ExamGecko
Home Home / Amazon / SAP-C01

Amazon SAP-C01 Practice Test - Questions Answers, Page 83

Question list
Search
Search

List of questions

Search

Related questions











In the context of IAM roles for Amazon EC2, which of the following NOT true about delegating permission to make API requests?

A.
You cannot create an IAM role.
A.
You cannot create an IAM role.
Answers
B.
You can have the application retrieve a set of temporary credentials and use them.
B.
You can have the application retrieve a set of temporary credentials and use them.
Answers
C.
You can specify the role when you launch your instances.
C.
You can specify the role when you launch your instances.
Answers
D.
You can define which accounts or AWS services can assume the role.
D.
You can define which accounts or AWS services can assume the role.
Answers
Suggested answer: A

Explanation:

Amazon designed IAM roles so that your applications can securely make API requests from your instances, without requiring you to manage the security credentials that the applications use. Instead of creating and distributing your AWS credentials, you can delegate permission to make API requests using IAM roles as follows: Create an IAM role. Define which accounts or AWS services can assume the role. Define which API actions and resources the application can use after assuming the role. Specify the role when you launch your instances. Have the application retrieve a set of temporary credentials and use them.

Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html

A company is migrating mobile banking applications to run on Amazon EC2 instances in a VPC. Backend service applications run in an on-premises data center. The data center has an AWS Direct Connect connection into AWS. The applications that run in the VPC need to resolve DNS requests to an on-premises Active Directory domain that runs in the data center. Which solution will meet these requirements with the LEAST administrative overhead?

A.
Provision a set of EC2 instances across two Availability Zones in the VPC as caching DNS servers to resolve DNS queries from the application servers within the VPC.
A.
Provision a set of EC2 instances across two Availability Zones in the VPC as caching DNS servers to resolve DNS queries from the application servers within the VPC.
Answers
B.
Provision an Amazon Route 53 private hosted zone. Configure NS records that point to on-premises DNS servers.
B.
Provision an Amazon Route 53 private hosted zone. Configure NS records that point to on-premises DNS servers.
Answers
C.
Create DNS endpoints by using Amazon Route 53 Resolver Add conditional forwarding rules to resolve DNS namespaces between the on-premises data center and the VPC.
C.
Create DNS endpoints by using Amazon Route 53 Resolver Add conditional forwarding rules to resolve DNS namespaces between the on-premises data center and the VPC.
Answers
D.
Provision a new Active Directory domain controller in the VPC with a bidirectional trust between this new domain and the on-premises Active Directory domain.
D.
Provision a new Active Directory domain controller in the VPC with a bidirectional trust between this new domain and the on-premises Active Directory domain.
Answers
Suggested answer: B

Explanation:

Reference: https://aws.amazon.com/blogs/security/how-to-set-up-dns-resolution-between-on-premises-networks-and-awsusing-aws-directory-service-and-amazon-route-53/

A company has an application that generates reports and stores them in an Amazon bucket Amazon S3 bucket. When a user accesses their report, the application generates a signed URL to allow the user to download the report. The company’s security team has discovered that the files are public and that anyone can download them without authentication. The company has suspended the generation of new reports until the problem is resolved. Which set of action will immediately remediate the security issue without impacting the application’s normal workflow?

A.
Create an AWS Lambda function that applies all policy for users who are not authenticated. Create a scheduled event to invoke the Lambda function.
A.
Create an AWS Lambda function that applies all policy for users who are not authenticated. Create a scheduled event to invoke the Lambda function.
Answers
B.
Review the AWS Trusted advisor bucket permissions check and implement the recommend actions.
B.
Review the AWS Trusted advisor bucket permissions check and implement the recommend actions.
Answers
C.
Run a script that puts a Private ACL on all of the object in the bucket.
C.
Run a script that puts a Private ACL on all of the object in the bucket.
Answers
D.
Use the Block Public Access feature in Amazon S3 to set the IgnorePublicAcis option to TRUE on the bucket.
D.
Use the Block Public Access feature in Amazon S3 to set the IgnorePublicAcis option to TRUE on the bucket.
Answers
Suggested answer: B

A user is planning to host a web server as well as an app server on a single EC2 instance which is a part of the public subnet of a VPC. How can the user setup to have two separate public IPs and separate security groups for both the application as well as the web server?

