AWS-SysOps Premium Bundle

AWS-SysOps Premium Bundle

AWS Certified SysOps Administrator Associate Certification Exam

4.5 
(2370 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Amazon AWS-SysOps Free Practice Questions

Q1. - (Topic 3) 

A user has enabled detailed CloudWatch monitoring with the AWS Simple Notification Service. Which of the below mentioned statements helps the user understand detailed monitoring better? 

A. SNS will send data every minute after configuration 

B. There is no need to enable since SNS provides data every minute 

C. AWS CloudWatch does not support monitoring for SNS 

D. SNS cannot provide data every minute 

Answer:

Explanation: 

CloudWatch is used to monitor AWS as well as the custom services. It provides either basic or detailed monitoring for the supported AWS products. In basic monitoring, a service sends data points to CloudWatch every five minutes, while in detailed monitoring a service sends data points to CloudWatch every minute. The AWS SNS service sends data every 5 minutes. Thus, it supports only the basic monitoring. The user cannot enable detailed monitoring with SNS. 

Q2. - (Topic 1) 

You have a Linux EC2 web server instance running inside a VPC The instance is In a public subnet and has an EIP associated with it so you can connect to It over the Internet via HTTP or SSH The instance was also fully accessible when you last logged in via SSH. and was also serving web requests on port 80. 

Now you are not able to SSH into the host nor does it respond to web requests on port 80 that were working fine last time you checked You have double-checked that all networking configuration parameters (security groups route tables. IGW'EIP. NACLs etc) are properly configured {and you haven’t made any changes to those anyway since you were last able to reach the Instance). You look at the EC2 console and notice that system status check shows "impaired." 

Which should be your next step in troubleshooting and attempting to get the instance back to a healthy state so that you can log in again? 

A. Stop and start the instance so that it will be able to be redeployed on a healthy host system that most likely will fix the "impaired" system status 

B. Reboot your instance so that the operating system will have a chance to boot in a clean healthy state that most likely will fix the 'impaired" system status 

C. Add another dynamic private IP address to me instance and try to connect via mat new path, since the networking stack of the OS may be locked up causing the “impaired” system status. 

D. Add another Elastic Network Interface to the instance and try to connect via that new path since the networking stack of the OS may be locked up causing the "impaired" system status 

E. un-map and then re-map the EIP to the instance, since the IGWVNAT gateway may not be working properly, causing the "impaired" system status 

Answer:

Topic 2, Volume B 

56. - (Topic 2) 

A user is accessing RDS from an application. The user has enabled the Multi AZ feature with the MS SQL RDS DB. During a planned outage how will AWS ensure that a switch from DB to a standby replica will not affect access to the application? 

A. RDS will have an internal IP which will redirect all requests to the new DB 

B. RDS uses DNS to switch over to stand by replica for seamless transition 

C. The switch over changes Hardware so RDS does not need to worry about access 

D. RDS will have both the DBs running independently and the user has to manually switch over 

Q3. - (Topic 2) 

An organization is planning to create 5 different AWS accounts considering various security requirements. The organization wants to use a single payee account by using the 

consolidated billing option. Which of the below mentioned statements is true with respect to the above information? 

A. Master (Payee. account will get only the total bill and cannot see the cost incurred by each account 

B. Master (Payee. account can view only the AWS billing details of the linked accounts 

C. It is not recommended to use consolidated billing since the payee account will have access to the linked accounts 

D. Each AWS account needs to create an AWS billing policy to provide permission to the payee account 

Answer:

Explanation: 

AWS consolidated billing enables the organization to consolidate payments for multiple Amazon Web Services (AWS. accounts within a single organization by making a single paying account. Consolidated billing enables the organization to see a combined view of the AWS charges incurred by each account as well as obtain a detailed cost report for each of the individual AWS accounts associated with the paying account. The payee account will not have any other access than billing data of linked accounts. 

Q4. - (Topic 2) 

A user is planning to use AWS Cloudformation. Which of the below mentioned functionalities does not help him to correctly understand Cloudfromation? 

A. Cloudformation follows the DevOps model for the creation of Dev & Test 

B. AWS Cloudfromation does not charge the user for its service but only charges for the AWS resources created with it 

C. Cloudformation works with a wide variety of AWS services, such as EC2, EBS, VPC, IAM, S3, RDS, 

ELB, etc 

D. CloudFormation provides a set of application bootstrapping scripts which enables the user to install Software 

Answer:

Explanation: 

AWS Cloudformation is an application management tool which provides application modelling, deployment, configuration, management and related activities. It supports a wide variety of AWS services, such as EC2, EBS, AS, ELB, RDS, VPC, etc. It also provides application bootstrapping scripts which enable the user to install software packages or create folders. It is free of the cost and only charges the user for the services created with it. The only challenge is that it does not follow any model, such as DevOps; instead customers can define templates and use them to provision and manage the AWS resources in an orderly way. 

