Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Amazon Web Services SOA-C03 - AWS Certified CloudOps Engineer - Associate

Page: 1 / 5
Total 165 questions

A CloudOps engineer is responsible for a company's disaster recovery procedures. The company has a source Amazon S3 bucket in a production account, and it wants to replicate objects from the source to a destination S3 bucket in a nonproduction account. The CloudOps engineer configures S3 cross-Region, cross-account replication to copy the source S3 bucket to the destination S3 bucket. When the CloudOps engineer attempts to access objects in the destination S3 bucket, they receive an Access Denied error.

Which solution will resolve this problem?

A.

Modify the replication configuration to change object ownership to the destination S3 bucket owner.

B.

Ensure that the replication rule applies to all objects in the source S3 bucket and is not scoped to a single prefix.

C.

Retry the request when the S3 Replication Time Control (S3 RTC) has elapsed.

D.

Verify that the storage class for the replicated objects did not change between the source S3 bucket and the destination S3 bucket.

A company has a web application that is experiencing performance problems many times each night. A root cause analysis reveals sudden increases in CPU utilization that last 5 minutes on an Amazon EC2 Linux instance. A CloudOps engineer must find the process ID (PID) of the service or process that is consuming more CPU.

What should the CloudOps engineer do to collect the process utilization information with the LEAST amount of effort?

A.

Configure the Amazon CloudWatch agent procstat plugin to capture CPU process metrics.

B.

Configure an AWS Lambda function to run every minute to capture the PID and send a notification.

C.

Log in to the EC2 instance each night and run the top command.

D.

Use the default Amazon CloudWatch CPUUtilization metric.

A CloudOps engineer is preparing to deploy an application to Amazon EC2 instances that are in an Auto Scaling group. The application requires dependencies to be installed. Application updates are issued weekly.

The CloudOps engineer needs to implement a solution to incorporate the application updates on a regular basis. The solution also must conduct a vulnerability scan during Amazon Machine Image (AMI) creation.

What is the MOST operationally efficient solution that meets these requirements?

A.

Create a script that uses Packer and schedule a cron job.

B.

Install the application and dependencies on an EC2 instance and create an AMI.

C.

Use EC2 Image Builder with a custom recipe to install the application and dependencies.

D.

Invoke the EC2 CreateImage API operation by using an EventBridge scheduled rule.

A media company hosts a public news and video portal on AWS. The portal uses an Amazon DynamoDB table with provisioned capacity to maintain an index of video files that are stored in an Amazon S3 bucket. During a recent event, millions of visitors came to the portal for news. This increase in traffic caused read requests to be throttled in the DynamoDB table. Videos could not be displayed in the portal.

The company's operations team manually increased the provisioned capacity on a temporary basis to meet the demand. The company wants the operations team to receive an alert before the table is throttled in the future. The company has created an Amazon Simple Notification Service (Amazon SNS) topic and has subscribed the operations team's email address to the SNS topic.

What should the company do next to meet these requirements?

A.

Create an Amazon CloudWatch alarm that uses the ConsumedReadCapacityUnits metric. Set the alarm threshold to a value that is close to the DynamoDB table's provisioned capacity. Configure the alarm to publish notifications to the SNS topic.

B.

Turn on auto scaling on the DynamoDB table. Configure an Amazon EventBridge rule to publish notifications to the SNS topic during scaling events.

C.

Turn on Amazon CloudWatch Logs for the DynamoDB table. Create an Amazon CloudWatch metric filter to pattern match the THROTTLING_EXCEPTION status code from DynamoDB. Create a CloudWatch alarm for the metric. Select the SNS topic for notifications.

D.

Configure the application to store logs in Amazon CloudWatch Logs. Create an Amazon CloudWatch metric filter to pattern match the THROTTLING_EXCEPTION status code from DynamoDB. Create a CloudWatch alarm for the metric. Select the SNS topic for notifications.

A CloudOps engineer must manage the security of an AWS account. Recently, an IAM user’s access key was mistakenly uploaded to a public code repository. The engineer must identify everything that was changed using this compromised key.

How should the CloudOps engineer meet these requirements?

A.

Create an Amazon EventBridge rule to send all IAM events to an AWS Lambda function for analysis.

B.

Query Amazon EC2 logs by using Amazon CloudWatch Logs Insights for all events initiated with the compromised access key within the suspected timeframe.

C.

Search AWS CloudTrail event history for all events initiated with the compromised access key within the suspected timeframe.

