Premium

AWS Certified Solutions Architect – Associate Questions and Answers (Dumps and Practice Questions)



Question :
Which parameter of the as-create-launch-config command displays the URL used to call the AWS Auto Scaling service?


  :
1. show-URL
2. show-request
3. Access Mostly Uused Products by 50000+ Subscribers
4. show-endpoint

Correct Answer : Get Lastest Questions and Answer :

Explanation: The AWS Auto Scaling launch config creates a template of the parameters which are required to launch an EC2 instance.
The parameter show-request is used to display the URL, which is the tool to call the AWS Service.





Question :
___________ provides a highly secure and convenient way to store and manage keys.


  :
1. AWS CloudHSM
2. AWS VPC
3. Access Mostly Uused Products by 50000+ Subscribers
4. AWS PGP

Correct Answer : Get Lastest Questions and Answer :

Explanation: The AWS CloudHSM service allows you to meet corporate, contractual and regulatory compliance requirements for data security. It uses Hardware Security
Module (HSM) that you can connect directly into the Amazon AWS Infrastructure.






Question :
A user is aware that a huge download is occurring on his instance.
He has already set the Auto Scaling policy to increase the instance count when the network I/O
increases beyond a certain limit. How can the user ensure that this temporary event does not result in scaling?

  :
1. The network I/O are not affected during data download
2. There is no way the user can stop scaling as it is already configured
3. Access Mostly Uused Products by 50000+ Subscribers
4. Suspend scaling

Correct Answer : Get Lastest Questions and Answer :

Explanation: The user may want to stop the automated scaling processes on the Auto Scaling groups either to perform manual operations or during emergency
situations. To perform this, the user can suspend one or more scaling processes at any time. Once it is completed, the user can resume all the suspended
processes.





Related Questions


Question : Which is true about AWS S data replication?
  : Which is true about AWS S data replication?
1. AWS replicate S3 data across the regions automatically.

2. AWS replicate S3 data across the availability zone in a Region

3. You have to create an IAM role to automatically replicate the data across the regions

4. None of the above


Question : As you know, HadoopExam.com needs to provide video course access to only authorized member. How that can be best implemented in AWS,
assuming videos needs to be streamed across various Geography


  : As you know, HadoopExam.com  needs to provide video course access to only authorized member. How that can be best implemented in AWS,
1. Save videos in S3 bucket. And copy the same bucket in all other regions

2. Save videos in S3 bucket and enable the cross region replication

3. Save videos in EMR

4. Use cloudfront with signed URLS


Question : Which of the follwing is a feature of IAM ?

A Central control of users and security credentials: You can control creation, rotation, and revocation of each users AWS security credentials (such as access keys)

B Central control of user access: You can control what data in the AWS system users can access and how they access it

C Shared AWS resources: Users can share data for collaborative projects

D Permissions based on organizational groups: You can restrict users AWS access based on their job duties (for example, admin, developer, etc.) or
departments. When users move inside the organization, you can easily update their AWS access to reflect the change in their role

E Central control of AWS resources: Your organization maintains central control of the AWS data the users create, with no breaks in continuity or lost
data as users move around within or leave the organization
  :  Which of the follwing is a feature of IAM ?
1. A,B,C only
2. A,D,E Only
3. A, B,E Only
4. A,B,C,D Only
5. A,B,C,D,E All mentioned


Question : Suppose you have created an EC , during the processing some data is generated which is stored on the root device.
One of your colleague terminate this instance in between, so what happen to the data on root device?

  : Suppose you have created an EC , during the processing some data is generated which is stored on the root device.
1. As soon as instance is terminated data will be copied to S3.
2. As soon as instance is terminated data will be copied to the EBS.
3. As soon as instance is terminated data will be deleted.
4. Nothing happend to the data, it will remain as it is until you delete it.


Question : You have launched AWS EC windows instance. Now as an administrator you want to connect to Windows instance using RDP. What process you
need to follow ?
  : You have launched AWS EC windows instance. Now as an administrator you want to connect to Windows instance using RDP. What process you
1. You must have IAM role defined to do RDP and use that role to connect to windows instance.

2. You have to use putty and ssh shell to do RDP

3. Access Mostly Uused Products by 50000+ Subscribers

4. Using the private keys , you have to first decrypt the default administrator password on EC2 console. This password you can use for
remotely connecting to AWS Windows instance.



Question : You have created a DB instance in VPC, for your web application (www.HadoopExam.com). You have not configured any rule to access this DB.
Which statement is correct?


  : You have created a DB instance in VPC, for your web application (www.HadoopExam.com). You have not configured any rule to access this DB.
1. There is no access to this DB by default. We have to explicitly assign some rule in security group to give access.

2. As part of default security group anybody can access this DB

3. Access Mostly Uused Products by 50000+ Subscribers

4. Port 80 will be open so, it can be reached using HTTP protocol.