ExamGecko
Home Home / Amazon / DOP-C01

Amazon DOP-C01 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











A Development team wants to deploy an application using AWS CloudFormation stacks, but the Developer IAM role does not currently have the required permissions to provision the resources specified in the CloudFormation template. A DevOps Engineer is tasked with allowing Developers to deploy the stacks while following the principal of least privilege. Which solution will meet these requirements?

A.
Create an IAM policy that allows Developers to provision the required resources. Attach the policy to the Developer role.
A.
Create an IAM policy that allows Developers to provision the required resources. Attach the policy to the Developer role.
Answers
B.
Create an IAM policy that allows full access to CloudFormation. Attach the policy to the Developer role.
B.
Create an IAM policy that allows full access to CloudFormation. Attach the policy to the Developer role.
Answers
C.
Create an AWS CloudFormation service role that has the required permissions. Grant the developer IAM role a cloudformation:* action. Use the new service role during stack deployments.
C.
Create an AWS CloudFormation service role that has the required permissions. Grant the developer IAM role a cloudformation:* action. Use the new service role during stack deployments.
Answers
D.
Create an AWS CloudFormation service role that has the required permissions. Grant the developer IAM role the iam:PassRole permission. Use the new service role during stack deployments.
D.
Create an AWS CloudFormation service role that has the required permissions. Grant the developer IAM role the iam:PassRole permission. Use the new service role during stack deployments.
Answers
Suggested answer: A

Which statement is true about configuring proxy support for Amazon Inspector agent on Linuxbased systems?

A.
Amazon Inspector proxy support on Linux-based systems is achieved through installing proxyenabled version of the agent which comes with pre-configured files that you need to edit to match your environment.
A.
Amazon Inspector proxy support on Linux-based systems is achieved through installing proxyenabled version of the agent which comes with pre-configured files that you need to edit to match your environment.
Answers
B.
Amazon Inspector agent does NOT support the use of proxy on Linux-based systems.
B.
Amazon Inspector agent does NOT support the use of proxy on Linux-based systems.
Answers
C.
Amazon Inspector proxy configuration on Linux-based system is included in awsagent.env file under /etc/init.d/
C.
Amazon Inspector proxy configuration on Linux-based system is included in awsagent.env file under /etc/init.d/
Answers
D.
Amazon Inspector agent proxy settings on Linux-based systems are configured through WinHTTP proxy.
D.
Amazon Inspector agent proxy settings on Linux-based systems are configured through WinHTTP proxy.
Answers
Suggested answer: C

Explanation:

To install an AWS agent on an EC2 instance that uses a proxy server Create a file called awsagent.env and save it in the /etc/init.d/ directory. Edit awsagent.env to include these environment variables in the following format: export https_proxy=https://hostname:port export http_proxy=http://hostname:port export no_proxy= 123.456.789.111 Reference:

https://docs.aws.amazon.com/inspector/latest/userguide/inspector_agents-on-win.html#inspectoragent-proxy

A business has an application that consists of five independent AWS Lambda functions.

The DevOps Engineer has built a CI/CD pipeline using AWS CodePipeline and AWS CodeBuild that builds, tests, packages, and deploys each Lambda function in sequence. The pipeline uses an Amazon CloudWatch Events rule to ensure the pipeline execution starts as quickly as possible after a change is made to the application source code. After working with the pipeline for a few months, the DevOps Engineer has noticed the pipeline takes too long to complete. What should the DevOps Engineer implement to BEST improve the speed of the pipeline?

