Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Amazon Web Services SOA-C03 - AWS Certified CloudOps Engineer - Associate

Page: 5 / 7
Total 219 questions

A company runs thousands of Amazon EC2 instances that are based on the Amazon Linux 2 Amazon Machine Image (AMI). A SysOps administrator must implement a solution to record commands and output from any user that needs an interactive session on one of the EC2 instances. The solution must log the data to a durable storage location. The solution also must provide automated notifications and alarms that are based on the log data.

Which solution will meet these requirements with the MOST operational efficiency?

A.

Configure command session logging on each EC2 instance. Configure the unified Amazon CloudWatch agent to send session logs to Amazon CloudWatch Logs. Set up query filters and alerts by using Amazon Athena.

B.

Require all users to use a central bastion host when they need command line access to an EC2 instance. Configure the unified Amazon CloudWatch agent on the bastion host to send session logs to Amazon CloudWatch Logs. Set up a metric filter and a metric alarm for relevant security findings in CloudWatch Logs.

C.

Require all users to use AWS Systems Manager Session Manager when they need command line access to an EC2 instance. Configure Session Manager to stream session logs to Amazon CloudWatch Logs. Set up a metric filter and a metric alarm for relevant security findings in CloudWatch Logs.

D.

Configure command session logging on each EC2 instance. Require all users to use AWS Systems Manager Run Command documents when they need command line access to an EC2 instance. Configure the unified Amazon CloudWatch agent to send session logs to Amazon CloudWatch Logs. Set up CloudWatch alarms that are based on Amazon Athena query results.

A company applies user-defined tags to AWS resources. Twenty days after applying the tags, the company notices that the tags cannot be used to filter views in the AWS Cost Explorer console.

What is the reason for this issue?

A.

It takes at least 30 days before tags can be used in Cost Explorer.

B.

The company has not activated the user-defined tags for cost allocation.

C.

The company has not created an AWS Cost and Usage Report.

D.

The company has not created a usage budget in AWS Budgets.

A CloudOps engineer created a VPC with a private subnet, a security group allowing all outbound traffic, and an endpoint for EC2 Instance Connect in the private subnet. The EC2 instance was launched without an SSH key pair, using the same subnet and security group. However, the engineer cannot connect via EC2 Instance Connect endpoint.

How can the CloudOps engineer connect to the instance?

A.

Create an inbound rule in the security group to allow HTTPS traffic on port 443 from the private subnet.

B.

Create an inbound rule in the security group to allow SSH traffic on port 22 from the private subnet.

C.

Create an IAM instance profile that allows AWS Systems Manager Session Manager to access the EC2 instance. Associate the instance profile with the instance.

D.

Recreate the EC2 instance. Associate an SSH key pair with the instance.

A company uses AWS Systems Manager to automate common operational tasks across its AWS resources. The company wants to automatically collect software inventory of all its Amazon EC2 instances every day. The solution must store the data in an Amazon S3 bucket for auditing purposes.

Which solution will meet these requirements?

A.

Create a Systems Manager association with the AWS-GatherSoftwareInventory document. Schedule the association to run every day on all EC2 instances.

B.

Configure Systems Manager Distributor to package inventory collection software. Use Systems Manager Hybrid Activations to scan the inventory every day.

C.

Configure Systems Manager Patch Manager to deploy inventory collection agents. Configure Systems Manager Compliance to validate inventory data.

D.

Set up Systems Manager Session Manager to connect to EC2 instances. Use Systems Manager Fleet Manager to aggregate inventory results across the environment.

A company is running workloads on premises and on AWS. A CloudOps engineer needs to automate tasks across all servers on premises by using AWS services. The CloudOps engineer must not install long-term credentials on the on-premises servers.

What should the CloudOps engineer do to meet these requirements?

A.

Create an IAM role and instance profile that include AWS Systems Manager permissions. Attach the role to the on-premises servers.

B.

Create a managed-instance activation in AWS Systems Manager. Install the Systems Manager Agent on the on-premises servers. Register the servers with the activation code and ID from the managed-instance activation.

C.

Create an AWS managed IAM policy that includes the appropriate AWS Systems Manager permissions. Download the IAM policy to the on-premises servers.

