Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Amazon Web Services SOA-C03 - AWS Certified CloudOps Engineer - Associate

Page: 2 / 7
Total 219 questions

A CloudOps engineer needs to ensure that AWS resources across multiple AWS accounts are tagged consistently. The company uses an organization in AWS Organizations to centrally manage the accounts. The company wants to implement cost allocation tags to accurately track the costs that are allocated to each business unit.

Which solution will meet these requirements with the LEAST operational overhead?

A.

Use Organizations tag policies to enforce mandatory tagging on all resources. Enable cost allocation tags in the AWS Billing and Cost Management console.

B.

Configure AWS CloudTrail events to invoke an AWS Lambda function to detect untagged resources and to automatically assign tags based on predefined rules.

C.

Use AWS Config to evaluate tagging compliance. Use AWS Budgets to apply tags for cost allocation.

D.

Use AWS Service Catalog to provision only pre-tagged resources. Use AWS Trusted Advisor to enforce tagging across the organization.

A company stores critical files in an Amazon S3 bucket in the us-east-1 AWS Region. To comply with disaster recovery requirements, all new objects in the bucket must automatically replicate to a bucket in the us-west-2 Region.

Which solution will meet this requirement with the LEAST operational overhead?

A.

Enable Cross-Region Replication (CRR) on the source bucket. Specify the destination bucket in the us-west-2 Region. Enable versioning on the source bucket.

B.

Enable Cross-Origin Resource Sharing (CORS) on both the us-east-1 bucket and the us-west-2 bucket.

C.

Create an AWS Lambda function that copies the object to the destination bucket. Configure an Amazon EventBridge rule to run the Lambda function for each object that is created.

D.

Enable S3 Lifecycle policies to transition objects to a different storage class in the us-west-2 Region.

A company maintains a list of 75 approved Amazon Machine Images (AMIs) that can be used across an organization in AWS Organizations. The company ' s development team has been launching Amazon EC2 instances from unapproved AMIs.

A SysOps administrator must prevent users from launching EC2 instances from unapproved AMIs.

Which solution will meet this requirement?

A.

Add a tag to the approved AMIs. Create an IAM policy that includes a tag condition that allows users to launch EC2 instances from only the tagged AMIs.

B.

Create a service-linked role. Attach a policy that denies the ability to launch EC2 instances from a list of unapproved AMIs. Assign the role to users.

C.

Use AWS Config with an AWS Lambda function to check for EC2 instances that are launched from unapproved AMIs. Program the Lambda function to send an Amazon Simple Notification Service (Amazon SNS) message to the SysOps administrator to terminate those EC2 instances.

D.

Use AWS Trusted Advisor to check for EC2 instances that are launched from unapproved AMIs. Configure Trusted Advisor to invoke an AWS Lambda function to terminate those EC2 instances.

A CloudOps engineer is helping a development team deploy an application to AWS. The AWS CloudFormation template includes an Amazon Linux EC2 instance, an Amazon Aurora DB cluster, and a hardcoded database password that must be rotated every 90 days.

What is the MOST secure way to manage the database password?

A.

Use the AWS::SecretsManager::Secret resource with the GenerateSecretString property to automatically generate a password. Use the AWS::SecretsManager::RotationSchedule resource to define a rotation schedule for the password. Configure the application to retrieve the secret from AWS Secrets Manager to access the database.

B.

Use the AWS::SecretsManager::Secret resource with the SecretString property. Accept a password as a CloudFormation parameter. Use the AllowedPattern property of the CloudFormation parameter to require a minimum length, uppercase and lowercase letters, and special characters. Configure the application to retrieve the secret from AWS Secrets Manager to access the database.

C.

Use the AWS::SSM::Parameter resource. Accept input as a CloudFormation parameter to store the parameter as a secure string. Configure the application to retrieve the parameter from AWS Systems Manager Parameter Store.

D.

Use a CloudFormation parameter with NoEcho enabled. Pass the password to the EC2 instance as user data.

A company uses AWS CloudFormation to manage a stack of Amazon EC2 instances on AWS. A CloudOps engineer needs to keep the instances and all of the instances ' data, even if someone deletes the stack.

Which solution will meet these requirements?

A.

Set the DeletionPolicy attribute to Snapshot for the EC2 instance resource in the CloudFormation template.

B.

Automate backups by using Amazon Data Lifecycle Manager (Amazon DLM).

C.

Create a backup plan in AWS Backup.

D.