A.
Modify the CodeBuild projects within the pipeline to use a compute type with more available network throughput.
A.
Modify the CodeBuild projects within the pipeline to use a compute type with more available network throughput.
Answers
B.
Create a custom CodeBuild execution environment that includes a symmetric multiprocessing configuration to run the builds in parallel.
B.
Create a custom CodeBuild execution environment that includes a symmetric multiprocessing configuration to run the builds in parallel.
Answers
C.
Modify the CodePipeline configuration to execute actions for each Lambda function in parallel by specifying the same runOrder.
C.
Modify the CodePipeline configuration to execute actions for each Lambda function in parallel by specifying the same runOrder.
Answers
D.
Modify each CodeBuild project to run within a VPC and use dedicated instances to increase throughput.
D.
Modify each CodeBuild project to run within a VPC and use dedicated instances to increase throughput.
Answers
Suggested answer: C

A large enterprise is deploying a web application on AWS. The application runs on Amazon EC2 instances behind an Application Load Balancer. The instances run in an Auto Scaling group across multiple Availability Zones. The application stores data in an Amazon RDS Oracle DB instance and Amazon DynamoDB. There are separate environments for development, testing, and production. What is the MOST secure and flexible way to obtain password credentials during deployment?

A.
Retrieve an access key from an AWS Systems Manager SecureString parameter to access AWS services. Retrieve the database credentials from a Systems Manager SecureString parameter.
A.
Retrieve an access key from an AWS Systems Manager SecureString parameter to access AWS services. Retrieve the database credentials from a Systems Manager SecureString parameter.
Answers
B.
Launch the EC2 instances with an EC2 IAM role to access AWS services. Retrieve the database credentials from AWS Secrets Manager.
B.
Launch the EC2 instances with an EC2 IAM role to access AWS services. Retrieve the database credentials from AWS Secrets Manager.
Answers
C.
Retrieve an access key from an AWS Systems Manager plaintext parameter to access AWS services. Retrieve the database credentials from a Systems Manager SecureString parameter.
C.
Retrieve an access key from an AWS Systems Manager plaintext parameter to access AWS services. Retrieve the database credentials from a Systems Manager SecureString parameter.
Answers
D.
Launch the EC2 instances with an EC2 IAM role to access AWS services. Store the database passwords in an encrypted config file with the application artifacts.
D.
Launch the EC2 instances with an EC2 IAM role to access AWS services. Store the database passwords in an encrypted config file with the application artifacts.
Answers
Suggested answer: B

A company’s legacy application uses IAM user credentials to access resources in the company’s AWS Organizations organization. A DevOps engineer needs to ensure new IAM users cannot be created unless the employee creating the IAM user is on an exception list.

Which solution will meet these requirements?

A.
Attach an Organizations SCP with an explicit deny for all iam:CreateAccessKey actions with a condition that excludes StringNotEquals for aws:username with a value of the exception list.
A.
Attach an Organizations SCP with an explicit deny for all iam:CreateAccessKey actions with a condition that excludes StringNotEquals for aws:username with a value of the exception list.
Answers
B.
Attach an Organizations SCP with an explicit deny for all iam:CreateUser actions with a condition that includes StringNotLike for aws:username with a value of the exception list.
B.
Attach an Organizations SCP with an explicit deny for all iam:CreateUser actions with a condition that includes StringNotLike for aws:username with a value of the exception list.
Answers
C.
Create an Amazon EventBridge (Amazon CloudWatch Events) rule with a pattern that matches the iam:CreateAccessKey action with an AWS Lambda function target. The function will check the user name account against an exception list. If the user is not in the exception list, the function will delete the user.
C.
Create an Amazon EventBridge (Amazon CloudWatch Events) rule with a pattern that matches the iam:CreateAccessKey action with an AWS Lambda function target. The function will check the user name account against an exception list. If the user is not in the exception list, the function will delete the user.
Answers
D.
Create an Amazon EventBridge (Amazon CloudWatch Events) rule with a pattern that matches the iam:CreateUser action with an AWS Lambda function target. The function will check the user name and account against an exception list. If the user is not in the exception list, the function will delete the user.
D.
Create an Amazon EventBridge (Amazon CloudWatch Events) rule with a pattern that matches the iam:CreateUser action with an AWS Lambda function target. The function will check the user name and account against an exception list. If the user is not in the exception list, the function will delete the user.
Answers
Suggested answer: A

For Amazon Inspector's integration with CloudTrail, what information is logged for List* and Describe* APIs?

