AWS-SysOps Premium Bundle

AWS-SysOps Premium Bundle

AWS Certified SysOps Administrator Associate Certification Exam

4.5 
(4095 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Amazon AWS-SysOps Free Practice Questions

Q1. - (Topic 3) 

A user has launched an EC2 instance store backed instance in the US-East-1a zone. The user created AMI #1 and copied it to the Europe region. After that, the user made a few updates to the application running in the US-East-1a zone. The user makes an AMI#2 after the changes. If the user launches a new instance in Europe from the AMI #1 copy, which of the below mentioned statements is true? 

A. The new instance will have the changes made after the AMI copy as AWS just copies the reference of the original AMI during the copying. Thus, the copied AMI will have all the updated data 

B. The new instance will have the changes made after the AMI copy since AWS keeps updating the AMI 

C. It is not possible to copy the instance store backed AMI from one region to another 

D. The new instance in the EU region will not have the changes made after the AMI copy 

Answer:

Explanation: 

Within EC2, when the user copies an AMI, the new AMI is fully independent of the source AMI; there is no link to the original (source. AMI. The user can modify the source AMI without affecting the new AMI and vice a versa. Therefore, in this case even if the source AMI is modified, the copied AMI of the EU region will not have the changes. Thus, after copy the user needs to copy the new source AMI to the destination region to get those changes. 

Q2. - (Topic 2) 

A user has setup an RDS DB with Oracle. The user wants to get notifications when someone modifies the 

security group of that DB. How can the user configure that? 

A. It is not possible to get the notifications on a change in the security group 

B. Configure SNS to monitor security group changes 

C. Configure event notification on the DB security group 

D. Configure the CloudWatch alarm on the DB for a change in the security group 

Answer:

Explanation: 

Amazon RDS uses the Amazon Simple Notification Service to provide a notification when an Amazon RDS event occurs. These events can be configured for source categories, such as DB instance, DB security group, DB snapshot and DB parameter group. If the user is subscribed to a Configuration Change category for a DB security group, he will be notified when the DB security group is changed. 

Q3. - (Topic 3) 

A user has launched 5 instances in EC2-CLASSIC and attached 5 elastic IPs to the five different instances in the US East region. The user is creating a VPC in the same region. The user wants to assign an elastic IP to the VPC instance. How can the user achieve this? 

A. The user has to request AWS to increase the number of elastic IPs associated with the account 

B. AWS allows 10 EC2 Classic IPs per region; so it will allow to allocate new Elastic IPs to the same region 

C. The AWS will not allow to create a new elastic IP in VPC; it will throw an error 

D. The user can allocate a new IP address in VPC as it has a different limit than EC2 

Answer:

Explanation: Section: (none) 

A Virtual Private Cloud (VPC. is a virtual network dedicated to the user’s AWS account. A user can create a subnet with VPC and launch instances inside that subnet. A user can have 5 IP addresses per region with EC2 Classic. The user can have 5 separate IPs with VPC in the same region as it has a separate limit than EC2 Classic. 

Q4. - (Topic 3) 

A system admin is planning to encrypt all objects being uploaded to S3 from an application. The system admin does not want to implement his own encryption algorithm; instead he is planning to use server side encryption by supplying his own key (SSE-C.. Which parameter is not required while making a call for SSE-C? 

A. x-amz-server-side-encryption-customer-key-AES-256 

B. x-amz-server-side-encryption-customer-key 

C. x-amz-server-side-encryption-customer-algorithm 

D. x-amz-server-side-encryption-customer-key-MD5 

Answer:

Explanation: 

AWS S3 supports client side or server side encryption to encrypt all data at rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key (SSE-C.. When the user is supplying his own encryption key, the user has to send the below mentioned parameters as a part of the API calls: x-amz-server-side-encryption-customer-algorithm: Specifies the encryption algorithm x-amz-server-side-encryption-customer-key: To provide the base64-encoded encryption key x-amz-server-side-encryption-customer-key-MD5: To provide the base64-encoded 128-bit MD5 digest of the encryption key 

Q5. - (Topic 3) 

A user has two EC2 instances running in two separate regions. The user is running an internal memory 

management tool, which captures the data and sends it to CloudWatch in US East, using a CLI with the same namespace and metric. Which of the below mentioned options is true with respect to the above statement? 

