ExamGecko
Home Home / Amazon / SOA-C02

Amazon SOA-C02 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











A SysOps Administrator is required to monitor free space on Amazon EBS volumes attached to Microsoft Windows-based Amazon EC2 instances within a company's account. The administrator must be alerted to potential issues. What should the administrator do to receive email alerts before low storage space affects EC2 instance performance?

A.
Use built-in Amazon CloudWatch metrics, and configure CloudWatch alarms and an Amazon SNS topic for email notifications.
A.
Use built-in Amazon CloudWatch metrics, and configure CloudWatch alarms and an Amazon SNS topic for email notifications.
Answers
B.
Use AWS CloudTrail logs and configure the trail to send notifications to an Amazon SNS topic.
B.
Use AWS CloudTrail logs and configure the trail to send notifications to an Amazon SNS topic.
Answers
C.
Use the Amazon CloudWatch agent to send disk space metrics, then set up CloudWatch alarms using an Amazon SNS topic.
C.
Use the Amazon CloudWatch agent to send disk space metrics, then set up CloudWatch alarms using an Amazon SNS topic.
Answers
D.
Use AWS Trusted Advisor and enable email notification alerts for EC2 disk space.
D.
Use AWS Trusted Advisor and enable email notification alerts for EC2 disk space.
Answers
Suggested answer: C

An errant process is known to use an entire processor and run at 100%. A SysOps administrator wants to automate restarting the instance once the problem occurs for more than 2 minutes. How can this be accomplished?

A.
Create an Amazon CloudWatch alarm for the Amazon EC2 instance with basic monitoring. Enable an action to restart the instance.
A.
Create an Amazon CloudWatch alarm for the Amazon EC2 instance with basic monitoring. Enable an action to restart the instance.
Answers
B.
Create a CloudWatch alarm for the EC2 instance with detailed monitoring. Enable an action to restart the instance.
B.
Create a CloudWatch alarm for the EC2 instance with detailed monitoring. Enable an action to restart the instance.
Answers
C.
Create an AWS Lambda function to restart the EC2 instance, triggered on a scheduled basis every 2 minutes.
C.
Create an AWS Lambda function to restart the EC2 instance, triggered on a scheduled basis every 2 minutes.
Answers
D.
Create a Lambda function to restart the EC2 instance, triggered by EC2 health checks.
D.
Create a Lambda function to restart the EC2 instance, triggered by EC2 health checks.
Answers
Suggested answer: B

Explanation:

Reference: https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/UsingAlarmActions.html

A SysOps administrator needs to design a high-traffic static website. The website must be highly available and must provide the lowest possible latency to users across the globe. Which solution will meet these requirements?

A.
Create an Amazon S3 bucket, and upload the website content to the S3 bucket. Create an Amazon CloudFront distribution in each AWS Region, and set the S3 bucket as the origin. Use Amazon Route 53 to create a DNS record that uses a geolocation routing policy to route traffic to the correct CloudFront distribution based on where the request originates.
A.
Create an Amazon S3 bucket, and upload the website content to the S3 bucket. Create an Amazon CloudFront distribution in each AWS Region, and set the S3 bucket as the origin. Use Amazon Route 53 to create a DNS record that uses a geolocation routing policy to route traffic to the correct CloudFront distribution based on where the request originates.
Answers
B.
Create an Amazon S3 bucket, and upload the website content to the S3 bucket. Create an Amazon CloudFront distribution, and set the S3 bucket as the origin. Use Amazon Route 53 to create an alias record that points to the CloudFront distribution.
B.
Create an Amazon S3 bucket, and upload the website content to the S3 bucket. Create an Amazon CloudFront distribution, and set the S3 bucket as the origin. Use Amazon Route 53 to create an alias record that points to the CloudFront distribution.
Answers
C.
Create an Application Load Balancer (ALB) and a target group. Create an Amazon EC2 Auto Scaling group with at least two EC2 instances in the associated target group. Store the website content on the EC2 instances. Use Amazon Route 53 to create an alias record that points to the ALB.
C.
Create an Application Load Balancer (ALB) and a target group. Create an Amazon EC2 Auto Scaling group with at least two EC2 instances in the associated target group. Store the website content on the EC2 instances. Use Amazon Route 53 to create an alias record that points to the ALB.
Answers
D.
Create an Application Load Balancer (ALB) and a target group in two Regions. Create an Amazon EC2 Auto Scaling group in each Region with at least two EC2 instances in each target group. Store the website content on the EC2 instances.Use Amazon Route 53 to create a DNS record that uses a geolocation routing policy to route traffic to the correct ALB based on where the request originates.
D.
Create an Application Load Balancer (ALB) and a target group in two Regions. Create an Amazon EC2 Auto Scaling group in each Region with at least two EC2 instances in each target group. Store the website content on the EC2 instances.Use Amazon Route 53 to create a DNS record that uses a geolocation routing policy to route traffic to the correct ALB based on where the request originates.
Answers
Suggested answer: A

An Amazon EC2 instance is running an application that uses Amazon Simple Queue Service (Amazon SQS) queues. A SysOps administrator must ensure that the application can read, write, and delete messages from the SQS queues. Which solution will meet these requirements in the MOST secure manner?

