ExamGecko
Home Home / Amazon / SAP-C01

Amazon SAP-C01 Practice Test - Questions Answers, Page 36

Question list
Search
Search

List of questions

Search

Related questions











A financial services company sells its software-as-a-service (SaaS) platform for application compliance to large global banks. The SaaS platform runs on AWS and uses multiple AWS accounts that are managed in an organization in AWS Organizations. The SaaS platform uses many AWS resources globally. For regulatory compliance, all API calls to AWS resources must be audited, tracked for changes, and stored in a durable and secure data store. Which solution will meet these requirements with the LEAST operational overhead?

A.
Create a new AWS CloudTrail trail. Use an existing Amazon S3 bucket in the organization’s management account to store the logs. Deploy the trail to all AWS Regions. Enable MFA delete and encryption on the S3 bucket.
A.
Create a new AWS CloudTrail trail. Use an existing Amazon S3 bucket in the organization’s management account to store the logs. Deploy the trail to all AWS Regions. Enable MFA delete and encryption on the S3 bucket.
Answers
B.
Create a new AWS CloudTrail trail in each member account of the organization. Create new Amazon S3 buckets to store the logs. Deploy the trail to all AWS Regions. Enable MFA delete and encryption on the S3 buckets.
B.
Create a new AWS CloudTrail trail in each member account of the organization. Create new Amazon S3 buckets to store the logs. Deploy the trail to all AWS Regions. Enable MFA delete and encryption on the S3 buckets.
Answers
C.
Create a new AWS CloudTrail trail in the organization’s management account. Create a new Amazon S3 bucket with versioning turned on to store the logs. Deploy the trail for all accounts in the organization. Enable MFA delete and encryption on the S3 bucket.
C.
Create a new AWS CloudTrail trail in the organization’s management account. Create a new Amazon S3 bucket with versioning turned on to store the logs. Deploy the trail for all accounts in the organization. Enable MFA delete and encryption on the S3 bucket.
Answers
D.
Create a new AWS CloudTrail trail in the organization’s management account. Create a new Amazon S3 bucket to store the logs. Configure Amazon Simple Notification Service (Amazon SNS) to send log-file delivery notifications to an external management system that will track the logs. Enable MFA delete and encryption on the S3 bucket.
D.
Create a new AWS CloudTrail trail in the organization’s management account. Create a new Amazon S3 bucket to store the logs. Configure Amazon Simple Notification Service (Amazon SNS) to send log-file delivery notifications to an external management system that will track the logs. Enable MFA delete and encryption on the S3 bucket.
Answers
Suggested answer: D

Explanation:

Reference: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-an-organizational-trail-in-the-console.html

The Solutions Architect manages a serverless application that consists of multiple API gateways, AWS Lambda functions, Amazon S3 buckets, and Amazon DynamoDB tables. Customers say that a few application components slow while loading dynamic images, and some are timing out with the “504 Gateway Timeout” error. While troubleshooting the scenario, the Solutions Architect confirms that DynamoDB monitoring metrics are at acceptable levels. Which of the following steps would be optimal for debugging these application issues? (Choose two.)

A.
Parse HTTP logs in Amazon API Gateway for HTTP errors to determine the root cause of the errors.
A.
Parse HTTP logs in Amazon API Gateway for HTTP errors to determine the root cause of the errors.
Answers
B.
Parse Amazon CloudWatch Logs to determine processing times for requested images at specified intervals.
B.
Parse Amazon CloudWatch Logs to determine processing times for requested images at specified intervals.
Answers
C.
Parse VPC Flow Logs to determine if there is packet loss between the Lambda function and S3.
C.
Parse VPC Flow Logs to determine if there is packet loss between the Lambda function and S3.
Answers
D.
Parse AWS X-Ray traces and analyze HTTP methods to determine the root cause of the HTTP errors.
D.
Parse AWS X-Ray traces and analyze HTTP methods to determine the root cause of the HTTP errors.
Answers
E.
Parse S3 access logs to determine if objects being accessed are from specific IP addresses to narrow the scope to geographic latency issues.
E.
Parse S3 access logs to determine if objects being accessed are from specific IP addresses to narrow the scope to geographic latency issues.
Answers
Suggested answer: B, D

Explanation:

Firstly “A 504 Gateway Timeout Error means your web server didn’t receive a timely response from another server upstream when it attempted to load one of your web pages. Put simply, your web servers aren’t communicating with each other fast enough”. This specific issue is addressed in the AWS article “Tracing, Logging and Monitoring an API Gateway API”.

