ExamGecko
Home Home / Amazon / CLF-C02

Amazon CLF-C02 Practice Test - Questions Answers, Page 44

Question list
Search
Search

List of questions

Search

Related questions











A company is looking for a managed machine learning (ML) service that can recommend products based on a customer's previous behaviors.

Which AWS service meets this requirement?

A.
Amazon Personalize
A.
Amazon Personalize
Answers
B.
Amazon SageMaker
B.
Amazon SageMaker
Answers
C.
Amazon Pinpoint
C.
Amazon Pinpoint
Answers
D.
Amazon Comprehend
D.
Amazon Comprehend
Answers
Suggested answer: A

Explanation:

The AWS service that meets the requirement of providing a managed machine learning (ML) service that can recommend products based on a customer's previous behaviors is Amazon Personalize.

Amazon Personalize is a fully managed service that enables developers to create personalized recommendations for customers using their own data. Amazon Personalize can automatically process and examine the data, identify what is meaningful, select the right algorithms, and train and optimize a personalized recommendation model2. Amazon SageMaker, Amazon Pinpoint, and Amazon Comprehend are other AWS services related to machine learning, but they do not provide the specific functionality of product recommendation.

A company wants its Amazon EC2 instances to share the same geographic area but use multiple independent underlying power sources.

Which solution achieves this goal?

A.
Use EC2 instances in a single Availability Zone.
A.
Use EC2 instances in a single Availability Zone.
Answers
B.
Use EC2 instances in multiple AWS Regions.
B.
Use EC2 instances in multiple AWS Regions.
Answers
C.
Use EC2 instances in multiple Availability Zones in the same AWS Region.
C.
Use EC2 instances in multiple Availability Zones in the same AWS Region.
Answers
D.
Use EC2 instances in the same edge location and the same AWS Region.
D.
Use EC2 instances in the same edge location and the same AWS Region.
Answers
Suggested answer: C

Explanation:

The solution that achieves the goal of having Amazon EC2 instances share the same geographic area but use multiple independent underlying power sources is to use EC2 instances in multiple Availability Zones in the same AWS Region. An Availability Zone is a physically isolated location within an AWS Region that has its own power, cooling, and network connectivity. An AWS Region is a geographical area that consists of two or more Availability Zones. By using multiple Availability Zones, users can increase the fault tolerance and resilience of their applications, as well as reduce latency for end users3. Using EC2 instances in a single Availability Zone, multiple AWS Regions, or the same edge location and the same AWS Region would not meet the requirement of having multiple independent power sources.

Which AWS service should be used when a company needs to provide its remote employees with virtual desktops?

A.
Amazon Identity and Access Management (1AM)
A.
Amazon Identity and Access Management (1AM)
Answers
B.
AWS Directory Service
B.
AWS Directory Service
Answers
C.
AWS 1AM Identity Center (AWS Single Sign-On)
C.
AWS 1AM Identity Center (AWS Single Sign-On)
Answers
D.
Amazon Workspaces
D.
Amazon Workspaces
Answers
Suggested answer: D

Explanation:

The AWS service that should be used when a company needs to provide its remote employees with virtual desktops is Amazon WorkSpaces. Amazon WorkSpaces is a fully managed, secure desktop-asa-service (DaaS) solution that runs on AWS. Amazon WorkSpaces allows users to provision cloudbased virtual desktops and provide their end users access to the documents, applications, and resources they need from any supported device, including Windows and Mac computers, Chromebooks, iPads, Fire tablets, and Android tablets4. Amazon Identity and Access Management (IAM), AWS Directory Service, and AWS IAM Identity Center (AWS Single Sign-On) are other AWS services related to identity and access management, but they do not provide virtual desktops.

A company needs a graph database service that is scalable and highly available.

Which AWS service meets these requirements?

A.
Amazon Aurora
A.
Amazon Aurora
Answers
B.
Amazon Redshift
B.
Amazon Redshift
Answers
C.
Amazon DynamoDB
C.
Amazon DynamoDB
Answers
D.
Amazon Neptune
D.
Amazon Neptune
Answers
Suggested answer: D

Explanation:

The AWS service that meets the requirements of providing a graph database service that is scalable and highly available is Amazon Neptune. Amazon Neptune is a fast, reliable, and fully managed graph database service that supports property graph and RDF graph models. Amazon Neptune is designed to store billions of relationships and query the graph with milliseconds latency. Amazon Neptune also offers high availability and durability by replicating six copies of the data across three Availability Zones and continuously backing up the data to Amazon S35. Amazon Aurora, Amazon Redshift, and Amazon DynamoDB are other AWS services that provide relational or non-relational database solutions, but they do not support graph database models.

