ExamGecko
Home Home / Amazon / SAP-C01

Amazon SAP-C01 Practice Test - Questions Answers, Page 74

Question list
Search
Search

List of questions

Search

Related questions











In the context of policies and permissions in AWS IAM, the Condition element is ____________.

A.
crucial while writing the IAM policies
A.
crucial while writing the IAM policies
Answers
B.
an optional element
B.
an optional element
Answers
C.
always set to null
C.
always set to null
Answers
D.
a mandatory element
D.
a mandatory element
Answers
Suggested answer: B

Explanation:

The Condition element (or Condition block) lets you specify conditions for when a policy is in effect. The Condition element is optional.

Reference: http://docs.aws.amazon.com/IAM/latest/UserGuide/AccessPolicyLanguage_ElementDescriptions.html

A solutions architect is designing a publicly accessible web application that is on an Amazon CloudFront distribution with an Amazon S3 website endpoint as the origin. When the solution is deployed, the website returns an Error 403: Access Denied message.

Which steps should the solutions architect take to correct the issue? (Choose two.)

A.
Remove the S3 block public access option from the S3 bucket.
A.
Remove the S3 block public access option from the S3 bucket.
Answers
B.
Remove the requester pays option from the S3 bucket.
B.
Remove the requester pays option from the S3 bucket.
Answers
C.
Remove the origin access identity (OAI) from the CloudFront distribution.
C.
Remove the origin access identity (OAI) from the CloudFront distribution.
Answers
D.
Change the storage class from S3 Standard to S3 One Zone-Infrequent Access (S3 One Zone-IA).
D.
Change the storage class from S3 Standard to S3 One Zone-Infrequent Access (S3 One Zone-IA).
Answers
E.
Disable S3 object versioning.
E.
Disable S3 object versioning.
Answers
Suggested answer: A, C


You have an application running on an EC2 instance which will allow users to download files from a private S3 bucket using a pre-signed URL. Before generating the URL, the application should verify the existence of the file in S3. How should the application use AWS credentials to access the S3 bucket securely?

A.
Use the AWS account access keys; the application retrieves the credentials from the source code of the application.
A.
Use the AWS account access keys; the application retrieves the credentials from the source code of the application.
Answers
B.
Create an IAM role for EC2 that allows list access to objects in the S3 bucket; launch the Instance with the role, and retrieve the role's credentials from the EC2 instance metadata.
B.
Create an IAM role for EC2 that allows list access to objects in the S3 bucket; launch the Instance with the role, and retrieve the role's credentials from the EC2 instance metadata.
Answers
C.
Create an IAM user for the application with permissions that allow list access to the S3 bucket; the application retrieves the IAM user credentials from a temporary directory with permissions that allow read access only to the Application user.
C.
Create an IAM user for the application with permissions that allow list access to the S3 bucket; the application retrieves the IAM user credentials from a temporary directory with permissions that allow read access only to the Application user.
Answers
D.
Create an IAM user for the application with permissions that allow list access to the S3 bucket; launch the instance as the IAM user, and retrieve the IAM user's credentials from the EC2 instance user data.
D.
Create an IAM user for the application with permissions that allow list access to the S3 bucket; launch the instance as the IAM user, and retrieve the IAM user's credentials from the EC2 instance user data.
Answers
Suggested answer: B

Explanation:

Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html

A company is building an application on AWS. The application sends logs to an Amazon Elasticsearch Service (Amazon ES) cluster for analysis. All data must be stored within a VPC. Some of the company’s developers work from home. Other developers work from three different company office locations. The developers need to access Amazon ES to analyze and visualize logs directly from their local development machines. Which solution will meet these requirements?

A.
Configure and set up an AWS Client VPN endpoint. Associate the Client VPN endpoint with a subnet in the VPC. Configure a Client VPN self-service portal. Instruct the developers to connect by using the client for Client VPN.
A.
Configure and set up an AWS Client VPN endpoint. Associate the Client VPN endpoint with a subnet in the VPC. Configure a Client VPN self-service portal. Instruct the developers to connect by using the client for Client VPN.
Answers
B.
Create a transit gateway, and connect it to the VPC. Create an AWS Site-to-Site VPN. Create an attachment to the transit gateway. Instruct the developers to connect by using an OpenVPN client.
B.
Create a transit gateway, and connect it to the VPC. Create an AWS Site-to-Site VPN. Create an attachment to the transit gateway. Instruct the developers to connect by using an OpenVPN client.
Answers
C.
Create a transit gateway, and connect it to the VPOrder an AWS Direct Connect connection. Set up a public VIF on the Direct Connect connection. Associate the public VIF with the transit gateway. Instruct the developers to connect to the Direct Connect connection
C.
Create a transit gateway, and connect it to the VPOrder an AWS Direct Connect connection. Set up a public VIF on the Direct Connect connection. Associate the public VIF with the transit gateway. Instruct the developers to connect to the Direct Connect connection
Answers
D.
Create and configure a bastion host in a public subnet of the VPC. Configure the bastion host security group to allow SSH access from the company CIDR ranges. Instruct the developers to connect by using SSH.
D.
Create and configure a bastion host in a public subnet of the VPC. Configure the bastion host security group to allow SSH access from the company CIDR ranges. Instruct the developers to connect by using SSH.
Answers
Suggested answer: A

Explanation:

Reference: https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/cvpn-getting-started.html

An organization has developed an application which provides a smarter shopping experience. They need to show a demonstration to various stakeholders who may not be able to access the in premise application so they decide to host a demo version of the application on AWS.

