Practice exam 5 Flashcards
A company is using EC2 Instances to run their e-commerce site on the AWS platform. If the site becomes unavailable, the company will lose a significant amount of money for each minute the site is unavailable. Which design principle should the company use to minimize the risk of an outage?
A. Least Privilege.
B. Pilot Light.
C. Fault Tolerance.
D. Multi-threading.
C. Fault Tolerance.
You decide to buy a reserved instance for a term of one year. Which option provides the largest total discount?
A. All up-front reservation.
B. All reserved instance payment options provide the same discount level.
C. Partial up-front reservation.
D. No up-front reservation.
All up-front reservation.
What features does AWS offer to help protect your data in the Cloud? (Choose TWO)
A. Access control.
B. Physical MFA devices.
C. Data encryption.
D. Unlimited storage.
E. Load balancing.
A. Access control.
C. Data encryption.
An AWS customer has used one Amazon Linux instance for 2 hours, 5 minutes and 9 seconds, and one CentOS instance for 4 hours, 23 minutes and 7 seconds. How much time will the customer be billed for?
A. 3 hours for the Linux instance and 5 hours for the CentOS instance.
B. 2 hours, 5 minutes and 9 seconds for the Linux instance and 4 hours, 23 minutes and 7 seconds for the CentOS instance.
C. 2 hours, 5 minutes and 9 seconds for the Linux instance and 5 hours for the CentOS instance.
D. 3 hours for the Linux instance and 4 hours, 23 minutes and 7 seconds for the CentOS instance.
C. 2 hours, 5 minutes and 9 seconds for the Linux instance and 5 hours for the CentOS instance.
What is the AWS Support feature that allows customers to manage support cases programmatically?
A. AWS Trusted Advisor.
B. AWS Operations Support.
C. AWS Support API.
D. AWS Personal Health Dashboard.
C. AWS Support API.
Which methods can be used by customers to interact with AWS Identity and Access Management (IAM)? (Choose TWO)
A. AWS CLI.
B. AWS Security Groups.
C. AWS SDKs.
D. AWS Network Access Control Lists.
E. AWS CodeCommit.
A. AWS CLI.
C. AWS SDKs.
Which of the following are types of AWS Identity and Access Management (IAM) identities? (Choose TWO)
A. AWS Resource Groups.
B. IAM Policies.
C. IAM Roles.
D. IAM Users.
E. AWS Organizations.
C. IAM Roles.
D. IAM Users.
Which of the following Amazon RDS features facilitates offloading of database read activity?
A. Database Snapshots.
B. Multi-AZ Deployments.
C. Automated Backups.
D. Read Replicas.
D. Read Replicas.
How does AWS notify customers about security and privacy events pertaining to AWS services?
A. Using the AWS ACM service.
B. Using Security Bulletins.
C. Using the AWS Management Console.
D. Using Compliance Resources.
B. Using Security Bulletins.
Which IAM entity can best be used to grant temporary access to your AWS resources?
A. IAM Users.
B. Key Pair.
C. IAM Roles.
D. IAM Groups.
C. IAM Roles.
A company has a web application that is hosted on a single EC2 instance and is approaching 100 percent CPU Utilization during peak loads. Rather than scaling the server vertically, the company has decided to deploy three Amazon EC2 instances in parallel and to distribute traffic across the three servers. What AWS Service should the company use to distribute the traffic evenly?
A. AWS Global Accelerator.
B. AWS Application Load Balancer (ALB).
C. Amazon CloudFront.
D. Transit VPC.
B. AWS Application Load Balancer (ALB).
Which of the following approaches will help you eliminate human error and automate the process of creating and updating your AWS environment?
A. Use Software test automation tools.
B. Use AWS CodeDeploy to build and automate your AWS environment.
C. Use code to provision and operate your AWS infrastructure.
D. Migrate all of your applications to a dedicated host.
C. Use code to provision and operate your AWS infrastructure.
A company is seeking to better secure its AWS account from unauthorized access. Which of the below options can the customer use to achieve this goal?
A. Restrict any API call made through SDKs or CLI.
B. Create one IAM account for each department in the company (Development, QA, Production), and share it across all staff in that department.
C. Require Multi-Factor Authentication (MFA) for all IAM User access.
D. Set up two login passwords.
C. Require Multi-Factor Authentication (MFA) for all IAM User access.
Which AWS Service offers volume discounts based on usage?
A. Amazon VPC.
B. Amazon S3.
C. Amazon Lightsail.
D. AWS Cost Explorer. E. AWS
B. Amazon S3.
Which of the following factors should be considered when determining the region in which AWS Resources will be deployed? (Choose TWO)
A. The AWS Region’s security level.
B. Data sovereignty.
C. Cost.
D. The planned number of VPCs.
E. Geographic proximity to the company’s location.
B. Data sovereignty.
C. Cost.
You are running a financial services web application on AWS. The application uses a MySQL database to store the data. Which of the following AWS services would improve the performance of your application by allowing you to retrieve information from fast in-memory caches?
A. Amazon EFS.
B. Amazon Neptune.
C. Amazon ElastiCache.
D. DAX.
C. Amazon ElastiCache.
What are the advantages of using Auto Scaling Groups for EC2 instances?
A. Auto Scaling Groups caches the most recent responses at global edge locations to reduce latency and improve performance.
B. Auto Scaling Groups scales EC2 instances in multiple Availability Zones to increase application availability and fault tolerance.
C. Auto Scaling Groups scales EC2 instances across multiple regions to reduce latency for global users.
D. Auto Scaling Groups distributes application traffic across multiple Availability Zones to enhance performance.
B. Auto Scaling Groups scales EC2 instances in multiple Availability Zones to increase application availability and fault tolerance.
The TCO gap between AWS infrastructure and traditional infrastructure has widened over the recent years. Which of the following could be the reason for that?
A. AWS helps customers invest more in capital expenditures.
B. AWS automates all infrastructure operations, so customers save more on human resources costs.
C. AWS continues to lower the cost of cloud computing for its customers.
D. AWS secures AWS resources at no additional charge.
C. AWS continues to lower the cost of cloud computing for its customers.
Which of the following are examples of the customer’s responsibility to implement “security IN the cloud”? (Choose TWO)
A. Building a schema for an application.
B. Replacing physical hardware.
C. Creating a new hypervisor.
D. Patch management of the underlying infrastructure.
E. File system encryption.
A. Building a schema for an application.
E. File system encryption.
Which of the following is a type of MFA device that customers can use to protect their AWS resources?
A. AWS CloudHSM.
B. U2F Security Key.
C. AWS Access Keys.
D. AWS Key Pair.
B. U2F Security Key.