Premium

AWS Certified SysOps Administrator - Associate Questions and Answers (Dumps and Practice Questions)



Question : An application you maintain consists of multiple EC instances in a default tenancy VPC.
This application has undergone an internal audit and has been determined to require dedicated hardware for one instance. Your compliance team has given you a week to move
this instance to single-tenant hardware. Which process will have minimal impact on your application while complying with this requirement?

  : An application you maintain consists of multiple EC instances in a default tenancy VPC.
1. Create a new VPC with tenancy=dedicated and migrate to the new VPC
2. Use ec2-reboot-instances command line and set the parameter "dedicated=true"
3. Access Mostly Uused Products by 50000+ Subscribers
4. Stop the instance, create an AMI, launch a new instance with tenancy=dedicated, and terminate the old instance


Correct Answer : Get Lastest Questions and Answer :

Explanation: You cannot change the tenancy of a default instance after you've launched it. You can change the tenancy of an instance from "dedicated" to "host" after you've launched it, and
vice versa. This question states that dedicated tenancy is needed for one instance, not the entire VPC





Question : You have private video content in S that you want to serve to subscribed users on the
Internet. User IDs, credentials, and subscriptions are stored in an Amazon RDS database.
Which configuration will allow you to securely serve private content to your users?
  : You have private video content in S that you want to serve to subscribed users on the
1. Generate pre-signed URLs for each user as they request access to protected S3 content
2. Create an IAM user for each subscribed user and assign the GetObject permission to each IAM user
3. Access Mostly Uused Products by 50000+ Subscribers
4. Create a CloudFront Origin Identity user for your subscribed users and assign the GetObject permission to this user

Correct Answer : Get Lastest Questions and Answer :

Explanation: You can optionally secure the content in your Amazon S3 bucket so users can access it through CloudFront but cannot access it directly by using Amazon S3 URLs. This prevents
anyone from bypassing CloudFront and using the Amazon S3 URL to get content that you want to restrict access to. This step isn't required to use signed URLs, but we recommend it






Question : The compliance department within your multi-national organization requires that all data for
your customers that reside in the European Union (EU) must not leave the EU and also
data for customers that reside in the US must not leave the US without explicit
authorization.
What must you do to comply with this requirement for a web based profile management
application running on EC2?
  : The compliance department within your multi-national organization requires that all data for
1. Run EC2 instances in multiple AWS Availability Zones in single Region and
leverage an Elastic Load Balancer with session stickiness to route traffic to the appropriate
zone to create their profile
2. Run EC2 instances in multiple Regions and leverage Route 53's Latency Based
Routing capabilities to route traffic to the appropriate region to create their profile
3. Access Mostly Uused Products by 50000+ Subscribers
determine if a user needs to be redirect to the appropriate region to create their profile
4. Run EC2 instances in multiple AWS Availability Zones in a single Region and
leverage a third party data provider to determine if a user needs to be redirect to the
appropriate zone to create their profile


Correct Answer : Get Lastest Questions and Answer :

Explanation:



Related Questions


Question : You are running a web-application on AWS consisting of the following components an Elastic
Load Balancer (ELB) an Auto-Scaling Group of EC2 instances running Linux/PHP/Apache, and
Relational DataBase Service (RDS) MySQL.
Which security measures fall into AWS's responsibility?

  : You are running a web-application on AWS consisting of the following components an Elastic
1. Protect the EC2 instances against unsolicited access by enforcing the principle of leastprivilege access
2. Protect against IP spoofing or packet sniffing
3. Access Mostly Uused Products by 50000+ Subscribers

4. Install latest security patches on ELB. RDS and EC2 instances



Question : You use S to store critical data for your company Several users within your group currently have
full permissions to your S3 buckets You need to come up with a solution that does not impact your
users and also protect against the accidental deletion of objects.
Which two options will address this issue?
Choose 2 answers
A. Enable versioning on your S3 Buckets
B. Configure your S3 Buckets with MFA delete
C. Create a Bucket policy and only allow read only permissions to all users at the bucket level
D. Enable object life cycle policies and configure the data older than 3 months to be archived in Glacier
  : You use S to store critical data for your company Several users within your group currently have
1. A,C
2. C,D
3. Access Mostly Uused Products by 50000+ Subscribers
4. A,D
5. A,B




Question : An organization's security policy requires multiple copies of all critical data to be replicated across
at least a primary and backup data center. The organization has decided to store some criticaldata on Amazon S3.
Which option should you implement to ensure this requirement is met?
  : An organization's security policy requires multiple copies of all critical data to be replicated across
1. Use the S3 copy API to replicate data between two S3 buckets in different regions
2. You do not need to implement anything since S3 data is automatically replicated between regions
3. Access Mostly Uused Products by 50000+ Subscribers
4. You do not need to implement anything since S3 data is automatically replicated between multiple facilities within an AWS Region


Question : You are tasked with setting up a cluster of EC Instances for a NoSOL database The database
requires random read 10 disk performance up to a 100.000 IOPS at 4KB block side per node
Which of the following EC2 instances will perform the best for this workload?
  : You are tasked with setting up a cluster of EC Instances for a NoSOL database The database
1. A High-Memory Quadruple Extra Large (m2 4xlarge) with EBS-Optimized set to true and a PIOPs EBS volume
2. A Cluster Compute Eight Extra Large (cc2 8xlarge) using instance storage
3. Access Mostly Uused Products by 50000+ Subscribers
4. A Cluster GPU Quadruple Extra Large (cg1 4xlarge) using four separate 4000 PIOPS EBS volumes in a RAID 0 configuration




Question : When an EC EBS-backed (EBS root) instance is stopped, what happens to the data on any ephemermal store volumes?
  :  When an EC EBS-backed (EBS root) instance is stopped, what happens to the data on any ephemermal store volumes?
1. Data will be deleted and will no longer be accessible
2. Data Is automatically saved in an EBS volume.
3. Access Mostly Uused Products by 50000+ Subscribers
4. Data is unavailable until the instance is restarted



Question : Your team Is excited about theuse of AWS because now they have access to programmable
Infrastructure" You have been asked to manage your AWS infrastructure In a manner similar to
the way you might manage application code You want to be able to deploy exact copies of
different versions of your infrastructure, stage changes into different environments, revert back to
previous versions, and identify what versions are running at any particular time (development test
QA. production).

Which approach addresses this requirement?


  : Your team Is excited about theuse of AWS because now they have access to programmable
1. Use cost allocation reports and AWS Opsworks to deploy and manage your infrastructure.
2. Use AWS CloudWatch metrics and alerts along with resource tagging to deploy and manage your infrastructure.
3. Access Mostly Uused Products by 50000+ Subscribers
4. Use AWS CloudFormation and a version control system like GIT to deploy and manage your infrastructure.