A.
Launch VPC with two separate subnets and make the instance a part of both the subnets.
A.
Launch VPC with two separate subnets and make the instance a part of both the subnets.
Answers
B.
Launch a VPC instance with two network interfaces. Assign a separate security group and elastic IP to them.
B.
Launch a VPC instance with two network interfaces. Assign a separate security group and elastic IP to them.
Answers
C.
Launch a VPC instance with two network interfaces. Assign a separate security group to each and AWS will assign a separate public IP to them.
C.
Launch a VPC instance with two network interfaces. Assign a separate security group to each and AWS will assign a separate public IP to them.
Answers
D.
Launch a VPC with ELB such that it redirects requests to separate VPC instances of the public subnet.
D.
Launch a VPC with ELB such that it redirects requests to separate VPC instances of the public subnet.
Answers
Suggested answer: B

Explanation:

If you need to host multiple websites (with different IPs) on a single EC2 instance, the following is the suggested method from AWS. Launch a VPC instance with two network interfaces. Assign elastic IPs from VPC EIP pool to those interfaces (Because, when the user has attached more than one network interface with an instance, AWS cannot assign public IPs to them.) Assign separate Security Groups if separate Security Groups are needed This scenario also helps for operating network appliances, such as firewalls or load balancers that have multiple private IP addresses for each network interface.

Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/MultipleIP.html

A company has deployed an application to multiple environments in AWS, including production and testing. The company has separate accounts for production and testing, and users are allowed to create additional application users for team members or services, as needed. The Security team has asked the Operations team for better isolation between production and testing with centralized controls on security credentials and improved management of permissions between environments.

Which of the following options would MOST securely accomplish this goal?

A.
Create a new AWS account to hold user and service accounts, such as an identity account. Create users and groups in the identity account. Create roles with appropriate permissions in the production and testing accounts. Add the identity account to the trust policies for the roles.
A.
Create a new AWS account to hold user and service accounts, such as an identity account. Create users and groups in the identity account. Create roles with appropriate permissions in the production and testing accounts. Add the identity account to the trust policies for the roles.
Answers
B.
Modify permissions in the production and testing accounts to limit creating new IAM users to members of the Operations team. Set a strong IAM password policy on each account. Create new IAM users and groups in each account to limit developer access to just the services required to complete their job function.
B.
Modify permissions in the production and testing accounts to limit creating new IAM users to members of the Operations team. Set a strong IAM password policy on each account. Create new IAM users and groups in each account to limit developer access to just the services required to complete their job function.
Answers
C.
Create a script that runs on each account that checks user accounts for adherence to a security policy. Disable any user or service accounts that do not comply.
C.
Create a script that runs on each account that checks user accounts for adherence to a security policy. Disable any user or service accounts that do not comply.
Answers
D.
Create all user accounts in the production account. Create roles for access in the production account and testing accounts. Grant cross-account access from the production account to the testing account.
D.
Create all user accounts in the production account. Create roles for access in the production account and testing accounts. Grant cross-account access from the production account to the testing account.
Answers
Suggested answer: A

Explanation:

Reference:

https://aws.amazon.com/ru/blogs/security/how-to-centralize-and-automate-iam-policy-creation-in-sandbox-development-andtest-environments/

A company has more than 100 AWS accounts, with one VPC per account, that need outbound HTTPS connectivity to theinternet. The current design contains one NAT gateway per Availability Zone (AZ) in each VPC. To reduce costs and obtaininformation about outbound traffic, management has asked for a new architecture for internet access. Which solution will meet the current needs, and continue to grow as new accounts are provisioned, while reducing costs?

