ExamGecko
Home Home / Amazon / SOA-C02

Amazon SOA-C02 Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











A company runs hundreds of Amazon EC2 instances in a single AWS Region. Each EC2 instance has two attached 1 GiB General Purpose SSD (gp2) Amazon Elastic Block Store (Amazon EBS) volumes. A critical workload is using all the available IOPS capacity on the EBS volumes.

According to company policy, the company cannot change instance types or EBS volume types without completing lengthy acceptance tests to validate that the company's applications will function properly. A SysOps administrator needs to increase the I/O performance of the EBS volumes as quickly as possible. Which action should the SysOps administrator take to meet these requirements?

A.
Increase the size of the 1 GiB EBS volumes.
A.
Increase the size of the 1 GiB EBS volumes.
Answers
B.
Add two additional elastic network interfaces on each EC2 instance.
B.
Add two additional elastic network interfaces on each EC2 instance.
Answers
C.
Turn on Transfer Acceleration on the EBS volumes in the Region.
C.
Turn on Transfer Acceleration on the EBS volumes in the Region.
Answers
D.
Add all the EC2 instances to a cluster placement group.
D.
Add all the EC2 instances to a cluster placement group.
Answers
Suggested answer: A

Explanation:

Increasing the size of the 1 GiB EBS volumes will increase the IOPS capacity of the volumes, which will improve the I/O performance of the EBS volumes. This option does not require any changes to the instance types or EBS volume types, so it can be done quickly without the need for lengthy acceptance tests to validate that the company's applications will function properly. https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/requesting-ebs-volumemodifications.html

A company is implementing a monitoring solution that is based on machine learning. The monitoring solution consumes Amazon EventBridge (Amazon CloudWatch Events) events that are generated by Amazon EC2 Auto Scaling. The monitoring solution provides detection of anomalous behavior such as unanticipated scaling events and is configured as an EventBridge (CloudWatch Events) API destination.

During initial testing, the company discovers that the monitoring solution is not receiving events. However, Amazon CloudWatch is showing that the EventBridge (CloudWatch Events) rule is being invoked. A SysOps administrator must implement a solution to retrieve client error details to help resolve this issue. Which solution will meet these requirements with the LEAST operational effort?

A.
Create an EventBridge (CloudWatch Events) archive for the event pattern to replay the events.Increase the logging on the monitoring solution. Use replay to invoke the monitoring solution.Examine the error details.
A.
Create an EventBridge (CloudWatch Events) archive for the event pattern to replay the events.Increase the logging on the monitoring solution. Use replay to invoke the monitoring solution.Examine the error details.
Answers
B.
Add an Amazon Simple Queue Service (Amazon SQS) standard queue as a dead-letter queue for the target. Process the messages in the dead-letter queue to retrieve error details.
B.
Add an Amazon Simple Queue Service (Amazon SQS) standard queue as a dead-letter queue for the target. Process the messages in the dead-letter queue to retrieve error details.
Answers
C.
Create a second EventBridge (CloudWatch Events) rule for the same event pattern to target an AWS Lambda function. Configure the Lambda function to invoke the monitoring solution and to record the results to Amazon CloudWatch Logs. Examine the errors in the logs.
C.
Create a second EventBridge (CloudWatch Events) rule for the same event pattern to target an AWS Lambda function. Configure the Lambda function to invoke the monitoring solution and to record the results to Amazon CloudWatch Logs. Examine the errors in the logs.
Answers
D.
Configure the EventBridge (CloudWatch Events) rule to send error messages to an Amazon Simple Notification Service (Amazon SNS) topic.
D.
Configure the EventBridge (CloudWatch Events) rule to send error messages to an Amazon Simple Notification Service (Amazon SNS) topic.
Answers
Suggested answer: A

Explanation:

"In EventBridge, you can create an archive of events so that you can easily replay them at a later time. For example, you might want to replay events to recover from errors or to validate new functionality in your application." https://docs.aws.amazon.com/eventbridge/latest/userguide/ebarchive.html

A company is storing backups in an Amazon S3 bucket. The backups must not be deleted for at least 3 months after the backups are created. What should a SysOps administrator do to meet this requirement?

