Premium

AWS Certified Solutions Architect – Associate Questions and Answers (Dumps and Practice Questions)



Question : Which of the following approaches provides the lowest cost for Amazon Elastic Block Store
snapshots while giving you the ability to fully restore data?

  : Which of the following approaches provides the lowest cost for Amazon Elastic Block Store
1. Maintain two snapshots: the original snapshot and the latest incremental snapshot.
2. Maintain a volume snapshot; subsequent snapshots will overwrite one another
3. Access Mostly Uused Products by 50000+ Subscribers
4. Maintain the most current snapshot, archive the original and incremental to Amazon Glacier.
Ans : 1
Exp :


Question : You try to connect via SSH to a newly created Amazon EC instance and get one of the
following error messages:
"Network error: Connection timed out" or "Error connecting to [instance], reason: ->
Connection timed out: connect,"
You have confirmed that the network and security group rules are configured correctly and
the instance is passing status checks. What steps should you take to identify the source of
the behavior? Choose 2 answers
A. Verify that the private key file corresponds to the Amazon EC2 key pair assigned at launch.
B. Verify that your IAM user policy has permission to launch Amazon EC2 instances.
C. Verify that you are connecting with the appropriate user name for your AMI.
D. Verify that the Amazon EC2 Instance was launched with the proper IAM role.
E. Verify that your federation trust to AWS has been established.
  : Which of the following approaches provides the lowest cost for Amazon Elastic Block Store
1. A,B
2. A,C
3. Access Mostly Uused Products by 50000+ Subscribers
4. C,D
Ans : 2
Exp :



Question : In VPC Network access control lists (ACLs) Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the ___________ level
  : Which of the following approaches provides the lowest cost for Amazon Elastic Block Store
1. Full VPC
2. Customer Gateway
3. Access Mostly Uused Products by 50000+ Subscribers
4. Subnet

Correct Answer : Get Lastest Questions and Answer :

Explanation: Amazon VPC provides two features that you can use to increase security for your VPC:
Security groups Act as a firewall for associated Amazon EC2 instances, controlling both inbound and outbound traffic at the instance level
Network access control lists (ACLs) Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the subnet level

When you launch an instance in a VPC, you can associate one or more security groups that youve created.
Each instance in your VPC could belong to a different set of security groups. If you dont specify a security group when you launch an instance,
the instance automatically belongs to the default security group for the VPC.






Question : Which of the following is wrong statement for the Local Secondary Index


  : Which of the following is wrong statement for the Local Secondary Index
1. The key of a local secondary index consists of a hash key and a range key.
2. For each hash key, the total size of all indexed items must be 10 GB or less.
3. Access Mostly Uused Products by 50000+ Subscribers
4. When you query a local secondary index, you can choose either eventual consistency or strong consistency.
5. The hash key of the index is the same attribute as the hash key of the table. The range key can be any scalar table attribute.


Correct Answer : Get Lastest Questions and Answer :

Explanation: A local secondary index lets you query over a single partition, as specified by the hash key value in the query.
A global secondary index lets you query over the entire table, across all partitions.





Question :
A user has created multiple data points for the CloudWatch metrics with the dimensions
Box=UAT, App=Document and Box=UAT, App=Notes.
If the user queries CloudWatch with the dimension parameter as Server=Prod, what data will he get?


 :
1. The last value of the email and SMS metric
2. It will not return any data as the dimension for Box=UAT does not exist
3. Access Mostly Uused Products by 50000+ Subscribers
4. All values specified for the dimension Box=UAT, App=Notes

Ans : 2
Exp : A dimension is a key value pair used to uniquely identify a metric. The user cannot get the CloudWatch metrics statistics
if he has not defined the right combination of dimensions for it. In this case the dimension combination is either
Box=UAT, App=Document or Box=UAT, App=Notes. Thus, if the user tries to get the data for a dimension with Box=UAT,
it will not return any statistics. This is because the combination is not right and no statistics are defined for the dimension Box=UAT.

Dimensions help you design a structure for your statistics plan. Because dimensions are part of the unique identifier for a metric,
whenever you add a unique name value pair to one of your metrics, you are creating a new metric.

CloudWatch treats each unique combination of dimensions as a separate metric




Question :
For DynamoDB, which statement are correct ?
1.By using Proxy, it is not possible for a developer to achieve item level access control
2.By using FGAC, it is possible for a developer to achieve item level access control
3. Access Mostly Uused Products by 50000+ Subscribers
4.By using secret key, it is possible for a developer to achieve item level access control


 :
1. 1,2,3
2. 2,3,4
3. Access Mostly Uused Products by 50000+ Subscribers
4. 2,3,4
Ans : 1
Exp : Fine Grained Access Control (FGAC) gives a DynamoDB table owner a high degree of control over data in the table.
Specifically, the table owner can indicate who (caller) can access which items or attributes of the table and perform what actions (read / write capability).

To achieve this level of control without FGAC, a developer would have to choose from a few potentially onerous approaches. Some of these are:
1.Proxy: The application client sends a request to a brokering proxy that performs the authentication and authorization.
Such a solution increases the complexity of the system architecture and can result in a higher total cost of ownership (TCO).
2.Per Client Table: Every application client is assigned its own table. Since application clients access different tables,
they would be protected from one another. This could potentially require a developer to create millions of tables, thereby
making database management extremely painful.
3. Access Mostly Uused Products by 50000+ Subscribers
changing the token and handling its impact on the stored data. Here, the key of the items accessible by this client would contain the secret token.



Question : When you tries to enable lifecycle policies on the one of the S bucket, created by you,
but you are not able to do so on that particular bucket, what could be reason ?
 :
1. Bucket is corrupted
2. Versioning is enabled on that bucket
3. Access Mostly Uused Products by 50000+ Subscribers
4. None of the above




Correct Answer : Get Lastest Questions and Answer :
Explanation: :


Related Questions


Question :
In regard to DynamoDB actions, which of the following statement is the meaning of HTTP Status Code: 403?



  :
1. The request was denied due to request throttling.
2. The AWS access key ID needs a subscription for the service.
3. Access Mostly Uused Products by 50000+ Subscribers
4. The query string contains a syntax error.



Question :
How many Elastic Network Interfaces and IP addresses can be attached to a singe EC2 instance running in VPC?


  :
1. It depends on the instance type. However, the maximum number of network interfaces that can be attached to the largest instance is 8.
2. The maximum number of network interfaces that can be attached to any instance is 8.
3. Access Mostly Uused Products by 50000+ Subscribers
4. It depends on the instance type. However, the maximum number of network interfaces that can be attached to the largest instance is 6.



Question :
If you're using the command line tools or API to set up your VPC, ______ .


  :
1. the wizard will prompt you to close it and reopen when you try this for the first time
2. the wizard automatically updates the route tables to use the gateway
3. Access Mostly Uused Products by 50000+ Subscribers
4. None of the above



Question :
In regards to VPC, select the correct statement:
  :
1. A customer gateway can be a physical or software appliance.
2. A customer gateway should be a software appliance not a physical one
3. Access Mostly Uused Products by 50000+ Subscribers
4. None of these



Question :
What could be the minimum duration between two data points when filtering the CloudWatch metrics based on the statistics?
  :
1. 1 minute
2. 5 minutes
3. Access Mostly Uused Products by 50000+ Subscribers
4. 1 day



Question :
Can SWF tasks be long running?
  :
1. Yes
2. Amazon SWF doesn't support "long running" tasks.
3. Access Mostly Uused Products by 50000+ Subscribers
4. No