ExamGecko
Home Home / Amazon / SAP-C01

Amazon SAP-C01 Practice Test - Questions Answers, Page 52

Question list
Search
Search

List of questions

Search

Related questions











A user is sending a custom metric to CloudWatch. If the call to the CloudWatch APIs has different dimensions, but the same metric name, how will CloudWatch treat all the requests?

A.
It will reject the request as there cannot be a separate dimension for a single metric.
A.
It will reject the request as there cannot be a separate dimension for a single metric.
Answers
B.
It will group all the calls into a single call.
B.
It will group all the calls into a single call.
Answers
C.
It will treat each unique combination of dimensions as a separate metric.
C.
It will treat each unique combination of dimensions as a separate metric.
Answers
D.
It will overwrite the previous dimension data with the new dimension data.
D.
It will overwrite the previous dimension data with the new dimension data.
Answers
Suggested answer: C

Explanation:

A dimension is a key-value pair used to uniquely identify a metric. CloudWatch treats each unique combination of dimensions as a separate metric. Thus, if the user is making 4 calls with the same metric name but a separate dimension, it will create 4 separate metrics.

Reference: http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/cloudwatch_concepts.html

A user is planning to host a Highly Available system on the AWS VPC. Which of the below mentioned statements is helpful in this scenario?

A.
Create VPC subnets in two separate availability zones and launch instances in different subnets.
A.
Create VPC subnets in two separate availability zones and launch instances in different subnets.
Answers
B.
Create VPC with only one public subnet and launch instances in different AZs using that subnet.
B.
Create VPC with only one public subnet and launch instances in different AZs using that subnet.
Answers
C.
Create two VPCs in two separate zones and setup failover with ELB such that if one VPC fails it will divert traffic to another VPC.
C.
Create two VPCs in two separate zones and setup failover with ELB such that if one VPC fails it will divert traffic to another VPC.
Answers
D.
Create VPC with only one private subnet and launch instances in different AZs using that subnet.
D.
Create VPC with only one private subnet and launch instances in different AZs using that subnet.
Answers
Suggested answer: A

Explanation:

A Virtual Private Cloud (VPC) is a virtual network dedicated to the user's AWS account. It enables the user to launch AWS resources into a virtual network that the user has defined. The VPC is always specific to a region. The user can create a VPC which can span multiple Availability Zones by adding one or more subnets in each Availability Zone. Each subnet must reside entirely within one Availability Zone and cannot span across zones.

Reference: http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Subnets.html#VPCSubnet

A company’s main intranet page has experienced degraded response times as its user base has increased although there are no reports of users seeing error pages. The application uses Amazon DynamoDB in read-only mode.

Amazon DynamoDB latency metrics for successful requests have been in a steady state even during times when users have reported degradation. The Development team has correlated the issue to ProvisionedThrough put Exceeded exceptions in the application logs when doing Scan and read operations The team also identified an access pattern of steady spikes of read activity on a distributed set of individual data items.

The Chief Technology Officer wants to improve the user experience.

Which solutions will meet these requirements with the LEAST amount of changes to the application? (Choose two.)

A.
Change the data model of the DynamoDB tables to ensure that all Scan and read operations meet DynamoDB best practices of uniform data access, reaching the full request throughput provisioned for the DynamoDB tables.
A.
Change the data model of the DynamoDB tables to ensure that all Scan and read operations meet DynamoDB best practices of uniform data access, reaching the full request throughput provisioned for the DynamoDB tables.
Answers
B.
Enable DynamoDB Auto Scaling to manage the throughput capacity as table traffic increases. Set the upper and lower limits to control costs and set a target utilization given the peak usage and how quickly the traffic changes.
B.
Enable DynamoDB Auto Scaling to manage the throughput capacity as table traffic increases. Set the upper and lower limits to control costs and set a target utilization given the peak usage and how quickly the traffic changes.
Answers
C.
Provision Amazon ElastiCache for Redis with cluster mode enabled. The cluster should be provisioned with enough shards to spread the application load and provision at least one read replica node for each shard.
C.
Provision Amazon ElastiCache for Redis with cluster mode enabled. The cluster should be provisioned with enough shards to spread the application load and provision at least one read replica node for each shard.
Answers
D.
Implement the DynamoDB Accelerator (DAX) client and provision a DAX cluster with the appropriate node types to sustain the application load. Tune the item and query cache configuration for an optimal user experience.
D.
Implement the DynamoDB Accelerator (DAX) client and provision a DAX cluster with the appropriate node types to sustain the application load. Tune the item and query cache configuration for an optimal user experience.
Answers
E.
Remove error retries and exponential backoffs in the application code to handle throttling errors.
E.
Remove error retries and exponential backoffs in the application code to handle throttling errors.
Answers
Suggested answer: A, E

A company has several Amazon EC2 instances to both public and private subnets within a VPC that is not connected to the corporate network. A security group associated with the EC2 instances allows the company to use the Windows remote desktop protocol (RDP) over the internet to access the instances. The security team has noticed connection attempts from unknown sources. The company wants to implement a more secure solution to access the EC2 instances. Which strategy should a solutions architect implement?