A.
Create an IAM user with an IAM policy that allows the sqs:SendMessage permission, the sqs:ReceiveMessage permission, and the sqs:DeleteMessage permission to the appropriate queues. Embed the IAM user's credentials in the application's configuration.
A.
Create an IAM user with an IAM policy that allows the sqs:SendMessage permission, the sqs:ReceiveMessage permission, and the sqs:DeleteMessage permission to the appropriate queues. Embed the IAM user's credentials in the application's configuration.
Answers
B.
Create an IAM user with an IAM policy that allows the sqs:SendMessage permission, the sqs:ReceiveMessage permission, and the sqs:DeleteMessage permission to the appropriate queues. Export the IAM user's access key and secret access key as environment variables on the EC2 instance.
B.
Create an IAM user with an IAM policy that allows the sqs:SendMessage permission, the sqs:ReceiveMessage permission, and the sqs:DeleteMessage permission to the appropriate queues. Export the IAM user's access key and secret access key as environment variables on the EC2 instance.
Answers
C.
Create and associate an IAM role that allows EC2 instances to call AWS services. Attach an IAM policy to the role that allows sqs:* permissions to the appropriate queues.
C.
Create and associate an IAM role that allows EC2 instances to call AWS services. Attach an IAM policy to the role that allows sqs:* permissions to the appropriate queues.
Answers
D.
Create and associate an IAM role that allows EC2 instances to call AWS services. Attach an IAM policy to the role that allows the sqs:SendMessage permission, the sqs:ReceiveMessage permission, and the sqs:DeleteMessage permission to the appropriate queues.
D.
Create and associate an IAM role that allows EC2 instances to call AWS services. Attach an IAM policy to the role that allows the sqs:SendMessage permission, the sqs:ReceiveMessage permission, and the sqs:DeleteMessage permission to the appropriate queues.
Answers
Suggested answer: D

A company must ensure that any objects uploaded to an S3 bucket are encrypted.

Which of the following actions will meet this requirement? (Choose two.)

A.
Implement AWS Shield to protect against unencrypted objects stored in S3 buckets.
A.
Implement AWS Shield to protect against unencrypted objects stored in S3 buckets.
Answers
B.
Implement Object access control list (ACL) to deny unencrypted objects from being uploaded to the S3 bucket.
B.
Implement Object access control list (ACL) to deny unencrypted objects from being uploaded to the S3 bucket.
Answers
C.
Implement Amazon S3 default encryption to make sure that any object being uploaded is encrypted before it is stored.
C.
Implement Amazon S3 default encryption to make sure that any object being uploaded is encrypted before it is stored.
Answers
D.
Implement Amazon Inspector to inspect objects uploaded to the S3 bucket to make sure that they are encrypted.
D.
Implement Amazon Inspector to inspect objects uploaded to the S3 bucket to make sure that they are encrypted.
Answers
E.
Implement S3 bucket policies to deny unencrypted objects from being uploaded to the buckets.
E.
Implement S3 bucket policies to deny unencrypted objects from being uploaded to the buckets.
Answers
Suggested answer: C, E

Explanation:

Reference: https://docs.aws.amazon.com/AmazonS3/latest/userguide/acl-overview.html#sample-acl

A company hosts a web application on an Amazon EC2 instance in a production VPC. Client connections to the application are failing. A SysOps administrator inspects the VPC flow logs and finds the following entry:

2 111122223333 eni-<###> 192.0.2.15 203.0.113.56 40711 443 6 1 40 1418530010 1418530070 REJECT OK

What is a possible cause of these failed connections?

A.
A security group is denying traffic on port 443.
A.
A security group is denying traffic on port 443.
Answers
B.
The EC2 instance is shut down.
B.
The EC2 instance is shut down.
Answers
C.
The network ACL is blocking HTTPS traffic.
C.
The network ACL is blocking HTTPS traffic.
Answers
D.
The VPC has no internet gateway attached.
D.
The VPC has no internet gateway attached.
Answers
Suggested answer: A

A company asks a SysOps administrator to ensure that AWS CloudTrail files are not tampered with after they are created. Currently, the company uses AWS Identity and Access Management (IAM) to restrict access to specific trails. The company's security team needs the ability to trace the integrity of each file. What is the MOST operationally efficient solution that meets these requirements?

