-
Notifications
You must be signed in to change notification settings - Fork 32
/
raw.txt
2164 lines (1198 loc) · 58.4 KB
/
raw.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1. How do you secure company critical data on S3 (chose 4 correct answers)
a. You can use IAM Policies
b. You can use Bucket policies
c. You can use Access Control Lists (ACLs)
d. You can use the Server Side Encryption (SSE)
e. You can serve it through Cloudfront
ABCD
2. How to secure data on rest in EBS?
a. EBS automatically encrypts data on it for more security
b. You can use your own encryption layer on the top
c. Use S3 instead
d. Block the EC2 to access data to your EBS
A
3. You have a photo selling website where you have a library of photos on S3. You noticed that there are some websites that are showing the link to your S3 photos. How do you restrict sites like these using your S3 photos link?
a. Use Cloudfront to serve images
b. Restrict access to those websites in the bucket policy
c. Use glacier to store images
d. Restrict access to those websites in the IAM policy
e. Remove the public URL link from the object in S3
A
4. In which of the following cases should you use SQS – Simple Queue Service (chose 2 correct answers)
a. Designing a business application which requires a lot of co-ordination between different tasks
b. Video encoding application where each video is encoded with a pre-defined number of steps
c. Receiving thousands of notifications from a process and add them to a queue
d. Process a queue of messages where each message is a task that needs to be completed
CD
5. How do you ensure that the data has been saved properly in S3?
a. Every S3 account has a predefined bucket where the logs are stored
b. When processing a request to store data, the service will redundantly store your object across multiple facilities before returning SUCCESS.
c. You can see the HTTP success code in the logs
d. Using a combination of Content-MD5 checksums
B
6. You are running an application on an EC2 and now you want to add another EC2 for your application that requires a high bandwidth connect with the existing EC2. Where should you launch your EC2 in this case?
a. VPC
b. Public Subnet
c. Private Subnet
d. Placement Group
e. Availability Zone
D
7. Where should you use SWF – Simple Workflow Service (chose 2 correct answers)
a. Designing a business application which requires a lot of co-ordination between different tasks
b. Video encoding application where each video is encoded with a pre-defined number of steps
c. Receiving thousands of notifications from a process and add them to a queue
d. Process a queue of messages where each message is a task that needs to be completed
AB
8. What services are required for Auto Scaling (chose 2 correct answers)
a. SNS
b. Cloudwatch
c. SQS
d. ELB
BD
9. What are the characteristics of Simple DB (chose 4 correct answers)
a. Automatic geo-redundant replication
b. It provides a simple web interface to create and store data sets, query and return data
c. You can store you relational database in Simple DB
d. Data is automatically indexed
e. You don’t need to worry about the infrastructure required
ABDE
10. Amazon Glacier is designed for (chose 2 correct answers)
a. Active database storage.
b. Infrequently accessed data.
c. Data archives.
d. Frequently accessed data.
e. Cached session data.
BC
11. An instance is launched into the public subnet of a VPC. Which of the following must be done in order for it to be accessible FROM the Internet?
a. Attach an Elastic IP to the instance
b. Nothing. The instance is accessible from the Internet
c. Launch a NAT instance and route all traffic to it
d. Make an entry in the route table passing all traffic going outside the VPC to the NAT instance
A
12. In VPCs with private and public subnets, database servers should ideally be launched into:
a. The public subnet
b. The private subnet
c. Either of them
d. Not recommended, they should ideally be launched outside VPC
B
13. What are the benefits of using Elasticache for your web application (chose 2 correct answers)
a. It reduces the load on your web servers
b. It reduces the load on your database
c. Gives you more availability of cached data when your Multi-AZ RDS is under maintenance
d. Gives you faster access to your cache data
AB
14. You configured ELB to perform health checks on EC2 instances. If an instance fails to pass health checks, which statement will be true?
a. The instance is replaced automatically by the ELB.
b. The instance gets terminated automatically by the ELB.
c. The ELB stops sending traffic to the instance that failed its health check.
d. The instance gets quarantined by the ELB for root cause analysis.