A.
Configure an IAM policy that denies the s3:DeleteObject action for all users. Three months after an object is written, remove the policy.
A.
Configure an IAM policy that denies the s3:DeleteObject action for all users. Three months after an object is written, remove the policy.
Answers
B.
Enable S3 Object Lock on a new S3 bucket in compliance mode. Place all backups in the new S3 bucket with a retention period of 3 months.
B.
Enable S3 Object Lock on a new S3 bucket in compliance mode. Place all backups in the new S3 bucket with a retention period of 3 months.
Answers
C.
Enable S3 Versioning on the existing S3 bucket. Configure S3 Lifecycle rules to protect the backups.
C.
Enable S3 Versioning on the existing S3 bucket. Configure S3 Lifecycle rules to protect the backups.
Answers
D.
Enable S3 Object Lock on a new S3 bucket in governance mode. Place all backups in the new S3 bucket with a retention period of 3 months.
D.
Enable S3 Object Lock on a new S3 bucket in governance mode. Place all backups in the new S3 bucket with a retention period of 3 months.
Answers
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-overview.html Ingovernance mode, users can't overwrite or delete an object version or alter its lock settingsunless they have special permissions. With governance mode, you protect objects against beingdeleted by most users, but you can still grant some users permission to alter the retentionsettings or delete the object if necessary. You can also use governance mode to test retention-period settings before creating a compliance-mode retention period. In compliance mode, aprotected object version can't be overwritten or deleted by any user, including the root user inyour AWS account. When an object is locked in compliance mode, its retention mode can't bechanged, and its retention period can't be shortened. Compliance mode helps ensure that anobject version can't be overwritten or deleted for the duration of the retention period.

A SysOps administrator needs to track the costs of data transfer between AWS Regions. The SysOps administrator must implement a solution to send alerts to an email distribution list when transfer costs reach 75% of a specific threshold.

What should the SysOps administrator do to meet these requirements?

A.
Create an AWS Cost and Usage Report. Analyze the results in Amazon Athena. Configure an alarm to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic when costs reach 75% of the threshold. Subscribe the email distribution list to the topic.
A.
Create an AWS Cost and Usage Report. Analyze the results in Amazon Athena. Configure an alarm to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic when costs reach 75% of the threshold. Subscribe the email distribution list to the topic.
Answers
B.
Create an Amazon CloudWatch billing alarm to detect when costs reach 75% of the threshold.Configure the alarm to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the email distribution list to the topic.
B.
Create an Amazon CloudWatch billing alarm to detect when costs reach 75% of the threshold.Configure the alarm to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the email distribution list to the topic.
Answers
C.
Use AWS Budgets to create a cost budget for data transfer costs. Set an alert at 75% of the budgeted amount. Configure the budget to send a notification to the email distribution list when costs reach 75% of the threshold.
C.
Use AWS Budgets to create a cost budget for data transfer costs. Set an alert at 75% of the budgeted amount. Configure the budget to send a notification to the email distribution list when costs reach 75% of the threshold.
Answers
D.
Set up a VPC flow log. Set up a subscription filter to an AWS Lambda function to analyze data transfer. Configure the Lambda function to send a notification to the email distribution list when costs reach 75% of the threshold.
D.
Set up a VPC flow log. Set up a subscription filter to an AWS Lambda function to analyze data transfer. Configure the Lambda function to send a notification to the email distribution list when costs reach 75% of the threshold.
Answers
Suggested answer: B

Explanation:

The reason is that it uses the Amazon CloudWatch billing alarm which is a built-in service specifically designed to monitor and alert on cost usage of your AWS account, which makes it a more suitable solution for this use case. The alarm can be configured to detect when costs reach 75% of the threshold and when it is triggered, it can publish a message to an Amazon Simple Notification Service (Amazon SNS) topic. The email distribution list can be subscribed to the topic, so that they will receive the alerts when costs reach 75% of the threshold. AWS Budgets allows you to track and manage your costs, but it doesn't specifically focus on data transfer costs between regions, and it might not provide as much granularity as CloudWatch Alarms.

A company needs to archive all audit logs for 10 years. The company must protect the logs from any future edits. Which solution will meet these requirements?