Reference:

https://docs.amazonaws.cn/en_us/apigateway/latest/developerguide/monitoring_overview.html

An education company is running a web application used by college students around the world. The application runs in an Amazon Elastic Container Service (Amazon ECS) cluster in an Auto Scaling group behind an Application Load Balancer (ALB). A system administrator detects a weekly spike in the number of failed login attempts, which overwhelm the application’s authentication service. All the failed login attempts originate from about 500 different IP addresses that change each week. A solutions architect must prevent the failed login attempts from overwhelming the authentication service. Which solution meets these requirements with the MOST operational efficiency?

A.
Use AWS Firewall Manager to create a security group and security group policy to deny access from the IP addresses
A.
Use AWS Firewall Manager to create a security group and security group policy to deny access from the IP addresses
Answers
B.
Create an AWS WAF web ACL with a rate-based rule, and set the rule action to Block. Connect the web ACL to the ALB
B.
Create an AWS WAF web ACL with a rate-based rule, and set the rule action to Block. Connect the web ACL to the ALB
Answers
C.
Use AWS Firewall Manager to create a security group and security group policy to allow access only to specific CIDR ranges
C.
Use AWS Firewall Manager to create a security group and security group policy to allow access only to specific CIDR ranges
Answers
D.
Create an AWS WAF web ACL with an IP set match rule, and set the rule action to Block. Connect the web ACL to the ALB
D.
Create an AWS WAF web ACL with an IP set match rule, and set the rule action to Block. Connect the web ACL to the ALB
Answers
Suggested answer: A

Explanation:

Reference: https://docs.aws.amazon.com/waf/latest/developerguide/security-group-policies.html

A company is migrating a legacy application from an on-premises data center to AWS. The application consists of a single application server and a Microsoft SQL Server database server. Each server is deployed on a VMware VM that consumes 500 TB of data across multiple attached volumes.

The company has established a 10 Gbps AWS Direct Connect connection from the closest AWS Region to its on-premises data center. The Direct Connect connection is not currently in use by other services. Which combination of steps should a solutions architect take to migrate the application with the LEAST amount of downtime? (Choose two.)

A.
Use an AWS Server Migration Service (AWS SMS) replication job to migrate the database server VM to AWS.
A.
Use an AWS Server Migration Service (AWS SMS) replication job to migrate the database server VM to AWS.
Answers
B.
Use VM Import/Export to import the application server VM.
B.
Use VM Import/Export to import the application server VM.
Answers
C.
Export the VM images to an AWS Snowball Edge Storage Optimized device.
C.
Export the VM images to an AWS Snowball Edge Storage Optimized device.
Answers
D.
Use an AWS Server Migration Service (AWS SMS) replication job to migrate the application server VM to AWS.
D.
Use an AWS Server Migration Service (AWS SMS) replication job to migrate the application server VM to AWS.
Answers
E.
Use an AWS Database Migration Service (AWS DMS) replication instance to migrate the database to an Amazon RDS DB instance.
E.
Use an AWS Database Migration Service (AWS DMS) replication instance to migrate the database to an Amazon RDS DB instance.
Answers
Suggested answer: B, E

A company has an Amazon EC2 deployment that has the following architecture:

An application tier that contains 8 m4.xlarge instances

A Classic Load Balancer

Amazon S3 as a persistent data store

After one of the EC2 instances fails, users report very slow processing of their requests. A Solutions Architect must recommend design changes to maximize system reliability. The solution must minimize costs. What should the Solutions Architect recommend?

