ExamGecko
Home Home / Amazon / CLF-C02

Amazon CLF-C02 Practice Test - Questions Answers, Page 71

Question list
Search
Search

List of questions

Search

Related questions











A company is building a new application on AWS. The company needs the application to remain available if an individual application component fails.

Which design principle should the company use to meet this requirement?

A.
Disposable resources
A.
Disposable resources
Answers
B.
Automation
B.
Automation
Answers
C.
Rightsizing
C.
Rightsizing
Answers
D.
Loose coupling
D.
Loose coupling
Answers
Suggested answer: D

Explanation:

Loose coupling is a design principle that involves reducing dependencies between application components so that they can operate independently. This approach ensures that the failure of one component does not affect the availability of the others, thereby improving the application's fault tolerance and resilience. Disposable resources, automation, and rightsizing are valuable principles in cloud architecture, but they do not directly address the requirement of remaining available despite the failure of an individual component like loose coupling does. References:

AWS Well-Architected Framework - Design Principles

Under the AWS shared responsibility model, which of the following is a responsibility of the customer?

A.
Shred disk drives before they leave a data center.
A.
Shred disk drives before they leave a data center.
Answers
B.
Prevent customers from gathering packets or collecting traffic at the hypervisor level.
B.
Prevent customers from gathering packets or collecting traffic at the hypervisor level.
Answers
C.
Patch the guest operating system with the latest security patches.
C.
Patch the guest operating system with the latest security patches.
Answers
D.
Maintain security systems that provide physical monitoring of data centers.
D.
Maintain security systems that provide physical monitoring of data centers.
Answers
Suggested answer: C

Explanation:

Under the AWS shared responsibility model, AWS is responsible for the security 'of' the cloud, which includes the physical infrastructure, networking, and hypervisor layer. The customer, however, is responsible for security 'in' the cloud, which includes managing the security of their data, patching and maintaining their guest operating system and applications, and managing identity and access. The responsibilities of shredding disk drives, preventing packet capture at the hypervisor level, and physical monitoring are handled by AWS as part of its responsibility for security 'of' the cloud.

In which situations should a company create an 1AM user instead of an 1AM role? (Select TWO.)

A.
When an application that runs on Amazon EC2 instances requires access to other AWS services
A.
When an application that runs on Amazon EC2 instances requires access to other AWS services
Answers
B.
When the company creates AWS access credentials for individuals
B.
When the company creates AWS access credentials for individuals
Answers
C.
When the company creates an application that runs on a mobile phone that makes requests to AWS
C.
When the company creates an application that runs on a mobile phone that makes requests to AWS
Answers
D.
When the company needs to add users to 1AM groups
D.
When the company needs to add users to 1AM groups
Answers
E.
When users are authenticated in the corporate network and want to be able to use AWS without having to sign in a second time
E.
When users are authenticated in the corporate network and want to be able to use AWS without having to sign in a second time
Answers
Suggested answer: B, D

Explanation:

An IAM user is created when the company needs to provide unique credentials (username and password) to individuals who need access to the AWS Management Console or programmatic access (using access keys) to AWS services.

B . When the company creates AWS access credentials for individuals: Correct, as an IAM user is created to provide credentials for specific individuals.

D . When the company needs to add users to IAM groups: Correct, as IAM users can be added to groups to apply permissions and policies at a group level.

A . When an application that runs on Amazon EC2 instances requires access to other AWS services: Incorrect, as an IAM role is more appropriate for applications running on EC2 to assume temporary credentials.

C . When the company creates an application that runs on a mobile phone that makes requests to AWS: Incorrect, as using Cognito or a role with temporary credentials is more suitable.

E . When users are authenticated in the corporate network and want to be able to use AWS without having to sign in a second time: Incorrect, as this use case typically involves IAM roles combined with AWS Single Sign-On (SSO).

AWS Cloud References:

IAM Users and Groups

IAM Roles

A company wants to run its application on Amazon EC2 instances. The company needs to keep the application on-premises to meet a compliance requirement. Which AWS offering will meet these requirements?

A.
Dedicated Instances
A.
Dedicated Instances
Answers
B.
Amazon CloudFront
B.
Amazon CloudFront
Answers
C.
AWS Fargate
C.
AWS Fargate
Answers
D.
AWS Outposts
D.
AWS Outposts
Answers
Suggested answer: D

Explanation:

AWS Outposts is an AWS offering that brings AWS infrastructure and services to a customer's on-premises location. It allows companies to run AWS services locally while meeting any regulatory or compliance requirements to keep data or applications on-premises. Dedicated Instances are EC2 instances that run on hardware dedicated to a single customer but are still within AWS data centers. Amazon CloudFront is a CDN service, and AWS Fargate is a serverless compute engine for containers, neither of which meets the requirement for running an application on-premises. References:

AWS Outposts

A company wants an AWS service to collect and process 10 TB of data locally and transfer the data to AWS. The company has intermittent connectivity.

Which AWS service will meet these requirements?

A.
AWS Database Migration Service (AWS DMS)
A.
AWS Database Migration Service (AWS DMS)
Answers
B.
AWS DataSync
B.
AWS DataSync
Answers
C.
AWS Backup
C.
AWS Backup
Answers
D.
AWS Snowball Edge
D.
AWS Snowball Edge
Answers
Suggested answer: D

Explanation:

The correct answer is D. AWS Snowball Edge.