C
15. What are the characteristics of Dynamo DB (chose 3 correct answers)
a. It is used for SQL databases like MsSQL, MySQL, Oracle
b. Gives you a fast and predictable performance with seamless scalability
c. It is a managed service provided by AWS
d. When reading data from Amazon DynamoDB, users can specify whether they want the read to be eventually consistent or strongly consistent
e. There is a limit of stored data or throughput of data
BCD
16. You have a business critical application that requires it to be highly available with 6 instances always running. What should you do to achieve this (chose 3 correct answers)
a. 2 EC2 in 3 regions with ELB on top
b. 3 EC2 in 2 AZ with ELB on top
c. Auto Scaling rule for 6 instances always running
d. Auto scaling rule for 3 instance always running in each zone
e. Auto Scaling Replace the lost capacity in case of zone failure in the other zone
f. Auto Scaling Replace the lost capacity in case of region failure in other region
ABD
17. What are the characteristics of Elastic Beanstalk (chose 2 correct answers)
a. You can use it to replace an instance in the ELB when it fails its health check
b. Helps you quickly deploy and manage applications in the AWS cloud
c. It creates a template for your EC2 instance
d. You don’t need to worry about the infrastructure required to run your applications
BD
18. How do you achieve single sign on with AWS
a. It is configurable in the IAM policies for the user
b. By Using Multi-factor authentication
c. By Using active directory and LDAP integration
d. By Configuring SAML 2.0
e. It is currently not possible in AWS
C
19. What is true about VPC (chose 3 correct answers)
a. You can have one EC2 in more than 1 VPC
b. There will always be atleast 1 default VPC
c. A VPC is always across multiple availability zones within a region
d. You can either have a VPC with public subnet or private subnet
e. You may use a third party software VPN to create a site to site or remote access VPN connection with your VPC via the Internet Gateway
BCE
20. You are building a system to distribute confidential training videos to employees. Using CloudFront, what method could be used to serve content that is stored in S3, but not publically accessible from S3 directly?
a. Create an Origin Access Identity (OAI) for CloudFront and grant access to the objects in your S3 bucket to that OAI.
b. Add the CloudFront account security group “Amazon-cf/Amazon-cf-sg” to the appropriate S3 bucket policy.
c. Create an Identity and Access Management (IAM) User for CloudFront and grant access to the objects in your S3 bucket to that IAM User.
d. Create a S3 bucket policy that lists the CloudFront distribution ID as the Principal and the target bucket as the Amazon Resource Name (ARN).
A
21. An instance is connected to an ENI (Elastic Network Interface) in one subnet. What happens when you attach an ENI of a different subnet to this instance?
a. The instance follows the rules of the older subnet
b. The instance follows the rules of both the subnets
c. The instance follows the rules of the newer subnet
d. Not possible cannot be connected to 2 ENIs
B
22. How do you point apex record of your website (example.com) to the public DNS of the Elastic Load Balancer?
a. A Record
b. CName record
c. AAAA record
d. Alias
e. NS Record
D
23. Which of the following will occur when an EC2 instance in a VPC (Virtual Private Cloud) with an associated Elastic IP is stopped and started (chose 2 correct answers)
a. The Elastic IP will be dissociated from the instance
b. All data on instance-store devices will be lost
c. All data on EBS (Elastic Block Store) devices will be lost
d. The ENI (Elastic Network Interface) is detached
e. The underlying host for the instance may change
BE
24. You are running an ERP application on EC2 for your company that runs 24x7 and the load is predictable and constant throughout the year. Which is the most cost-efficient option for the EC2 purchase model in this case?