A.
None. Amazon Inspector is an automated service and not monitored by CloudTrail.
A.
None. Amazon Inspector is an automated service and not monitored by CloudTrail.
Answers
B.
Both request and response information is logged.
B.
Both request and response information is logged.
Answers
C.
Only request information is logged.
C.
Only request information is logged.
Answers
D.
Request information is always logged. Response information is logged only for Completed assessment runs.
D.
Request information is always logged. Response information is logged only for Completed assessment runs.
Answers
Suggested answer: C

Explanation:

For the Amazon Inspector integration with CloudTrail, for the List* and Describe* APIs, only the request information is logged.

Reference:

https://docs.aws.amazon.com/inspector/latest/userguide/logging-using-cloudtrail.html

A company recently launched an application that is more popular than expected. The company wants to ensure the application can scale to meet increasing demands and provide reliability using multiple Availability Zones (AZs). The application runs on a fleet of Amazon EC2 instances behind an Application Load Balancer (ALB). A DevOps engineer has created an Auto Scaling group across multiple AZs for the application. Instances launched in the newly added AZs are not receiving any traffic for the application.

What is likely causing this issue?

A.
Auto Scaling groups can create new instances in a single AZ only.
A.
Auto Scaling groups can create new instances in a single AZ only.
Answers
B.
The EC2 instances have not been manually associated to the ALB.
B.
The EC2 instances have not been manually associated to the ALB.
Answers
C.
The ALB should be replaced with a Network Load Balancer (NLB).
C.
The ALB should be replaced with a Network Load Balancer (NLB).
Answers
D.
The new AZ has not been added to the ALB.
D.
The new AZ has not been added to the ALB.
Answers
Suggested answer: D

Your application has an Auto Scaling group of m3.large instances running an application that receives messages born an Amazon SQS queue. After a while, the number of instances reaches the maximum set for the group and the number of messages on the queue continues to increase. You have discovered that a third- party library used by the application has a bug that causes a memory leak. What cost-effective steps can you take to continue message processing while the library developer fixes the bug?

A.
Enable Elastic Load Balancing health checks for the Auto Scaling group. When Elastic Load Balancing has detected a failure, Auto Scaling will terminate the failing application's instance and launch a new one.
A.
Enable Elastic Load Balancing health checks for the Auto Scaling group. When Elastic Load Balancing has detected a failure, Auto Scaling will terminate the failing application's instance and launch a new one.
Answers
B.
Use Amazon EC2 instance memory usage CloudWatch metrics to raise alerts when they reach a defined level and send a message to Auto Scaling to fail the instance health check.
B.
Use Amazon EC2 instance memory usage CloudWatch metrics to raise alerts when they reach a defined level and send a message to Auto Scaling to fail the instance health check.
Answers
C.
Use application monitoring on the instance to restart the application when memory usage reaches a defined level.
C.
Use application monitoring on the instance to restart the application when memory usage reaches a defined level.
Answers
D.
Create a new Auto Scaling launch configuration to use the r3.large instance type. Update the Auto Scaling group with the new launch configuration.
D.
Create a new Auto Scaling launch configuration to use the r3.large instance type. Update the Auto Scaling group with the new launch configuration.
Answers
Suggested answer: D

A DevOps Engineer is leading the implementation for automating patching of Windows-based workstations in a hybrid cloud environment by using AWS Systems Manager (SSM). What steps should the Engineer follow to set up Systems Manager to automate patching in this environment? (Choose two.)

