Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Amazon Web Services SOA-C01 - AWS Certified SysOps Administrator - Associate

Page: 2 / 8
Total 263 questions

A company has an application database on Amazon RDS that runs a resource-intensive reporting job This is causing other applications using the database to run slowly

What should the SysOps Administrator do to resolve this issue*?

A.

Create Amazon RDS backups

B.

Create Amazon RDS read replicas to run the report

C.

Enable Multi-AZ mode on Amazon RDS

D.

Use Amazon RDS automatic host replacement

A company’s customers are reporting increased latency while accessing static web content from Amazon S3. A SysOps Administrator observed a very high rate of read operations on a particular S3 bucket.

What will minimize latency by reducing load on the S3 bucket?

A.

Migrate the S3 bucket to a region that is closer to end users’ geographic locations.

B.

Use cross-regions replication to replicate all of the data to another region.

C.

Create an Amazon CloudFront distribution with the S3 bucket as the origin.

D.

Use Amazon ElasticCache to cache data being served from Amazon S3.

A SysOps Administrator working on an Amazon EC2 instance has misconfigured the clock by one hour. The EC2 instance is sending data to Amazon CloudWatch through the CloudWatch agent. The timestamps on the logs are 45 minutes in the future.

What will be the result of this configuration?

A.

Amazon CloudWatch will not capture the data because it is in the future.

B.

Amazon CloudWatch will accept the custom metric data and record it.

C.

The Amazon CloudWatch agent will check the Network Time Protocol (NTP) server before sending the data, and the agent will correct the time.

D.

The Amazon CloudWatch agent will agent check the Network Time Protocol (NTP) server, and the agent will not send the data because it is more than 30 minutes in the future.

A company is managing multiple AWS accounts using AWS Organizations. One of these accounts is used only for retaining logs in an Amazon S3 bucket The company wants to make sure that compute resources cannot be used in the account.

How can this be accomplished with the LEAST administrative effort?

A.

Apply an 1AM policy to all 1AM entities in the account with a statement to explicitly deny NotAction: s3:

B.

Configure AWS Config to terminate compute resources that have been created in the accounts.

C.

Configure AWS CloudTrail to block any action where the event source is not s3.amazonaws.com.

D.

Update the service control policy on the account to deny the unapproved services.

An application running on Amazon EC2 needs login credentials to access a database. The login credentials are stored in AWS Systems Manager Parameter Store as secure string parameters.

What is the MOST secure way to grant the application access to the credentials?

A.

Create an IAM EC2 role for the EC2 instances and grant the role permission to read the Systems Manager parameters

B.

Create an IAM group for the application and grant the group permissions to read the Systems Manager parameters

C.

Create an IAM policy for the application and grant the policy permission to read the Systems Manager parameters

D.

Create an IAM user for the application and grant the user permission to read the Systems Manager parameters

A company wants to increase the availability and durability of a critical business application. The application currently uses a MySQL database running on an Amazon EC2 instance. The company wants to minimize application changes.

How should the company meet these requirements?

A.

Shut down the EC2 instance. Enable multi-AZ replication within the EC2 instance, then restart the instance.

B.

Launch a secondary EC2 instance running MySQL. Configure a cron job that backs up the database on the primary EC2 instance and copies it to the secondary instance every 30 minutes.

C.

Migrate the database to an Amazon RDS Aurora DB instance and create a Read Replica in another Availability Zone.

D.

Create an Amazon RDS Microsoft SQL DB instance and enable multi-AZ replication. Back up the existing data and import it into the new database.

A company stores thousands of non-critical log files in an Amazon S3 bucket A set of reporting scripts retrieve these log files daily. Which of the following storage options will be the MOST cost efficient for the company's use case?

A.

Amazon Glacier

B.

Amazon S3 Standard IA (infrequent access) storage

C.

Amazon S3 Standard Storage

D.

AWS Snowball

A financial service company is running distributed computing software to manage a fleet of 20 servers for their calculations. There are 2 control nodes and 18 worker nodes to run the calculations. Worker nodes can be automatically started by the control nodes when required. Currently, all nodes are running on demand, and the worker nodes are uses for approximately 4 hours each day.

Which combination of actions will be most cost-effective? (Select Two)

A.

Use dedicated Hosts for the control nodes.

B.

Use reserved instances for the control nodes.

C.

Use reserved instances for the worker nodes.

D.

Use spot instances for the control nodes and On-demand instances if there is no Spot availability.

E.

Use spot instances for the worker nodes and On-demand instances if there is no spot availability.

A SysOps administrator is configuring an application on AWS to be used over the internet by departments in other countries For remote locations, the company requires a static public IP address to be explicitly allowed as a target for outgoing internet traffic

How should the SysOps administrator deploy the application to meet this requirement?

A.

Deploy the application on an Amazon Elastic Container Service (Amazon ECS) cluster Configure an AWS App Mesh service mesh.

B.

Deploy the application as AWS Lambda functions behind an Application Load Balancer

C.

Deploy the application on Amazon EC2 instances behind an internet-facing Network Load Balancer

D.

Deploy the application on an Amazon Elastic Kubernetes Service (Amazon EKS) cluster behind an Amazon API Gateway

A company is concerned about a security vulnerability impacting its Linux operating system.

What should the SysOps Administrator do to alleviate this concern?

A.

Patch the vulnerability with Amazon Inspector.

B.

Provide an AWS Trusted Advisor report showing which Amazon EC2 instances have been patched.

C.

Redeploy the Amazon EC2 instances using AWS CloudFormation.

D.

Patch the Linux operating system using AWS Systems Manager.