a. On-Demand
b. Reserved
c. Dedicated
d. Spot
e. EC2 is not the right choice here
B
25. What are the characteristics of EBS (chose 3 correct answers)
a. You can attach one EBS volume to multiple EC2 instance
b. Data in EBS is stored across multiple AZ for redundancy
c. Maximum size of an EBS can be 1 TB
d. You can have provisioned IOPS with your EBS volumes
e. EBS behaves like raw unformatted block device
CDE
26. You notice that you are not able to access your EC2 linux instance using SSH. What should you check first?
a. Make sure that the patches are up to date on the instance
b. Make sure the port 22 are open on the subnet for incoming traffic
c. Make sure the port 22 are open on the subnet for outgoing traffic
d. Make sure the port 22 are open on the security group for incoming traffic
e. Make sure the port 22 are open on the security group for outgoing traffic
D
27. What is true about AMI (chose 4 correct answers)
a. You can share your AMI with other AWS account owners
b. You can create an instance store-backed AMI
c. You can create an EBS-backed AMI
d. For Instance stored-backed AMIs, the root volume is stored in S3
e. For EBS stored-backed AMIs, the root volume is stored in S3
ABCD
28. What is true about RDS (chose 3 correct answers)
a. You can create multiple read replica for ready heavy applications
b. You can have a read replica of a read replica
c. Daily backups are automatically taken
d. You can enable Multi-AZ option to have automatic failover in a different region
e. You can have provisioned IOPS for your RDS database
ECA
29. What are the characteristics of IAM (chose 2 correct answers)
a. By Default all the services are enabled for a new IAM user
b. By Default all the services are disabled for a new IAM user
c. You can create multiple access ID and secret keys for 1 IAM user
d. Option 4
e. Option 5
BC
30. What are the characteristics of Subnet (chose 2 correct answers)
a. network traffic entering and exiting each subnet can be allowed or denied via network Access Control Lists (ACLs)
b. A subnet can be across multiple availability zones
c. A subnet can be across multiple regions
d. Default subnets are assigned a /20 netblocks
e. Default subnets are assigned a /16 netblocks
AD
31. You have created 4 weighted resource record sets with weights 1, 2, 3 and 4. The 3rd record set is selected by Route53?
a. 1/7th of the time
b. 3/10th of the time
c. 3/7th of the time
d. 1/4th of the time
B
32. Which of the following can be used as an origin server in CloudFront?(Choose 3)
a. A webserver running on EC2
b. A webserver running in your own datacenter
c. A RDS instance
d. An Amazon S3 bucket
e. A Glacier storage
ABD
33. In cloudFront what happens when content is NOT present at an Edge location and a request is made to it?
a. Option 1 An Error 404 not found is returned
b. CloudFront delivers the content directly from the origin server and stores it in the cache of the edge location
c. The request is kept on hold till content is delivered to the edge location
d. The request is routed to the next closest edge location
B
34. Which of the following is true with respect to serving private content through CloudFront? (chose 3 correct answers)
a. Signed URLs can be created to access objects from CloudFront edge locations
b. Direct access to S3 URLs can be removed therefore allowing access only through CloudFront URLs
c. Mark the S3 bucket private and allow access to CloudFront by means of Roles
d. Mark the S3 bucket private and and create an Origin Access Identity to access the objects
ABD
35. You have written a CloudFormation template that creates 1 elastic load balancer fronting 2 EC2 instances. Which section of the template should you edit so that the DNS of the load balancer is returned upon creation of the stack?
a. Resources
b. Parameters
c. Outputs
d. Mappings
C
36. You are doing a large data analysis which requires high computing power and many instances to be launched simultaneously and then to be retired after the analysis. If the instance is retired during the analysis, the program automatically shifts the analysis to the other instance. Which is the most cost-efficient option for launching the EC2 in this case?
