ExamGecko
Home Home / Amazon / SAP-C01

Amazon SAP-C01 Practice Test - Questions Answers, Page 80

Question list
Search
Search

List of questions

Search

Related questions











A company is running its AWS infrastructure across two AWS Regions. The company has four VPCs in the eu-west-1 Region and has two VPCs in the us-east-1 Region. The company also has an onpremises data center in Europe that has two AWS Direct Connect connections in eu-west-1.

The company needs a solution in which Amazon EC2 instances in each VPC can connect to each other by using private IP addresses. Servers in the on-premises data center also must be able to connect to those VPCs by using private IP addresses.

What is the MOST cost-effective solution that meets these requirements?

A.
Create an AWS Transit Gateway in each Region, and attach each VPC to the transit gateway in that Region. Create cross-Region peering between the transit gateways. Create two transit VIFs, and attach them to a single Direct Connect gateway. Associate each transit gateway with the Direct Connect gateway.
A.
Create an AWS Transit Gateway in each Region, and attach each VPC to the transit gateway in that Region. Create cross-Region peering between the transit gateways. Create two transit VIFs, and attach them to a single Direct Connect gateway. Associate each transit gateway with the Direct Connect gateway.
Answers
B.
Create VPC peering between each VPC in the same Region. Create cross-Region peering between each VPC in different Regions. Create two private VIFs, and attach them to a single Direct Connect gateway. Associate each VPC with the Direct Connect gateway.
B.
Create VPC peering between each VPC in the same Region. Create cross-Region peering between each VPC in different Regions. Create two private VIFs, and attach them to a single Direct Connect gateway. Associate each VPC with the Direct Connect gateway.
Answers
C.
Create VPC peering between each VPC in the same Region. Create cross-Region peering between each VPC in different Regions. Create two public VIFs that are configured to route AWS IP addresses globally to on-premises servers.
C.
Create VPC peering between each VPC in the same Region. Create cross-Region peering between each VPC in different Regions. Create two public VIFs that are configured to route AWS IP addresses globally to on-premises servers.
Answers
D.
Create an AWS Transit Gateway in each Region, and attach each VPC to the transit gateway in that Region. Create cross-Region peering between the transit gateways. Create two private VIFs, and attach them to a single Direct Connect gateway. Associate each VPC with the Direct Connect gateway.
D.
Create an AWS Transit Gateway in each Region, and attach each VPC to the transit gateway in that Region. Create cross-Region peering between the transit gateways. Create two private VIFs, and attach them to a single Direct Connect gateway. Associate each VPC with the Direct Connect gateway.
Answers
Suggested answer: B

A company has multiple lines of business (LOBs) that roll up to the parent company. The company has asked its solutions architect to develop a solution with the following requirements:

Produce a single AWS invoice for all of the AWS accounts used by its LOBs.

The costs for each LOB account should be broken out on the invoice.

Provide the ability to restrict services and features in the LOB accounts, as defined by the company’s governance policy. Each LOB account should be delegated full administrator permissions, regardless of the governance policy. Which combination of steps should the solutions architect take to meet these requirements? (Choose two.)

A.
Use AWS Organizations to create an organization in the parent account for each LOB. Then, invite each LOB account to the appropriate organization.
A.
Use AWS Organizations to create an organization in the parent account for each LOB. Then, invite each LOB account to the appropriate organization.
Answers
B.
Use AWS Organizations to create a single organization in the parent account. Then, invite each LOB’s AWS account to pin the organization.
B.
Use AWS Organizations to create a single organization in the parent account. Then, invite each LOB’s AWS account to pin the organization.
Answers
C.
Implement service quotas to define the services and features that are permitted and apply the quotas to each LOB as appropriate.
C.
Implement service quotas to define the services and features that are permitted and apply the quotas to each LOB as appropriate.
Answers
D.
Create an SCP that allows only approved services and features, then apply the policy to the LOB accounts. Enable consolidated billing in the parent account’s billing console and link the LOB accounts.
D.
Create an SCP that allows only approved services and features, then apply the policy to the LOB accounts. Enable consolidated billing in the parent account’s billing console and link the LOB accounts.
Answers
Suggested answer: C, D

Amazon EC2 provides a repository of public data sets that can be seamlessly integrated into AWS cloud-based applications. What is the monthly charge for using the public data sets?