A. The setup will not work as CloudWatch cannot receive data across regions 

B. CloudWatch will receive and aggregate the data based on the namespace and metric 

C. CloudWatch will give an error since the data will conflict due to two sources 

D. CloudWatch will take the data of the server, which sends the data first 

Answer:

Explanation: 

Amazon CloudWatch does not differentiate the source of a metric when receiving custom data. If the user is publishing a metric with the same namespace and dimensions from different sources, CloudWatch will treat them as a single metric. If the data is coming with the same timezone within a minute, CloudWatch will aggregate the data. It treats these as a single metric, allowing the user to get the statistics, such as minimum, maximum, average, and the sum of all across all servers. 

Q6. - (Topic 2) 

A sys admin has created a shopping cart application and hosted it on EC2. The EC2 instances are running behind ELB. The admin wants to ensure that the end user request will always go to the EC2 instance where the user session has been created. How can the admin configure this? 

A. Enable ELB cross zone load balancing 

B. Enable ELB cookie setup 

C. Enable ELB sticky session 

D. Enable ELB connection draining 

Answer:

Explanation: 

Generally AWS ELB routes each request to a zone with the minimum load. The Elastic Load Balancer provides a feature called sticky session which binds the user’s session with a specific EC2 instance. If the sticky session is enabled the first request from the user will be redirected to any of the EC2 instances. But, henceforth, all requests from the same user will be redirected to the same EC2 instance. This ensures that all requests coming from the user during the session will be sent to the same application instance. 

Q7. - (Topic 3) 

An organization has configured Auto Scaling with ELB. One of the instance health check returns the status as Impaired to Auto Scaling. What will Auto Scaling do in this scenario? 

A. Perform a health check until cool down before declaring that the instance has failed 

B. Terminate the instance and launch a new instance 

C. Notify the user using SNS for the failed state 

D. Notify ELB to stop sending traffic to the impaired instance 

Answer:

Explanation: 

The Auto Scaling group determines the health state of each instance periodically by checking the results of the Amazon EC2 instance status checks. If the instance status description shows any other state other than “running” or the system status description shows impaired, Auto Scaling considers the instance to be unhealthy. Thus, it terminates the instance and launches a replacement. 

Q8. - (Topic 1) 

Your organization's security policy requires that all privileged users either use frequently rotated passwords or one-time access credentials in addition to username/password. 

Which two of the following options would allow an organization to enforce this policy for AWS users? 

Choose 2 answers 

A. Configure multi-factor authentication for privileged 1AM users 

B. Create 1AM users for privileged accounts 

C. Implement identity federation between your organization's Identity provider leveraging the 1AM Security Token Service 

D. Enable the 1AM single-use password policy option for privileged users 

Answer: C,D 

Q9. - (Topic 1) 

You have identified network throughput as a bottleneck on your m1.small EC2 instance when uploading data Into Amazon S3 In the same region. 

How do you remedy this situation? 

A. Add an additional ENI 

B. Change to a larger Instance 

C. Use DirectConnect between EC2 and S3 

D. Use EBS PIOPS on the local volume 

Answer:

Explanation: Reference: 

https://media.amazonwebservices.com/AWS_Amazon_EMR_Best_Practices.pdf 

Q10. - (Topic 3) 

An application you maintain consists of multiple EC2 instances in a default tenancy VPC. This application has undergone an internal audit and has been determined to require dedicated hardware for one instance. Your compliance team has given you a week to move this instance to single-tenant hardware. 

