Premium

AWS Certified SysOps Administrator - Associate Questions and Answers (Dumps and Practice Questions)



Question : A user is collecting records per second. The user wants to send the data to CloudWatch using the
custom namespace. Which of the below mentioned options is recommended for this activity?
 : A user is collecting  records per second. The user wants to send the data to CloudWatch using the
1. Aggregate the data with statistics, such as Min, max, Average, Sum and Sample data and send the
data to CloudWatch
2. Send all the data values to CloudWatch in a single command by separating them with a comma.
CloudWatch will parse automatically
3. Access Mostly Uused Products by 50000+ Subscribers
4. It is not possible to send all the data in one call. Thus, it should be sent one by one. CloudWatch will aggregate the data automatically


Correct Answer : Get Lastest Questions and Answer :

AWS CloudWatch supports the custom metrics. The user can always capture the custom data and upload the data to CloudWatch using CLI or
APIs. The user can publish data to CloudWatch as single data points or as an aggregated set of data points called a statistic set using the
command put-metric-data. It is recommended that when the user is having multiple data points per minute, he should aggregate the data so that it
will minimize the number of calls to put-metric-data. In this case it will be single call to CloudWatch instead of 1000 calls if the data is aggregated.




Question : A user is trying to create an EBS volume with the highest PIOPS supported by EBS. What is the minimum size of EBS required to have the
maximum IOPS?

 : A user is trying to create an EBS volume with the highest PIOPS supported by EBS. What is the minimum size of EBS required to have the
1. 124
2. 150
3. Access Mostly Uused Products by 50000+ Subscribers
4. 128


Correct Answer : Get Lastest Questions and Answer :

Explanation: A provisioned IOPS EBS volume can range in size from 10 GB to 1 TB and the user can provision up to 4000 IOPS per volume. The ratio
of IOPS provisioned to the volume size requested should be a maximum of 30. 30=4000/x .Hence, 134 is the closest value.





Question : An organization is trying to create various IAM users. Which of the below mentioned options is not a valid IAM username?
 : An organization is trying to create various IAM users. Which of the below mentioned options is not a valid IAM username?
1. John.cloud
2. john@cloud
3. Access Mostly Uused Products by 50000+ Subscribers
4. john#cloud


Correct Answer : Get Lastest Questions and Answer :


Explanation: AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS
services. Whenever the organization is creating an IAM user, there should be a unique ID for each user. The names of users, groups, roles,
instance profiles must be alphanumeric, including the following common characters: +,=,,., period @, and dash -


Related Questions


Question : How can you secure data at rest on an EBS volume?
  : How can you secure data at rest on an EBS volume?
1. Encrypt the volume using the S3 server-side encryption service.
2. Attach the volume to an instance using EC2's SSL interface.
3. Access Mostly Uused Products by 50000+ Subscribers
4. Write the data randomly instead of sequentially.
5. Use an encrypted file system m top of the EBS volume.


Question : In AWS, which security aspects are the customer's responsibility? Choose answers
A. Controlling physical access to compute resources
B. Patch management on the EC2 instance s operating system
C. Encryption of EBS (Elastic Block Storage) volumes
D. Life-cycle management of IAM credentials
E. Decommissioning storage devices
F. Security Group and ACL (Access Control List) settings

  : In AWS, which security aspects are the customer's responsibility? Choose  answers
1. A,C,E,F
2. C,D,E,F
3. Access Mostly Uused Products by 50000+ Subscribers
4. B,C,E,F

5. B,C,D,F




Question : A .NET application that you manage is running in Elastic Beanstalk. Your developers tell
you they will need access to application log files to debug issues that arise. The
infrastructure will scale up and down.
How can you ensure the developers will be able to access only the log files?


  : A .NET application that you manage is running in Elastic Beanstalk. Your developers tell
1. Access the log files directly from Elastic Beanstalk
2. Enable log file rotation to S3 within the Elastic Beanstalk configuration
3. Access Mostly Uused Products by 50000+ Subscribers
4. Connect to each Instance launched by Elastic Beanstalk and create a Windows Scheduled task to rotate the log files to S3.



Question : Your organization is preparing for a security assessment of your use of AWS.
In preparation for this assessment, which two IAM best practices should you consider

implementing? Choose 2 answers
A. Create individual IAM users for everyone in your organization
B. Configure MFA on the root account and for privileged IAM users
C. Assign IAM users and groups configured with policies granting least privilege access
D. Ensure all users have been assigned and are frequently rotating a password, access ID/secret key, and X.509 certificate
  : Your organization is preparing for a security assessment of your use of AWS.
1. A,C
2. A,D
3. Access Mostly Uused Products by 50000+ Subscribers
4. B,D
5. A,B