A.
Deploy a Linux bastion host on the corporate network that has access to all instances in the VPC.
A.
Deploy a Linux bastion host on the corporate network that has access to all instances in the VPC.
Answers
B.
Deploy AWS Systems Manager Agent on the EC2 instances. Access the EC2 instances using Session Manager restricting access to users with permission.
B.
Deploy AWS Systems Manager Agent on the EC2 instances. Access the EC2 instances using Session Manager restricting access to users with permission.
Answers
C.
Deploy a Linux bastion host with an Elastic IP address in the public subnet. Allow access to the bastion host from 0.0.0.0/0.
C.
Deploy a Linux bastion host with an Elastic IP address in the public subnet. Allow access to the bastion host from 0.0.0.0/0.
Answers
D.
Establish a Site-to-Site VPN connecting the corporate network to the VPC. Update the security groups to allow access from the corporate network only.
D.
Establish a Site-to-Site VPN connecting the corporate network to the VPC. Update the security groups to allow access from the corporate network only.
Answers
Suggested answer: A

A company needs to establish a connection from its on-premises data center to AWS. The company needs to connect all of its VPCs that are located in different AWS Regions with transitive routing capabilities between VPC networks. The company also must reduce network outbound traffic costs, increase bandwidth throughput, and provide a consistent network experience for end users. Which solution will meet these requirements?

A.
Create an AWS Site-to-Site VPN connection between the on-premises data center and a new central VPC. Create VPC peering connections that initiate from the central VPC to all other VPCs.
A.
Create an AWS Site-to-Site VPN connection between the on-premises data center and a new central VPC. Create VPC peering connections that initiate from the central VPC to all other VPCs.
Answers
B.
Create an AWS Direct Connect connection between the on-premises data center and AWS. Provision a transit VIF, and connect it to a Direct Connect gateway. Connect the Direct Connect gateway to all the other VPCs by using a transit gateway in each Region.
B.
Create an AWS Direct Connect connection between the on-premises data center and AWS. Provision a transit VIF, and connect it to a Direct Connect gateway. Connect the Direct Connect gateway to all the other VPCs by using a transit gateway in each Region.
Answers
C.
Create an AWS Site-to-Site VPN connection between the on-premises data center and a new central VPUse a transit gateway with dynamic routing. Connect the transit gateway to all other VPCs.
C.
Create an AWS Site-to-Site VPN connection between the on-premises data center and a new central VPUse a transit gateway with dynamic routing. Connect the transit gateway to all other VPCs.
Answers
D.
Create an AWS Direct Connect connection between the on-premises data center and AWS. Establish an AWS Site-to- Site VPN connection between all VPCs in each Region. Create VPC peering connections that initiate from the central VPC to all other VPCs.
D.
Create an AWS Direct Connect connection between the on-premises data center and AWS. Establish an AWS Site-to- Site VPN connection between all VPCs in each Region. Create VPC peering connections that initiate from the central VPC to all other VPCs.
Answers
Suggested answer: A

Explanation:

Reference: https://aws.amazon.com/vpc/faqs/

You create a VPN connection, and your VPN device supports Border Gateway Protocol (BGP).

Which of the following should be specified to configure the VPN connection?

A.
Classless routing
A.
Classless routing
Answers
B.
Classfull routing
B.
Classfull routing
Answers
C.
Dynamic routing
C.
Dynamic routing
Answers
D.
Static routing
D.
Static routing
Answers
Suggested answer: C

Explanation:

If you create a VPN connection, you must specify the type of routing that you plan to use, which will depend upon on the make and model of your VPN devices. If your VPN device supports Border Gateway Protocol (BGP), you need to specify dynamic routing when you configure your VPN connection. If your device does not support BGP, you should specify static routing.

Reference: http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_VPN.html

A solutions architect has implemented a SAML 2.0 federated identity solution with their company’s on-premises identity provider (IdP) to authenticate users’ access to the AWS environment. When the solutions architect tests authentication through the federated identity web portal, access to the AWS environment is granted. However, when test users attempt to authenticate through the federated identity web portal, they are not able to access the AWS environment. Which items should the solutions architect check to ensure identity federation is properly configured? (Choose three.)