D.

Search VPC Flow Logs for all events initiated with the compromised access key within the suspected timeframe.

A company needs to log and audit any principal that publishes messages to Amazon Simple Notification Service (Amazon SNS) topics and Amazon Simple Queue Service (Amazon SQS) queues. The company wants to ensure that all communication with these services uses VPC endpoints.

Which combination of solutions will meet these requirements? (Select TWO.)

A.

Use Amazon CloudWatch Logs to collect message content from Amazon SNS and Amazon SQS. Deliver logs to an Amazon S3 bucket for querying.

B.

Set up AWS CloudTrail. Enable tracking of data events for Amazon SNS and Amazon SQS. Deliver logs to an Amazon S3 bucket for querying.

C.

Create Amazon EventBridge rules to gather Amazon SNS and Amazon SQS events. Store the events in an Amazon S3 bucket.

D.

Configure VPC endpoints for Amazon SNS and Amazon SQS. Inspect the vpcEndpointId field in the AWS CloudTrail logs.

E.

Configure VPC endpoints for Amazon SNS and Amazon SQS. Inspect the vpcEndpoint field in the Amazon CloudWatch logs.

A company hosts an FTP server on EC2 instances. AWS Security Hub sends findings to Amazon EventBridge when the FTP port becomes publicly exposed in attached security groups.

A CloudOps engineer needs an automated, event-driven remediation solution to remove public access from security groups.

Which solution will meet these requirements?

A.

Configure the existing EventBridge event to stop the EC2 instances that have the exposed port.

B.

Create a cron job for the FTP server to invoke an AWS Lambda function. Configure the Lambda function to modify the security group of the identified EC2 instances and to remove the instances that allow public access.

C.

Create a cron job for the FTP server that invokes an AWS Lambda function. Configure the Lambda function to modify the server to use SFTP instead of FTP.

D.

Configure the existing EventBridge event to invoke an AWS Lambda function. Configure the function to remove the security group rule that allows public access.

A company hosts a web application on an Amazon EC2 instance. The web server logs are published to Amazon CloudWatch Logs. The log events have the same structure and include the HTTP response codes associated with user requests. The company needs to monitor the number of times the web server returns an HTTP 404 response.

What is the MOST operationally efficient solution that meets these requirements?

A.

Create a CloudWatch Logs metric filter that counts the number of times the web server returns an HTTP 404 response.

B.

Create a CloudWatch Logs subscription filter that counts the number of HTTP 404 responses.

C.

Create an AWS Lambda function that runs a CloudWatch Logs Insights query every hour.

D.

Create a script that runs a CloudWatch Logs Insights query every hour.

A company has an on-premises DNS solution and wants to resolve DNS records in an Amazon Route 53 private hosted zone for example.com. The company has set up an AWS Direct Connect connection for network connectivity between the on-premises network and the VPC. A CloudOps engineer must ensure that an on-premises server can query records in the example.com domain.

What should the CloudOps engineer do to meet these requirements?

A.

Create a Route 53 Resolver inbound endpoint. Attach a security group to the endpoint to allow inbound traffic on TCP/UDP port 53 from the on-premises DNS servers.

B.

Create a Route 53 Resolver inbound endpoint. Attach a security group to the endpoint to allow outbound traffic on TCP/UDP port 53 to the on-premises DNS servers.

C.

Create a Route 53 Resolver outbound endpoint. Attach a security group to the endpoint to allow inbound traffic on TCP/UDP port 53 from the on-premises DNS servers.

D.

Create a Route 53 Resolver outbound endpoint. Attach a security group to the endpoint to allow outbound traffic on TCP/UDP port 53 to the on-premises DNS servers.

A SysOps administrator is configuring an Auto Scaling group of Amazon EC2 instances for an application. The average CPU utilization of the instances in the Auto Scaling group must remain at approximately 40% when the load on the application changes.

Which solution will meet this requirement in the MOST operationally efficient manner?

A.

Create a scheduled scaling action. Configure the action to run at times when the application typically experiences an increase in traffic.

B.

Configure a simple scaling policy. Create an Amazon CloudWatch alarm that enters ALARM state when CPU utilization is greater than 40%. Associate the alarm with the scaling policy.

C.

Configure a step scaling policy. Create an Amazon CloudWatch alarm that enters ALARM state when CPU utilization is greater than 40%. Associate the alarm with the scaling policy.

D.

Configure a target tracking scaling policy. Specify a target value of 40 for average CPU utilization.