Premium

AWS Certified Solutions Architect – Associate Questions and Answers (Dumps and Practice Questions)



Question : Which of the following is used by Amazon RDS to provide high availability and failover support for DB instances
  : Which of the following is used by Amazon RDS to provide high availability and failover support for DB instances
1. Multi Region Deployment of DB Instances
2. Multi-AZ deployments
3. Access Mostly Uused Products by 50000+ Subscribers
4. Read Replicas

Correct Answer : Get Lastest Questions and Answer :

Amazon RDS provides high availability and failover support for DB instances using Multi-AZ deployments. Multi-AZ deployments for Oracle,
PostgreSQL, and MySQL DB instances use Amazon technology to automatically provision and maintain a synchronous standby replica in a different Availability
Zone.
The primary DB instance is synchronously replicated across Availability Zones to a standby replica to provide data redundancy,
eliminate I/O freezes, and minimize latency spikes during system backups. Running a DB instance with high availability can enhance
availability during planned system maintenance, and help protect your databases against DB instance failure and Availability Zone disruption.

Note that the high-availability feature is not a scaling solution for read-only scenarios;
you cannot use a standby replica to serve read traffic. To service read-only traffic, you should use a read replica.






Question : What would you use to categorize your EC resources by application or purpose?

 :  What would you use to categorize your EC resources by application or purpose?
1. Instance Names
2. Filters
3. Access Mostly Uused Products by 50000+ Subscribers
4. None of Above


Correct Answer : Get Lastest Questions and Answer :

Explanation: Tags enable you to categorize your AWS resources in different ways, for example, by purpose, owner, or environment. Each tag consists of a key and
a value, both of which you define. For example, you could define a set of tags for your account's Amazon EC2 instances that helps you track each
instance's owner and stack level. We recommend that you devise a set of tag keys that meets your needs for each resource type. Using a consistent set of
tag keys makes it easier for you to manage your resources. You can search and filter the resources based on the tags you add.




Question :

What is the maximum write throughput that can be provisioned for a single DynamoDB table?

 :
1. 1,000 write capacity units
2. 10,000 write capacity units
3. Access Mostly Uused Products by 50000+ Subscribers
4. There are throughput capacity limits but after 10,000 AWS must be contacted first.

Correct Answer : Get Lastest Questions and Answer :


Explanation: No, you can increase the throughput you have provisioned for your table using UpdateTable API or in the AWS Management Console. DynamoDB is able to
operate at massive scale and there is no theoretical limit on the maximum throughput you can achieve. DynamoDB automatically divides your table across
multiple partitions, where each partition is an independent parallel computation unit. DynamoDB can achieve increasingly high throughput rates by adding more
partitions.

If you wish to exceed throughput rates of 10,000 writes/second or 10,000 reads/second, you must first contact Amazon


Related Questions


Question : When creation of an EBS snapshot is initiated, but not completed, the EBS volume:
  : When creation of an EBS snapshot is initiated, but not completed, the EBS volume:
1. Can be used while the snapshot is in progress.
2. Cannot be detached or attached to an EC2 instance until the snapshot completes
3. Access Mostly Uused Products by 50000+ Subscribers
4. Cannot be used until the snapshot completes.


Question : In VPC for Your Customer Gateway, to establish ephemeral keys to secure all communication between your customer gateway and the virutal
private gateway IKE uses

  : In VPC for Your Customer Gateway,  to establish ephemeral keys to secure all communication between your customer gateway and the virutal
1. Utilize the AES 128-bit encryption function
2. Utilize IPsec Dead Peer Detection
3. Access Mostly Uused Products by 50000+ Subscribers
4. Diffie-Hellman Perfect Forward Secrecy in "Group 2" mode



Question : Suppose an Elastic Network Interfaces (ENI) has been automatically created and attached to an instance using the EC Console.
If, later on, the instance is terminated, what will the default termination behavior of the ENI be?
  :  Suppose an Elastic Network Interfaces (ENI) has been automatically created and attached to an instance using the EC Console.
1. Will be Deleted
2. Will be Terminated
3. Access Mostly Uused Products by 50000+ Subscribers
4. Unpredicatble



Question : If the network interface has an Elastic IP address associated with it and regarding Disassociating an Elastic IP Address from a Network
Interface
1. You can disassociate the address
2. You can either associate it with another network interface once disassociated
3. Access Mostly Uused Products by 50000+ Subscribers

Which of the above is correct
  : If the network interface has an Elastic IP address associated with it and regarding Disassociating an Elastic IP Address from a Network
1. 1,2,3
2. 1,2
3. Access Mostly Uused Products by 50000+ Subscribers
4. 2,3




Question : To enable traffic encryption between the clients that initiate HTTPS sessions with your load balancer , Can a user configure TLS with AWS ELB?

  :  To enable traffic encryption between the clients that initiate HTTPS sessions with your load balancer , Can a user configure TLS with AWS ELB?
1. Yes, You have to install SSL certificate on ELB
2. Yes, You have to enable HTTPS listener
3. Access Mostly Uused Products by 50000+ Subscribers
4. Yes, only at the EC2 instance level


Question : The __________ header helps you identify the IP address of a client when you use a load balancer configured for TCP/SSL connections.
Because load balancers intercept traffic between clients and your back-end instances, the access logs from your back-end instance
contain the IP address of the load balancer instead of the originating client.


 : The __________ header helps you identify the IP address of a client when you use a load balancer configured for TCP/SSL connections.
1. Proxy Protocol
2. HTTPS Protocol
3. Access Mostly Uused Products by 50000+ Subscribers
4. SSL/TLS protocol