Consequently, they will need a fixed elastic IP attached automatically to the instance when it is launched. In this scenario which of the below mentioned options will not help assign the elastic IP automatically?

A.
Write a script which will fetch the instance metadata on system boot and assign the public IP using that metadata.
A.
Write a script which will fetch the instance metadata on system boot and assign the public IP using that metadata.
Answers
B.
Provide an elastic IP in the user data and setup a bootstrapping script which will fetch that elastic IP and assign it to the instance.
B.
Provide an elastic IP in the user data and setup a bootstrapping script which will fetch that elastic IP and assign it to the instance.
Answers
C.
Create a controlling application which launches the instance and assigns the elastic IP based on the parameter provided when that instance is booted.
C.
Create a controlling application which launches the instance and assigns the elastic IP based on the parameter provided when that instance is booted.
Answers
D.
Launch instance with VPC and assign an elastic IP to the primary network interface.
D.
Launch instance with VPC and assign an elastic IP to the primary network interface.
Answers
Suggested answer: A

Explanation:

EC2 allows the user to launch On-Demand instances. If the organization is using an application temporarily only for demo purposes the best way to assign an elastic IP would be: Launch an instance with a VPC and assign an EIP to the primary network interface. This way on every instance start it will have the same IP Create a bootstrapping script and provide it some metadata, such as user data which can be used to assign an EIP Create a controller instance which can schedule the start and stop of the instance and provide an EIP as a parameter so that the controller instance can check the instance boot and assign an EIP The instance metadata gives the current instance data, such as the public/private IP. It can be of no use for assigning an EIP.

Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AESDG-chapter-instancedata.html

A financial company needs to create a separate AWS account for a new digital wallet application. The company uses AWS Organizations to manage its accounts. A solutions architect uses the IAM user Support1 from the master account to create a new member account with [email protected] as the email address.

What should the solutions architect do to create IAM users in the new member account?

A.
Sign in to the AWS Management Console with AWS account root user credentials by using the 64-character password from the initial AWS Organizations email sent to [email protected]. Set up the IAM users as required.
A.
Sign in to the AWS Management Console with AWS account root user credentials by using the 64-character password from the initial AWS Organizations email sent to [email protected]. Set up the IAM users as required.
Answers
B.
From the master account, switch roles to assume the OrganizationAccountAccessRole role with the account ID of the new member account. Set up the IAM users as required.
B.
From the master account, switch roles to assume the OrganizationAccountAccessRole role with the account ID of the new member account. Set up the IAM users as required.
Answers
C.
Go to the AWS Management Console sign-in page. Choose “Sign in using root account credentials.” Sign in by using the email address [email protected] and the master account’s root password. Set up the IAM users as required.
C.
Go to the AWS Management Console sign-in page. Choose “Sign in using root account credentials.” Sign in by using the email address [email protected] and the master account’s root password. Set up the IAM users as required.
Answers
D.
Go to the AWS Management Console sign-in page. Sign in by using the account ID of the new member account and the Support1 IAM credentials. Set up the IAM users as required.
D.
Go to the AWS Management Console sign-in page. Sign in by using the account ID of the new member account and the Support1 IAM credentials. Set up the IAM users as required.
Answers
Suggested answer: A

Explanation:

Reference: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_create.html

You need a persistent and durable storage to trace call activity of an IVR (Interactive Voice Response) system. Call duration is mostly in the 2-3 minutes timeframe. Each traced call can be either active or terminated. An external application needs to know each minute the list of currently active calls. Usually there are a few calls/second, but once per month there is a periodic peak up to 1000 calls/second for a few hours. The system is open 24/7 and any downtime should be avoided.

Historical data is periodically archived to files. Cost saving is a priority for this project.

What database implementation would better fit this scenario, keeping costs as low as possible?

A.
Use DynamoDB with a "Calls" table and a Global Secondary Index on a "State" attribute that can equal to "active" or "terminated". In this way the Global Secondary Index can be used for all items in the table.
A.
Use DynamoDB with a "Calls" table and a Global Secondary Index on a "State" attribute that can equal to "active" or "terminated". In this way the Global Secondary Index can be used for all items in the table.
Answers
B.
Use RDS Multi-AZ with a "CALLS" table and an indexed "STATE" field that can be equal to "ACTIVE" or 'TERMINATED". In this way the SQL query is optimized by the use of the Index.
B.
Use RDS Multi-AZ with a "CALLS" table and an indexed "STATE" field that can be equal to "ACTIVE" or 'TERMINATED". In this way the SQL query is optimized by the use of the Index.
Answers
C.
Use RDS Multi-AZ with two tables, one for "ACTIVE_CALLS" and one for "TERMINATED_CALLS". In this way the "ACTIVE_CALLS" table is always small and effective to access.
C.
Use RDS Multi-AZ with two tables, one for "ACTIVE_CALLS" and one for "TERMINATED_CALLS". In this way the "ACTIVE_CALLS" table is always small and effective to access.
Answers
D.
Use DynamoDB with a "Calls" table and a Global Secondary Index on a "IsActive" attribute that is present for active calls only. In this way the Global Secondary Index is sparse and more effective.
D.
Use DynamoDB with a "Calls" table and a Global Secondary Index on a "IsActive" attribute that is present for active calls only. In this way the Global Secondary Index is sparse and more effective.
Answers
Suggested answer: D

