GoCloud CSA Practice Exam Qs Flashcards
Practice exam questions from GoCloud's Solutions Architect Associate Exam Guide
An organization has an application in their on-premises data center that stores multiple 5GB files per day in S3. Recently many of these uploads have been failing. The customer’s data center is geographically close to the S3 region where they store their data. What can the organization do to increase the reliability of data transfers to AWS without incurring substantial costs?
A) Upload data to S3 using transfer acceleration
B) Upload data as part of a multipart upload
C) Upload data to glacier and then copy to S3
D) Upgrade to a faster connection to the internet
B) Upload data as part of a multipart upload
An organization has users who upload a large number of files (each file is about 30MB) each day to S3. Recently, many of these uploads have been very slow. The organization’s employees are spread throughout the world. What can the organization do to increase the performance of these transfers to S3?
A) Upload data to S3 using transfer acceleration
B) Upload data as part of a multipart upload
C) Upload data to Glacier and then copy to S3
D) Upgrade to a faster connection to the internet
A) Upload data to S3 using transfer acceleration
You have deployed a three-tier architecture in a VPC with a CIDR block of 172.16.1.0/28. The initial deployment has two web servers, two application servers, two database servers, and a custom server deployed on an EC2 instance. All web, application servers, and database servers are spread across two availability zones. Additionally, there is an ELB and DNS using Route 53. Demand for the application grows, and autoscaling is not able to keep up with demand, as autoscaling stops after adding two additional servers.
Why did autoscaling stop adding instances? Choose two:
A) AWS reserves the first four and last IP addresses, so there are not enough addresses to launch additional instances.
B) There should be 15 usable addresses in a /28 subnet, so there must be a configuration error.
C) Autoscaling is configured improperly.
D) The customer needs a larger subnet, i.e. a /27 instead of a /28.
A) AWS reserves the first four and last IP addresses, so there are not enough addresses to launch additional instances.
D) The customer needs a larger subnet, i.e. a /27 instead of a /28.
When using IAM, a group is regarded as a:
A) Collection of AWS accounts
B) Collection of AWS users
C) Collection of computing instances
D) Link between a database and a compute instance
B) Collection of AWS users
You have set up an autoscaling policy to scale in and out. You would like to control which instances are stopped first. How would you configure this?
A) IAM Role
B) A termination policy
C) Route 53
D) DynamoDB
B) A termination policy
What are characteristics of VPC subnets? Choose 3:
A) Each subnet maps to a single availability zone.
B) Subnets are spread across availability zones.
C) Instances in a private subnet can access the internet if they have an elastic IP.
D) The smallest subnet on AWS is a /28.
E) With the default configuration all subnets can route between each other in a VPC.
A) Each subnet maps to a single availability zone.
D) The smallest subnet on AWS is a /28.
E) With the default configuration all subnets can route between each other in a VPC.
In a CloudFormation template, each identified resource includes the following:
A) An operating system and AMI
B) A dedicated host and hypervisor
C) Logical ID, resource type, and resource properties
D) Physical ID, resource type, and resource properties
C) Logical ID, resource type, and resource properties
Every time you attempt to delete an SSL certificate from the IAM certificate store, you keep getting the error “Certificate: <certificate-id> is being used by CloudFront”. What is the most likely reason for this error?
A) SSL certificates cannot be deleted.
B) You do not have sufficient IAM permissions.
C) CloudFront is not set up properly.
D) Prior to deleting the SSL certificate, its necessary to rotate SSL certificates or revert to the default CloudFront certificate.</certificate-id>
D) Prior to deleting the SSL certificate, its necessary to rotate SSL certificates or revert to the default CloudFront certificate.
You plan on launching a new product. There is tremendous buzz and enthusiasm around the product launch, but you don’t know exactly the demand. Orders will be sent to the database, so it’s critical that writes to the database will not be lost. What is the best way to be sure orders are not lost when being written to the database?
A) Use a Microsoft SQL server cluster.
B) Use DynamoDB with the max write capacity.
C) Use an Amazon Simple Queue Service (SQS) to store orders until written to the database.
D) Add additional read replicas.
C) Use an Amazon Simple Queue Service (SQS) to store orders until written to the database.
An organization wants autoscaling to scale out at 65 percent CPU utilization and scale in at 35 percent. How can the organization make sure this occurs?
A) Use auto-scaling with the default policy.
B) Use autoscaling with a policy.
C) Use CloudWatch alarms to send an SNS message to autoscale.
D) It is not possible to scale at these CPU levels.
B) Use autoscaling with a policy.
Which of the following EBS volume types is ideal for applications with light or burst I/O requirements?
A) Provisioned IOPS
B) EBS General Purpose SSD (gp2)
C) EBS Throughput Optimized HDD (st1)
D) EBS Cold HDD (sc1)
D) EBS Cold HDD (sc1)
Which of the following EBS volume types is ideal for applications requiring the lowest latency possible?
A) Provisioned IOPS
B) EBS General Purpose SSD (gp2)
C) EBS Throughput Optimized HDD (st1)
D) EBS Cold HDD (sc1)
A) Provisioned IOPS
Your company is getting ready to make a major public announcement about a highly anticipated new product. The website is running on EC2 instances deployed across multiple Availability Zones with a Multi-AZ RDS MySQL Extra Large DB Instance. There are a large number of read and writes on the database. After examination you discover that there is read contention on RDS MySQL. How can you best scale in this environment?
A) Deploy ElastiCache in-memory cache running in each availability zone.
B) Add an SQS queue in front of the RDS MySQL database.