AWS Snowball Edge is a physical device that can be used to collect and process data locally and then transfer it to AWS. It is designed for situations where there is limited or intermittent network connectivity, or where bandwidth costs are high. AWS Snowball Edge can store up to 80 TB of data and has compute and storage capabilities to run applications on the device1.

AWS Database Migration Service (AWS DMS) is a service that helps migrate databases to AWS. It does not collect or process data locally, nor does it work offline2.

AWS DataSync is a service that helps transfer data between on-premises storage systems and AWS storage services. It does not collect or process data locally, and it requires a network connection to work3.

AWS Backup is a service that helps automate and manage backups across AWS services. It does not collect or process data locally, nor does it transfer data to AWS. It only backs up data that is already in AWS4.

References:


A company wants to discover, prepare, move, and integrate data from multiple sources for data analytics and machine learning.

Which AWS serverless data integration service should the company use to meet these requirements?

A.
AWS Glue
A.
AWS Glue
Answers
B.
AWS Data Exchange
B.
AWS Data Exchange
Answers
C.
Amazon Athena
C.
Amazon Athena
Answers
D.
Amazon EMR
D.
Amazon EMR
Answers
Suggested answer: A

Explanation:

AWS Glue is a serverless data integration service designed to discover, prepare, move, and integrate data from multiple sources for data analytics and machine learning purposes. It provides a managed ETL (Extract, Transform, Load) service that is ideal for preparing and transforming data for analytics. AWS Data Exchange is used for finding and subscribing to third-party data, Amazon Athena is for querying data stored in Amazon S3 using SQL, and Amazon EMR is for big data processing using Apache Hadoop and Spark, but AWS Glue is specifically designed for data integration and preparation tasks.

Which AWS service or tool provides a visualization of historical AWS spending patterns and projections of future AWS costs?

A.
AWS Cos! and Usage Report
A.
AWS Cos! and Usage Report
Answers
B.
AWS Budgets
B.
AWS Budgets
Answers
C.
Cost Explorer
C.
Cost Explorer
Answers
D.
Amazon CloudWatch
D.
Amazon CloudWatch
Answers
Suggested answer: C

Explanation:

AWS Cost Explorer provides a visualization of historical AWS spending patterns and allows users to project future costs based on past usage. It offers advanced filtering and grouping features, enabling users to analyze costs and usage at a granular level. The AWS Cost and Usage Report provides detailed AWS cost and usage data but does not offer visualization or future cost projections. AWS Budgets is used for setting custom cost and usage budgets and receiving alerts. Amazon CloudWatch is for monitoring AWS resources and applications, not for cost management.

Which AWS service integrates with other AWS services to provide the ability to encrypt data at rest?

A.
AWS Key Management Service (AWS KMS)
A.
AWS Key Management Service (AWS KMS)
Answers
B.
AWS Certificate Manager (ACM)
B.
AWS Certificate Manager (ACM)
Answers
C.
AWS Identity and Access Management (1AM)
C.
AWS Identity and Access Management (1AM)
Answers
D.
AWS Security Hub
D.
AWS Security Hub
Answers
Suggested answer: A

Explanation:

AWS Key Management Service (AWS KMS) is designed to integrate with various AWS services to encrypt data at rest. It provides a secure and highly available service to create, control, and manage encryption keys used to encrypt your data. AWS Certificate Manager (ACM) is for managing SSL/TLS certificates, AWS Identity and Access Management (IAM) is for managing user access and permissions, and AWS Security Hub is for security monitoring and compliance, but none of these services provide data encryption at rest like AWS KMS.

A company has an AWS Business Support plan. The company needs to gain access to the AWS DDoS Response Team (DRT) to help mitigate DDoS events.

Which AWS service or resource must the company use to meet these requirements?

A.
AWS Shield Standard
A.
AWS Shield Standard
Answers
B.
AWS Enterprise Support
B.
AWS Enterprise Support
Answers
C.
AWS WAF
C.
AWS WAF
Answers
D.
AWS Shield Advanced
D.
AWS Shield Advanced
Answers
Suggested answer: D

Explanation:

AWS Shield Advanced provides enhanced protection against DDoS attacks and includes access to the AWS DDoS Response Team (DRT) to help mitigate complex DDoS events. AWS Shield Standard offers basic DDoS protection, which is included with AWS services, but does not provide access to the DRT. AWS WAF is a web application firewall, and AWS Enterprise Support is a premium support plan but does not specifically provide DDoS mitigation services or access to the DRT.

A company is planning to migrate a monolithic application to AWS. The company wants to modernize the application by splitting it into microservices. The company will deploy the microservices on AWS.

Which migration strategy should the company use?

A.

Rehost

A.

Rehost

Answers
B.

Repurchase

B.

Repurchase

Answers
C.

Replatform

C.

Replatform

Answers
D.

Refactor

D.

Refactor

Answers
Suggested answer: D

Explanation:

Refactoring involves re-architecting and modifying an application to take advantage of cloud-native features. In this case, the company wants to modernize a monolithic application by breaking it into microservices. This process aligns with the Refactor strategy, which is aimed at modernizing and re-architecting applications. Rehost, Repurchase, and Replatform do not involve the level of re-architecting needed to move from a monolithic to a microservices architecture.

Total 789 questions
Go to page: of 79