aiotestking uk

AWS-SysOps Exam Questions - Online Test


AWS-SysOps Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 2) 

A user is launching an EC2 instance in the US East region. Which of the below mentioned options is 

recommended by AWS with respect to the selection of the availability zone? 

A. Always select the US-East-1-a zone for HA 

B. Do not select the AZ; instead let AWS select the AZ 

C. The user can never select the availability zone while launching an instance 

D. Always select the AZ while launching an instance 

Answer:

Explanation: 

When launching an instance with EC2, AWS recommends not to select the availability zone (AZ.. AWS 

specifies that the default Availability Zone should be accepted. This is because it enables AWS to select the best Availability Zone based on the system health and available capacity. If the user launches additional instances, only then an Availability Zone should be specified. This is to specify the same or different AZ from the running instances. 

Q2. - (Topic 1) 

You are designing a system that has a Bastion host. This component needs to be highly available without human intervention. 

Which of the following approaches would you select? 

A. Run the bastion on two instances one in each AZ 

B. Run the bastion on an active Instance in one AZ and have an AMI ready to boot up in the event of failure 

C. Configure the bastion instance in an Auto Scaling group Specify the Auto Scaling group to include multiple AZs but have a min-size of 1 and max-size of 1 

D. Configure an ELB in front of the bastion instance 

Answer:

Q3. - (Topic 3) 

A user is collecting 1000 records per second. The user wants to send the data to CloudWatch using the custom namespace. Which of the below mentioned options is recommended for this activity? 

A. Aggregate the data with statistics, such as Min, max, Average, Sum and Sample data and send the data to CloudWatch 

B. Send all the data values to CloudWatch in a single command by separating them with a comma. CloudWatch will parse automatically 

C. Create one csv file of all the data and send a single file to CloudWatch 

D. It is not possible to send all the data in one call. Thus, it should be sent one by one. CloudWatch will aggregate the data automatically 

Answer:

Explanation: 

AWS CloudWatch supports the custom metrics. The user can always capture the custom data and upload the data to CloudWatch using CLI or APIs. The user can publish data to CloudWatch as single data points or as an aggregated set of data points called a statistic set using the command put-metric-data. It is recommended that when the user is having multiple data points per minute, he should aggregate the data so that it will minimize the number of calls to put-metric-data. In this case it will be single call to CloudWatch instead of 1000 calls if the data is aggregated. 

Q4. - (Topic 3) 

A user has launched an EBS backed instance with EC2-Classic. The user stops and starts the instance. Which of the below mentioned statements is not true with respect to the stop/start action? 

A. The instance gets new private and public IP addresses 

B. The volume is preserved 

C. The Elastic IP remains associated with the instance 

D. The instance may run on a anew host computer 

Answer:

Explanation: 

A user can always stop/start an EBS backed EC2 instance. When the user stops the instance, it first enters the stopping state, and then the stopped state. AWS does not charge the running cost but charges only for the EBS storage cost. If the instance is running in EC2-Classic, it receives a new private IP address; as the Elastic IP address (EIP. associated with the instance is no longer associated with that instance. 

Q5. - (Topic 2) 

A user has configured the AWS CloudWatch alarm for estimated usage charges in the US East region. Which of the below mentioned statements is not true with respect to the estimated charges? 

Exhibit: 

A. It will store the estimated charges data of the last 14 days 

B. It will include the estimated charges of every AWS service 

C. The metric data will represent the data of all the regions 

D. The metric data will show data specific to that region 

Answer:

Explanation: 

When the user has enabled the monitoring of estimated charges for the AWS account with AWS CloudWatch, the estimated charges are calculated and sent several times daily to CloudWatch in the form of metric data. This data will be stored for 14 days. The billing metric data is stored in the US East (Northern Virginia. Region and represents worldwide charges. This data also includes the estimated charges for every service in AWS used by the user, as well as the estimated overall AWS charges. 

Q6. - (Topic 3) 

A user is using the AWS SQS to decouple the services. Which of the below mentioned operations is not 

supported by SQS? 

A. SendMessageBatch 

B. DeleteMessageBatch 

C. CreateQueue 

D. DeleteMessageQueue 

Answer:

Explanation: 

Amazon Simple Queue Service (SQS. is a fast, reliable, scalable, and fully managed message queuing service. SQS provides a simple and cost-effective way to decouple the components of an application. The user can perform the following set of operations using the Amazon SQS: 

CreateQueue, ListQueues, DeleteQueue, SendMessage, SendMessageBatch, 

ReceiveMessage, DeleteMessage, DeleteMessageBatch, ChangeMessageVisibility, 

ChangeMessageVisibilityBatch, SetQueueAttributes, GetQueueAttributes, GetQueueUrl, 

AddPermission and RemovePermission. Operations can be performed only by the AWS account owner or an AWS account that the account owner has delegated to. 

Q7. - (Topic 2) 

A user has configured Elastic Load Balancing by enabling a Secure Socket Layer (SSL. negotiation 

configuration known as a Security Policy. Which of the below mentioned options is not part of this secure policy while negotiating the SSL connection between the user and the client? 

A. SSL Protocols 

B. Client Order Preference 

C. SSL Ciphers 

D. Server Order Preference 

Answer:

Explanation: 

Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. A security policy is a combination of SSL Protocols, SSL Ciphers, and the Server Order Preference option. 

Q8. - (Topic 3) 

An organization has applied the below mentioned policy on an IAM group which has selected the IAM users. What entitlements do the IAM users avail with this policy? 

"Version": "2012-10-17", 

"Statement": [ 

"Effect": "Allow", 

"Action": "*", 

"Resource": "*" 

A. The policy is not created correctly. It will throw an error for wrong resource name 

B. The policy is for the group. Thus, the IAM user cannot have any entitlement to this 

C. It allows full access to all AWS services for the IAM users who are a part of this group 

D. If this policy is applied to the EC2 resource, the users of the group will have full access to the EC2 Resources 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. The IAM group allows the organization to specify permissions for a collection of users. With the below mentioned policy, it will allow the group full access (Admin. to all AWS services. 

"Version": "2012-10-17", 

"Statement": [ 

"Effect": "Allow", 

"Action": "*", 

"Resource": "*" 

Q9. - (Topic 1) 

When an EC2 instance that is backed by an S3-based AMI Is terminated, what happens to the data on me root volume? 

A. Data is automatically saved as an E8S volume. 

B. Data is automatically saved as an ESS snapshot. 

C. Data is automatically deleted. 

D. Data is unavailable until the instance is restarted. 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ComponentsAMIs.html 

Q10. - (Topic 3) 

A user has granted read/write permission of his S3 bucket using ACL. Which of the below mentioned options is a valid ID to grant permission to other AWS accounts (grantee. using ACL? 

A. IAM User ID 

B. S3 Secure ID 

C. Access ID 

D. Canonical user ID 

Answer:

Explanation: 

An S3 bucket ACL grantee can be an AWS account or one of the predefined Amazon S3 groups. The user can grant permission to an AWS account by the email address of that account or by the canonical user ID. If the user provides an email in the grant request, Amazon S3 finds the canonical user ID for that account and adds it to the ACL. The resulting ACL will always contain the canonical user ID for the AWS account, and not the AWS account's email address.