Aws Asc
Aws Asc
1)
You work as a solutions architect for a Healthcare company that hosts all their
applications on Amazon EC2 instances. For compliance and governance perspective, the
company has to take daily, weekly, and monthly snapshots of all their volumes. For
auditing purpose there is a requirement to keep the snapshot for 6 months and next 6
months in grace period after which the snapshots can be deleted. To automate the
snapshot creation, the organization is already using Amazon Data Lifecycle Manager
(DLM) policies, so that no volume is left out from snapshot perspective. Recently you
discovered that the total snapshot cost has almost doubled as compared to total volume
cost.
What automated method can you take to reduce the total snapshot cost?
Manually identify the snapshots which need to be deleted via describe snapshot
API and then invoke a Delete Snapshot API based on snapshot age.
Create an archival policy Amazon EBS Snapshots with Amazon Data Lifecycle
Manager wherein the Snapshots will be archived after 6 months and deleted
after 1 year.
Comments: This is correct and recent feature to save costs on snapshots
(https://aws.amazon.com/blogs/storage/automatically-archive-amazon-ebs-
snapshots-with-amazon-data-lifecycle-manager/)
Push all the Snapshots to Amazon S3 bucket and then put a lifecycle policy on
that bucket to archive the snapshots after 6 months and delete it after 1 year.
Leverage the SSM Run command to delete the snapshots who have aged for 365
days.
Score: 0.79
Multiple Choice
2)
A company is working on a new product launch. Both production and test environments
are using similar Amazon EC2 instances with attached Amazon EBS volumes. The Billing
team will need a solution to monitor the costs of both environments to identify any
unexpected charges.
What should a solutions architect implement to ensure that the Billing team can identify
the charges for each environment? (Select TWO)
Which of the following factors would need you to look at to determine the actual cost of
AWS Backup? (Select TWO)
Security Groups
Network Access Control List (NACL)
Comments: A NACL has reach at the subnet level.
AWS WAF
AWS Network Firewall
Score: 0.79
Single Choice
5)
Your team is migrating an application from a cluster of Amazon EC2 instances into AWS
Lambda functions.
Which technical consideration will continue to be your responsibility after the transition
is complete?
Inject a user script via Ops Work to all of the Amazon EC2 instances that will push
the logs to this Amazon S3 bucket.
Create a schedule in AWS Systems Manager Maintenance window to move the
logs to S3 bucket every 2:00 AM in the morning.
Use SSM Session Manager to run a shell script on all Amazon EC2 instances 2:00
AM in the morning.
Use Systems Manager Distributor to transfer the logs every 2:00 AM on all the
AWS Systems Manager Managed instances.
Comments: This option is incorrect because SSM Distributor is used to
install packaged and not to execute scripts to do some task at a time
specified interval.
Score: 0.00
Single Choice
7)
A solutions architect has been tasked to migrate the shared filesystem for a High
Performance Compute (HPC) workload to AWS. The workload runs on Amazon Linux 2,
and requires a shared filesystem that can support sub-millisecond latencies, hundreds
of gigabytes per second of throughput, and millions of IOPS.
Which storage service should the solutions architect choose to meet these
requirements?
Amazon DocumentDB
Amazon RDS
Amazon Aurora
Amazon DynamoDB
Amazon ElastiCache
Score: 0.79
Multiple Choice
9)
What services can be used to perform hybrid network connectivity between on-premise
sites and Amazon VPCs? (Select TWO)
AWS WAF
Comments: With CloudFront, you would create a distribution and use
CloudFront's geo-blocking feature to restrict access at the country level.
Also, AWS WAF can be used to restrict access to a CloudFront distribution
at the country-level. Alternatively, Amazon Route 53, can be used. However
that would re-route requests from a restricted geography, for example, to
an error message page.
References:
Restricting the geographic distribution of your content
Using AWS WAF to control access to your content
3 Ways to Geo-Restrict your App
Amazon Route 53
Amazon CloudFront
Comments: With CloudFront, you would create a distribution and use
CloudFront's geo-blocking feature to restrict access at the country level.
Also, AWS WAF can be used to restrict access to a CloudFront distribution
at the country-level. Alternatively, Amazon Route 53, can be used. However
that would re-route requests from a restricted geography, for example, to
an error message page.
References:
Restricting the geographic distribution of your content
Using AWS WAF to control access to your content
3 Ways to Geo-Restrict your App
AWS Network Firewall
AWS Shield
Score: 0.79
Multiple Choice
14)
A company wants to allow their existing Active Directory users access to AWS without
having to recreate AWS IAM user accounts for every person.
