Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
AWS-SysOps
Free trial
Verified
Question 126
A user has setup a custom application which generates a number in decimals. The user wants to track that number and setup the alarm whenever the number is above a certain limit. The application is sending the data to CloudWatch at regular intervals for this purpose. Which of the below mentioned statements is not true with respect to the above scenario?
- A: The user can get the aggregate data of the numbers generated over a minute and send it to CloudWatch
- B: The user has to supply the time zone with each data point
- C: CloudWatch will not truncate the number until it has an exponent larger than 126 (i.e. (1 x 10^126))
- D: The user can create a file in the JSON format with the metric name and value and supply it to CloudWatch
Question 127
A user has launched an EC2 Windows instance from an instance store backed AMI. The user has also set the Instance initiated shutdown behavior to stop. What will happen when the user shuts down the OS?
- A: It will not allow the user to shutdown the OS when the shutdown behavior is set to Stop
- B: It is not possible to set the termination behavior to Stop for an Instance store backed AMI instance
- C: The instance will stay running but the OS will be shutdown
- D: The instance will be terminated
Question 128
A user has enabled versioning on an S3 bucket. The user is using server side encryption for data at Rest. If the user is supplying his own keys for encryption
(SSE-C., which of the below mentioned statements is true?
- A: The user should use the same encryption key for all versions of the same object
- B: It is possible to have different encryption keys for different versions of the same object
- C: AWS S3 does not allow the user to upload his own keys for server side encryption
- D: The SSE-C does not work when versioning is enabled
Question 129
A user has created a VPC with CIDR 20.0.0.0/16. The user has created one subnet with CIDR 20.0.0.0/16 in this VPC. The user is trying to create another subnet with the same VPC for CIDR 20.0.0.1/24. What will happen in this scenario?
- A: The VPC will modify the first subnet CIDR automatically to allow the second subnet IP range
- B: It is not possible to create a subnet with the same CIDR as VPC
- C: The second subnet will be created
- D: It will throw a CIDR overlaps error
Question 130
A user has launched an RDS MySQL DB with the Multi AZ feature. The user has scheduled the scaling of instance storage during maintenance window. What is the correct order of events during maintenance window?
- Perform maintenance on standby
- Promote standby to primary
- Perform maintenance on original primary
- Promote original master back as primary
- A: 1, 2, 3, 4
- B: 1, 2, 3
- C: 2, 3, 1, 4
Question 131
A sys admin is using server side encryption with AWS S3. Which of the below mentioned statements helps the user understand the S3 encryption functionality?
- A: The server side encryption with the user supplied key works when versioning is enabled
- B: The user can use the AWS console, SDK and APIs to encrypt or decrypt the content for server side encryption with the user supplied key
- C: The user must send an AES-128 encrypted key
- D: The user can upload his own encryption key to the S3 console
Question 132
A root account owner is trying to understand the S3 bucket ACL. Which of the below mentioned options cannot be used to grant ACL on the object using the authorized predefined group?
- A: Authenticated user group
- B: All users group
- C: Log Delivery Group
- D: Canonical user group
Question 133
A user has created a VPC with CIDR 20.0.0.0/16 using the wizard. The user has created a public subnet CIDR (20.0.0.0/24) and VPN only subnets CIDR
(20.0.1.0/24) along with the VPN gateway (vgw-12345) to connect to the user's data center. The user's data center has CIDR 172.28.0.0/12. The user has also setup a NAT instance (i-123456) to allow traffic to the internet from the VPN subnet. Which of the below mentioned options is not a valid entry for the main route table in this scenario?
- A: Destination: 20.0.1.0/24 and Target: i-12345
- B: Destination: 0.0.0.0/0 and Target: i-12345
- C: Destination: 172.28.0.0/12 and Target: vgw-12345
- D: Destination: 20.0.0.0/16 and Target: local
Question 134
A user has created a VPC with public and private subnets using the VPC wizard. The VPC has CIDR 20.0.0.0/16. The private subnet uses CIDR 20.0.0.0/24 . The
NAT instance ID is i-a12345. Which of the below mentioned entries are required in the main route table attached with the private subnet to allow instances to connect with the internet?
- A: Destination: 0.0.0.0/0 and Target: i-a12345
- B: Destination: 20.0.0.0/0 and Target: 80
- C: Destination: 20.0.0.0/0 and Target: i-a12345
- D: Destination: 20.0.0.0/24 and Target: i-a12345
Question 135
You have two Elastic Compute Cloud (EC2) instances inside a Virtual Private Cloud (VPC) in the same Availability Zone (AZ) but in different subnets. One instance is running a database and the other instance an application that will interface with the database. You want to confirm that they can talk to each other for your application to work properly.
Which two things do we need to confirm in the VPC settings so that these EC2 instances can communicate inside the VPC? (Choose two.)
- A: A network ACL that allows communication between the two subnets.
- B: Both instances are the same instance class and using the same Key-pair.
- C: That the default route is set to a NAT instance or internet Gateway (IGW) for them to communicate.
- D: Security groups are set to allow the application host to talk to the database on the right port/protocol.
Question 136
A root account owner has given full access of his S3 bucket to one of the IAM users using the bucket ACL. When the IAM user logs in to the S3 console, which actions can he perform?
- A: He can just view the content of the bucket
- B: He can do all the operations on the bucket
- C: It is not possible to give access to an IAM user using ACL
- D: The IAM user can perform all operations on the bucket using only API/SDK
Question 137
An organization has configured Auto Scaling with ELB. There is a memory issue in the application which is causing CPU utilization to go above 90%. The higher
CPU usage triggers an event for Auto Scaling as per the scaling policy. If the user wants to find the root cause inside the application without triggering a scaling activity, how can he achieve this?