Q5. - (Topic 3) 

A user has enabled versioning on an S3 bucket. The user is using server side encryption for data at rest. If the user is supplying his own keys for encryption (SSE-C., what is recommended to the user for the purpose of security? 

A. The user should not use his own security key as it is not secure 

B. Configure S3 to rotate the user’s encryption key at regular intervals 

C. Configure S3 to store the user’s keys securely with SSL 

D. Keep rotating the encryption key manually at the client side 

Answer:

Explanation: 

AWS S3 supports client side or server side encryption to encrypt all data at Rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key (SSE-C.. Since S3 does not store the encryption keys in SSE-C, it is recommended that the user should manage keys securely and keep rotating them regularly at the client side version. 

Q6. - (Topic 3) 

A user has launched an EBS backed EC2 instance in the US-East-1a region. The user stopped the instance and started it back after 20 days. AWS throws up an ‘InsufficientInstanceCapacity’ error. What can be the possible reason for this? 

A. AWS does not have sufficient capacity in that availability zone 

B. AWS zone mapping is changed for that user account 

C. There is some issue with the host capacity on which the instance is launched 

D. The user account has reached the maximum EC2 instance limit 

Answer:

Explanation: 

When the user gets an ‘InsufficientInstanceCapacity’ error while launching or starting an EC2 instance, it means that AWS does not currently have enough available capacity to service the user request. If the user is requesting a large number of instances, there might not be enough server capacity to host them. The user can either try again later, by specifying a smaller number of instances or changing the availability zone if launching a fresh instance. 

Q7. - (Topic 3) 

An organization has launched 5 instances: 2 for production and 3 for testing. The organization wants that one particular group of IAM users should only access the test instances and not the production ones. How can the organization set that as a part of the policy? 

A. Launch the test and production instances in separate regions and allow region wise access to the group 

B. Define the IAM policy which allows access based on the instance ID 

C. Create an IAM policy with a condition which allows access to only small instances 

D. Define the tags on the test and production servers and add a condition to the IAM policy which allows access to specific tags 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. The user can add conditions as a part of the IAM policies. The condition can be set on AWS Tags, Time, and Client IP as well as on various parameters. If the organization wants the user to access only specific instances he should define proper tags and add to the IAM policy condition. 

The sample policy is shown below. 

"Statement": [ 

"Action": "ec2:*", 

"Effect": "Allow", 

"Resource": "*", 

"Condition": { 

"StringEquals": { 

"ec2:ResourceTag/InstanceType": "Production" 

Q8. - (Topic 2) 

A user has created a queue named “myqueue” with SQS. There are four messages published to queue which are not received by the consumer yet. If the user tries to delete the queue, what will happen? 

A. A user can never delete a queue manually. AWS deletes it after 30 days of inactivity on queue 

B. It will delete the queue 

C. It will initiate the delete but wait for four days before deleting until all messages are deleted automatically. 

D. I t will ask user to delete the messages first 

Answer:

Explanation: 

SQS allows the user to move data between distributed components of applications so they can perform different tasks without losing messages or requiring each component to be always available. The user can delete a queue at any time, whether it is empty or not. It is important to note that queues retain messages for a set period of time. By default, a queue retains messages for four days. 

Q9. - (Topic 3) 

A user has configured an EC2 instance in the US-East-1a zone. The user has enabled detailed monitoring of the instance. The user is trying to get the data from CloudWatch using a CLI. Which of the below mentioned CloudWatch endpoint URLs should the user use? 

A. monitoring.us-east-1.amazonaws.com 

B. monitoring.us-east-1-a.amazonaws.com 

C. monitoring.us-east-1a.amazonaws.com 

D. cloudwatch.us-east-1a.amazonaws.com 

Answer:

Explanation: 

The CloudWatch resources are always region specific and they will have the end point as region specific. If the user is trying to access the metric in the US-East-1 region, the endpoint URL will be: monitoring.us-east- 1.amazonaws.com 

Q10. - (Topic 3) 

How can you secure data at rest on an EBS volume? 

A. Encrypt the volume using the S3 server-side encryption service. 

B. Attach the volume to an instance using EC2's SSL interface. 

C. Create an IAM policy that restricts read and write access to the volume. 

D. Write the data randomly instead of sequentially. 

E. Use an encrypted file system m top of the EBS volume. 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/IAM/latest/UserGuide/policies_examples.html 

Q11. - (Topic 2) 

A user has stored data on an encrypted EBS volume. The user wants to share the data with his friend’s AWS account. How can user achieve this? 

