aiotestking uk

AWS-SysOps Exam Questions - Online Test


AWS-SysOps Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 1) 

What would happen to an RDS (Relational Database Service) multi-Availability Zone deployment of the primary OB instance fails? 

A. The IP of the primary DB instance is switched to the standby OB instance 

B. The RDS (Relational Database Service) DB instance reboots 

C. A new DB instance is created in the standby availability zone 

D. The canonical name record (CNAME) is changed from primary to standby 

Answer:

Q2. - (Topic 2) 

A user has created an ELB with Auto Scaling. Which of the below mentioned offerings from ELB helps the user to stop sending new requests traffic from the load balancer to the EC2 instance when the instance is being deregistered while continuing in-flight requests? 

A. ELB sticky session 

B. ELB deregistration check 

C. ELB connection draining 

D. ELB auto registration Off 

Answer:

Explanation: 

The Elastic Load Balancer connection draining feature causes the load balancer to stop sending new requests to the back-end instances when the instances are deregistering or become unhealthy, while ensuring that inflight requests continue to be served. 

Q3. - (Topic 3) 

How can you secure data at rest on an EBS volume? 

A. Encrypt the volume using the S3 server-side encryption service. 

B. Attach the volume to an instance using EC2's SSL interface. 

C. Create an IAM policy that restricts read and write access to the volume. 

D. Write the data randomly instead of sequentially. 

E. Use an encrypted file system m top of the EBS volume. 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/IAM/latest/UserGuide/policies_examples.html 

Q4. - (Topic 3) 

A user has provisioned 2000 IOPS to the EBS volume. The application hosted on that EBS is experiencing less IOPS than provisioned. Which of the below mentioned options does not affect the IOPS of the volume? 

A. The application does not have enough IO for the volume 

B. The instance is EBS optimized 

C. The EC2 instance has 10 Gigabit Network connectivity 

D. The volume size is too large 

Answer:

Explanation: 

When the application does not experience the expected IOPS or throughput of the PIOPS EBS volume that was provisioned, the possible root cause could be that the EC2 bandwidth is the limiting factor and the instance might not be either EBS-optimized or might not have 10 Gigabit network connectivity. Another possible cause for not experiencing the expected IOPS could also be that the user is not driving enough I/O to the EBS volumes. The size of the volume may not affect IOPS. 

Q5. - (Topic 2) 

A user has setup a web application on EC2. The user is generating a log of the application performance at every second. There are multiple entries for each second. If the user wants to send that data to CloudWatch every minute, what should he do? 

A. The user should send only the data of the 60th second as CloudWatch will map the receive data timezone with the sent data timezone 

B. It is not possible to send the custom metric to CloudWatch every minute 

C. Give CloudWatch the Min, Max, Sum, and SampleCount of a number of every minute 

D. Calculate the average of one minute and send the data to CloudWatch 

Answer:

Explanation: 

Amazon CloudWatch aggregates statistics according to the period length that the user has specified while getting data from CloudWatch. The user can publish as many data points as he wants with the same or similartime stamps. CloudWatch aggregates them by the period length when the user calls get statistics about those data points. CloudWatch records the average (sum of all items divided by the number of items. of the values received for every 1-minute period, as well as the number of samples, maximum value, and minimum value for the same time period. CloudWatch will aggregate all the data which have time stamps within a one-minute period. 

Q6. - (Topic 1) 

When attached to an Amazon VPC which two components provide connectivity with external networks? Choose 2 answers 

A. Elastic IPS (EIP) 

B. NAT Gateway (NAT) 

C. Internet Gateway {IGW) 

D. Virtual Private Gateway (VGW) 

Answer: C,D 

Q7. - (Topic 1) 

When preparing for a compliance assessment of your system built inside of AWS. what are three best-practices for you to prepare for an audit? 

Choose 3 answers 

A. Gather evidence of your IT operational controls 

B. Request and obtain applicable third-party audited AWS compliance reports and certifications 

C. Request and obtain a compliance and security tour of an AWS data center for a pre-assessment security review 

D. Request and obtain approval from AWS to perform relevant network scans and in-depth penetration tests of your system's Instances and endpoints 

E. Schedule meetings with AWS's third-party auditors to provide evidence of AWS compliance that maps to your control objectives 

Answer: A,B,D 

Q8. - (Topic 2) 

A user is trying to setup a recurring Auto Scaling process. The user has setup one process to scale up every day at 8 am and scale down at 7 PM. The user is trying to setup another recurring process which scales up on the 1st of every month at 8 AM and scales down the same day at 7 PM. What will Auto Scaling do in this scenario? 

A. Auto Scaling will execute both processes but will add just one instance on the 1st 

B. Auto Scaling will add two instances on the 1st of the month 

C. Auto Scaling will schedule both the processes but execute only one process randomly 

D. Auto Scaling will throw an error since there is a conflict in the schedule of two separate Auto Scaling Processes 

Answer:

Explanation: 

Auto Scaling based on a schedule allows the user to scale the application in response to predictable load changes. The user can also configure the recurring schedule action which will follow the Linux cron format. As per Auto Scaling, a scheduled action must have a unique time value. If the user attempts to schedule an activity at a time when another existing activity is already scheduled, the call will be rejected with an error message noting the conflict. 

Q9. - (Topic 3) 

A user is planning to use AWS services for his web application. If the user is trying to set up his own billing management system for AWS, how can he configure it? 

A. Set up programmatic billing access. Download and parse the bill as per the requirement 

B. It is not possible for the user to create his own billing management service with AWS 

C. Enable the AWS CloudWatch alarm which will provide APIs to download the alarm data 

D. Use AWS billing APIs to download the usage report of each service from the AWS billing console 

Answer:

Explanation: 

AWS provides an option to have programmatic access to billing. Programmatic Billing Access leverages the existing Amazon Simple Storage Service (Amazon S3. APIs. Thus, the user can build applications that reference his billing data from a CSV (comma-separated value. file stored in an Amazon S3 bucket. AWS will upload the bill to the bucket every few hours and the user can download the bill CSV from the bucket, parse itand create a billing system as per the requirement. 

Q10. - (Topic 3) 

A user is trying to setup a security policy for ELB. The user wants ELB to meet the cipher supported by the client by configuring the server order preference in ELB security policy. Which of the below mentioned 

preconfigured policies supports this feature? 

A. ELBSecurity Policy-2014-01 

B. ELBSecurity Policy-2011-08 

C. ELBDefault Negotiation Policy 

D. ELBSample- OpenSSLDefault Cipher Policy 

Answer:

Explanation: 

Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. If the load balancer is configured to support the Server Order Preference, then the load balancer gets to select the first cipher in its list that matches any one of the ciphers in the client's list. When the user verifies the preconfigured policies supported by ELB, the policy “ELBSecurity Policy-2014-01” supports server order preference.