AWS-SysOps Premium Bundle

AWS-SysOps Premium Bundle

AWS Certified SysOps Administrator Associate Certification Exam

4.5 
(36810 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Amazon AWS-SysOps Free Practice Questions

Q1. - (Topic 3) 

A user is planning to use AWS services for his web application. If the user is trying to set up his own billing management system for AWS, how can he configure it? 

A. Set up programmatic billing access. Download and parse the bill as per the requirement 

B. It is not possible for the user to create his own billing management service with AWS 

C. Enable the AWS CloudWatch alarm which will provide APIs to download the alarm data 

D. Use AWS billing APIs to download the usage report of each service from the AWS billing console 

Answer:

Explanation: 

AWS provides an option to have programmatic access to billing. Programmatic Billing Access leverages the existing Amazon Simple Storage Service (Amazon S3. APIs. Thus, the user can build applications that reference his billing data from a CSV (comma-separated value. file stored in an Amazon S3 bucket. AWS will upload the bill to the bucket every few hours and the user can download the bill CSV from the bucket, parse itand create a billing system as per the requirement. 

Q2. - (Topic 3) 

A user has configured ELB with a TCP listener at ELB as well as on the back-end instances. The user wants to enable a proxy protocol to capture the source and destination IP information in the header. Which of the below mentioned statements helps the user understand a proxy protocol with TCP configuration? 

A. If the end user is requesting behind a proxy server then the user should not enable a proxy protocol on ELB 

B. ELB does not support a proxy protocol when it is listening on both the load balancer and the back-end instances 

C. Whether the end user is requesting from a proxy server or directly, it does not make a difference for the proxy protocol 

D. If the end user is requesting behind the proxy then the user should add the “isproxy” flag to the ELB Configuration 

Answer:

Explanation: 

When the user has configured Transmission Control Protocol (TCP. or Secure Sockets Layer (SSL. for both front-end and back-end connections of the Elastic Load Balancer, the load balancer forwards the request to the back-end instances without modifying the request headers unless the proxy header is enabled. If the end user is requesting from a Proxy Protocol enabled proxy server, then the ELB admin should not enable the Proxy Protocol on the load balancer. If the Proxy Protocol is enabled on both the proxy server and the load balancer, the load balancer will add another header to the request which already has a header from the proxy server. This duplication may result in errors. 

Q3. - (Topic 1) 

You have decided to change the Instance type for instances running In your application tier that are using Auto Scaling. 

In which area below would you change the instance type definition? 

A. Auto Scaling launch configuration 

B. Auto Scaling group 

C. Auto Scaling policy 

D. Auto Scaling tags 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/AutoScaling/latest/DeveloperGuide/WhatIsAutoScaling.html 

Q4. - (Topic 2) 

A user is planning to setup notifications on the RDS DB for a snapshot. Which of the below mentioned event categories is not supported by RDS for this snapshot source type? 

A. Backup 

B. Creation 

C. Deletion 

D. Restoration 

Answer:

Explanation: 

Amazon RDS uses the Amazon Simple Notification Service to provide a notification when an Amazon RDS event occurs. Event categories for a snapshot source type include: Creation, Deletion, and Restoration. The Backup is a part of DB instance source type. 

Q5. - (Topic 3) 

A sys admin is using server side encryption with AWS S3. Which of the below mentioned statements helps the user understand the S3 encryption functionality? 

A. The server side encryption with the user supplied key works when versioning is enabled 

B. The user can use the AWS console, SDK and APIs to encrypt or decrypt the content for server side encryption with the user supplied key 

C. The user must send an AES-128 encrypted key 

D. The user can upload his own encryption key to the S3 console 

Answer:

Explanation: 

AWS S3 supports client side or server side encryption to encrypt all data at rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key. The encryption with the user supplied key (SSE-C. does not work with the AWS console. The S3 does not store the keys and the user has to send a key with each request. The SSE-C works when the user has enabled versioning. 