Which of the following methods is the most cost effective solution to meet the
requirements? (Select TWO)
X.509 Certificate
OpenID Connect
SAML 2.0
Comments: To use an IdP, you create an IAM identity provider entity to
establish a trust relationship between your AWS account and the IdP. IAM
supports IdPs that are compatible with OpenID Connect (OIDC) or SAML 2.0
(Security Assertion Markup Language 2.0)
Cognito Identity Pool
Amazon Directory Services
Comments: AWS Directory Service for Microsoft Active Directory, also
known as AWS Managed Microsoft Active Directory (AD), enables your
directory-aware workloads and AWS resources to use managed Active
Directory (AD) in AWS.
Score: 0.39
Multiple Choice
15)
An on-premises customer uses GitHub, a code repository to store, track, and collaborate
on software projects, and Jenkins, an open source automation server used to automate
the building and testing of software. The customer is migrating to AWS.
AWS CodeCommit
Comments: AWS CodeCommit is a secure, highly scalable, managed source
control service that hosts private Git repositories."
AWS CodeDeploy
AWS CodeBuild
Comments: AWS CodeBuild is a fully managed continuous integration
service that compiles source code, runs tests, and produces ready-to-
deploy software packages."
AWS CloudFormation
Score: 0.79
Multiple Choice
16)
Some companies design their AWS workloads to update their components regularly, in
small, reversible increments.
Which pillar of the AWS Well-Architected Framework does this design support?
Operational Excellence
Comments: The Operational Excellence pillar includes the ability to support
development and run workloads effectively,
Reliability
Comments: The Operational Excellence pillar includes the ability to support
development and run workloads effectively,
Resilience
Security
Comments: The Operational Excellence pillar includes the ability to support
development and run workloads effectively,
Score: 0.79
Multiple Choice
17)
What API types are supported by Amazon API Gateway? (Select TWO)
TCP
HTTPS API
HTTP API
Comments: Amazon API Gateway offers two options to create RESTful APIs,
HTTP APIs and REST APIs, as well as an option to create WebSocket APIs.
UDP
GraphQL API
WebSocket API
Comments: Amazon API Gateway offers two options to create RESTful APIs,
HTTP APIs and REST APIs, as well as an option to create WebSocket APIs.
Score: 0.79
Single Choice
18)
Your company is looking to store session information from their backend Amazon EC2
instances and they want to identify the best database which can provide them
durability, high availability (HA), scalability and persistence. Since they want to store
session information, they want a database which can provide them microsecond
latency.
Which one of the following database can best satisfy the requirements?
Amazon DocumentDB
Amazon DynamoDB
Amazon MemoryDB for Redis
Comments: As discussed here
(https://aws.amazon.com/blogs/aws/introducing-amazon-memorydb-for-
redis-a-redis-compatible-durable-in-memory-database-service/#:
Amazon ElastiCache with Redis cluster mode enabled
Score: 0.79
Multiple Choice
19)
Your company uses Amazon Route 53 in their networking account to manage public
hosted zone records for their root domain, example.com. A developer in a different
account requires the ability to create, update, or delete DNS records for their public
application, app1.
How should you meet this requirement without giving the developer access to the
company's networking account, or control over the root domain? (Select TWO)
Transit Gateway
Direct Connect Gateway
Internet Gateway
Comments: Internet Gateway is used for direct Internet connectivity for
public subnets. Find more here:
https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Scenario2.html
Virtual Private Gateway
NAT Gateway
Comments: NAT Gateway is used for Internet direct connectivity for private
subnets. Find more here:
https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Scenario2.html
Score: 0.79
Single Choice
21)
Your company is exploring cloud computing and wants to start by building a small,
event-driven application that supports Marketing campaigns. The campaign will consist
of workflow that involves several discrete steps and target a small customer base. The
Marketing group wants the developers to build it quickly and have it ready for
customers as soon as possible. The developers want a visual way to track the individual
steps in the campaign.
Configure an Amazon EC2 instance and deploy the application to run there. Write
another service to run the application components when requested on another
EC2.
Use AWS Lambda for compute. Organize the Lambdas to run within AWS Step
Functions.
Comments: AWS Lambda is great for small applications, event-driven apps,
and enables fast development speed. Step Functions are specifically made
to visually organize Lambda functions in a workflow.
Run the application on AWS Batch. Set up Batch to call the Lambda for compute.
Run the application on AWS Batch. Organize the steps in the batch with AWS
Step Functions for compute.
Score: 0.79
Multiple Choice
22)
Your company uses an Identity Provider (IdP) for Single-sign on (SSO) and has tasked
their solutions architect with connecting their AWS Account to the IdP so their users can
leverage their corporate identity to access the environment.
