AWS-SysOps Premium Bundle

AWS-SysOps Premium Bundle

AWS Certified SysOps Administrator Associate Certification Exam

4.5 
(36375 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Amazon AWS-SysOps Free Practice Questions

Q1. - (Topic 1) 

Your EC2-Based Multi-tier application includes a monitoring instance that periodically makes application -level read only requests of various application components and if any of those fail more than three times 30 seconds calls CloudWatch lo fire an alarm, and the alarm notifies your operations team by email and SMS of a possible application health problem. However, you also need to watch the watcher -the monitoring instance itself - and be notified if it becomes unhealthy. 

Which of the following is a simple way to achieve that goal? 

A. Run another monitoring instance that pings the monitoring instance and fires a could watch alarm mat notifies your operations teamshould the primary monitoring instance become unhealthy. 

B. Set a CloudWatch alarm based on EC2 system and instance status checks and have the alarm notify your operations team of any detected problem with the monitoring instance. 

C. Set a CloudWatch alarm based on the CPU utilization of the monitoring instance and nave the alarm notify your operations team if C r the CPU usage exceeds 50% few more than one minute: then have your monitoring application go into a CPU-bound loop should it Detect any application problems. 

D. Have the monitoring instances post messages to an SOS queue and then dequeue those messages on another instance should the queue cease to have new messages, the second instance should first terminate the original monitoring instance start anotherbackup monitoring instance and assume (he role of the previous monitoring instance and beginning adding messages to the SQSqueue. 

Answer:

Q2. - (Topic 3) 

A user is trying to create a PIOPS EBS volume with 8 GB size and 200 IOPS. Will AWS create the volume? 

A. Yes, since the ratio between EBS and IOPS is less than 30 

B. No, since the PIOPS and EBS size ratio is less than 30 

C. No, the EBS size is less than 10 GB 

D. Yes, since PIOPS is higher than 100 

Answer:

Explanation: 

A provisioned IOPS EBS volume can range in size from 10 GB to 1 TB and the user can provision up to 4000 IOPS per volume. The ratio of IOPS provisioned to the volume size requested should be a maximum of 30; for example, a volume with 3000 IOPS must be at least 100 GB. 

Q3. - (Topic 3) 

An organization has created 10 IAM users. The organization wants each of the IAM users to have access to a separate DyanmoDB table. All the users are added to the same group and the organization wants to setup a group level policy for this. How can the organization achieve this? 

A. Define the group policy and add a condition which allows the access based on the IAM name 

B. Create a DynamoDB table with the same name as the IAM user name and define the policy rule which grants access based on the DynamoDB ARN using a variable 

C. Create a separate DynamoDB database for each user and configure a policy in the group based on the DB variable 

D. It is not possible to have a group level policy which allows different IAM users to different DynamoDB Tables 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. AWS DynamoDB has only tables and the organization cannot makeseparate databases. The organization should create a table with the same name as the IAM user name and use the ARN of DynamoDB as part of the group policy. The sample policy is shown below: 

"Version": "2012-10-17", 

"Statement": [{ 

"Effect": "Allow", 

"Action": ["dynamodb:*"], 

"Resource": "arn:aws:dynamodb:region:account-number-without-hyphens:table/${aws:username}" 

Q4. - (Topic 3) 

An AWS root account owner is trying to create a policy to access RDS. Which of the below mentioned 

statements is true with respect to the above information? 

A. Create a policy which allows the users to access RDS and apply it to the RDS instances 

B. The user cannot access the RDS database if he is not assigned the correct IAM policy 

C. The root account owner should create a policy for the IAM user and give him access to the RDS services 

D. The policy should be created for the user and provide access for RDS 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. If the account owner wants to create a policy for RDS, the owner has to create an IAM user and define the policy which entitles the IAM user with various RDS services such as Launch Instance, Manage security group, Manage parameter group etc. 

Q5. - (Topic 1) 

When an EC2 instance that is backed by an S3-based AMI Is terminated, what happens to the data on me root volume? 

A. Data is automatically saved as an E8S volume. 

B. Data is automatically saved as an ESS snapshot. 

C. Data is automatically deleted. 

D. Data is unavailable until the instance is restarted. 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ComponentsAMIs.html 

Q6. - (Topic 3) 

A user is planning to schedule a backup for an EBS volume. The user wants security of the snapshot data. How can the user achieve data encryption with a snapshot? 