Q6. - (Topic 1) 

You are tasked with setting up a cluster of EC2 Instances for a NoSQL database. The database requires random read IO disk performance up to a 100,000 IOPS at 4KB block side per node. 

Which of the following EC2 instances will perform the best for this workload? 

A. A High-Memory Quadruple Extra Large (m2.4xlarge) with EBS-Optimized set to true and a PIOPs EBS volume 

B. A Cluster Compute Eight Extra Large (cc2.8xlarge) using instance storage 

C. High I/O Quadruple Extra Large (hi1.4xlarge) using instance storage 

D. A Cluster GPU Quadruple Extra Large (cg1.4xlarge) using four separate 4000 PIOPS EBS volumes in a RAID 0 configuration 

Answer:

Explanation: Explanation: Reference: 

http://aws.amazon.com/ec2/instance-types/ 

Q7. - (Topic 3) 

An organization has applied the below mentioned policy on an IAM group which has selected the IAM users. What entitlements do the IAM users avail with this policy? 

"Version": "2012-10-17", 

"Statement": [ 

"Effect": "Allow", 

"Action": "*", 

"Resource": "*" 

A. The policy is not created correctly. It will throw an error for wrong resource name 

B. The policy is for the group. Thus, the IAM user cannot have any entitlement to this 

C. It allows full access to all AWS services for the IAM users who are a part of this group 

D. If this policy is applied to the EC2 resource, the users of the group will have full access to the EC2 Resources 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. The IAM group allows the organization to specify permissions for a collection of users. With the below mentioned policy, it will allow the group full access (Admin. to all AWS services. 

"Version": "2012-10-17", 

"Statement": [ 

"Effect": "Allow", 

"Action": "*", 

"Resource": "*" 

Q8. - (Topic 3) 

A user is having data generated randomly based on a certain event. The user wants to upload that data to CloudWatch. It may happen that event may not have data generated for some period due to andomness. Which of the below mentioned options is a recommended option for this case? 

A. For the period when there is no data, the user should not send the data at all 

B. For the period when there is no data the user should send a blank value 

C. For the period when there is no data the user should send the value as 0 

D. The user must upload the data to CloudWatch as having no data for some period will cause an error at CloudWatch monitoring 

Answer:

Explanation: 

AWS CloudWatch supports the custom metrics. The user can always capture the custom data and upload the data to CloudWatch using CLI or APIs. When the user data is more random and not generated at regular intervals, there can be a period which has no associated data. The user can either publish the zero (0. Value for that period or not publish the data at all. It is recommended that the user should publish zero instead of no value to monitor the health of the application. This is helpful in an alarm as well as in the generation of the sample data count. 

Q9. - (Topic 2) 

A user has created an ELB with Auto Scaling. Which of the below mentioned offerings from ELB helps the user to stop sending new requests traffic from the load balancer to the EC2 instance when the instance is being deregistered while continuing in-flight requests? 

A. ELB sticky session 

B. ELB deregistration check 

C. ELB connection draining 

D. ELB auto registration Off 

Answer:

Explanation: 

The Elastic Load Balancer connection draining feature causes the load balancer to stop sending new requests to the back-end instances when the instances are deregistering or become unhealthy, while ensuring that inflight requests continue to be served. 

Q10. - (Topic 1) 

Which of the following requires a custom CloudWatch metric to monitor? 

A. Data transfer of an EC2 instance 

B. Disk usage activity of an EC2 instance 

C. Memory Utilization of an EC2 instance 

D. CPU Utilization of an EC2 instance 

Answer:

Explanation: Reference: 

http://aws.amazon.com/cloudwatch/ 

Q11. - (Topic 2) 

A user has created a web application with Auto Scaling. The user is regularly monitoring the application and he observed that the traffic is highest on Thursday and Friday between 8 AM to 6 PM. What is the best solution to handle scaling in this case? 

