ExamGecko
Home Home / Amazon / CLF-C02

Amazon CLF-C02 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











Which task can a company perform by using security groups in the AWS Cloud?

A.
Allow access to an Amazon EC2 instance through only a specific port.
A.
Allow access to an Amazon EC2 instance through only a specific port.
Answers
B.
Deny access to malicious IP addresses at a subnet level.
B.
Deny access to malicious IP addresses at a subnet level.
Answers
C.
Protect data that is cached by Amazon CloudFront.
C.
Protect data that is cached by Amazon CloudFront.
Answers
D.
Apply a stateless firewall to an Amazon EC2 instance.
D.
Apply a stateless firewall to an Amazon EC2 instance.
Answers
Suggested answer: A

Explanation:

Security groups are virtual firewalls that control the inbound and outbound traffic for Amazon EC2 instances. They can be used to allow access to an Amazon EC2 instance through only a specific port, such as port 22 for SSH or port 80 for HTTP. Security groups cannot deny access to malicious IP addresses at a subnet level, as they only allow or deny traffic based on the rules defined by the customer. To block malicious IP addresses, customers can use network ACLs, which are stateless firewalls that can be applied to subnets. Security groups cannot protect data that is cached by Amazon CloudFront, as they only apply to EC2 instances. To protect data that is cached by Amazon CloudFront, customers can use encryption, signed URLs, or signed cookies. Security groups are not stateless firewalls, as they track the state of the traffic and automatically allow the response traffic to flow back to the source. Stateless firewalls do not track the state of the traffic and require rules for both inbound and outbound traffic.

A company needs to centralize its operational dat a. The company also needs to automate tasks across all of its Amazon EC2 instances.

Which AWS service can the company use to meet these requirements?

A.
AWS Trusted Advisor
A.
AWS Trusted Advisor
Answers
B.
AWS Systems Manager
B.
AWS Systems Manager
Answers
C.
AWS CodeDeploy
C.
AWS CodeDeploy
Answers
D.
AWS Elastic Beanstalk
D.
AWS Elastic Beanstalk
Answers
Suggested answer: B

Explanation:

AWS Systems Manager is a service that enables users to centralize and automate the management of their AWS resources. It provides a unified user interface to view operational data, such as inventory, patch compliance, and performance metrics. It also allows users to automate common and repetitive tasks, such as patching, backup, and configuration management, across all of their Amazon EC2 instances1. AWS Trusted Advisor is a service that provides best practices and recommendations to optimize the performance, security, and cost of AWS resources2. AWS CodeDeploy is a service that automates the deployment of code and applications to Amazon EC2 instances or other compute services3. AWS Elastic Beanstalk is a service that simplifies the deployment and management of web applications using popular platforms, such as Java, PHP, and Node.js4.

A company needs Amazon EC2 instances for a workload that can tolerate interruptions.

Which EC2 instance purchasing option meets this requirement with the LARGEST discount compared to On-Demand prices?

A.
Spot Instances
A.
Spot Instances
Answers
B.
Convertible Reserved Instances
B.
Convertible Reserved Instances
Answers
C.
Standard Reserved Instances
C.
Standard Reserved Instances
Answers
D.
Dedicated Hosts
D.
Dedicated Hosts
Answers
Suggested answer: A

Explanation:

Spot Instances are spare Amazon EC2 instances that are available at up to 90% discount compared to On-Demand prices. They are suitable for workloads that can tolerate interruptions, such as batch processing, data analysis, and testing. Spot Instances are allocated based on the current supply and demand, and can be reclaimed by AWS with a two-minute notice when the demand exceeds the supply5. Convertible Reserved Instances are a type of Reserved Instances that provide a significant discount (up to 54%) compared to On-Demand prices and a capacity reservation for Amazon EC2 instances. They are available in 1-year or 3-year terms and allow users to change the instance family, size, operating system, or tenancy during the term. Standard Reserved Instances are another type of Reserved Instances that provide a larger discount (up to 75%) compared to On-Demand prices and a capacity reservation for Amazon EC2 instances. They are available in 1-year or 3-year terms and do not allow users to change the instance attributes during the term. Dedicated Hosts are physical servers with Amazon EC2 instance capacity fully dedicated to the user's use. They are suitable for users who have specific server-bound software licenses or compliance requirements.

Which AWS service can defend against DDoS attacks?