A. Create an AMI from the volume and share the AMI 

B. Copy the data to an unencrypted volume and then share 

C. Take a snapshot and share the snapshot with a friend 

D. If both the accounts are using the same encryption key then the user can share the volume directly 

Answer:

Explanation: 

AWS EBS supports encryption of the volume. It also supports creating volumes from existing snapshots 

provided the snapshots are created from encrypted volumes. If the user is having data on an encrypted volume and is trying to share it with others, he has to copy the data from the encrypted volume to a new unencrypted volume. Only then can the user share it as an encrypted volume data. Otherwise the snapshot cannot be shared. 

Q12. - (Topic 3) 

An organization has created 10 IAM users. The organization wants each of the IAM users to have access to a separate DyanmoDB table. All the users are added to the same group and the organization wants to setup a group level policy for this. How can the organization achieve this? 

A. Define the group policy and add a condition which allows the access based on the IAM name 

B. Create a DynamoDB table with the same name as the IAM user name and define the policy rule which grants access based on the DynamoDB ARN using a variable 

C. Create a separate DynamoDB database for each user and configure a policy in the group based on the DB variable 

D. It is not possible to have a group level policy which allows different IAM users to different DynamoDB Tables 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. AWS DynamoDB has only tables and the organization cannot makeseparate databases. The organization should create a table with the same name as the IAM user name and use the ARN of DynamoDB as part of the group policy. The sample policy is shown below: 

"Version": "2012-10-17", 

"Statement": [{ 

"Effect": "Allow", 

"Action": ["dynamodb:*"], 

"Resource": "arn:aws:dynamodb:region:account-number-without-hyphens:table/${aws:username}" 

Q13. - (Topic 1) 

You have a web application leveraging an Elastic Load Balancer (ELB) In front of the web servers deployed using an Auto Scaling Group Your database is running on Relational 

Database Service (RDS) The application serves out technical articles and responses to them in general there are more views of an article than there are responses to the article. On occasion, an article on the site becomes extremely popular resulting in significant traffic Increases that causes the site to go down. 

What could you do to help alleviate the pressure on the infrastructure while maintaining availability during these events? 

Choose 3 answers 

A. Leverage CloudFront for the delivery of the articles. 

B. Add RDS read-replicas for the read traffic going to your relational database 

C. Leverage ElastiCache for caching the most frequently used data. 

D. Use SOS to queue up the requests for the technical posts and deliver them out of the queue. 

E. Use Route53 health checks to fail over to an S3 bucket for an error page. 

Answer: A,C,E 

Q14. - (Topic 3) 

A sys admin is planning to subscribe to the RDS event notifications. For which of the below mentioned source categories the subscription cannot be configured? 

A. DB security group 

B. DB snapshot 

C. DB options group 

D. DB parameter group 

Answer:

Explanation: 

Amazon RDS uses the Amazon Simple Notification Service (SNS. to provide a notification when an Amazon RDS event occurs. These events can be configured for source categories, such as DB instance, DB security group, DB snapshot and DB parameter group. 

Q15. - (Topic 2) 

A user has created a VPC with CIDR 20.0.0.0/24. The user has created a public subnet with CIDR 20.0.0.0/25 and a private subnet with CIDR 20.0.0.128/25. The user has launched one instance each in the private and public subnets. Which of the below mentioned options cannot be the correct IP address (private IP. assigned to an instance in the public or private subnet? 

A. 20.0.0.255 

B. 20.0.0.132 

C. 20.0.0.122 

D. 20.0.0.55 

Answer:

Explanation: 

When the user creates a subnet in VPC, he specifies the CIDR block for the subnet. In this case the user has created a VPC with the CIDR block 20.0.0.0/24, which supports 256 IP addresses (20.0.0.0 to 20.0.0.255.. The public subnet will have IP addresses between 20.0.0.0 - 20.0.0.127 and the private subnet will have IP addresses between 20.0.0.128 -20.0.0.255. AWS reserves the first four IP addresses and the last IP address in each subnet’s CIDR block. These are not available for the user to use. Thus, the instance cannot have an IP address of 20.0.0.255 

Q16. - (Topic 3) 

How can software determine the public and private IP addresses of the Amazon EC2 instance that it is running on? 

A. Query the local instance metadata. 

B. Query the appropriate Amazon CloudWatch metric. 

C. Query the local instance userdata. 

D. Use ipconfig or ifconfig command. 

Answer:

START AWS-SysOps EXAM