A.
Create a transit VPC across two AZs using a third-party routing appliance. Create a VPN connection to each VPC. Default route internet traffic to the transit VPC.
A.
Create a transit VPC across two AZs using a third-party routing appliance. Create a VPN connection to each VPC. Default route internet traffic to the transit VPC.
Answers
B.
Create multiple hosted-private AWS Direct Connect VIFs, one per account, each with a Direct Connect gateway. Default route internet traffic back to an on-premises router to route to the internet.
B.
Create multiple hosted-private AWS Direct Connect VIFs, one per account, each with a Direct Connect gateway. Default route internet traffic back to an on-premises router to route to the internet.
Answers
C.
Create a central VPC for outbound internet traffic. Use VPC peering to default route to a set of redundant NAT gateway in the central VPC.
C.
Create a central VPC for outbound internet traffic. Use VPC peering to default route to a set of redundant NAT gateway in the central VPC.
Answers
D.
Create a proxy fleet in a central VPC account. Create an AWS PrivateLink endpoint service in the central VPC. Use PrivateLink interface for internet connectivity through the proxy fleet.
D.
Create a proxy fleet in a central VPC account. Create an AWS PrivateLink endpoint service in the central VPC. Use PrivateLink interface for internet connectivity through the proxy fleet.
Answers
Suggested answer: D

Explanation:

Reference:

https://aws.amazon.com/blogs/networking-and-content-delivery/how-to-use-aws-privatelink-to-secure-and-scale-webfiltering-using-explicit-proxy/

A large company recently experienced an unexpected increase in Amazon RDS and Amazon DynamoDB costs. The company needs to increase visibility into details of AWS Billing and Cost Management. There are various accounts associated with AWS Organizations, including many development and production accounts. There is no consistent tagging strategy across the organization, but there are guidelines in place that require all infrastructure to be deployed using AWS CloudFormation with consistent tagging. Management requires cost center numbers and project ID numbers for all existing and future DynamoDB tables and RDS instances. Which strategy should the solutions architect provide to meet these requirements?

A.
Use Tag Editor to tag existing resources. Create cost allocation tags to define the cost center and project ID and allow 24 hours for tags to propagate to existing resources.
A.
Use Tag Editor to tag existing resources. Create cost allocation tags to define the cost center and project ID and allow 24 hours for tags to propagate to existing resources.
Answers
B.
Use an AWS Config rule to alert the finance team of untagged resources. Create a centralized AWS Lambda based solution to tag untagged RDS databases and DynamoDB resources every hour using a cross-account role.
B.
Use an AWS Config rule to alert the finance team of untagged resources. Create a centralized AWS Lambda based solution to tag untagged RDS databases and DynamoDB resources every hour using a cross-account role.
Answers
C.
Use Tag Editor to tag existing resources. Create cost allocation tags to define the cost center and project ID. Use SCPs to restrict resource creation that do not have the cost center and project ID on the resource.
C.
Use Tag Editor to tag existing resources. Create cost allocation tags to define the cost center and project ID. Use SCPs to restrict resource creation that do not have the cost center and project ID on the resource.
Answers
D.
Create cost allocation tags to define the cost center and project ID and allow 24 hours for tags to propagate to existing resources. Update existing federated roles to restrict privileges to provision resources that do not include the cost center and project ID on the resource.
D.
Create cost allocation tags to define the cost center and project ID and allow 24 hours for tags to propagate to existing resources. Update existing federated roles to restrict privileges to provision resources that do not include the cost center and project ID on the resource.
Answers
Suggested answer: A

Explanation:

Reference: https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/cost-alloc-tags.html

A company’s lease of a colocated storage facility will expire in 90 days. The company wants to move to AWS to avoid signing a contract extension. The company’s environment consists of 200 virtual machines and a NAS with 40 TB of data. Most of the data is archival, yet instant access is required when data is requested. Leadership wants to ensure minimal downtime during the migration. Each virtual machine has a number of customized configurations. The company’s existing 1 Gbps network connection is mostly idle, especially after business hours. Which combination of steps should the company take to migrate to AWS while minimizing downtime and operational impact? (Choose two.)