Which AWS Cloud benefit describes the ability to acquire resources as they are needed and release resources when they are no longer needed?

A.
Economies of scale
A.
Economies of scale
Answers
B.
Elasticity
B.
Elasticity
Answers
C.
Agility
C.
Agility
Answers
D.
Security
D.
Security
Answers
Suggested answer: B

Explanation:

The AWS Cloud benefit that describes the ability to acquire resources as they are needed and release resources when they are no longer needed is elasticity. Elasticity means that users can quickly add and remove resources to match the demand of their applications, and only pay for what they use. Elasticity enables users to handle unpredictable workloads, reduce costs, and improve performance1. Economies of scale, agility, and security are other benefits of the AWS Cloud, but they do not describe the specific ability of acquiring and releasing resources on demand.

A company wants to design a reliable web application that is hosted on Amazon EC2.

Which approach will achieve this goal?

A.
Launch large EC2 instances in the same Availability Zone.
A.
Launch large EC2 instances in the same Availability Zone.
Answers
B.
Spread EC2 instances across more than one security group.
B.
Spread EC2 instances across more than one security group.
Answers
C.
Spread EC2 instances across more than one Availability Zone.
C.
Spread EC2 instances across more than one Availability Zone.
Answers
D.
Use an Amazon Machine Image (AMI) from AWS Marketplace.
D.
Use an Amazon Machine Image (AMI) from AWS Marketplace.
Answers
Suggested answer: C

Explanation:

The approach that will achieve the goal of designing a reliable web application that is hosted on Amazon EC2 is to spread EC2 instances across more than one Availability Zone. An Availability Zone is a physically isolated location within an AWS Region that has its own power, cooling, and network connectivity. By spreading EC2 instances across multiple Availability Zones, users can increase the fault tolerance and availability of their web applications, as well as reduce latency for end users2.

Launching large EC2 instances in the same Availability Zone, spreading EC2 instances across more than one security group, or using an Amazon Machine Image (AMI) from AWS Marketplace are not sufficient to ensure reliability, as they do not provide redundancy or resilience in case of an outage in one Availability Zone.

A company has a MySQL database running on a single Amazon EC2 instance. The company now requires higher availability in the event of an outage.

Which set of tasks would meet this requirement?

A.
Add an Application Load Balancer in front of the EC2 instance.
A.
Add an Application Load Balancer in front of the EC2 instance.
Answers
B.
Configure EC2 Auto Recovery to move the instance to another Availability Zone.
B.
Configure EC2 Auto Recovery to move the instance to another Availability Zone.
Answers
C.
Migrate to Amazon RDS and enable Multi-AZ.
C.
Migrate to Amazon RDS and enable Multi-AZ.
Answers
D.
Enable termination protection for the EC2 instance to avoid outages.
D.
Enable termination protection for the EC2 instance to avoid outages.
Answers
Suggested answer: C

Explanation:

The set of tasks that would meet the requirement of having higher availability for a MySQL database running on a single Amazon EC2 instance is to migrate to Amazon RDS and enable Multi-AZ. Amazon RDS is a fully managed relational database service that supports MySQL and other popular database engines. By enabling Multi-AZ, users can have a primary database in one Availability Zone and a synchronous standby replica in another Availability Zone. In case of a planned or unplanned outage of the primary database, Amazon RDS automatically fails over to the standby replica with minimal disruption3. Adding an Application Load Balancer in front of the EC2 instance, configuring EC2 Auto Recovery to move the instance to another Availability Zone, or enabling termination protection for the EC2 instance would not provide higher availability for the database, as they do not address the single point of failure or data replication issues.

Which AWS service or feature can a company use to apply security rules to specific Amazon EC2 instances?