A.
Create multiple IAM service roles for Systems Manager so that the ssm.amazonaws.com service can execute the AssumeRole operation on every instance. Register the role on a per-resource level to enable the creation of a service token.Perform managed-instance activation with the newly created service role attached to each managed instance.
A.
Create multiple IAM service roles for Systems Manager so that the ssm.amazonaws.com service can execute the AssumeRole operation on every instance. Register the role on a per-resource level to enable the creation of a service token.Perform managed-instance activation with the newly created service role attached to each managed instance.
Answers
B.
Create an IAM service role for Systems Manager so that the ssm.amazonaws.com service can execute the AssumeRole operation. Register the role to enable the creation of a service token. Perform managed-instance activation with the newly created service role.
B.
Create an IAM service role for Systems Manager so that the ssm.amazonaws.com service can execute the AssumeRole operation. Register the role to enable the creation of a service token. Perform managed-instance activation with the newly created service role.
Answers
C.
Using previously obtained activation codes and activation IDs, download and install the SSM Agent on the hybrid servers, and register the servers or virtual machines on the Systems Manager service. Hybrid instances will show with an "mi-" prefix in the SSM console.
C.
Using previously obtained activation codes and activation IDs, download and install the SSM Agent on the hybrid servers, and register the servers or virtual machines on the Systems Manager service. Hybrid instances will show with an "mi-" prefix in the SSM console.
Answers
D.
Using previously obtained activation codes and activation IDs, download and install the SSM Agent on the hybrid servers, and register the servers or virtual machines on the Systems Manager service. Hybrid instances will show with an "i-" prefix in the SSM console as if they were provisioned as a regular Amazon EC2 instance.
D.
Using previously obtained activation codes and activation IDs, download and install the SSM Agent on the hybrid servers, and register the servers or virtual machines on the Systems Manager service. Hybrid instances will show with an "i-" prefix in the SSM console as if they were provisioned as a regular Amazon EC2 instance.
Answers
E.
Run AWS Config to create a list of instances that are unpatched and not compliant. Create an instance scheduler job, and through an AWS Lambda function, perform the instance patching to bring them up to compliance.
E.
Run AWS Config to create a list of instances that are unpatched and not compliant. Create an instance scheduler job, and through an AWS Lambda function, perform the instance patching to bring them up to compliance.
Answers
Suggested answer: B, C

A DevOps Engineer is launching a new application that will be deployed on infrastructure using Amazon Route 53, an Application Load Balancer, Auto Scaling, and Amazon DynamoDB. One of the key requirements of this launch is that the application must be able to scale to meet a load increase. During periods of low usage, the infrastructure components must scale down to optimize cost. What steps can the DevOps Engineer take to meet the requirements? (Choose two.)

A.
Use AWS Trusted Advisor to submit limit increase requests for the Amazon EC2 instances that will be used by the infrastructure.
A.
Use AWS Trusted Advisor to submit limit increase requests for the Amazon EC2 instances that will be used by the infrastructure.
Answers
B.
Determine which Amazon EC2 instance limits need to be raised by leveraging AWS Trusted Advisor, and submit a request to AWS Support to increase those limits.
B.
Determine which Amazon EC2 instance limits need to be raised by leveraging AWS Trusted Advisor, and submit a request to AWS Support to increase those limits.
Answers
C.
Enable Auto Scaling for the DynamoDB tables that are used by the application.
C.
Enable Auto Scaling for the DynamoDB tables that are used by the application.
Answers
D.
Configure the Application Load Balancer to automatically adjust the target group based on the current load.
D.
Configure the Application Load Balancer to automatically adjust the target group based on the current load.
Answers
E.
Create an Amazon CloudWatch Events scheduled rule that runs every 5 minutes to track the current use of the Auto Scaling group. If usage has changed, trigger a scale-up event to adjust the capacity. Do the same for DynamoDB read and write capacities.
E.
Create an Amazon CloudWatch Events scheduled rule that runs every 5 minutes to track the current use of the Auto Scaling group. If usage has changed, trigger a scale-up event to adjust the capacity. Do the same for DynamoDB read and write capacities.
Answers
Suggested answer: C, D

Explanation:

Reference: https://docs.aws.amazon.com/autoscaling/ec2/userguide/autoscaling-load-balancer.html

Total 557 questions
Go to page: of 56