Set the DeletionPolicy attribute to Retain for the EC2 instance resource in the CloudFormation template.

A company ' s website runs on an Amazon EC2 Linux instance. The website needs to serve PDF files from an Amazon S3 bucket. All public access to the S3 bucket is blocked at the account level. The company needs to allow website users to download the PDF files.

Which solution will meet these requirements with the LEAST administrative effort?

A.

Create an IAM role that has a policy that allows s3:list* and s3:get* permissions. Assign the role to the EC2 instance. Assign a company employee to download requested PDF files to the EC2 instance and deliver the files to website users. Create an AWS Lambda function to periodically delete local files.

B.

Create an Amazon CloudFront distribution that uses an origin access control (OAC) that points to the S3 bucket. Apply a bucket policy to the bucket to allow connections from the CloudFront distribution. Assign a company employee to provide a download URL that contains the distribution URL and the object path to users when users request PDF files.

C.

Change the S3 bucket permissions to allow public access on the source S3 bucket. Assign a company employee to provide a PDF file URL to users when users request the PDF files.

D.

Deploy an EC2 instance that has an IAM instance profile to a public subnet. Use a signed URL from the EC2 instance to provide temporary access to the S3 bucket for website users.

A SysOps administrator needs to give an existing AWS Lambda function access to an existing Amazon S3 bucket. Traffic between the Lambda function and the S3 bucket must not use public IP addresses. The Lambda function has been configured to run in a VPC.

Which solution will meet these requirements?

A.

Configure VPC sharing between the Lambda VPC and the S3 bucket.

B.

Attach a transit gateway to the Lambda VPC to allow the Lambda function to connect to the S3 bucket.

C.

Create a NAT gateway. Associate the NAT gateway with the subnet where the Lambda function is configured to run.

D.

Create an S3 interface endpoint. Change the Lambda function to use the new S3 DNS name.

A CloudOps engineer wants to share a copy of a production database with a migration account. The production database is hosted on an Amazon RDS DB instance and is encrypted at rest with an AWS Key Management Service (AWS KMS) key that has an alias of production-rds-key.

What must the CloudOps engineer do to meet these requirements with the LEAST administrative overhead?

A.

Take a snapshot of the RDS DB instance. Update the KMS key policy to allow access for the migration account root user. Share the snapshot with the migration account.

B.

Create an RDS read replica in the migration account. Replicate the KMS key.

C.

Take a snapshot and create a new KMS key in the migration account with the same alias.

D.

Export the database to Amazon S3 and import it into a new RDS instance.

A CloudOps engineer is responsible for a legacy, CPU-heavy application. The application can only be scaled vertically. Currently, the application is deployed on a single t3.large Amazon EC2 instance. The system is showing 90% CPU usage and significant performance latency after a few minutes.

What change should be made to alleviate the performance problem?

A.

Change the Amazon EBS volume to Provisioned IOPS.

B.

Upgrade to a compute-optimized instance.

C.

Add additional t3.large instances to the application.

D.

Purchase Reserved Instances.

A CloudOps engineer is troubleshooting an implementation of Amazon CloudWatch Synthetics. The CloudWatch Synthetics results must be sent to an Amazon S3 bucket.

The CloudOps engineer has copied the configuration of an existing canary that runs on a VPC that has an internet gateway attached. However, the CloudOps engineer cannot get the canary to successfully start on a private VPC that has no internet access.

What should the CloudOps engineer do to successfully run the canary on the private VPC?

A.

Ensure that the DNS resolution option and the DNS hostnames option are turned on in the VPC. Add the synthetics:GetCanaryRuns permission to the VPC. On the S3 bucket, add the IgnorePublicAcls permission to the CloudWatch Synthetics role.

B.

Ensure that the DNS resolution option and the DNS hostnames option are turned off in the VPC. Create a gateway VPC endpoint for Amazon S3. Add the permissions to allow CloudWatch Synthetics to use the S3 endpoint.

C.

Ensure that the DNS resolution option and the DNS hostnames option are turned off in the VPC. Add a security group to the canary to allow outbound traffic on the DNS port. Add the permissions to allow CloudWatch Synthetics to write to the S3 bucket.

D.

Ensure that the DNS resolution option and the DNS hostnames option are turned on in the VPC. Create an interface VPC endpoint for CloudWatch. Create a gateway VPC endpoint for Amazon S3. Add the permissions to allow CloudWatch Synthetics to use both endpoints.