A. Use encrypted EBS volumes so that the snapshot will be encrypted by AWS 

B. While creating a snapshot select the snapshot with encryption 

C. By default the snapshot is encrypted by AWS 

D. Enable server side encryption for the snapshot using S3 

Answer:

Explanation: 

AWS EBS supports encryption of the volume. It also supports creating volumes from existing snapshots provided the snapshots are created from encrypted volumes. The data at rest, the I/O as well as all the snapshots of the encrypted EBS will also be encrypted. EBS encryption is based on the AES-256 cryptographic algorithm, which is the industry standard. 

Q7. - (Topic 3) 

A user has launched two EBS backed EC2 instances in the US-East-1a region. The user wants to change the zone of one of the instances. How can the user change it? 

A. The zone can only be modified using the AWS CLI 

B. It is not possible to change the zone of an instance after it is launched 

C. Stop one of the instances and change the availability zone 

D. From the AWS EC2 console, select the Actions - > Change zones and specify the new zone 

Answer:

Explanation: 

With AWS EC2, when a user is launching an instance he can select the availability zone (AZ. at the time of launch. If the zone is not selected, AWS selects it on behalf of the user. Once the instance is launched, the user cannot change the zone of that instance unless he creates an AMI of that instance and launches a new instance from it. 

Q8. - (Topic 3) 

A user is trying to setup a security policy for ELB. The user wants ELB to meet the cipher supported by the client by configuring the server order preference in ELB security policy. Which of the below mentioned 

preconfigured policies supports this feature? 

A. ELBSecurity Policy-2014-01 

B. ELBSecurity Policy-2011-08 

C. ELBDefault Negotiation Policy 

D. ELBSample- OpenSSLDefault Cipher Policy 

Answer:

Explanation: 

Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. If the load balancer is configured to support the Server Order Preference, then the load balancer gets to select the first cipher in its list that matches any one of the ciphers in the client's list. When the user verifies the preconfigured policies supported by ELB, the policy “ELBSecurity Policy-2014-01” supports server order preference. 

Q9. - (Topic 3) 

A user is measuring the CPU utilization of a private data centre machine every minute. The machine provides the aggregate of data every hour, such as Sum of data”, “Min value”, “Max value, and “Number of Data points”. 

The user wants to send these values to CloudWatch. How can the user achieve this? 

A. Send the data using the put-metric-data command with the aggregate-values parameter 

B. Send the data using the put-metric-data command with the average-values parameter 

C. Send the data using the put-metric-data command with the statistic-values parameter 

D. Send the data using the put-metric-data command with the aggregate –data parameter 

Answer:

Explanation: 

AWS CloudWatch supports the custom metrics. The user can always capture the custom data and upload the data to CloudWatch using CLI or APIs. The user can publish the data to CloudWatch as single data points or as an aggregated set of data points called a statistic set using the command put-metric-data. When sending the aggregate data, the user needs to send it with the parameter statistic-values: awscloudwatch put-metric-data --metric-name <Name> --namespace <Custom namespace> --timestamp <UTC Format> --statistic-values Sum=XX,Minimum=YY,Maximum=AA,SampleCount=BB --unit Milliseconds 

Q10. - (Topic 1) 

Your organization's security policy requires that all privileged users either use frequently rotated passwords or one-time access credentials in addition to username/password. 

Which two of the following options would allow an organization to enforce this policy for AWS users? 

Choose 2 answers 

A. Configure multi-factor authentication for privileged 1AM users 

B. Create 1AM users for privileged accounts 

C. Implement identity federation between your organization's Identity provider leveraging the 1AM Security Token Service 

D. Enable the 1AM single-use password policy option for privileged users 

Answer: C,D 

Q11. - (Topic 3) 

A user has created an Auto Scaling group with default configurations from CLI. The user wants to setup the CloudWatch alarm on the EC2 instances, which are launched by the Auto Scaling group. The user has setup an alarm to monitor the CPU utilization every minute. Which of the below mentioned statements is true? 

A. It will fetch the data at every minute but the four data points [corresponding to 4 minutes] will not have value since the EC2 basic monitoring metrics are collected every five minutes 

B. It will fetch the data at every minute as detailed monitoring on EC2 will be enabled by the default launch configuration of Auto Scaling 

C. The alarm creation will fail since the user has not enabled detailed monitoring on the EC2 instances 

D. The user has to first enable detailed monitoring on the EC2 instances to support alarm monitoring at every minute 

Answer:

Explanation: 

CloudWatch is used to monitor AWS as well as the custom services. To enable detailed instance monitoring for a new Auto Scaling group, the user does not need to take any extra steps. When the user creates an Auto Scaling launch config using CLI, each launch configuration contains a flag named InstanceMonitoring.Enabled. The default value of this flag is true. Thus, by default detailed monitoring will be enabled for Auto Scaling as well as for all the instances launched by that Auto Scaling group. 