A.
Create an Amazon EventBridge (Amazon CloudWatch Events) rule that invokes an AWS Lambda function when a new file is delivered. Configure the Lambda function to compute an MD5 hash check on the file and store the result in an Amazon DynamoDB table. The security team can use the values that are stored in DynamoDB to verify the integrity of the delivered files.
A.
Create an Amazon EventBridge (Amazon CloudWatch Events) rule that invokes an AWS Lambda function when a new file is delivered. Configure the Lambda function to compute an MD5 hash check on the file and store the result in an Amazon DynamoDB table. The security team can use the values that are stored in DynamoDB to verify the integrity of the delivered files.
Answers
B.
Create an AWS Lambda function that is invoked each time a new file is delivered to the CloudTrail bucket. Configure the Lambda function to compute an MD5 hash check on the file and store the result as a tag in an Amazon 53 object. The security team can use the information in the tag to verify the integrity of the delivered files.
B.
Create an AWS Lambda function that is invoked each time a new file is delivered to the CloudTrail bucket. Configure the Lambda function to compute an MD5 hash check on the file and store the result as a tag in an Amazon 53 object. The security team can use the information in the tag to verify the integrity of the delivered files.
Answers
C.
Enable the CloudTrail file integrity feature on an Amazon S3 bucket. Create an IAM policy that grants the security team access to the file integrity logs that are stored in the S3 bucket.
C.
Enable the CloudTrail file integrity feature on an Amazon S3 bucket. Create an IAM policy that grants the security team access to the file integrity logs that are stored in the S3 bucket.
Answers
D.
Enable the CloudTrail file integrity feature on the trail. The security team can use the digest file that is created by CloudTrail to verify the integrity of the delivered files.
D.
Enable the CloudTrail file integrity feature on the trail. The security team can use the digest file that is created by CloudTrail to verify the integrity of the delivered files.
Answers
Suggested answer: C

A company creates custom AMI images by launching new Amazon EC2 instances from an AWS CloudFormation template. It installs and configures necessary software through AWS OpsWorks, and takes images of each EC2 instance. The process of installing and configuring software can take between 2 to 3 hours, but at times, the process stalls due to installation errors. The SysOps administrator must modify the CloudFormation template so if the process stalls, the entire stack will fail and roll back. Based on these requirements, what should be added to the template?

A.
Conditions with a timeout set to 4 hours.
A.
Conditions with a timeout set to 4 hours.
Answers
B.
CreationPolicy with a timeout set to 4 hours.
B.
CreationPolicy with a timeout set to 4 hours.
Answers
C.
DependsOn with a timeout set to 4 hours.
C.
DependsOn with a timeout set to 4 hours.
Answers
D.
Metadata with a timeout set to 4 hours.
D.
Metadata with a timeout set to 4 hours.
Answers
Suggested answer: B

Explanation:

Reference: https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/deploying.applications.html

A large company is using AWS Organizations to manage hundreds of AWS accounts across multiple AWS Regions. The company has turned on AWS Config throughout the organization. The company requires all Amazon S3 buckets to block public read access. A SysOps administrator must generate a monthly report that shows all the S3 buckets and whether they comply with this requirement. Which combination of steps should the SysOps administrator take to collect this data? (Choose two.)

A.
Create an AWS Config aggregator in an aggregator account. Use the organization as the source. Retrieve the compliance data from the aggregator.
A.
Create an AWS Config aggregator in an aggregator account. Use the organization as the source. Retrieve the compliance data from the aggregator.
Answers
B.
Create an AWS Config aggregator in each account. Use an S3 bucket in an aggregator account as the destination. Retrieve the compliance data from the S3 bucket.
B.
Create an AWS Config aggregator in each account. Use an S3 bucket in an aggregator account as the destination. Retrieve the compliance data from the S3 bucket.
Answers
C.
Edit the AWS Config policy in AWS Organizations. Use the organization's management account to turn on the S3-bucketpublic- read-prohibited rule for the entire organization.
C.
Edit the AWS Config policy in AWS Organizations. Use the organization's management account to turn on the S3-bucketpublic- read-prohibited rule for the entire organization.
Answers
D.
Use the AWS Config compliance report from the organization's management account. Filter the results by resource, and select Amazon S3.
D.
Use the AWS Config compliance report from the organization's management account. Filter the results by resource, and select Amazon S3.
Answers
E.
Use the Aws Config API to apply the s3-bucket-public-read-prohibited rule in all accounts for all available Regions.
E.
Use the Aws Config API to apply the s3-bucket-public-read-prohibited rule in all accounts for all available Regions.
Answers
Suggested answer: B, D

Explanation:

Reference: https://docs.aws.amazon.com/config/latest/developerguide/aggregate-data.html

https://docs.aws.amazon.com/config/latest/developerguide/looking-up-discovered-resources.html

A SysOps administrator must create an IAM policy for a developer who needs access to specific AWS services. Based on the requirements, the SysOps administrator creates the following policy:

Which actions does this policy allow? (Choose two.)

A.
Create an AWS Storage Gateway.
A.
Create an AWS Storage Gateway.
Answers
B.
Create an IAM role for an AWS Lambda function.
B.
Create an IAM role for an AWS Lambda function.
Answers
C.
Delete an Amazon Simple Queue Service (Amazon SQS) queue.
C.
Delete an Amazon Simple Queue Service (Amazon SQS) queue.
Answers
D.
Describe AWS load balancers.
D.
Describe AWS load balancers.
Answers
E.
Invoke an AWS Lambda function.
E.
Invoke an AWS Lambda function.
Answers
Suggested answer: A, E
Total 425 questions
Go to page: of 43