Premium

AWS Certified Solutions Architect – Associate Questions and Answers (Dumps and Practice Questions)



Question : You create a new AWS account and you use the API to provision on-demand EC instances in a single Availability Zone. After instances are
provisioned all
subsequent requests fail. What could be causing this and how should you resolve it?

  : You create a new AWS account and you use the API to provision  on-demand EC instances in a single Availability Zone. After  instances are
1. There is a soft limit of 20 instances per region. Submit the limit increase form and retry the failed requests once approved.
2. AWS allows you to provision no more than 20 instances per Availability Zone. Select a different Availability Zone and retry the failed request.
3. Access Mostly Uused Products by 50000+ Subscribers
already provisioned and re-launch them all in a VPC.
4. You encountered an API throttling situation and should try the failed requests using an exponential decay retry algorithm.



Correct Answer : Get Lastest Questions and Answer







Question : What do you need to do to establish a VPN connection between an on-premises data center and an Amazon VPC virtual private gateway?

  : What do you need to do to establish a VPN connection between an on-premises data center and an Amazon VPC virtual private gateway?
1. Establish a dedicated networking connection using AWS Direct Connect.
2. Assign a static Internet-routable IP address to an Amazon VPC customer gateway.
3. Access Mostly Uused Products by 50000+ Subscribers
4. Modify the main route table to allow traffic to a network address translation instance.



Correct Answer : Get Lastest Questions and Answer







Question : A new startup has hired you to help them build a new web application. This application will ultimately store billions of images and videos in
Amazon Simple Storage
Service (S3) and is similar to DropBox. The company is a start up and does not have much funding, so it wants to minimize operational costs. They have an
aggressive marketing
strategy and they expect to double their current installation base every six months. Due to the nature of their business, they are expecting sudden and
large increases in traffic to
and from S3, and need to ensure that it can handle the performance needs of their application. What other key information must you gather from this customer
in order to determine
whether S3 is the right option for them?

  : A new startup has hired you to help them build a new web application. This application will ultimately store billions of images and videos in
1. You need to know the number of customers the company has today, because this will help you calculate how many customers the company will have
in 2 years.
2. You must find out the total number of requests per second at peak usage.
3. Access Mostly Uused Products by 50000+ Subscribers
4. In order to build the key namespace correctly, you must understand the total amount of storage needs for each S3 bucket.

Correct Answer : Get Lastest Questions and Answer




Related Questions


Question : You have deployed two tier application, in this web server in public subnet and db server in private subnet. You have also created a NAT instance in public subnet and
attached an EIP to that NAT instance and added route for that. Now, all the instances in private subnet need to download OS patch from internet and will access internet via NAT
instances. However, after entire configuration they are still not able to reach internet. What could be the possible reason?

  : You have deployed two tier application, in this web server in public subnet and db server in private subnet. You have also created a NAT instance in public subnet and
1. Keep the NAT instance in the same private subnet. So that instances from private subnet can reach NAT instances. And NAT instances can send back traffic to instances in private subnet.

2. Instances in private subnet can never access the internet. They have to be in public subnet.

3. Access Mostly Uused Products by 50000+ Subscribers

4. You would have to complete one more step on NAT instance, disable source/destination check on the NAT instance.



Question : You are building an automated transcription service in which Amazon EC worker
instances process an uploaded audio file and generate a text file. You must store both of
these files in the same durable storage until the text file is retrieved. You do not know what
the storage capacity requirements are. Which storage option is both cost-efficient and
scalable?
  : You are building an automated transcription service in which Amazon EC worker
1. Multiple Amazon EBS volume with snapshots
2. A single Amazon Glacier vault
3. Access Mostly Uused Products by 50000+ Subscribers
4. Multiple instance stores

Ans : 3



Question : You want to install, your own custom database on EC. So that you can migrate your in-house MySQL db. On that EC instance. Now, you have also attached an EIP and
Elastic Block store to that instance. After installing required software, it is recommended to stop and start the instance again. You have some license versioned data on instance
store as well. Because of this, how your entire configuration will be impacted?

A. EIP of the instance will be detached and you have to attach it again, after restart and it could be different one.
B. All the data which is on instance store will be lost.
C. You have to attach EBS back to the instance after re-start
D. Underlying host of EC2 instance would be changed
E. You have to re-create all the Security Group and NACL, previously you created for this instance.

  : You are building an automated transcription service in which Amazon EC worker
1. A,B
2. B,C
3. Access Mostly Uused Products by 50000+ Subscribers
4. A,D
5. B,D


Question : In the event of a planned or unplanned outage of your primary DB instance,
Amazon RDS automatically switches to a standby replica in another Availability Zone if you have enabled__________

 : In the event of a planned or unplanned outage of your primary DB instance,
1. More than One Read Replica
2. More Than one write Replica
3. Access Mostly Uused Products by 50000+ Subscribers
4. Multi Region Deployment


Question : Which of the following approaches provides the lowest cost for Amazon Elastic Block Store
snapshots while giving you the ability to fully restore data?