A.
Migrate the existing EC2 instances to a serverless deployment using AWS Lambda functions
A.
Migrate the existing EC2 instances to a serverless deployment using AWS Lambda functions
Answers
B.
Change the Classic Load Balancer to an Application Load Balancer
B.
Change the Classic Load Balancer to an Application Load Balancer
Answers
C.
Replace the application tier with m4.large instances in an Auto Scaling group
C.
Replace the application tier with m4.large instances in an Auto Scaling group
Answers
D.
Replace the application tier with 4 m4.2xlarge instances
D.
Replace the application tier with 4 m4.2xlarge instances
Answers
Suggested answer: B

Explanation:

By default, connection draining is enabled for Application Load Balancers but must be enabled for Classic Load Balancers. When Connection Draining is enabled and configured, the process of deregistering an instance from an Elastic Load Balancer gains an additional step. For the duration of the configured timeout, the load balancer will allow existing, in-flight requests made to an instance to complete, but it will not send any new requests to the instance. During this time, the API will report the status of the instance as InService, along with a message stating that “Instance deregistration currently in progress.” Once the timeout is reached, any remaining connections will be forcibly closed.

Reference: https://docs.aws.amazon.com/autoscaling/ec2/userguide/attach-load-balancer-asg.html

https://aws.amazon.com/blogs/aws/elb-connection-draining-remove-instances-from-service-with-care/

A medical company is building a data lake on Amazon S3. The data must be encrypted in transit and at rest. The data must remain protected even if S3 bucket is inadvertently made public. Which combination of steps will meet these requirements? (Choose three.)

A.
Ensure that each S3 bucket has a bucket policy that includes a Deny statement if the aws:SecureTransport condition is not present.
A.
Ensure that each S3 bucket has a bucket policy that includes a Deny statement if the aws:SecureTransport condition is not present.
Answers
B.
Create a CMK in AWS Key Management Service (AWS KMS). Turn on server-side encryption (SSE) on the S3 buckets, select SSE-KMS for the encryption type, and use the CMK as the key.
B.
Create a CMK in AWS Key Management Service (AWS KMS). Turn on server-side encryption (SSE) on the S3 buckets, select SSE-KMS for the encryption type, and use the CMK as the key.
Answers
C.
Ensure that each S3 bucket has a bucket policy that includes a Deny statement for PutObject actions if the request does not include an “s3:x-amz-server-side-encryption”:“aws:kms” condition.
C.
Ensure that each S3 bucket has a bucket policy that includes a Deny statement for PutObject actions if the request does not include an “s3:x-amz-server-side-encryption”:“aws:kms” condition.
Answers
D.
Turn on server-side encryption (SSE) on the S3 buckets and select SSE-S3 for the encryption type.
D.
Turn on server-side encryption (SSE) on the S3 buckets and select SSE-S3 for the encryption type.
Answers
E.
Ensure that each S3 bucket has a bucket policy that includes a Deny statement for PutObject actions if the request does not include an “s3:x-amz-server-side-encryption”:“AES256” condition.
E.
Ensure that each S3 bucket has a bucket policy that includes a Deny statement for PutObject actions if the request does not include an “s3:x-amz-server-side-encryption”:“AES256” condition.
Answers
F.
Turn on AWS Config. Use the s3-bucket-public-read-prohibited, s3-bucket-public-write-prohibited, and s3-bucket-sslrequests- only AWS Config managed rules to monitor the S3 buckets.
F.
Turn on AWS Config. Use the s3-bucket-public-read-prohibited, s3-bucket-public-write-prohibited, and s3-bucket-sslrequests- only AWS Config managed rules to monitor the S3 buckets.
Answers
Suggested answer: A, B, C

Explanation:

To determine HTTP or HTTPS requests in a bucket policy, use a condition that checks for the key "aws:SecureTransport". When this key is true, then request is sent through HTTPS. To comply with the s3bucket-ssl-requests-only rule, create abucket policy that explicitly denies access when the request meets the condition "aws:SecureTransport": "false". This policyexplicitly denies access to HTTP requests.

When you create an object, you can specify the use of server-side encryption with AWS Key Management Service (AWS KMS) keys to encrypt your data. This is true when you are either uploading a new object or copying an existing object. This encryption is known as SSE-KMS.

Enforce object encryption, create an S3 bucket policy that denies any S3 Put request that does not include the x-amz-serverside- encryption header.