A.
Store the data in an Amazon Elastic Block Store (Amazon EBS) volume. Configure AWS Key Management Service (AWS KMS) encryption.
A.
Store the data in an Amazon Elastic Block Store (Amazon EBS) volume. Configure AWS Key Management Service (AWS KMS) encryption.
Answers
B.
Store the data in an Amazon S3 Glacier vault. Configure a vault lock policy for write-once, readmany (WORM) access.
B.
Store the data in an Amazon S3 Glacier vault. Configure a vault lock policy for write-once, readmany (WORM) access.
Answers
C.
Store the data in Amazon S3 Standard-Infrequent Access (S3 Standard-IA). Configure server-side encryption.
C.
Store the data in Amazon S3 Standard-Infrequent Access (S3 Standard-IA). Configure server-side encryption.
Answers
D.
Store the data in Amazon S3 Standard-Infrequent Access (S3 Standard-IA). Configure multi-factor authentication (MFA).
D.
Store the data in Amazon S3 Standard-Infrequent Access (S3 Standard-IA). Configure multi-factor authentication (MFA).
Answers
Suggested answer: B

Explanation:

To meet the requirements of the workload, a company should store the data in an Amazon S3 Glacier vault and configure a vault lock policy for write-once, read-many (WORM) access. This will ensure that the data is stored securely and cannot be edited in the future. The other solutions (storing the data in an Amazon Elastic Block Store (Amazon EBS) volume and configuring AWS Key Management Service (AWS KMS) encryption, storing the data in Amazon S3 Standard-Infrequent Access (S3 Standard-IA) and configuring server-side encryption, or storing the data in Amazon S3 StandardInfrequent Access (S3 Standard-IA) and configuring multi-factor authentication (MFA)) will not meet the requirements, as they do not provide a way to protect the audit logs from future edits. https://docs.aws.amazon.com/zh_tw/AmazonS3/latest/userguide/object-lock.html

A company's AWS Lambda function is experiencing performance issues. The Lambda function performs many CPU-intensive operations. The Lambda function is not running fast enough and is creating bottlenecks in the system.

What should a SysOps administrator do to resolve this issue?

A.
In the CPU launch options for the Lambda function, activate hyperthreading.
A.
In the CPU launch options for the Lambda function, activate hyperthreading.
Answers
B.
Turn off the AWS managed encryption.
B.
Turn off the AWS managed encryption.
Answers
C.
Increase the amount of memory for the Lambda function.
C.
Increase the amount of memory for the Lambda function.
Answers
D.
Load the required code into a custom layer.
D.
Load the required code into a custom layer.
Answers
Suggested answer: C

Explanation:

Increasing the amount of memory for the Lambda function will help to improve the performance of the function. This is because the Lambda function is CPU-intensive and increasing the memory will give it access to more CPU resources and help it run faster. The other options (activating hyperthreading in the CPU launch options for the Lambda function, turning off the AWS managed encryption, and loading the required code into a custom layer) will not help to improve the performance of the Lambda function and are not the correct solutions for this issue. https://docs.aws.amazon.com/lambda/latest/dg/configuration-functioncommon.html#configuration-memory-console

A company is attempting to manage its costs in the AWS Cloud. A SysOps administrator needs specific company-defined tags that are assigned to resources to appear on the billing report. What should the SysOps administrator do to meet this requirement?

A.
Activate the tags as AWS generated cost allocation tags.
A.
Activate the tags as AWS generated cost allocation tags.
Answers
B.
Activate the tags as user-defined cost allocation tags.
B.
Activate the tags as user-defined cost allocation tags.
Answers
C.
Create a new cost category. Select the account billing dimension.
C.
Create a new cost category. Select the account billing dimension.
Answers
D.
Create a new AWS Cost and Usage Report. Include the resource IDs.
D.
Create a new AWS Cost and Usage Report. Include the resource IDs.
Answers
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/custom-tags.html "User-defined tags are tags that you define, create, and apply to resources. After you have created and applied the user-defined tags, you can activate by using the Billing and Cost Management console for cost allocation tracking. " To meet this requirement, the SysOps administrator should activate the company-defined tags as user-defined cost allocation tags. This will ensure that the tags appear on the billing report and that the resources can be tracked with the specific tags. The other options (activating the tags as AWS generated cost allocation tags, creating a new cost category and selecting the account billing dimension, and creating a new AWS Cost and Usage Report and including the resource IDs) will not meet the requirements and are not the correct solutions for this issue.