a. On-Demand
b. Reserved
c. Dedicated
d. Spot
e. EC2 is not the right choice here
D
37. What is true about penetration testing in AWS (chose 2 correct answers)
a. You can do the penetration on your individual EC2 instance only
b. A prior permission is required from AWS for penetration testing
c. You cannot do the penetration testing at all
d. You can ask AWS support to do the penetration testing
e. AWS will automatically conduct penetration testing from time to time
CD
38. What are the benefits of Multi-AZ RDS deployments (chose 2 correct answers)
a. You get a read-replica
b. More availability during the maintenance window
c. Automatic failover in case of one data center failure
d. More IOPS available for data throughput
e. You get more privileges to manage your database
BC
39. What kind of data should not be stored in S3 (chose 3 correct answers)
a. Images and videos
b. Static files for your websites
c. Your website database
d. Notifications from a computer program
e. Static Files that are accessed once in many years
CDE
40. What are the characteristics of a reserved instance (chose 3 correct answers)
a. It can be applied across regions
b. It saves you significant money over on-demand instance
c. You can shut down the reserved instance any time you want and the hourly charge wont incur for the shutdown hours
d. If your AMI changes the Reserved instance is still valid if it’s the same instance type
e. You pay a fixed amount of money irrespective of the number of hours you used the instance for
CBD
41. What are the characteristics of CloudFormation (chose 2 correct answers)
a. You can use it to replace an instance in the ELB when it fails its health check
b. Helps you quickly deploy and manage applications in the AWS cloud
c. It creates a template for your EC2 instance
d. You don’t need to worry about the infrastructure required to run your applications
CD
42. To protect S3 data from accidental deletion and overwriting you should:
a. Disable S3 delete using an IAM bucket policy
b. Access S3 data only using signed URLs
c. Enable S3 reduced redundancy storage
d. Enable S3 versioning on the bucket
e. Enable MFA protected access
D
43. Which is an operational process performed by AWS for data security?
a. AES 256 bit encryption of data stored on any shared storage device
b. Decommissioning of storage device using industry-standard practices
c. Background virus scans of EBS volumes and EBS snapshots
d. Replication of data across multiple geographic regions
e. Secure wiping of EBS volumes when they are un-mounted
B
44. In the basic monitoring package for EC2, Amazon CloudWatch provides the following metrics (chose 2 correct answers)
a. Hypervisor visible metrics such as CPU utilization
b. Operating system visible metrics such as memory utilization
c. Network Utilization (Read-write)
d. Web server visible metrics such as number failed transaction requests
e. Database visible metrics such as number of connections
AC
45. How should you launch instance if you need a pre-defined IP?
a. Launch it in a VPC
b. Launch it under an ELB
c. Pre-assign an IP using Cloudformation script
d. Launch it in a placement group
C
46. In Which case do you have full authority of the underlying instance (chose 2 correct answers)
a. EC2
b. RDS
c. Dynamo DB
d. EMR (Elastic Map Reduce)
e. Simple DB
AD
47. What is true about EBS (chose 3 correct answers)
a. The snapshots are stored in S3
b. The snapshots are just stored as another EBS volume
c. Snapshots are incremental in nature and only
d. You can share the snapshot with other AWS accounts
e. Snapshots are automatically encrypted
ACD
48. What is the difference between a security group in VPC and a network ACL in VPC (chose 3 correct answers)
a. Security group restricts access to a Subnet while ACL restricts traffic to EC2
b. Security group restricts access to EC2 while ACL restricts traffic to a subnet
c. Security group can work outside the VPC also while ACL only works within a VPC
d. Network ACL performs stateless filtering and Security group provides stateful filtering
e. Security group can only set Allow rule, while ACL can set Deny rule also
f. Option 5
BCD
49. For an EC2 instance launched in a private subnet in VPC, which of the following are the options for it to be able to connect to the internet (assume security groups have proper ports open)
a. Simply attach an elastic IP
b. If there is also a public subnet in the same VPC, an ENI can be attached to the instance with the IP address range of the public subnet
c. If there is a public subnet in the same VPC with a NAT instance attached to internet gateway, then a route can be configured from the instance to the NAT
d. There is no way for an instance in private subnet to talk to the internet
C
50. What happens to data when an EC2 instance terminates (chose 3 correct answers)
a. For EBS backed AMI, the EBS volume with operation system on it is preserved
b. For EBS backed AMI, any volume attached other than the OS volume is preserved
c. All the snapshots of the EBS volume with operating system is preserved
d. For S3 backed AMI, all the data in the local (ephemeral) hard drive is deleted
e. For Instance store-backed EC2 the data is lost when the instance is rebooted
BCD
51. Which of the following Auto scaling cannot do (chose 3 correct answers)
a. Start up EC2 instances when CPU utilization is above threshold
b. Release EC2 instances when CPU utilization is below threshold
c. Increase the instance size when utilization is above threshold
d. Add more Relational Database Service (RDS) read replicas when utilization is above threshold
e. Reboots an instance if the health check is failed for that instance
CDE
52. What is true for S3 buckets (chose 3 correct answers)
a. Bucket namespace is shared and is global among all AWS users.