Q12. - (Topic 2) 

A user wants to make so that whenever the CPU utilization of the AWS EC2 instance is above 90%, the redlight of his bedroom turns on. Which of the below mentioned AWS services is helpful for this purpose? 

A. AWS CloudWatch + AWS SES 

B. AWS CloudWatch + AWS SNS 

C. None. It is not possible to configure the light with the AWS infrastructure services 

D. AWS CloudWatch and a dedicated software turning on the light 

Answer:

Explanation: 

Amazon Simple Notification Service (Amazon SNS. is a fast, flexible, and fully managed push messaging service. Amazon SNS can deliver notifications by SMS text message or email to the Amazon Simple Queue Service (SQS. queues or to any HTTP endpoint. The user can configure some sensor devices at his home which receives data on the HTTP end point (REST calls. and turn on the red light. The user can configure the CloudWatch alarm to send a notification to the AWS SNS HTTP end point (the sensor device. and it will turn the light red when there is an alarm condition. 

Q13. - (Topic 3) 

You have private video content in S3 that you want to serve to subscribed users on the Internet. User IDs, credentials, and subscriptions are stored in an Amazon RDS database. 

Which configuration will allow you to securely serve private content to your users? 

A. Generate pre-signed URLs for each user as they request access to protected S3 content 

B. Create an IAM user for each subscribed user and assign the GetObject permission to each IAM user 

C. Create an S3 bucket policy that limits access to your private content to only your subscribed users' credentials 

D. Create a CloudFront Origin Identity user for your subscribed users and assign the GetObject permission to this user 

Answer:

Explanation: Reference: 

https://java.awsblog.com/post/Tx1VE22EWFR4H86/Accessing-Private-Content-in-Amazon-CloudFront 

Q14. - (Topic 2) 

A user has launched a large EBS backed EC2 instance in the US-East-1a region. The user wants to achieve Disaster Recovery (DR. for that instance by creating another small instance in Europe. How can the user achieve DR? 

A. Copy the running instance using the “Instance Copy” command to the EU region 

B. Create an AMI of the instance and copy the AMI to the EU region. Then launch the instance from the EU AMI 

C. Copy the instance from the US East region to the EU region 

D. Use the “Launch more like this” option to copy the instance from one region to another 

Answer:

Explanation: 

To launch an EC2 instance it is required to have an AMI in that region. If the AMI is not available in that region, then create a new AMI or use the copy command to copy the AMI from one region to the other region. 

Q15. - (Topic 3) 

An organization has launched 5 instances: 2 for production and 3 for testing. The organization wants that one particular group of IAM users should only access the test instances and not the production ones. How can the organization set that as a part of the policy? 

A. Launch the test and production instances in separate regions and allow region wise access to the group 

B. Define the IAM policy which allows access based on the instance ID 

C. Create an IAM policy with a condition which allows access to only small instances 

D. Define the tags on the test and production servers and add a condition to the IAM policy which allows access to specific tags 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. The user can add conditions as a part of the IAM policies. The condition can be set on AWS Tags, Time, and Client IP as well as on various parameters. If the organization wants the user to access only specific instances he should define proper tags and add to the IAM policy condition. 

The sample policy is shown below. 

"Statement": [ 

"Action": "ec2:*", 

"Effect": "Allow", 

"Resource": "*", 

"Condition": { 

"StringEquals": { 

"ec2:ResourceTag/InstanceType": "Production" 

Q16. - (Topic 3) 

A user wants to find the particular error that occurred on a certain date in the AWS MySQL RDS DB. Which of the below mentioned activities may help the user to get the data easily? 

A. It is not possible to get the log files for MySQL RDS 

B. Find all the transaction logs and query on those records 

C. Direct the logs to the DB table and then query that table 

D. Download the log file to DynamoDB and search for the record 

Answer:

Explanation: 

The user can view, download, and watch the database logs using the Amazon RDS console, the Command Line Interface (CLI. or the Amazon RDS API. For the MySQL RDS, the user can view the error log, slow query log, and general logs. The user can also view the MySQL logs easily by directing the logs to a database table in the main database and querying that table. 

START AWS-SysOps EXAM