A.
AWS Firewall Manager
A.
AWS Firewall Manager
Answers
B.
AWS Shield Standard
B.
AWS Shield Standard
Answers
C.
AWS WAF
C.
AWS WAF
Answers
D.
Amazon Inspector
D.
Amazon Inspector
Answers
Suggested answer: B

Explanation:

AWS Shield Standard is a service that provides protection against Distributed Denial of Service (DDoS) attacks for all AWS customers at no additional charge. It automatically detects and mitigates the most common and frequently occurring network and transport layer DDoS attacks that target AWS resources, such as Amazon EC2 instances, Elastic Load Balancers, Amazon CloudFront distributions, and Amazon Route 53 hosted zones. AWS Firewall Manager is a service that allows users to centrally configure and manage firewall rules across their AWS accounts and resources, such as AWS WAF web ACLs, AWS Shield Advanced protections, and Amazon VPC security groups. AWS WAF is a web application firewall that helps protect web applications from common web exploits, such as SQL injection, cross-site scripting, and bot attacks. Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It analyzes the behavior of the applications and checks for vulnerabilities, exposures, and deviations from best practices.

A company wants its Amazon EC2 instances to share the same geographic area but use redundant underlying power sources.

Which solution will meet these requirements?

A.
Use EC2 instances across multiple Availability Zones in the same AWS Region.
A.
Use EC2 instances across multiple Availability Zones in the same AWS Region.
Answers
B.
Use Amazon CloudFront as the database for the EC2 instances.
B.
Use Amazon CloudFront as the database for the EC2 instances.
Answers
C.
Use EC2 instances in the same edge location and the same Availability Zone.
C.
Use EC2 instances in the same edge location and the same Availability Zone.
Answers
D.
Use EC2 instances in AWS OpsWorks stacks in different AWS Regions.
D.
Use EC2 instances in AWS OpsWorks stacks in different AWS Regions.
Answers
Suggested answer: A

Explanation:

Using EC2 instances across multiple Availability Zones in the same AWS Region is a solution that meets the requirements of sharing the same geographic area but using redundant underlying power sources. Availability Zones are isolated locations within an AWS Region that have independent power, cooling, and physical security. They are connected through low-latency, high-throughput, and highly redundant networking. By launching EC2 instances in different Availability Zones, users can increase the fault tolerance and availability of their applications. Amazon CloudFront is a content delivery network (CDN) service that speeds up the delivery of web content and media to end users by caching it at the edge locations closer to them. It is not a database service and cannot be used to store operational data for EC2 instances. Edge locations are sites that are part of the Amazon CloudFront network and are located in many cities around the world. They are not the same as Availability Zones and do not provide redundancy for EC2 instances. AWS OpsWorks is a configuration management service that allows users to automate the deployment and management of applications using Chef or Puppet. It can be used to create stacks that span multiple AWS Regions, but this would not meet the requirement of sharing the same geographic area.

A company needs to design a solution for the efficient use of compute resources for an enterprise workload. The company needs to make informed decisions as its technology needs evolve.

Which pillar of the AWS Well-Architected Framework do these requirements represent?

A.
Operational excellence
A.
Operational excellence
Answers
B.
Performance efficiency
B.
Performance efficiency
Answers
C.
Cost optimization
C.
Cost optimization
Answers
D.
Reliability
D.
Reliability
Answers
Suggested answer: B

Explanation:

Performance efficiency is the pillar of the AWS Well-Architected Framework that represents the requirements of designing a solution for the efficient use of compute resources for an enterprise workload and making informed decisions as the technology needs evolve. It focuses on using the right resources and services for the workload, monitoring performance, and continuously improving the efficiency of the solution. Operational excellence is the pillar of the AWS Well-Architected Framework that represents the ability to run and monitor systems to deliver business value and to continually improve supporting processes and procedures. Cost optimization is the pillar of the AWS Well-Architected Framework that represents the ability to run systems to deliver business value at the lowest price point. Reliability is the pillar of the AWS Well-Architected Framework that represents the ability of a system to recover from infrastructure or service disruptions, dynamically acquire computing resources to meet demand, and mitigate disruptions such as misconfigurations or transient network issues.

What does "security of the cloud" refer to in the AWS shared responsibility model?

A.
Availability of AWS services such as Amazon EC2
A.
Availability of AWS services such as Amazon EC2
Answers
B.
Security of the cloud infrastructure that runs all the AWS services
B.
Security of the cloud infrastructure that runs all the AWS services
Answers
C.
Implementation of password policies for 1AM users
C.
Implementation of password policies for 1AM users
Answers
D.
Security of customer environments by using AWS Network Firewall partners
D.
Security of customer environments by using AWS Network Firewall partners
Answers
Suggested answer: B

Explanation:

Security of the cloud refers to the security of the cloud infrastructure that runs all the AWS services.

This includes the hardware, software, networking, and facilities that AWS operates and manages.

AWS is responsible for protecting the security of the cloud as part of the AWS shared responsibility model. Availability of AWS services such as Amazon EC2 refers to the ability of the services to be up and running and to meet the expected performance. Availability is part of the reliability pillar of the AWS Well-Architected Framework and is a shared responsibility between AWS and the customer .

