AWS-Solution-Architect-Associate Premium Bundle

AWS-Solution-Architect-Associate Premium Bundle

AWS Certified Solutions Architect - Associate Certification Exam

4.5 
(31170 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
December 3, 2024Last update

Amazon AWS-Solution-Architect-Associate Free Practice Questions

Q1. True or False: Manually created DB Snapshots are deleted after the DB Instance is deleted.

A. TRUE

B. FALSE

Answer: A

Q2. How many types of block devices does Amazon EC2 support?

A. 4

B. 5

C. 2

D. 1

Answer: C

Explanation:

Amazon EC2 supports 2 types of block devices. Reference:

http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/block-device-mapping-concepts.html

Q3. You need to set up security for your VPC and you know that Amazon VPC provides two features that you can use to increase security for your VPC: security groups and network access control lists (ACLs). You have already looked into security groups and you are now trying to understand ACLs. Which statement below is incorrect in relation to ACLs?

A. Supports allow rules and deny rules.

B. Is stateful: Return traffic is automatically allowed, regardless of any rules.

C. Processes rules in number order when deciding whether to allow traffic.

D. Operates at the subnet level (second layer of defense). 

Answer: B

Explanation:

Amazon VPC provides two features that you can use to increase security for your VPC:

Security groups—Act as a firewall for associated Amazon EC2 instances, controlling both inbound and outbound traffic at the instance level

Network access control lists (ACLs)—Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the subnet level

Security groups are stateful: (Return traffic is automatically allowed, regardless of any rules) Network ACLs are stateless: (Return traffic must be explicitly allowed by rules)

Reference: http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Security.html

Q4. A benefits enrollment company is hosting a 3-tier web application running in a VPC on AWS which includes a NAT (Network Address Translation) instance in the public Web tier. There is enough provisioned capacity for the expected workload tor the new fiscal year benefit enrollment period plus some extra overhead Enrollment proceeds nicely for two days and then the web tier becomes unresponsive, upon investigation using CIoudWatch and other monitoring tools it is discovered that there is an extremely large and unanticipated amount of inbound traffic coming from a set of 15 specific IP addresses over port 80 from a country where the benefits company has no customers. The web tier instances are so overloaded that benefit enrollment administrators cannot even SSH into them. Which actMty would be useful in defending against this attack?

A. Create a custom route table associated with the web tier and block the attacking IP addresses from the IGW (Internet Gateway)

B. Change the EIP (Elastic IP Address) of the NAT instance in the web tier subnet and update the Main Route Table with the new EIP

C. Create 15 Security Group rules to block the attacking IP addresses over port 80

D. Create an inbound NACL (Network Access control list) associated with the web tier subnet with deny rules to block the attacking IP addresses

Answer:

Explanation:

Use AWS Identity and Access Management (IAM) to control who in your organization has permission to create and manage security groups and network ACLs (NACL). Isolate the responsibilities and roles for

better defense. For example, you can give only your network administrators or security ad min the permission to manage the security groups and restrict other roles.

Q5. By default, EBS volumes that are created and attached t o an instance at launch are deleted when t hat instance is terminated. You can modify this behavior by changing the value of the flag _ to false when you launch the instance

A. Delete On Termination

B. Remove On Deletion

C. Remove On Termination

D. Terminate On Deletion

Answer: A

Q6. What would be the best way to retrieve the public IP address of your EC2 instance using the CLI?

A. Using tags

B. Using traceroute

C. Using ipconfig

D. Using instance metadata 

Answer: D

Explanation:

To determine your instance's public IP address from within the instance, you can use instance metadata. Use the following command to access the public IP address: For Linux use, $ curl

http://169.254.169.254/latest/meta-data/public-ipv4, and for Windows use, $ wget http://169.254.169.254/latest/meta-data/public-ipv4.

Reference:  http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-instance-addressing.htm|

Q7. A user has created an ELB with Auto Scaling. Which of the below mentioned offerings from ELB helps the

user to stop sending new requests traffic from the load balancer to the EC2 instance when the instance is being deregistered while continuing in-flight requests?

A. ELB sticky session

B. ELB deregistration check

C. ELB auto registration Off

D. ELB connection draining 

Answer: D

Explanation:

The Elastic Load Balancer connection draining feature causes the load balancer to stop sending new requests to the back-end instances when the instances are deregistering or become unhealthy, while ensuring that in-flight requests continue to be served.