D.

Create an IAM user and an access key. Log on to the on-premises servers and install the AWS CLI. Configure the access key in the AWS credentials file after the AWS CLI is successfully installed.

A company that uses AWS Organizations recently implemented AWS Control Tower. The company now needs to centralize identity management. A CloudOps engineer must federate AWS IAM Identity Center with an external SAML 2.0 identity provider (IdP) to centrally manage access to all AWS accounts and cloud applications.

Which prerequisites must the CloudOps engineer have so that the CloudOps engineer can connect to the external IdP? (Select TWO.)

A.

A copy of the IAM Identity Center SAML metadata

B.

The IdP metadata, including the public X.509 certificate

C.

The IP address of the IdP

D.

Root access to the management account

E.

Administrative permissions to the member accounts of the organization

A company uses an IAM policy to ensure that all AWS resources are deployed and managed by AWS CloudFormation. A CloudOps engineer must periodically audit all AWS resources and provide a list of resources that do not match the expected configuration.

Which solution will meet this requirement with the LEAST effort?

A.

Configure an Amazon EventBridge rule that sends a notification to the company when any resource is created by CloudFormation. Audit the event notifications for any incorrect configurations.

B.

Audit code repositories where CloudFormation code is stored to look for any deviations from the expected configuration.

C.

Use the AWS CLI to check all resources to ensure consistency with the intended configuration.

D.

Use Amazon EventBridge to schedule periodic invocations of CloudFormation drift detection. Capture findings for review.

A company has an application that uses an Amazon EFS file system. A recent incident that involved an application logic error corrupted several files. The company wants to improve its ability to back up and recover the EFS file system. The company must be able to recover individual files rapidly.

Which solution meets these requirements MOST cost-effectively?

A.

Configure Amazon Data Lifecycle Manager (Amazon DLM) to archive a copy of the data to an Amazon S3 Glacier vault. Use S3 Glacier retrieval requests to retrieve individual files.

B.

Create a second EFS file system in another AWS Region. Configure AWS DataSync to copy the data to the backup file system. Recover files by copying them from the backup EFS file system.

C.

Enable AWS Backup in Amazon EFS to back up the file system to an Amazon S3 Glacier vault. Use S3 Glacier retrieval requests to retrieve individual files.

D.

Enable AWS Backup in Amazon EFS to back up the file system to a backup vault. Use a partial restore job to retrieve individual files.

A company recently acquired another corporation and all of that corporation’s AWS accounts. A financial analyst needs the cost data from these accounts. A CloudOps engineer uses Cost Explorer to generate cost and usage reports. The CloudOps engineer notices that “No Tagkey” represents 20% of the monthly cost.

What should the CloudOps engineer do to tag the “No Tagkey” resources?

A.

Add the accounts to AWS Organizations. Use a service control policy (SCP) to tag all the untagged resources.

B.

Use an AWS Config rule to find the untagged resources. Set the remediation action to terminate the resources.

C.

Use Cost Explorer to find and tag all the untagged resources.

D.

Use Tag Editor to find and tag all the untagged resources.

A company needs to log and audit any principal that publishes messages to Amazon Simple Notification Service (Amazon SNS) topics and Amazon Simple Queue Service (Amazon SQS) queues. The company wants to ensure that all communication with these services uses VPC endpoints.

Which combination of solutions will meet these requirements? (Select TWO.)

A.

Use Amazon CloudWatch Logs to collect message content from Amazon SNS and Amazon SQS. Deliver logs to an Amazon S3 bucket for querying.

B.

Set up AWS CloudTrail. Enable tracking of data events for Amazon SNS and Amazon SQS. Deliver logs to an Amazon S3 bucket for querying.

C.

Create Amazon EventBridge rules to gather Amazon SNS and Amazon SQS events. Store the events in an Amazon S3 bucket.

D.

Configure VPC endpoints for Amazon SNS and Amazon SQS. Inspect the vpcEndpointId field in the AWS CloudTrail logs.

E.

Configure VPC endpoints for Amazon SNS and Amazon SQS. Inspect the vpcEndpoint field in the Amazon CloudWatch logs.