  : Which of the following approaches provides the lowest cost for Amazon Elastic Block Store
1. Maintain two snapshots: the original snapshot and the latest incremental snapshot.
2. Maintain a volume snapshot; subsequent snapshots will overwrite one another
3. Access Mostly Uused Products by 50000+ Subscribers
4. Maintain the most current snapshot, archive the original and incremental to Amazon Glacier.
Ans : 1
Exp :


Question : You try to connect via SSH to a newly created Amazon EC instance and get one of the
following error messages:
"Network error: Connection timed out" or "Error connecting to [instance], reason: ->
Connection timed out: connect,"
You have confirmed that the network and security group rules are configured correctly and
the instance is passing status checks. What steps should you take to identify the source of
the behavior? Choose 2 answers
A. Verify that the private key file corresponds to the Amazon EC2 key pair assigned at launch.
B. Verify that your IAM user policy has permission to launch Amazon EC2 instances.
C. Verify that you are connecting with the appropriate user name for your AMI.
D. Verify that the Amazon EC2 Instance was launched with the proper IAM role.
E. Verify that your federation trust to AWS has been established.
  : Which of the following approaches provides the lowest cost for Amazon Elastic Block Store
1. A,B
2. A,C
3. Access Mostly Uused Products by 50000+ Subscribers
4. C,D
Ans : 2
Exp :



Question : In VPC Network access control lists (ACLs) Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the ___________ level
  : Which of the following approaches provides the lowest cost for Amazon Elastic Block Store
1. Full VPC
2. Customer Gateway
3. Access Mostly Uused Products by 50000+ Subscribers
4. Subnet


Question : Which of the following is wrong statement for the Local Secondary Index


  : Which of the following is wrong statement for the Local Secondary Index
1. The key of a local secondary index consists of a hash key and a range key.
2. For each hash key, the total size of all indexed items must be 10 GB or less.
3. Access Mostly Uused Products by 50000+ Subscribers
4. When you query a local secondary index, you can choose either eventual consistency or strong consistency.
5. The hash key of the index is the same attribute as the hash key of the table. The range key can be any scalar table attribute.



Question :
A user has created multiple data points for the CloudWatch metrics with the dimensions
Box=UAT, App=Document and Box=UAT, App=Notes.
If the user queries CloudWatch with the dimension parameter as Server=Prod, what data will he get?


 :
1. The last value of the email and SMS metric
2. It will not return any data as the dimension for Box=UAT does not exist
3. Access Mostly Uused Products by 50000+ Subscribers
4. All values specified for the dimension Box=UAT, App=Notes

Ans : 2
Exp : A dimension is a key value pair used to uniquely identify a metric. The user cannot get the CloudWatch metrics statistics
if he has not defined the right combination of dimensions for it. In this case the dimension combination is either
Box=UAT, App=Document or Box=UAT, App=Notes. Thus, if the user tries to get the data for a dimension with Box=UAT,
it will not return any statistics. This is because the combination is not right and no statistics are defined for the dimension Box=UAT.

Dimensions help you design a structure for your statistics plan. Because dimensions are part of the unique identifier for a metric,
whenever you add a unique name value pair to one of your metrics, you are creating a new metric.

CloudWatch treats each unique combination of dimensions as a separate metric




Question :
For DynamoDB, which statement are correct ?
1.By using Proxy, it is not possible for a developer to achieve item level access control
2.By using FGAC, it is possible for a developer to achieve item level access control
3. Access Mostly Uused Products by 50000+ Subscribers
4.By using secret key, it is possible for a developer to achieve item level access control


 :
1. 1,2,3
2. 2,3,4
3. Access Mostly Uused Products by 50000+ Subscribers
4. 2,3,4
Ans : 1
Exp : Fine Grained Access Control (FGAC) gives a DynamoDB table owner a high degree of control over data in the table.
Specifically, the table owner can indicate who (caller) can access which items or attributes of the table and perform what actions (read / write capability).

To achieve this level of control without FGAC, a developer would have to choose from a few potentially onerous approaches. Some of these are:
1.Proxy: The application client sends a request to a brokering proxy that performs the authentication and authorization.
Such a solution increases the complexity of the system architecture and can result in a higher total cost of ownership (TCO).
2.Per Client Table: Every application client is assigned its own table. Since application clients access different tables,
they would be protected from one another. This could potentially require a developer to create millions of tables, thereby
making database management extremely painful.
3. Access Mostly Uused Products by 50000+ Subscribers
changing the token and handling its impact on the stored data. Here, the key of the items accessible by this client would contain the secret token.



Question : When you tries to enable lifecycle policies on the one of the S bucket, created by you,
but you are not able to do so on that particular bucket, what could be reason ?
 :
1. Bucket is corrupted
2. Versioning is enabled on that bucket
3. Access Mostly Uused Products by 50000+ Subscribers
4. None of the above