What actions should the solutions architect take to meet these requirements? (Select
TWO)
Create an AWS IAM Identity Provider by uploading the JSON metadata document
from your IdP.
Create an AWS IAM User Group, associate the User Group with the IdP and add
users to the User Group.
Create an AWS IAM User with AWS Management Console Access, attach a policy
with a trust relationship with the IdP.
Create an AWS IAM Identity Provider by uploading the SAML metadata document
from your IdP.
Comments: This is correct, IdP metadata documents are provided in an
SAML format
Create an AWS IAM Role with a trust relationship with the IdP.
Comments: This is correct, Any IAM roles that will be used with IAM
federations require a trust policy to permit federation from the IdP
Score: 0.79
Multiple Choice
23)
You have to design a hybrid network architecture for an AWS Direct Connect link for
connecting to a customer's on-premise site.
What gateways can you use to make this connection? (Select THREE)
Internet Gateway
Transit Gateway
Comments: Transit Gateway can be used for an AWS Direct Connect link.
Direct Connect Gateway
Comments: Direct Connect Gateway can be used for an AWS Direct
Connect link.
NAT Gateway
Egress only Gateway
Virtual Private Gateway
Comments: Virtual Private Gateway can be used for an AWS Direct Connect
link.
Score: 0.79
Multiple Choice
24)
What are the components of Amazon VPC? (Select THREE)
Which of the following scenarios is valid when it comes to the usage of an EBS volume
while the snapshot is in progress?
Which is the best service that you could use to achieve this requirement?
What is the most cost effective storage option for original images and converted
thumbnails? (Select TWO)
Amazon ECS has built-in security; all of the images are stored in a container
registry that is only accessible through HTTPS.
Comments: True;
A cluster may contain a mix of tasks hosted on AWS Fargate, Amazon EC2
instances, or external instances.
Comments: True;
https://docs.aws.amazon.com/AmazonECS/latest/developerguide/clusters.ht
ml
Amazon ECS manages your cluster resources for all launch types.
Comments: False;
When using the EC2 launch type, you manage your cluster resources.
Amazon ECS supports multi-cloud integration.
Amazon ECS provides service discovery for a microservice architecture.
Easier to manage since your entire application need to be on a single task
definition.
Score: 0.52
Single Choice
30)
As the solutions architect in an organization, you are given an assignment to build an
application in AWS which is required to be deployed in an Auto Scaling group of On-
Demand Amazon EC2 instances and a MongoDB database. It is expected that the
database will have high-throughput workloads performing small, random I/O operations.
Which of the following is the most performant Amazon EBS type to use for your
database?
Which of the following options below would address this risk regardless of where the
request comes from?
Create a bucket policy for the designated bucket and create a condition using
as:SecureTransport to only allow encrypted connections over HTTPS.
Create a SCP policy for the organization with a condition to only write to the
bucket if the data is encrypted.
Create a SCP policy for the organization with a condition using
as:SecureTransport to only allow encrypted connections over HTTPS.
Create an IAM User policy with a condition that will only allow users to upload or
read from the designated bucket if as:SecureTransport is True.
Comments: Although, you can create an IAM User policy to enforce secure
transport, you have to make sure it is attached to all users who are
interacting with that bucket If you want to enforce secure transport for
anyone making requests, youll have to make sure everyone has this policy
attached which may require more management effort.
Score: 0.00
Single Choice
32)
A company operates in a highly regulated industry. The company stores log files in
Amazon S3. Industry policy requires that the company must not delete or overwritten
the log files for at least 6 months.
What can be added to the process flow in the state machine to help recover
automatically from a stuck condition created by an un-returned result from a task?
Create a cron job that will automatically retrigger the state machine after a
certain amount of time.
Use timeouts to avoid stuck executions.
Comments: By default, the Amazon States Language doesn't specify
timeouts for state machine definitions. Without an explicit timeout, Step
Functions often relies solely on a response from an activity worker to know
that a task is complete. If something goes wrong and the TimeoutSeconds
field isn't specified for an Activity or Task state, an execution is stuck
waiting for a response that will never come.
Create a Pass process flow to bypass the problem task.
Remove the problem task from the state machine.
Score: 0.79
Multiple Choice
35)
Your CEO decided to migrate your data center to AWS. You are engaged as the AWS
migration specialist to create a business case and decide to use AWS Migration
Evaluator.
Which of the following are included in the business case report? (Select THREE)
What troubleshooting step should you take to ensure secure SSH traffic is allowed into
your Amazon EC2 instance?
Configure your security group to all inbound traffic over port 22 from 0.0.0.0/0.
Configure your security group and network ACL to all inbound traffic over port 22
from your company's private IP address range.
Comments: You must add rules to allow traffic through your security group.