- A: Stop the scaling process until research is completed
- B: It is not possible to find the root cause from that instance without triggering scaling
- C: Delete Auto Scaling until research is completed
- D: Suspend the scaling process until research is completed
Question 138
A sys admin is planning to subscribe to the RDS event notifications. For which of the below mentioned source categories the subscription cannot be configured?
- A: DB security group
- B: DB snapshot
- C: DB options group
- D: DB parameter group
Question 139
A user has launched an EC2 instance. The instance got terminated as soon as it was launched. Which of the below mentioned options is not a possible reason for this?
- A: The user account has reached the maximum EC2 instance limit
- B: The snapshot is corrupt
- C: The AMI is missing. It is the required part
- D: The user account has reached the maximum volume limit
Question 140
A user is trying to understand the detailed CloudWatch monitoring concept. Which of the below mentioned services does not provide detailed monitoring with
CloudWatch?
- A: AWS EMR
- B: AWS RDS
- C: AWS ELB
- D: AWS Route53
Question 141
A user is measuring the CPU utilization of a private data center machine every minute. The machine provides the aggregate of data every hour, such as Sum of data, Min value, Max value, and Number of Data points.
The user wants to send these values to CloudWatch. How can the user achieve this?
- A: Send the data using the put-metric-data command with the aggregate-values parameter
- B: Send the data using the put-metric-data command with the average-values parameter
- C: Send the data using the put-metric-data command with the statistic-values parameter
- D: Send the data using the put-metric-data command with the aggregate ג€"data parameter
Question 142
A user has enabled detailed CloudWatch monitoring with the AWS Simple Notification Service. Which of the below mentioned statements helps the user understand detailed monitoring better?
- A: SNS will send data every minute after configuration
- B: There is no need to enable since SNS provides data every minute
- C: AWS CloudWatch does not support monitoring for SNS
- D: SNS cannot provide data every minute
Question 143
A user has setup a VPC with CIDR 20.0.0.0/16. The VPC has a private subnet (20.0.1.0/24. and a public subnet (20.0.0.0/24.. The user's data center has CIDR of
20.0.54.0/24 and 20.1.0.0/24. If the private subnet wants to communicate with the data center, what will happen?
- A: It will allow traffic communication on both the CIDRs of the data center
- B: It will not allow traffic with data center on CIDR 20.1.0.0/24 but allows traffic communication on 20.0.54.0/24
- C: It will not allow traffic communication on any of the data center CIDRs
- D: It will allow traffic with data center on CIDR 20.1.0.0/24 but does not allow on 20.0.54.0/24
Question 144
A user wants to find the particular error that occurred on a certain date in the AWS MySQL RDS DB. Which of the below mentioned activities may help the user to get the data easily?
- A: It is not possible to get the log files for MySQL RDS
- B: Find all the transaction logs and query on those records
- C: Direct the logs to the DB table and then query that table
- D: Download the log file to DynamoDB and search for the record
Question 145
A user is trying to send custom metrics to CloudWatch using the PutMetricData APIs. Which of the below mentioned points should the user needs to take care while sending the data to CloudWatch?
- A: The size of a request is limited to 8KB for HTTP GET requests and 40KB for HTTP POST requests
- B: The size of a request is limited to 128KB for HTTP GET requests and 64KB for HTTP POST requests
- C: The size of a request is limited to 40KB for HTTP GET requests and 8KB for HTTP POST requests
- D: The size of a request is limited to 16KB for HTTP GET requests and 80KB for HTTP POST requests
Question 146
Which services allow the customer to retain full administrative privileges of the underlying EC2 instances? (Choose two.)
- A: Amazon Elastic Map Reduce
- B: Elastic Load Balancing
- C: AWS Elastic Beanstalk
- D: Amazon Elasticache
- E: Amazon Relational Database service
Question 147
An AWS account owner has setup multiple IAM users. One IAM user only has CloudWatch access. He has setup the alarm action which stops the EC2 instances when the CPU utilization is below the threshold limit. What will happen in this case?
- A: It is not possible to stop the instance using the CloudWatch alarm
- B: CloudWatch will stop the instance when the action is executed
- C: The user cannot set an alarm on EC2 since he does not have the permission
- D: The user can setup the action but it will not be executed if the user does not have EC2 rights
Question 148
A user has configured ELB with Auto Scaling. The user suspended the Auto Scaling terminate process only for a while. What will happen to the availability zone rebalancing process (AZRebalance. during this period?
- A: Auto Scaling will not launch or terminate any instances
- B: Auto Scaling will allow the instances to grow more than the maximum size
- C: Auto Scaling will keep launching instances till the maximum instance size
- D: It is not possible to suspend the terminate process while keeping the launch active
Question 149
A user has created a mobile application which makes calls to DynamoDB to fetch certain data. The application is using the DynamoDB SDK and root account access/secret access key to connect to DynamoDB from mobile. Which of the below mentioned statements is true with respect to the best practice for security in this scenario?
- A: The user should create a separate IAM user for each mobile application and provide DynamoDB access with it
- B: The user should create an IAM role with DynamoDB and EC2 access. Attach the role with EC2 and route all calls from the mobile through EC2
- C: The application should use an IAM role with web identity federation which validates calls to DynamoDB with identity providers, such as Google, Amazon, and Facebook
- D: Create an IAM Role with DynamoDB access and attach it with the mobile application
Question 150
A user is configuring the Multi AZ feature of an RDS DB. The user came to know that this RDS DB does not use the AWS technology, but uses server mirroring to achieve HA. Which DB is the user using right now?
- A: My SQL
- B: Oracle
- C: MS SQL
- D: PostgreSQL
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!