b. Bucket names can contain alpha numeric characters
c. Bucket are associated with a region, and all data in a bucket resides in that region
d. Buckets can be transferred from one account to another through API
e. You can have unlimited number of buckets in each AWS account
ABC
53. Does S3 provides read-after-write consistency?
a. Yes, not for all regions
b. Yes, for all regions
c. No, it does not provide read-after-write consistency
d. You can provision this by making the right API calls
A
54. Choose the correct statement (chose 3 correct answers)
a. You can have unlimited number of objects in S3 bucket
b. An S3 object can be of unlimited size
c. Data stored in S3 is encrypted
d. You can use Reduced Redundancy storage for lower cost option
e. You can serve your static website from S3
ADE
55. In CloudFront what happens when content is NOT present at an Edge location and a request is made to it?
a. An Error 404 not found is returned
b. CloudFront delivers the content directly from the origin server and stores it in the cache of the edge location
c. The request is kept on hold till content is delivered to the edge location
d. The request is routed to the next closest edge location
B
56. Which of the services could spread across Multi-AZ (chose 2 correct answers)
a. EC2
b. ELB
c. RDS
d. Dynamo DB
e. EBS
CB
57. How do you mount a new EBS to an EC2 (chose 3 correct answers)
a. Using AWS management console
b. Using AWS API tools
c. Using AWS command line interface
d. By doing an RDP to the instance
e. By doing an SSH to the instance
ACE
58. Which of the following will provide the maximum IOPS for your EC2?
a. Instance based SSD storage
b. EBS with SSD storage
c. EBS with provisioned IOPS
d. Stripe data across Multiple EBS volumes with Raid 5
e. Stripe data across Multiple EBS volumes with Raid 0
E
59. Chose the right statements about EC2 instance(chose 2 correct answers)
a. The instance based storage is automatically saved in S3
b. You can use the instance based storage for your root volume
c. You can attach multiple Elastic IPs to a single EC2
d. The public DNS of the EC2 remains intact when you shut down the EC2 and start it again
e. Data on the instance based storage remains intact when you reboot the instance
BE
60. What is the best way of taking a fast snapshot without losing the consistency?
a. Stop the EC2, issue a snapshot command, Switch on the EC2
b. Stop the EC2, issue a snapshot command, wait to complete the snapshot, remount EBS
c. Just issue the snapshot command
d. Un-mount EBS, issue snapshot command, remount
e. Un-mount EBS, Take snapshot, wait to complete the snapshot, remount EBS
C
61. What is the maximum size of a single S3 object?
a. There is no such limit
b. 5 TB
c. 5 GB
d. 100 GB
B
62. Which of the following benefits does adding Multi-AZ deployment in RDS provide (choose multiple if more than one is true)?
a. MultiAZ deployed database can tolerate an Availability Zone failure
b. Decrease latencies if app servers accessing database are in multiple Availability zones
c. Make database access times faster for all app servers
d. Make database more available during maintenance tasks
AD
63. When an ELB is setup, what is the best way to route a website’s traffic to it?
a. Resolve the ELB name to an IP address and point the website to that IP address
b. There is no direct way to do so, Route53 has to be used
c. Generate a CNAME record for the website pointing to the DNS name of the ELB
C
64. You want to use Route53 to direct your www sub-domain to an elastic load balancer fronting your web servers. What kind of record set should you create?
a. A.
b. AAAA
c. NS
d. CNAME
D
65. You have created a Route 53 latency record set from your domain to a machine in Singapore and a similar record to a machine in Oregon. When a user located in India visits your domain he will be routed to:
a. Singapore
b. Oregon
c. Depends on the load on each machine
d. Both, because 2 requests are made, 1 to each machine
A
66. If I want an instance to have a public IP address, which IP address should I use?
A Elastic IP Address
B Class B IP Address
C Class A IP Address
D Dynamic IP Address
A
67. What does RRS stand for when talking about S3?
A Redundancy Removal System
B Relational Rights Storage
C Regional Rights Standard
D Reduced Redundancy Storage
D
68. What does the AWS Storage Gateway provide?
A It allows to integrate on-premises IT environments with Cloud Storage.