A. Add a new instance manually by 8 AM Thursday and terminate the same by 6 PM Friday 

B. Schedule Auto Scaling to scale up by 8 AM Thursday and scale down after 6 PM on Friday 

C. Schedule a policy which may scale up every day at 8 AM and scales down by 6 PM 

D. Configure a batch process to add a instance by 8 AM and remove it by Friday 6 PM 

Answer:

Explanation: 

Auto Scaling based on a schedule allows the user to scale the application in response to predictable load changes. In this case the load increases by Thursday and decreases by Friday. Thus, the user can setup the scaling activity based on the predictable traffic patterns of the web application using Auto Scaling scale by Schedule. 

Q12. - (Topic 1) 

What is a placement group? 

A. A collection of Auto Scaling groups in the same Region 

B. Feature that enables EC2 instances to interact with each other via nigh bandwidth, low latency connections 

C. A collection of Elastic Load Balancers in the same Region or Availability Zone 

D. A collection of authorized Cloud Front edge locations for a distribution 

Answer:

Explanation: Reference: 

http://aws.amazon.com/ec2/faqs/ 

Q13. - (Topic 3) 

How can you secure data at rest on an EBS volume? 

A. Encrypt the volume using the S3 server-side encryption service. 

B. Attach the volume to an instance using EC2's SSL interface. 

C. Create an IAM policy that restricts read and write access to the volume. 

D. Write the data randomly instead of sequentially. 

E. Use an encrypted file system m top of the EBS volume. 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/IAM/latest/UserGuide/policies_examples.html 

Q14. - (Topic 3) 

A user has configured ELB with Auto Scaling. The user suspended the Auto Scaling AddToLoadBalancer 

(which adds instances to the load balancer. process for a while. What will happen to the instances launched during the suspension period? 

A. The instances will not be registered with ELB and the user has to manually register when the process is resumed 

B. The instances will be registered with ELB only once the process has resumed 

C. Auto Scaling will not launch the instance during this period due to process suspension 

D. It is not possible to suspend only the AddToLoadBalancer process 

Answer:

Explanation: 

Auto Scaling performs various processes, such as Launch, Terminate, add to Load Balancer etc. The user can also suspend the individual process. The AddToLoadBalancer process type adds instances to the load balancer when the instances are launched. If this process is suspended, Auto Scaling will launch the instances but will not add them to the load balancer. When the user resumes this process, Auto Scaling will resume adding new instances launched after resumption to the load balancer. However, it will not add running instances that were launched while the process was suspended; those instances must be added manually. 

Q15. - (Topic 1) 

You have two Elastic Compute Cloud (EC2) instances inside a Virtual Private Cloud (VPC) in the same Availability Zone (AZ) but in different subnets. One instance is running a database and the other instance an application that will interface with the database. You want to confirm that they can talk to each other for your application to work properly. 

Which two things do we need to confirm in the VPC settings so that these EC2 instances can communicate inside the VPC? Choose 2 answers 

A. A network ACL that allows communication between the two subnets. 

B. Both instances are the same instance class and using the same Key-pair. 

C. That the default route is set to a NAT instance or internet Gateway (IGW) for them to communicate. 

D. Security groups are set to allow the application host to talk to the database on the right port/protocol. 

Answer: A,D 

Q16. - (Topic 3) 

A user has created a VPC with two subnets: one public and one private. The user is planning to run the patch update for the instances in the private subnet. How can the instances in the private subnet connect to theinternet? 

A. Use the internet gateway with a private IP 

B. Allow outbound traffic in the security group for port 80 to allow internet updates 

C. The private subnet can never connect to the internet 

D. Use NAT with an elastic IP 

Answer:

Explanation: 

A Virtual Private Cloud (VPC. is a virtual network dedicated to the user’s AWS account. A user can create a subnet with VPC and launch instances inside that subnet. If the user has created two subnets (one private and one public., he would need a Network Address Translation (NAT. instance with the elastic IP address. This enables the instances in the private subnet to send requests to the internet (for example, to perform software updates.. 

START AWS-SysOps EXAM