A.
Use new Amazon EC2 instances and reinstall all application code.
A.
Use new Amazon EC2 instances and reinstall all application code.
Answers
B.
Use AWS SMS to migrate the virtual machines.
B.
Use AWS SMS to migrate the virtual machines.
Answers
C.
Use AWS Storage Gateway to migrate the data to cloud-native storage.
C.
Use AWS Storage Gateway to migrate the data to cloud-native storage.
Answers
D.
Use AWS Snowball to migrate the data.
D.
Use AWS Snowball to migrate the data.
Answers
E.
Use AWS SMS to copy the infrequently accessed data from the NAS.
E.
Use AWS SMS to copy the infrequently accessed data from the NAS.
Answers
Suggested answer: A, D

Explanation:

Reference: https://docs.aws.amazon.com/snowball/latest/ug/transfer-data.html

A company has 50 AWS accounts that are members of an organization in AWS Organizations. Each account contains multiple VPCs. The company wants to use AWS Transit Gateway to establish connectivity between the VPCs in each member account. Each time a new member account is created, the company wants to automate the process of creating a new VPC and a transit gateway attachment. Which combination of steps will meet these requirements? (Choose two.)

A.
From the management account, share the transit gateway with member accounts by using AWS Resource Access Manager.
A.
From the management account, share the transit gateway with member accounts by using AWS Resource Access Manager.
Answers
B.
From the management account, share the transit gateway with member accounts by using an AWS Organizations SCP.
B.
From the management account, share the transit gateway with member accounts by using an AWS Organizations SCP.
Answers
C.
Launch an AWS CloudFormation stack set from the management account that automatically creates a new VPC and a VPC transit gateway attachment in a member account. Associate the attachment with the transit gateway in the management account by using the transit gateway ID.
C.
Launch an AWS CloudFormation stack set from the management account that automatically creates a new VPC and a VPC transit gateway attachment in a member account. Associate the attachment with the transit gateway in the management account by using the transit gateway ID.
Answers
D.
Launch an AWS CloudFormation stack set from the management account that automatically creates a new VPC and a peering transit gateway attachment in a member account. Share the attachment with the transit gateway in the management account by using a transit gateway service-linked role.
D.
Launch an AWS CloudFormation stack set from the management account that automatically creates a new VPC and a peering transit gateway attachment in a member account. Share the attachment with the transit gateway in the management account by using a transit gateway service-linked role.
Answers
E.
From the management account, share the transit gateway with member accounts by using AWS Service Catalog.
E.
From the management account, share the transit gateway with member accounts by using AWS Service Catalog.
Answers
Suggested answer: A, C

The Security team needs to provide a team of interns with an AWS environment so they can build a serverless video transcoding application. The project will use Amazon S3, AWS Lambda, Amazon API Gateway, Amazon Cognito, Amazon DynamoDB, and Amazon Elastic Transcoder.

The interns should be able to create and configure the necessary resources, but they may not have access to create or modify AWS IAM roles. The Solutions Architect creates a policy and attaches it to the interns’ group. How should the Security team configure the environment to ensure that the interns are self-sufficient?

A.
Create a policy that allows creation of project-related resources only. Create roles with required service permissions, which are assumable by the services.
A.
Create a policy that allows creation of project-related resources only. Create roles with required service permissions, which are assumable by the services.
Answers
B.
Create a policy that allows creation of all project-related resources, including roles that allow access only to specified resources.
B.
Create a policy that allows creation of all project-related resources, including roles that allow access only to specified resources.
Answers
C.
Create roles with the required service permissions, which are assumable by the services. Have the interns create and use a bastion host to create the project resources in the project subnet only.
C.
Create roles with the required service permissions, which are assumable by the services. Have the interns create and use a bastion host to create the project resources in the project subnet only.
Answers
D.
Create a policy that allows creation of project-related resources only. Require the interns to raise a request for roles to be created with the Security team. The interns will provide the requirements for the permissions to be set in the role.
D.
Create a policy that allows creation of project-related resources only. Require the interns to raise a request for roles to be created with the Security team. The interns will provide the requirements for the permissions to be set in the role.
Answers
Suggested answer: A
Total 906 questions
Go to page: of 91