Reference: https://aws.amazon.com/premiumsupport/knowledge-center/s3-bucket-policy-for-config-rule/

https://docs.aws.amazon.com/AmazonS3/latest/userguide/specifying-kms-encryption.html

https://aws.amazon.com/blogs/security/how-to-prevent-uploads-of-unencrypted-objects-to-amazon-s3/

A video streaming company recently launched a mobile app for video sharing. The app uploads various files to an Amazon S3 bucket in the us-east-1 Region. The files range in size from 1 GB to 10 GB. Users who access the app from Australia have experienced uploads that take long periods of time. Sometimes the files fail to completely upload for these users. A solutions architect must improve the app’s performance for these uploads. Which solutions will meet these requirements? (Choose two.)

A.
Enable S3 Transfer Acceleration on the S3 bucket. Configure the app to use the Transfer Acceleration endpoint for uploads.
A.
Enable S3 Transfer Acceleration on the S3 bucket. Configure the app to use the Transfer Acceleration endpoint for uploads.
Answers
B.
Configure an S3 bucket in each Region to receive the uploads. Use S3 Cross-Region Replication to copy the files to the distribution S3 bucket.
B.
Configure an S3 bucket in each Region to receive the uploads. Use S3 Cross-Region Replication to copy the files to the distribution S3 bucket.
Answers
C.
Set up Amazon Route 53 with latency-based routing to route the uploads to the nearest S3 bucket Region.
C.
Set up Amazon Route 53 with latency-based routing to route the uploads to the nearest S3 bucket Region.
Answers
D.
Configure the app to break the video files into chunks. Use a multipart upload to transfer files to Amazon S3.
D.
Configure the app to break the video files into chunks. Use a multipart upload to transfer files to Amazon S3.
Answers
E.
Modify the app to add random prefixes to the files before uploading.
E.
Modify the app to add random prefixes to the files before uploading.
Answers
Suggested answer: A, C

If you have a running instance using an Amazon EBS boot partition, you can call the _______ API to release the compute resources but preserve the data on the boot partition.

A.
Stop Instances
A.
Stop Instances
Answers
B.
Terminate Instances
B.
Terminate Instances
Answers
C.
AMI Instance
C.
AMI Instance
Answers
D.
Ping Instance
D.
Ping Instance
Answers
Suggested answer: A

Explanation:

If you have a running instance using an Amazon EBS boot partition, you can also call the Stop Instances API to release the compute resources but preserve the data on the boot partition.

Reference: https://aws.amazon.com/ec2/faqs/#How_quickly_will_systems_be_running

An elastic network interface (ENI) is a virtual network interface that you can attach to an instance in a VPC. An ENI can include one public IP address, which can be auto-assigned to the elastic network interface for eth0 when you launch an instance, but only when you_____.

A.
create an elastic network interface for eth1
A.
create an elastic network interface for eth1
Answers
B.
include a MAC address
B.
include a MAC address
Answers
C.
use an existing network interface
C.
use an existing network interface
Answers
D.
create an elastic network interface for eth0
D.
create an elastic network interface for eth0
Answers
Suggested answer: D

Explanation:

An elastic network interface (ENI) is defined as a virtual network interface that you can attach to an instance in a VPC and can include one public IP address, which can be auto-assigned to the elastic network interface for eth0 when you launch an instance, but only when you create an elastic network interface for eth0 instead of using an existing network interface.

Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-eni.html

A user has enabled detailed CloudWatch monitoring with the AWS Simple Notification Service. Which of the below mentioned statements helps the user understand detailed monitoring better?

A.
SNS cannot provide data every minute
A.
SNS cannot provide data every minute
Answers
B.
SNS will send data every minute after configuration
B.
SNS will send data every minute after configuration
Answers
C.
There is no need to enable since SNS provides data every minute
C.
There is no need to enable since SNS provides data every minute
Answers
D.
AWS CloudWatch does not support monitoring for SNS
D.
AWS CloudWatch does not support monitoring for SNS
Answers
Suggested answer: A

Explanation:

CloudWatch is used to monitor AWS as well as the custom services. It provides either basic or detailed monitoring for the supported AWS products. In basic monitoring, a service sends data points to CloudWatch every five minutes, while in detailed monitoring a service sends data points to CloudWatch every minute. The AWS SNS service sends data every 5 minutes. Thus, it supports only the basic monitoring. The user cannot enable detailed monitoring with SNS.

Reference: http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/supported_services.html

Total 906 questions
Go to page: of 91