Implementation of password policies for IAM users refers to the security of the customer data and applications in the cloud. This includes the configuration and management of IAM user permissions, encryption keys, security group rules, network ACLs, and other aspects of access management. The customer is responsible for protecting the security in the cloud as part of the AWS shared responsibility model. Security of customer environments by using AWS Network Firewall partners refers to the security of the customer data and applications in the cloud. AWS Network Firewall is a managed service that provides network protection for Amazon VPCs. It allows customers to use AWS Marketplace partners to implement firewall rules and policies. The customer is responsible for protecting the security in the cloud as part of the AWS shared responsibility model .

Which AWS service or tool should a company use to forecast AWS spending?

A.
Amazon DevPay
A.
Amazon DevPay
Answers
B.
AWS Organizations
B.
AWS Organizations
Answers
C.
AWS Trusted Advisor
C.
AWS Trusted Advisor
Answers
D.
Cost Explorer
D.
Cost Explorer
Answers
Suggested answer: D

Explanation:

Cost Explorer is an AWS service or tool that can be used to forecast AWS spending. It allows users to analyze their AWS costs and usage using interactive graphs and tables. It also provides features such as filtering, grouping, and forecasting to help users plan their future spending. Amazon DevPay is an AWS service that allows developers to sell applications that are built on AWS services. It handles the billing and metering for the customers of the applications and collects payments from them. It is not a tool for forecasting AWS spending. AWS Organizations is an AWS service that allows users to centrally manage and govern their AWS accounts. It provides features such as creating groups of accounts, applying policies, and automating account creation. It is not a tool for forecasting AWS spending. AWS Trusted Advisor is an AWS service that provides best practices and recommendations to optimize the performance, security, and cost of AWS resources. It can help users identify opportunities to reduce their AWS costs, but it is not a tool for forecasting AWS spending

Which AWS service is always free of charge for users?

A.
Amazon S3
A.
Amazon S3
Answers
B.
Amazon Aurora
B.
Amazon Aurora
Answers
C.
Amazon EC2
C.
Amazon EC2
Answers
D.
AWS Identity and Access Management (1AM)
D.
AWS Identity and Access Management (1AM)
Answers
Suggested answer: D

Explanation:

AWS Identity and Access Management (IAM) is a service that allows users to manage access to AWS resources and services. It enables users to create and manage users, groups, roles, and policies that control who can do what in AWS. IAM is always free of charge for users, as there is no additional cost for using IAM with any AWS service1. Amazon S3 is a storage service that provides scalable, durable, and secure object storage. Amazon S3 has a free tier that offers 5 GB of storage, 20,000 GET requests, and 2,000 PUT requests per month for one year. However, users are charged for any additional usage beyond the free tier limits2. Amazon Aurora is a relational database service that is compatible with MySQL and PostgreSQL. Amazon Aurora has a free tier that offers 750 hours of Aurora Single-AZ db.t2.small database usage and 20 GB of storage per month for one year. However, users are charged for any additional usage beyond the free tier limits3. Amazon EC2 is a compute service that provides resizable virtual servers. Amazon EC2 has a free tier that offers 750 hours of Linux and Windows t2.micro instances per month for one year. However, users are charged for any additional usage beyond the free tier limits4.

A company has multiple AWS accounts that include compute workloads that cannot be interrupted.

The company wants to obtain billing discounts that are based on the company's use of AWS services.

Which AWS feature or purchasing option will meet these requirements?

A.
Resource tagging
A.
Resource tagging
Answers
B.
Consolidated billing
B.
Consolidated billing
Answers
C.
Pay-as-you-go pricing
C.
Pay-as-you-go pricing
Answers
D.
Spot Instances
D.
Spot Instances
Answers
Suggested answer: B

Explanation:

Consolidated billing is an AWS feature that allows users to combine the usage and costs of multiple

AWS accounts into a single bill. This enables users to obtain billing discounts that are based on the company's use of AWS services, such as volume pricing tiers, Reserved Instance discounts, and Savings Plans discounts5. Resource tagging is an AWS feature that allows users to assign metadata to AWS resources, such as EC2 instances, S3 buckets, and Lambda functions. This enables users to organize, track, and manage their AWS resources, such as filtering, grouping, and reporting. Pay-asyou-go pricing is an AWS pricing model that allows users to pay only for the resources and services they use, without any upfront or long-term commitments. This enables users to lower their costs by scaling up or down as needed, and avoiding over-provisioning or under-utilization. Spot Instances are spare EC2 instances that are available at up to 90% discount compared to On-Demand prices. They are suitable for workloads that can tolerate interruptions, such as batch processing, data analysis, and testing. Spot Instances are allocated based on the current supply and demand, and can be reclaimed by AWS with a two-minute notice when the demand exceeds the supply.

Total 789 questions
Go to page: of 79