A.
Network ACLs
A.
Network ACLs
Answers
B.
Security groups
B.
Security groups
Answers
C.
AWS Trusted Advisor
C.
AWS Trusted Advisor
Answers
D.
AWS WAF
D.
AWS WAF
Answers
Suggested answer: B

Explanation:

Security groups are the AWS service or feature that can be used to apply security rules to specific Amazon EC2 instances. Security groups are virtual firewalls that control the inbound and outbound traffic for one or more instances. Customers can create security groups and add rules that reflect the role of the instance that is associated with the security group. For example, a web server instance needs security group rules that allow inbound HTTP and HTTPS access, while a database instance needs rules that allow access for the type of database12. Security groups are stateful, meaning that the responses to allowed inbound traffic are also allowed, regardless of the outbound rules1. Customers can assign multiple security groups to an instance, and the rules from each security group are effectively aggregated to create one set of rules1.

Network ACLs are another AWS service or feature that can be used to control the traffic for a subnet.

Network ACLs are stateless, meaning that they do not track the traffic that they allow. Therefore, customers must add rules for both inbound and outbound traffic3. Network ACLs are applied at the subnet level, not at the instance level.

AWS Trusted Advisor is an AWS service that provides best practice recommendations for security, performance, cost optimization, and fault tolerance. AWS Trusted Advisor does not apply security rules to specific Amazon EC2 instances, but it can help customers identify security gaps and improve their security posture4.

AWS WAF is an AWS service that helps protect web applications from common web exploits, such as SQL injection, cross-site scripting, and bot attacks. AWS WAF does not apply security rules to specific Amazon EC2 instances, but it can be integrated with other AWS services, such as Amazon CloudFront, Amazon API Gateway, and Application Load Balancer.

Which actions are best practices for an AWS account root user? (Select TWO.)

A.
Share root user credentials with team members.
A.
Share root user credentials with team members.
Answers
B.
Create multiple root users for the account, separated by environment.
B.
Create multiple root users for the account, separated by environment.
Answers
C.
Enable multi-factor authentication (MFA) on the root user.
C.
Enable multi-factor authentication (MFA) on the root user.
Answers
D.
Create an IAM user with administrator privileges for daily administrative tasks, instead of using the root user.Use programmatic access instead of the root user and password.
D.
Create an IAM user with administrator privileges for daily administrative tasks, instead of using the root user.Use programmatic access instead of the root user and password.
Answers
Suggested answer: C, D

Explanation:

The AWS account root user is the identity that has complete access to all AWS services and resources in the account. It is accessed by signing in with the email address and password that were used to create the account1. The root user should be protected and used only for a few account and service management tasks that require it1. Therefore, the following actions are best practices for an AWS account root user:

Enable multi-factor authentication (MFA) on the root user. MFA is a security feature that requires users to provide two or more pieces of information to authenticate themselves, such as a password and a code from a device. MFA adds an extra layer of protection for the root user credentials, which can access sensitive information and perform critical operations in the account2.

Create an IAM user with administrator privileges for daily administrative tasks, instead of using the root user. IAM is a service that helps customers manage access to AWS resources for users and groups. Customers can create IAM users and assign them permissions to perform specific tasks on specific resources. Customers can also create IAM roles and policies to delegate access to other AWS services or external entities3. By creating an IAM user with administrator privileges, customers can avoid using the root user for everyday tasks and reduce the risk of accidental or malicious changes to the account1.

A company wants an automated process to continuously scan its Amazon EC2 instances for software vulnerabilities.

Which AWS service will meet these requirements?

A.
Amazon GuardDuty
A.
Amazon GuardDuty
Answers
B.
Amazon Inspector
B.
Amazon Inspector
Answers
C.
Amazon Detective
C.
Amazon Detective
Answers
D.
Amazon Cognito
D.
Amazon Cognito
Answers
Suggested answer: B

Explanation:

Amazon Inspector is the AWS service that can be used to perform vulnerability scans on AWS EC2 instances for software vulnerabilities automatically in a periodic fashion. Amazon Inspector automatically discovers EC2 instances and scans them for software vulnerabilities and unintended network exposure. Amazon Inspector uses AWS Systems Manager (SSM) and the SSM Agent to collect information about the software application inventory of the EC2 instances. This data is then scanned by Amazon Inspector for software vulnerabilities12. Amazon Inspector also integrates with other AWS services, such as Amazon EventBridge and AWS Security Hub, to automate discovery, expedite vulnerability routing, and shorten mean time to remediate (MTTR) vulnerabilities2.

Total 789 questions
Go to page: of 79