Configure your network ACL to allow outbound traffic over port 22 from your
company's private IP address range.
Configure your network ACL to allow inbound traffic over port 22 from your
company's private IP address range.
Score: 0.79
Multiple Choice
38)
Which open source databases are compatible with Amazon Aurora? (Select TWO)
Redis
PostgreSQL
Comments: Amazon Aurora (Aurora) is a fully managed relational database
engine that's compatible with MySQL and PostgreSQL.
https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/CHAP_A
uroraOverview.html
SQL Server
MySQL
Comments: Amazon Aurora (Aurora) is a fully managed relational database
engine that's compatible with MySQL and PostgreSQL.
https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/CHAP_A
uroraOverview.html
MariaDB
Score: 0.79
Single Choice
39)
Your company has an on-premises contact center.Your CTO is looking to migrate to the
cloud to reduce operational workloads and costs.
Amazon Connect
Comments: Amazon Connect is an easy-to-use omnichannel cloud contact
center that helps you provide superior customer service at a lower cost
Alexa for business
Amazon Chime
Amazon Monitron
Score: 0.79
Single Choice
40)
Your team is deploying a new solution on Amazon ECS. Since your team is new to the
cloud, your director wants you to use AWS provided permissions to ensure reusability
and automatic updates.
Which type of AWS provided permission policy should you use to enable principals to
create, manage, and describe Amazon EC2 Auto Scaling resources?
Multi-factor authentication
Managed policy
Comments: A managed policy is provided by AWS and can be attached to
multiple principal entities like groups and roles for reusability. It will also
receive updates from AWS automatically.
Inline policy
Custom policy
Score: 0.79
Single Choice
41)
A company is developing a highly available web application using stateless web servers.
Which service is most suitable for storing ephemeral session state data?
Amazon ElastiCache
Comments: Amazon ElastiCache supports requests that are latency
sensitive at less than a millisecond for response times and data that is
stored in RAM is ephemeral which is ideal for storing session data.
Storage Gateway
Amazon DynamoDB
Amazon S3
Score: 0.79
Single Choice
42)
A solutions architect needs to test the connectivity of different protocols, such as ICMP,
between an Amazon EC2 instance and an Internet Gateway, both in the same AWS
account.
AWS Fargate
AWS Elastic Beanstalk
Amazon Elastic Kubernetes Service (EKS)
Comments: https://aws.amazon.com/eks/
How can you configure storage between 512MB and 10,240MB, in 1MB increments?
(Select TWO)
How can you retrieve an endpoint of the newly created instance? (Select TWO)
In the IP address design, which CIDRs can be assigned to these subnets? (Select TWO)
10.0.0.0/32
10.0.0.0/29
10.0.0.0/30
10.0.0.0/28
Comments: A subnet CIDR allowed block size is between a /28 netmask and
/16 netmask. Find more here:
https://docs.aws.amazon.com/vpc/latest/userguide/configure-subnets.html
10.0.0.16/27
Comments: A subnet CIDR allowed block size is between a /28 netmask and
/16 netmask. Find more here:
https://docs.aws.amazon.com/vpc/latest/userguide/configure-subnets.html
Score: 0.79
Single Choice
47)
Your company has an internal knowledge base which has large number of files. 1000s of
new files are added to the knowledge base every week and once a month outdated files
are removed.The total storage requirements for the knowledge base can vary greatly
based on additions, removals and modifications of the files.The knowledge base is
accessed via a web application which runs on multiple Amazon EC2 instances behind an
application load balancer. Every EC2 instance needs to access all of the files.
Amazon EBS
Amazon S3
Amazon EFS
Comments: Amazon Elastic File System (Amazon EFS) is a simple,
serverless, set-and-forget elastic file system that makes it easy to set up,
scale, and cost-optimize file storage in AWS.
Amazon FSx for Lustre
Score: 0.79
Single Choice
48)
A healthcare company has strict security requirements and they need to make sure that
data in Amazon S3 buckets is not publicly accessible. However, one of their team
members inadvertently made a bucket publicly available. The Security team of the
company wants to implement a solution that would prevent public access to any
buckets requiring minimal administrative effort.
What gateways can you use to make this connection? (Select TWO)
Which of the following is the simplest way to recover the objects from overwrite?
Configure bucket policy (Permissions -> Bucket Policy) that will Deny
s3:DeleteObject action.
Enable versioning for Amazon S3 buckets.
Comments: For overwrites, Versioning is the best option because S3 will
retain previous versions of an object whether an object is updated
(overwritten).
Copy Amazon S3 objects periodically to Amazon Elastic Block Storage (EBS)
volume as a backup.
Create a snapshot of the Amazon S3 bucket.
Score: 0.79