A.
A 1-time charge of 10$ for all the datasets.
A.
A 1-time charge of 10$ for all the datasets.
Answers
B.
1$ per dataset per month
B.
1$ per dataset per month
Answers
C.
10$ per month for all the datasets
C.
10$ per month for all the datasets
Answers
D.
There is no charge for using the public data sets
D.
There is no charge for using the public data sets
Answers
Suggested answer: D

If a single condition within an IAM policy includes multiple values for one key, it will be evaluated using a logical______.

A.
OR
A.
OR
Answers
B.
NAND
B.
NAND
Answers
C.
NOR
C.
NOR
Answers
D.
AND
D.
AND
Answers
Suggested answer: A

Explanation:

If a single condition within an IAM policy includes multiple values for one key, it will be evaluated using a logical OR.

Reference: http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements.html

True or False: Amazon ElastiCache supports the Redis key-value store.

A.
True, ElastiCache supports the Redis key-value store, but with limited functionalities.
A.
True, ElastiCache supports the Redis key-value store, but with limited functionalities.
Answers
B.
False, ElastiCache does not support the Redis key-value store.
B.
False, ElastiCache does not support the Redis key-value store.
Answers
C.
True, ElastiCache supports the Redis key-value store.
C.
True, ElastiCache supports the Redis key-value store.
Answers
D.
False, ElastiCache supports the Redis key-value store only if you are in a VPC environment.
D.
False, ElastiCache supports the Redis key-value store only if you are in a VPC environment.
Answers
Suggested answer: C

Explanation:

This is true. ElastiCache supports two open-source in-memory caching engines: 1. Memcached - a widely adopted memory object caching system. ElastiCache is protocol compliant with Memcached, so popular tools that you use today with existing Memcached environments will work seamlessly with the service. 2. Redis - a popular open-source in-memory key-value store that supports data structures such as sorted sets and lists. ElastiCache supports Master / Slave replication and Multi- AZ which can be used to achieve cross AZ redundancy.

Reference: https://aws.amazon.com/elasticache/

A company has created an account for individual Development teams, resulting in a total of 200 accounts. All accounts have a single virtual private cloud (VPC) in a single region with multiple microservices running in Docker containers that need to communicate with microservices in other accounts. The Security team requirements state that these microservices must not traverse the public internet, and only certain internal services should be allowed to call other individual services. If there is any denied network traffic for a service, the Security team must be notified of any denied requests, including the source IP. How can connectivity be established between service while meeting the security requirements?