A company's application currently uses an IAM role that allows all access to all AWS services. A SysOps administrator must ensure that the company's IAM policies allow only the permissions that the application requires.

How can the SysOps administrator create a policy to meet this requirement?

A.
Turn on AWS CloudTrail. Generate a policy by using AWS Security Hub.
A.
Turn on AWS CloudTrail. Generate a policy by using AWS Security Hub.
Answers
B.
Turn on Amazon EventBridge (Amazon CloudWatch Events). Generate a policy by using AWS Identity and Access Management Access Analyzer.
B.
Turn on Amazon EventBridge (Amazon CloudWatch Events). Generate a policy by using AWS Identity and Access Management Access Analyzer.
Answers
C.
Use the AWS CLI to run the get-generated-policy command in AWS Identity and Access Management Access Analyzer.
C.
Use the AWS CLI to run the get-generated-policy command in AWS Identity and Access Management Access Analyzer.
Answers
D.
Turn on AWS CloudTrail. Generate a policy by using AWS Identity and Access Management Access Analyzer.
D.
Turn on AWS CloudTrail. Generate a policy by using AWS Identity and Access Management Access Analyzer.
Answers
Suggested answer: D

Explanation:

Generate a policy by using AWS Identity and Access Management Access Analyzer. AWS CloudTrail is a service that records all API calls made on your account. You can use this data to generate a policy with AWS Identity and Access Management Access Analyzer that only allows the permissions that the application requires. This will ensure that the application only has the necessary permissions and will protect the company from any unauthorized access.

https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html#what-is-accessanalyzer-policy-generation

A company updates its security policy to clarify cloud hosting arrangements for regulated workloads. Workloads that are identified as sensitive must run on hardware that is not shared with other customers or with other AWS accounts within the company. Which solution will ensure compliance with this policy?

A.
Deploy workloads only to Dedicated Hosts.
A.
Deploy workloads only to Dedicated Hosts.
Answers
B.
Deploy workloads only to Dedicated Instances.
B.
Deploy workloads only to Dedicated Instances.
Answers
C.
Deploy workloads only to Reserved Instances.
C.
Deploy workloads only to Reserved Instances.
Answers
D.
Place all instances in a dedicated placement group.
D.
Place all instances in a dedicated placement group.
Answers
Suggested answer: A

Explanation:

Dedicated Hosts are physical servers that are dedicated to a single customer, ensuring that the customer's workloads are not shared with other customers or with other AWS accounts within the company. This will ensure that the company's security policy is followed and that sensitive workloads are running on hardware that is not shared with other customers or with other AWS accounts within the company.

A company needs to implement a managed file system to host Windows file shares for users on premises. Resources in the AWS Cloud also need access to the data on these file shares. A SysOps administrator needs to present the user file shares on premises and make the user file shares available on AWS with minimum latency. What should the SysOps administrator do to meet these requirements?

A.
Set up an Amazon S3 File Gateway.
A.
Set up an Amazon S3 File Gateway.
Answers
B.
Set up an AWS Direct Connect connection.
B.
Set up an AWS Direct Connect connection.
Answers
C.
Use AWS DataSync to automate data transfers between the existing file servers and AWS.
C.
Use AWS DataSync to automate data transfers between the existing file servers and AWS.
Answers
D.
Set up an Amazon FSx File Gateway.
D.
Set up an Amazon FSx File Gateway.
Answers
Suggested answer: D

Explanation:

Amazon FSx provides a fully managed file system that is optimized for Windows-based workloads and can be used to create file shares that can be accessed both on premises and in the AWS Cloud. The file shares that are created in Amazon FSx are highly available and can be accessed with low latency. Additionally, Amazon FSx supports Windows-based authentication, making it easy to integrate with existing Windows user accounts.

Total 425 questions
Go to page: of 43