B A direct encrypted connection to Amazon S3.
C It's a backup solution that provides an on-premises Cloud storage.
D It provides an encrypted SSL endpoint for backups in the Cloud.
A
69. How many relational database engines does RDS currently support?
A. Six: Amazon Aurora, Oracle, Microsoft SQL Server, PostgreSQL, MySQL and MariaDB
B. Just two: MySQL and Oracle.
C. Five: MySQL, PostgreSQL, MongoDB, Cassandra and SQLite.
D. Just one: MySQL.
A
70. What are the two permission types used by AWS?
A Resource-based and Product-based
B Product-based and Service-based
C Service-based
D User-based and Resource-based
D
71. Which of the following requires a custom CloudWatch metric to monitoring?
A Disk usage activity of the ephemeral volumes of an Amazon EC2 instance
B CPU Utilisation of an Amazon Elastic compute cloud(EC2) instance
C Disk usage activity of an elastic block store volume attached to an Amazon EC2 instance
D Disk full percentage of an Elastic Block store volume
d
71. Your web application is using Auto Scaling and Elastic load balancing. You want to monitor the application to ensure that it maintains a good quality of service for your customers, defined by the application’s page load time. What metric in Amazon CloudWatch can best be used for this?
A Latency reported by the elastic load balancer(ELB)
B Request count reported by ELB
C Aggregate networking for the web tier
D Aggregate CPU Utilisation for the web tier
A
72. You run a two-tiered application with the following components: an elastic load balancer (ELB), three web/application servers on EC2, and one MySQL RDS database. With growing loads, the database queries take longer and longer and slow down the overall response time for user requests. What of the following options could speed up performance? (choose 3)
A Create an RDS read-replica and redirect half of the database read request to it
B Cache database queries in Amazon elastic cloud
C Setup RDS in multi-availability zone mode.
D Shard the database and distribute loads between shards.
E Use Amazon cloudfront to cache database queries.
EBD
73. As an application has increased in popularity, reports of performance issues have grown. the current configuration initiates scaling actions based on avg CPU utilization; however during reports of slowness, CloudWatch graphs have shown that avg CPU remains steady at 40 percent. this is well below the alarm threshold of 60 percent.Your developers have discovered that, due to the unique design of the application,performance degradation occurs on an instance when it is processing more than 200 threads. What is the best way to ensure that your application scales to match the demands?
A launch two to six additional instances outside of the autoscaling group to handle the additional load.
B populate the custom CloudWatch metric for concurrent session and initiate scaling action based on that metric instead of CPU use.
C Empirically determine the expected CPU use for 200 concurrent sessions and adjust the CloudWatch alarm threshold to be that CPU use.
D Add a script to each instance to detect the number of concurrent sessions.if the no. of session remains over 200 for five minutes, have the instance increased the desired capacity of the autoscaling group by one.
C
74. Your company built a mobile application that has already been downloaded several thousand times. Which authentication solution would enable mobile clients to access pictures stored on an AWS S3 bucket and provide you with the highest flexibility to rotate credentials?
A Federated Identity based on AWS security token service (STS) using an AWS IAM policy for the respective S3 bucket
B IAM user per registered client with an IAM policy granted AWS S3 access to the respective bucket
C AWS S3 policy with a ...
A
71. EBS can always tolerate an Availability Zone failure?
a. No, all EBS volume is stored in a single Availability Zone
b. Yes, EBS volume has multiple copies so it should be fine
c. Depends on how it is setup
d. Depends on the Region where EBS volume is initiated
A