Explanation:

Q: Can a global secondary index key be defined on non-unique attributes?

Yes. Unlike the primary key on a table, a GSI index does not require the indexed attributes to be unique. Q: Are GSI key attributes required in all items of a DynamoDB table? No. GSIs are sparse indexes. Unlike the requirement of having a primary key, an item in a DynamoDB table does not have to contain any of the GSI keys. If a GSI key has both hash and range elements, and a table item omits either of them, then that item will not be indexed by the corresponding GSI. In such cases, a GSI can be very useful in efficiently locating items that have an uncommon attribute.

Reference: https://aws.amazon.com/dynamodb/faqs/

What is a circular dependency in AWS CloudFormation?

A.
When Nested Stacks depend on each other.
A.
When Nested Stacks depend on each other.
Answers
B.
When Resources form a Depend On loop.
B.
When Resources form a Depend On loop.
Answers
C.
When a Template references an earlier version of itself.
C.
When a Template references an earlier version of itself.
Answers
D.
When a Template references a region, which references the original Template.
D.
When a Template references a region, which references the original Template.
Answers
Suggested answer: B

Explanation:

To resolve a dependency error, add a Depends On attribute to resources that depend on other resources in your template. In some cases, you must explicitly declare dependencies so that AWS CloudFormation can create or delete resources in the correct order. For example, if you create an Elastic IP and a VPC with an Internet gateway in the same stack, the Elastic IP must depend on the Internet gateway attachment. For additional information, see Depends On Attribute.

Reference: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/troubleshooting.html#troubleshooting-errorsdependency- error

A multimedia company with a single AWS account is launching an application for a global user base. The application storage and bandwidth requirements are unpredictable. The application will use Amazon EC2 instances behind an Application Load Balancer as the web tier and will use Amazon DynamoDB as the database tier. The environment for the application must meet the following requirements:

Low latency when accessed from any part of the world

WebSocket support

End-to-end encryption

Protection against the latest security threats

Managed layer 7 DDoS protection

Which actions should the solutions architect take to meet these requirements? (Choose two.)

A.
Use Amazon Route 53 and Amazon CloudFront for content distribution. Use Amazon S3 to store static content
A.
Use Amazon Route 53 and Amazon CloudFront for content distribution. Use Amazon S3 to store static content
Answers
B.
Use Amazon Route 53 and AWS Transit Gateway for content distribution. Use an Amazon Elastic Block Store (Amazon EBS) volume to store static content
B.
Use Amazon Route 53 and AWS Transit Gateway for content distribution. Use an Amazon Elastic Block Store (Amazon EBS) volume to store static content
Answers
C.
Use AWS WAF with AWS Shield Advanced to protect the application
C.
Use AWS WAF with AWS Shield Advanced to protect the application
Answers
D.
Use AWS WAF and Amazon Detective to protect the application
D.
Use AWS WAF and Amazon Detective to protect the application
Answers
E.
Use AWS Shield Standard to protect the application
E.
Use AWS Shield Standard to protect the application
Answers
Suggested answer: B, C

A sys admin is maintaining an application on AWS. The application is installed on EC2 and user has configured ELB and Auto Scaling. Considering future load increase, the user is planning to launch new servers proactively so that they get registered with ELB.

How can the user add these instances with Auto Scaling?

A.
Decrease the minimum limit of the Auto Scaling group
A.
Decrease the minimum limit of the Auto Scaling group
Answers
B.
Increase the maximum limit of the Auto Scaling group
B.
Increase the maximum limit of the Auto Scaling group
Answers
C.
Launch an instance manually and register it with ELB on the fly
C.
Launch an instance manually and register it with ELB on the fly
Answers
D.
Increase the desired capacity of the Auto Scaling group
D.
Increase the desired capacity of the Auto Scaling group
Answers
Suggested answer: D

Explanation:

A user can increase the desired capacity of the Auto Scaling group and Auto Scaling will launch a new instance as per the new capacity. The newly launched instances will be registered with ELB if Auto Scaling group is configured with ELB. If the user decreases the minimum size the instances will be removed from Auto Scaling. Increasing the maximum size will not add instances but only set the maximum instance cap.

Reference: http://docs.aws.amazon.com/AutoScaling/latest/DeveloperGuide/as-manual-scaling.html

Total 906 questions
Go to page: of 91