A.
Create a VPC peering connection between the VPCs. Use security groups on the instances to allow traffic from the security group IDs that are permitted to call the microservice. Apply network ACLs and allow traffic from the local VPC and peered VPCs only. Within the task definition in Amazon ECS for each of the microservices, specify a log configuration by using the awslogs driver. Within Amazon CloudWatch Logs, create a metric filter and alarm off of the number of HTTP 403 responses. Create an alarm when the number of messages exceeds a threshold set by the Security team.
A.
Create a VPC peering connection between the VPCs. Use security groups on the instances to allow traffic from the security group IDs that are permitted to call the microservice. Apply network ACLs and allow traffic from the local VPC and peered VPCs only. Within the task definition in Amazon ECS for each of the microservices, specify a log configuration by using the awslogs driver. Within Amazon CloudWatch Logs, create a metric filter and alarm off of the number of HTTP 403 responses. Create an alarm when the number of messages exceeds a threshold set by the Security team.
Answers
B.
Ensure that no CIDR ranges are overlapping, and attach a virtual private gateway (VGW) to each VPC. Provision an IPsec tunnel between each VGW and enable route propagation on the route table. Configure security groups on each service to allow the CIDR ranges of the VPCs in the other accounts. Enable VPC Flow Logs, and use an Amazon CloudWatch Logs subscription filter for rejected traffic. Create an IAM role and allow the Security team to call the AssumeRole action for each account.
B.
Ensure that no CIDR ranges are overlapping, and attach a virtual private gateway (VGW) to each VPC. Provision an IPsec tunnel between each VGW and enable route propagation on the route table. Configure security groups on each service to allow the CIDR ranges of the VPCs in the other accounts. Enable VPC Flow Logs, and use an Amazon CloudWatch Logs subscription filter for rejected traffic. Create an IAM role and allow the Security team to call the AssumeRole action for each account.
Answers
C.
Deploy a transit VPC by using third-party marketplace VPN appliances running on Amazon EC2, dynamically routed VPN connections between the VPN appliance, and the virtual private gateways (VGWs) attached to each VPC within the region.Adjust network ACLs to allow traffic from the local VPC only. Apply security groups to the microservices to allow traffic from the VPN appliances only. Install the awslogs agent on each VPN appliance, and configure logs to forward to Amazon CloudWatch Logs in the security account for the Security team to access.
C.
Deploy a transit VPC by using third-party marketplace VPN appliances running on Amazon EC2, dynamically routed VPN connections between the VPN appliance, and the virtual private gateways (VGWs) attached to each VPC within the region.Adjust network ACLs to allow traffic from the local VPC only. Apply security groups to the microservices to allow traffic from the VPN appliances only. Install the awslogs agent on each VPN appliance, and configure logs to forward to Amazon CloudWatch Logs in the security account for the Security team to access.
Answers
D.
Create a Network Load Balancer (NLB) for each microservice. Attach the NLB to a PrivateLink endpoint service and whitelist the accounts that will be consuming this service. Create an interface endpoint in the consumer VPC and associate a security group that allows only the security group IDs of the services authorized to call the producer service. On the producer services, create security groups for each microservice and allow only the CIDR range of the allowed services. Create VPC Flow Logs on each VPC to capture rejected traffic that will be delivered to an Amazon CloudWatch Logs group. Create a CloudWatch Logs subscription that streams the log data to a security account.
D.
Create a Network Load Balancer (NLB) for each microservice. Attach the NLB to a PrivateLink endpoint service and whitelist the accounts that will be consuming this service. Create an interface endpoint in the consumer VPC and associate a security group that allows only the security group IDs of the services authorized to call the producer service. On the producer services, create security groups for each microservice and allow only the CIDR range of the allowed services. Create VPC Flow Logs on each VPC to capture rejected traffic that will be delivered to an Amazon CloudWatch Logs group. Create a CloudWatch Logs subscription that streams the log data to a security account.
Answers
Suggested answer: C

Which of the following is true of Amazon EBS encryption keys?

A.
Amazon EBS encryption uses the Customer Master Key (CMK) to create an AWS Key Management Service (AWS KMS) master key.
A.
Amazon EBS encryption uses the Customer Master Key (CMK) to create an AWS Key Management Service (AWS KMS) master key.
Answers
B.
Amazon EBS encryption uses the EBS Magnetic key to create an AWS Key Management Service (AWS KMS) master key.
B.
Amazon EBS encryption uses the EBS Magnetic key to create an AWS Key Management Service (AWS KMS) master key.
Answers
C.
Amazon EBS encryption uses the EBS Magnetic key to create a Customer Master Key (CMK).
C.
Amazon EBS encryption uses the EBS Magnetic key to create a Customer Master Key (CMK).
Answers
D.
Amazon EBS encryption uses the AWS Key Management Service (AWS KMS) master key to create a Customer Master Key (CMK).
D.
Amazon EBS encryption uses the AWS Key Management Service (AWS KMS) master key to create a Customer Master Key (CMK).
Answers
Suggested answer: D

Explanation:

Amazon EBS encryption uses AWS Key Management Service (AWS KMS) master keys when creating encrypted volumes and any snapshots created from your encrypted volumes.

Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AmazonEBS.html

You are designing a social media site and are considering how to mitigate distributed denial-of-service (DDoS) attacks. Which of the below are viable mitigation techniques? (Choose three.)