A.
The IAM user’s permissions policy has allowed the use of SAML federation for that user.
A.
The IAM user’s permissions policy has allowed the use of SAML federation for that user.
Answers
B.
The IAM roles created for the federated users’ or federated groups’ trust policy have set the SAML provider as the principal.
B.
The IAM roles created for the federated users’ or federated groups’ trust policy have set the SAML provider as the principal.
Answers
C.
Test users are not in the AWSFederatedUsers group in the company’s IdR.
C.
Test users are not in the AWSFederatedUsers group in the company’s IdR.
Answers
D.
The web portal calls the AWS STS AssumeRoleWithSAML API with the ARN of the SAML provider, the ARN of the IAM role, and the SAML assertion from IdR.
D.
The web portal calls the AWS STS AssumeRoleWithSAML API with the ARN of the SAML provider, the ARN of the IAM role, and the SAML assertion from IdR.
Answers
E.
The on-premises IdP’s DNS hostname is reachable from the AWS environment VPCs.
E.
The on-premises IdP’s DNS hostname is reachable from the AWS environment VPCs.
Answers
F.
The company’s IdP defines SAML assertions that properly map users or groups in the company to IAM roles with appropriate permissions.
F.
The company’s IdP defines SAML assertions that properly map users or groups in the company to IAM roles with appropriate permissions.
Answers
Suggested answer: D, E, F

An organization is setting up a multi-site solution where the application runs on premise as well as on AWS to achieve the minimum recovery time objective(RTO). Which of the below mentioned configurations will not meet the requirements of the multi-site solution scenario?

A.
Configure data replication based on RTO.
A.
Configure data replication based on RTO.
Answers
B.
Keep an application running on premise as well as in AWS with full capacity.
B.
Keep an application running on premise as well as in AWS with full capacity.
Answers
C.
Setup a single DB instance which will be accessed by both sites.
C.
Setup a single DB instance which will be accessed by both sites.
Answers
D.
Setup a weighted DNS service like Route 53 to route traffic across sites.
D.
Setup a weighted DNS service like Route 53 to route traffic across sites.
Answers
Suggested answer: D

An organization is trying to setup a VPC with Auto Scaling. Which configuration steps below is not required to setup AWS VPC with Auto Scaling?

A.
Configure the Auto Scaling group with the VPC ID in which instances will be launched.
A.
Configure the Auto Scaling group with the VPC ID in which instances will be launched.
Answers
B.
Configure the Auto Scaling Launch configuration with multiple subnets of the VPC to enable the Multi AZ feature.
B.
Configure the Auto Scaling Launch configuration with multiple subnets of the VPC to enable the Multi AZ feature.
Answers
C.
Configure the Auto Scaling Launch configuration which does not allow assigning a public IP to instances.
C.
Configure the Auto Scaling Launch configuration which does not allow assigning a public IP to instances.
Answers
D.
Configure the Auto Scaling Launch configuration with the VPC security group.
D.
Configure the Auto Scaling Launch configuration with the VPC security group.
Answers
Suggested answer: B

Explanation:

The Amazon Virtual Private Cloud (Amazon VPC) allows the user to define a virtual networking environment in a private, isolated section of the Amazon Web Services (AWS) cloud. The user has complete control over the virtual networking environment. Within this virtual private cloud, the user can launch AWS resources, such as an Auto Scaling group. Before creating the Auto Scaling group it is recommended that the user creates the Launch configuration. Since it is a VPC, it is recommended to select the parameter which does not allow assigning a public IP to the instances.

The user should also set the VPC security group with the Launch configuration and select the subnets where the instances will be launched in the AutoScaling group. The HA will be provided as the subnets may be a part of separate AZs.

Reference: http://docs.aws.amazon.com/AutoScaling/latest/DeveloperGuide/autoscalingsubnets.html

A travel company built a web application that uses Amazon Simple Email Service (Amazon SES) to send email notifications to users. The company needs to enable logging to help troubleshoot email delivery issues. The company also needs the ability to do searches that are based on recipient, subject, and time sent.

Which combination of steps should a solutions architect take to meet these requirements? (Choose two.)

A.
Create an Amazon SES configuration set with Amazon Kinesis Data Firehose as the destination. Choose to send logs to an Amazon S3 bucket.
A.
Create an Amazon SES configuration set with Amazon Kinesis Data Firehose as the destination. Choose to send logs to an Amazon S3 bucket.
Answers
B.
Enable AWS CloudTrail logging. Specify an Amazon S3 bucket as the destination for the logs.
B.
Enable AWS CloudTrail logging. Specify an Amazon S3 bucket as the destination for the logs.
Answers
C.
Use Amazon Athena to query the logs in the Amazon S3 bucket for recipient, subject, and time sent.
C.
Use Amazon Athena to query the logs in the Amazon S3 bucket for recipient, subject, and time sent.
Answers
D.
Create an Amazon CloudWatch log group. Configure Amazon SES to send logs to the log group.
D.
Create an Amazon CloudWatch log group. Configure Amazon SES to send logs to the log group.
Answers
E.
Use Amazon Athena to query the logs in Amazon CloudWatch for recipient, subject, and time sent.
E.
Use Amazon Athena to query the logs in Amazon CloudWatch for recipient, subject, and time sent.
Answers
Suggested answer: A

Explanation:

Reference https://docs.aws.amazon.com/ses/latest/DeveloperGuide/ses-dg.pdf

Total 906 questions
Go to page: of 91