Reference:

http://docs.aws.amazon.com/EIasticLoadBaIancing/latest/DeveIoperGuide/config-conn-drain.htmI

Q8. Your customer is willing to consolidate their log streams (access logs application logs security logs etc.) in one single system. Once consolidated, the customer wants to analyze these logs in real time based on heuristics. From time to time, the customer needs to validate heuristics, which requires going back to data samples extracted from the last 12 hours?

What is the best approach to meet your customer's requirements?

A. Send all the log events to Amazon SQS. Setup an Auto Scaling group of EC2 sewers to consume the logs and apply the heuristics.

B. Send all the log events to Amazon Kinesis develop a client process to apply heuristics on the logs

C. Configure Amazon Cloud Trail to receive custom logs, use EMR to apply heuristics the logs

D. Setup an Auto Scaling group of EC2 syslogd servers, store the logs on 53 use EMR to apply heuristics on the logs

Answer:

Explanation:

The throughput of an Amazon Kinesis stream is designed to scale without limits via increasing the number of shards within a stream. However, there are certain limits you should keep in mind while using Amazon Kinesis Streams:

By default, Records of a stream are accessible for up to 24 hours from the time they are added to the stream. You can raise this limit to up to 7 days by enabling extended data retention.

The maximum size of a data blob (the data payload before Base64-encoding) within one record is 1 megabyte (MB).

Each shard can support up to 1000 PUT records per second.

For more information about other API level limits, see Amazon Kinesis Streams Limits.

Q9. What does RRS stand for when talking about 53?

A. Redundancy Removal System

B. Relational Rights Storage

C. Regional Rights Standard

D. Reduced Redundancy Storage 

Answer: D

Q10. What does Amazon DynamoDB provide?

A. A predictable and scalable MySQL database

B. A fast and reliable PL/SQL database cluster

C. A standalone Cassandra database, managed by Amazon Web Services

D. A fast, highly scalable managed NoSQL database service 

Answer: D

Explanation:

Amazon DynamoDB is a managed NoSQL database service offered by Amazon. It automatically manages tasks like scalability for you while it provides high availability and durability for your data, allowing you to concentrate in other aspects of your application.

Reference: check link - https://aws.amazon.com/running_databases/

Q11. In Amazon EC2, while sharing an Amazon EBS snapshot, can the snapshots with AWS IV|arketpIace product codes be public?

A. Yes, but only for US-based providers.

B. Yes, they can be public.

C. No, they cannot be made public.

D. Yes, they are automatically made public by the system. 

Answer: C

Explanation:

Snapshots with AWS Marketplace product codes can't be made public. Reference:

http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/ebs-modifying-snapshot-permissions.ht ml

Q12. True or False: When using IAM to control access to your RDS resources, the key names that can be used are case sensitive. For example, aws:CurrentTime is NOT equivalent to AWS:currenttime.

A. TRUE

B. FALSE

Answer: A

Q13. How many relational database engines does RDS currently support?

A. Three: MySQL, Oracle and Microsoft SQL Sewer.

B. Just two: MySQL and Oracle.

C. Five: MySQL, PostgreSQL, MongoDB, Cassandra and SQLite.

D. Just one: MySQL. 

Answer: A

Q14. In Amazon EC2, partial instance-hours are billed .

A. per second used in the hour

B. per minute used

C. by combining partial segments into full hours

D. as full hours 

Answer: D

Explanation:

Partial instance-hours are billed to the next hour. Reference: http://aws.amazon.com/ec2/faqs/

Q15. You want to use AWS Import/Export to send data from your S3 bucket to several of your branch offices. What should you do if you want to send 10 storage units to AWS?

A. Make sure your disks are encrypted prior to shipping.

B. Make sure you format your disks prior to shipping.

C. Make sure your disks are 1TB or more.

D. Make sure you submit a separate job request for each device. 

Answer: D

Explanation:

When using Amazon Import/Export, a separate job request needs to be submitted for each physical device even if they belong to the same import or export job.

Reference: http://docs.aws.amazon.com/AWSImportExport/latest/DG/Concepts.html

START AWS-Solution-Architect-Associate EXAM