C) Increase the RDS MySQL instance size and implement provisioned IOPS.
D) Add an RDS MySQL read replica in each availability zone.
D) Add an RDS MySQL read replica in each availability zone.
An organization has a requirement for the highest-throughput and lowest-latency storage option. The organization is willing to trade redundancy for performance. What is the best RAID option for this situation?
A) Raid 0
B) Raid 1
C) Raid 5
D) Raid 10
A) Raid 0
An organization has a requirement for the highest-throughput and lowest-latency storage option with complete redundancy. What is the best RAID option for this situation?
A) Raid 0
B) Raid 1
C) Raid 5
D) Raid 10
D) Raid 10
An organization requires a solution that provides complete redundancy. Speed is not a concern. What is the best RAID option?
A) Raid 0
B) Raid 1
C) Raid 5
D) Raid 10
B) Raid 1
Your company is developing a next-generation wearable device that collects health information to assist individuals with adopting healthy lifestyles. The sensor will push 25 KB of health data in JSON format every 2 seconds. The data should be processed and analyzed, and information should be sent to the individual’s primary care provider.
The application must provide the ability for real-time analytics of the inbound health data. The health data must be highly durable. The results of the analytic processing should persist for data mining.
Which architecture outlined below will meet the initial requirements for the collection platform?
A) Use S3 to collect the inbound sensor data analyze the data with Amazon Athena.
B) Use Amazon Kinesis to collect the inbound sensor data, analyze the data with Kinesis clients, and save the results to a Redshift cluster using EMR.
C) Send data to SNS to collect the inbound sensor data and save the results to AWS RDS Multi-AZ.
D) Send the data to SQS, which then sends to DynamoDB.
B) Use Amazon Kinesis to collect the inbound sensor data, analyze the data with Kinesis clients, and save the results to a Redshift cluster using EMR.
A new reality game show is being created. During the show users will vote for their favorite contestant. It is expected that millions of users will be voting. The votes must be collected into a durable, scalable, and highly available location. Which service should you use?
A) Amazon DynamoDB
B) Amazon Redshift
C) Microsoft SQL Server
D) AWS S3
A) Amazon DynamoDB
You are tasked with creating a solution to analyze a customer’s clickstream data on a website to analyze user behavior. The analysis must provide the sequence of pages that are clicked by websites users. This data will be used in real time to optimize the website’s performance in terms of page stickiness and advertising click-through rates. Which is the best option to capture and analyze user behavior in real time?
A) Send web clicks data to Amazon S3, and then analyze and analyze behavior using Amazon Athena.
B) Push web clicks data to Amazon Kinesis and analyze behavior using Kinesis workers.
C) Write web clicks directly to DynamoDB.
D) Write web clicks directly to Amazon RDS for Oracle.
B) Push web clicks data to Amazon Kinesis and analyze behavior using Kinesis workers.
An application provides data transformation services. Data to be transformed is uploaded to Amazon S3 and then transformed by a fleet of spot EC2 instances. VIP customers should have their files transformed before other customers. How should you implement a system that services VIP customers first?
A) This cannot be performed, as the apposition process messages in the order they are received.
B) Use an ELB to distribute VIP traffic first and then generic traffic to the spot fleet of transformation instances.
C) Set up two SQS queues, priority queue for VIP customers and a second queue with default priority for everyone else. Have the transformation instances first poll the high-priority queue; if there is no message, then poll the default priority queue.
D) Use SNS to send a message to administrators to manually send VIP customers data for immediate transformation.
C) Set up two SQS queues, priority queue for VIP customers and a second queue with default priority for everyone else. Have the transformation instances first poll the high-priority queue; if there is no message, then poll the default priority queue.
An organization is planning on setting up a bastion host to help manage systems on their VPC. The bastion host must be reachable from all internet addresses. The bastion host must also be able to access the internal network and should only be open to SSH traffic from a small CIDR range of addresses. How can the bastion host be configured for this purpose?
A) This cannot be performed, as the host is on a public subnet.
B) Create two network interfaces on two different subnets. Assign security groups to allow external traffic on the public interface and SSH traffic on the internal network interface.
C) Create two network interfaces with the same subnets. Assign security groups to allow external traffic on the public interface and SSH traffic on the internal network interface.
D) Separate the services. Put the web server on an EC2 instance and set up a second server for SSH traffic.
B) Create two network interfaces on two different subnets. Assign security groups to allow external traffic on the public interface and SSH traffic on the internal network interface.
_____________ pricing offers a significant discount over on-demand pricing. This pricing approach works well for mission-critical applications with known capacity utilization and known duration of use.
A) Discount voucher
B) Reserved instance
C) AWS coupon code
D) Spot instance
B) Reserved instance
An organization’s security policy requires encryption of sensitive data at rest. The data is stored on an EBS volume which is attached to an EC2 instance. Which options would facilitate encrypting your data at rest? (Choose 3):
A) Leverage third-party volume encryption tools.
B) Move data from EBS to S3.
C) Encrypt data prior to storing on EBS.
D) Encrypt data using native data encryption drivers at the file system level.
E) Unnecessary, as all data on AWS is encrypted.
A) Leverage third-party volume encryption tools.
C) Encrypt data prior to storing on EBS.
D) Encrypt data using native data encryption drivers at the file system level.
What does the PollForTask action perform when it’s called by a task runner in AWS Data Pipeline?
A) It retrieves the pipeline definition.
B) It sends an SNS message to AWS administrators.
C) It sends the data to the next application in the task.
D) It performs the next task to perform from AWS Data Pipeline.
A) It retrieves the pipeline definition.