A.
Add multiple elastic network interfaces (ENIs) to each EC2 instance to increase the network bandwidth.
A.
Add multiple elastic network interfaces (ENIs) to each EC2 instance to increase the network bandwidth.
Answers
B.
Use dedicated instances to ensure that each instance has the maximum performance possible.
B.
Use dedicated instances to ensure that each instance has the maximum performance possible.
Answers
C.
Use an Amazon CloudFront distribution for both static and dynamic content.
C.
Use an Amazon CloudFront distribution for both static and dynamic content.
Answers
D.
Use an Elastic Load Balancer with auto scaling groups at the web, app and Amazon Relational Database Service (RDS) tiers
D.
Use an Elastic Load Balancer with auto scaling groups at the web, app and Amazon Relational Database Service (RDS) tiers
Answers
E.
Add alert Amazon CloudWatch to look for high Network in and CPU utilization.
E.
Add alert Amazon CloudWatch to look for high Network in and CPU utilization.
Answers
F.
Create processes and capabilities to quickly add and remove rules to the instance OS firewall.
F.
Create processes and capabilities to quickly add and remove rules to the instance OS firewall.
Answers
Suggested answer: C, D, E

A company recently deployed a new application that runs on a group of Amazon EC2 Linux instances in a VPC. In a peered VPC, the company launched an EC2 Linux instance that serves as a bastion host. The security group of the application instances allows access only on TCP port 22 from the private IP of the bastion host. The security group of the bastion host allows access to TCP port 22 from 0.0.0.0/0 so that system administrators can use SSH to remotely log in to the application instances from several branch offices.

While looking through operating system logs on the bastion host, a cloud engineer notices thousands of failed SSH logins to the bastion host from locations around the world. The cloud engineer wants to change how remote access is granted to the application instances and wants to meet the following requirements: Eliminate brute-force SSH login attempts. Retain a log of commands run during an SSH session. Retain the ability to forward ports.

Which solution meets these requirements for remote access to the application instances?

A.
Configure the application instances to communicate with AWS Systems Manager. Grant access to the system administrators to use Session Manager to establish a session with the application instances. Terminate the bastion host.
A.
Configure the application instances to communicate with AWS Systems Manager. Grant access to the system administrators to use Session Manager to establish a session with the application instances. Terminate the bastion host.
Answers
B.
Update the security group of the bastion host to allow traffic from only the public IP addresses of the branch offices.
B.
Update the security group of the bastion host to allow traffic from only the public IP addresses of the branch offices.
Answers
C.
Configure an AWS Client VPN endpoint and provision each system administrator with a certificate to establish a VPN connection to the application VPUpdate the security group of the application instances to allow traffic from only the Client VPN IPv4 CIDR. Terminate the bastion host.
C.
Configure an AWS Client VPN endpoint and provision each system administrator with a certificate to establish a VPN connection to the application VPUpdate the security group of the application instances to allow traffic from only the Client VPN IPv4 CIDR. Terminate the bastion host.
Answers
D.
Configure the application instances to communicate with AWS Systems Manager. Grant access to the system administrators to issue commands to the application instances by using Systems Manager Run Command. Terminate the bastion host.
D.
Configure the application instances to communicate with AWS Systems Manager. Grant access to the system administrators to issue commands to the application instances by using Systems Manager Run Command. Terminate the bastion host.
Answers
Suggested answer: C

An organization has created 5 IAM users. The organization wants to give them the same login ID but different passwords. How can the organization achieve this?

A.
The organization should create each user in a separate region so that they have their own URL to login
A.
The organization should create each user in a separate region so that they have their own URL to login
Answers
B.
The organization should create a separate login ID but give the IAM users the same alias so that each one can login with their alias
B.
The organization should create a separate login ID but give the IAM users the same alias so that each one can login with their alias
Answers
C.
It is not possible to have the same login ID for multiple IAM users of the same account
C.
It is not possible to have the same login ID for multiple IAM users of the same account
Answers
D.
The organization should create various groups and add each user with the same login ID to different groups. The user can login with their own group ID
D.
The organization should create various groups and add each user with the same login ID to different groups. The user can login with their own group ID
Answers
Suggested answer: C

Explanation:

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. Whenever the organization is creating an IAM user, there should be a unique ID for each user. It is not possible to have the same login ID for multiple users. The names of users, groups, roles, instance profiles must be alphanumeric, including the following common characters: plus (+), equal (=), comma (,), period (.), at (@), and dash (-).

Reference: http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_SettingUpUser.html

Total 906 questions
Go to page: of 91