Question : You create a new AWS account and you use the API to provision on-demand EC instances in a single Availability Zone. After instances are provisioned all subsequent requests fail. What could be causing this and how should you resolve it?
1. There is a soft limit of 20 instances per region. Submit the limit increase form and retry the failed requests once approved. 2. AWS allows you to provision no more than 20 instances per Availability Zone. Select a different Availability Zone and retry the failed request. 3. Access Mostly Uused Products by 50000+ Subscribers already provisioned and re-launch them all in a VPC. 4. You encountered an API throttling situation and should try the failed requests using an exponential decay retry algorithm.
Question : What do you need to do to establish a VPN connection between an on-premises data center and an Amazon VPC virtual private gateway?
1. Establish a dedicated networking connection using AWS Direct Connect. 2. Assign a static Internet-routable IP address to an Amazon VPC customer gateway. 3. Access Mostly Uused Products by 50000+ Subscribers 4. Modify the main route table to allow traffic to a network address translation instance.
Question : A new startup has hired you to help them build a new web application. This application will ultimately store billions of images and videos in Amazon Simple Storage Service (S3) and is similar to DropBox. The company is a start up and does not have much funding, so it wants to minimize operational costs. They have an aggressive marketing strategy and they expect to double their current installation base every six months. Due to the nature of their business, they are expecting sudden and large increases in traffic to and from S3, and need to ensure that it can handle the performance needs of their application. What other key information must you gather from this customer in order to determine whether S3 is the right option for them?
1. You need to know the number of customers the company has today, because this will help you calculate how many customers the company will have in 2 years. 2. You must find out the total number of requests per second at peak usage. 3. Access Mostly Uused Products by 50000+ Subscribers 4. In order to build the key namespace correctly, you must understand the total amount of storage needs for each S3 bucket.
1. Keep the NAT instance in the same private subnet. So that instances from private subnet can reach NAT instances. And NAT instances can send back traffic to instances in private subnet.
2. Instances in private subnet can never access the internet. They have to be in public subnet.
Question : You want to install, your own custom database on EC. So that you can migrate your in-house MySQL db. On that EC instance. Now, you have also attached an EIP and Elastic Block store to that instance. After installing required software, it is recommended to stop and start the instance again. You have some license versioned data on instance store as well. Because of this, how your entire configuration will be impacted?
A. EIP of the instance will be detached and you have to attach it again, after restart and it could be different one. B. All the data which is on instance store will be lost. C. You have to attach EBS back to the instance after re-start D. Underlying host of EC2 instance would be changed E. You have to re-create all the Security Group and NACL, previously you created for this instance.
1. Maintain two snapshots: the original snapshot and the latest incremental snapshot. 2. Maintain a volume snapshot; subsequent snapshots will overwrite one another 3. Access Mostly Uused Products by 50000+ Subscribers 4. Maintain the most current snapshot, archive the original and incremental to Amazon Glacier. Ans : 1 Exp :
Question : You try to connect via SSH to a newly created Amazon EC instance and get one of the following error messages: "Network error: Connection timed out" or "Error connecting to [instance], reason: -> Connection timed out: connect," You have confirmed that the network and security group rules are configured correctly and the instance is passing status checks. What steps should you take to identify the source of the behavior? Choose 2 answers A. Verify that the private key file corresponds to the Amazon EC2 key pair assigned at launch. B. Verify that your IAM user policy has permission to launch Amazon EC2 instances. C. Verify that you are connecting with the appropriate user name for your AMI. D. Verify that the Amazon EC2 Instance was launched with the proper IAM role. E. Verify that your federation trust to AWS has been established. 1. A,B 2. A,C 3. Access Mostly Uused Products by 50000+ Subscribers 4. C,D Ans : 2 Exp :
Question : In VPC Network access control lists (ACLs) Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the ___________ level 1. Full VPC 2. Customer Gateway 3. Access Mostly Uused Products by 50000+ Subscribers 4. Subnet
1. The key of a local secondary index consists of a hash key and a range key. 2. For each hash key, the total size of all indexed items must be 10 GB or less. 3. Access Mostly Uused Products by 50000+ Subscribers 4. When you query a local secondary index, you can choose either eventual consistency or strong consistency. 5. The hash key of the index is the same attribute as the hash key of the table. The range key can be any scalar table attribute.
1. The last value of the email and SMS metric 2. It will not return any data as the dimension for Box=UAT does not exist 3. Access Mostly Uused Products by 50000+ Subscribers 4. All values specified for the dimension Box=UAT, App=Notes
Ans : 2 Exp : A dimension is a key value pair used to uniquely identify a metric. The user cannot get the CloudWatch metrics statistics if he has not defined the right combination of dimensions for it. In this case the dimension combination is either Box=UAT, App=Document or Box=UAT, App=Notes. Thus, if the user tries to get the data for a dimension with Box=UAT, it will not return any statistics. This is because the combination is not right and no statistics are defined for the dimension Box=UAT.
Dimensions help you design a structure for your statistics plan. Because dimensions are part of the unique identifier for a metric, whenever you add a unique name value pair to one of your metrics, you are creating a new metric.
CloudWatch treats each unique combination of dimensions as a separate metric
Question : For DynamoDB, which statement are correct ? 1.By using Proxy, it is not possible for a developer to achieve item level access control 2.By using FGAC, it is possible for a developer to achieve item level access control 3. Access Mostly Uused Products by 50000+ Subscribers 4.By using secret key, it is possible for a developer to achieve item level access control
1. 1,2,3 2. 2,3,4 3. Access Mostly Uused Products by 50000+ Subscribers 4. 2,3,4 Ans : 1 Exp : Fine Grained Access Control (FGAC) gives a DynamoDB table owner a high degree of control over data in the table. Specifically, the table owner can indicate who (caller) can access which items or attributes of the table and perform what actions (read / write capability).
To achieve this level of control without FGAC, a developer would have to choose from a few potentially onerous approaches. Some of these are: 1.Proxy: The application client sends a request to a brokering proxy that performs the authentication and authorization. Such a solution increases the complexity of the system architecture and can result in a higher total cost of ownership (TCO). 2.Per Client Table: Every application client is assigned its own table. Since application clients access different tables, they would be protected from one another. This could potentially require a developer to create millions of tables, thereby making database management extremely painful. 3. Access Mostly Uused Products by 50000+ Subscribers changing the token and handling its impact on the stored data. Here, the key of the items accessible by this client would contain the secret token.
Question : When you tries to enable lifecycle policies on the one of the S bucket, created by you, but you are not able to do so on that particular bucket, what could be reason ? 1. Bucket is corrupted 2. Versioning is enabled on that bucket 3. Access Mostly Uused Products by 50000+ Subscribers 4. None of the above