Which process will have minimal impact on your application while complying with this requirement? 

A. Create a new VPC with tenancy=dedicated and migrate to the new VPC 

B. Use ec2-reboot-instances command line and set the parameter "dedicated=true" 

C. Right click on the instance, select properties and check the box for dedicated tenancy 

D. Stop the instance, create an AMI, launch a new instance with tenancy=dedicated, and terminate the old instance 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/AWSEC2/latest/CommandLineReference/ApiReference-cmd-CreateVpc.html 

Q11. - (Topic 1) 

You have a server with a 5O0GB Amazon EBS data volume. The volume is 80% full. You need to back up the volume at regular intervals and be able to re-create the volume in a new Availability Zone in the shortest time possible. All applications using the volume can be paused for a period of a few minutes with no discernible user impact. 

Which of the following backup methods will best fulfill your requirements? 

A. Take periodic snapshots of the EBS volume 

B. Use a third party Incremental backup application to back up to Amazon Glacier 

C. Periodically back up all data to a single compressed archive and archive to Amazon S3 using a parallelized multi-part upload 

D. Create another EBS volume in the second Availability Zone attach it to the Amazon EC2 instance, and use a disk manager to mirror me two disks 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-creating-snapshot.html 

Q12. - (Topic 3) 

A sys admin is trying to understand the sticky session algorithm. Please select the correct sequence of steps, both when the cookie is present and when it is not, to help the admin understand the implementation of the sticky session: 

ELB inserts the cookie in the response ELB chooses the instance based on the load balancing algorithm Check the cookie in the service request The cookie is found in the request The cookie is not found in the request 

A. 3,1,4,2 [Cookie is not Present] & 3,1,5,2 [Cookie is Present] 

B. 3,4,1,2 [Cookie is not Present] & 3,5,1,2 [Cookie is Present] 

C. 3,5,2,1 [Cookie is not Present] & 3,4,2,1 [Cookie is Present] 

D. 3,2,5,4 [Cookie is not Present] & 3,2,4,5 [Cookie is Present] 

Answer:

Explanation: 

Generally AWS ELB routes each request to a zone with the minimum load. The Elastic Load Balancer provides a feature called sticky session which binds the user’s session with a specific EC2 instance. The load balancer uses a special load-balancer-generated cookie to track the application instance for each request. When the load balancer receives a request, it first checks to see if this cookie is present in the request. If so, the request is sent to the application instance specified in the cookie. If there is no cookie, the load balancer chooses an application instance based on the existing load balancing algorithm. A cookie is inserted into the response for binding subsequent requests from the same user to that application instance. 

Q13. - (Topic 2) 

A user has setup an EBS backed instance and a CloudWatch alarm when the CPU utilization is more than 65%. The user has setup the alarm to watch it for 5 periods of 5 minutes each. The CPU utilization is 60% between 9 AM to 6 PM. The user has stopped the EC2 instance for 15 minutes between 11 AM to 11:15 AM. What will be the status of the alarm at 11:30 AM? 

A. Alarm 

B. OK 

C. Insufficient Data 

D. Error 

Answer:

Explanation: 

Amazon CloudWatch alarm watches a single metric over a time period the user specifies and performs one or more actions based on the value of the metric relative to a given threshold over a number of time periods. The state of the alarm will be OK for the whole 

day. When the user stops the instance for three periods the alarm may not receive the data 

Q14. - (Topic 1) 

You are creating an Auto Scaling group whose Instances need to insert a custom metric into CloudWatch. 

Which method would be the best way to authenticate your CloudWatch PUT request? 

A. Create an IAM role with the Put MetricData permission and modify the Auto Scaling launch configuration to launch instances in that role 

B. Create an IAM user with the PutMetricData permission and modify the Auto Scaling launch configuration to inject the userscredentials into the instance User Data 

C. Modify the appropriate Cloud Watch metric policies to allow the Put MetricData permission to instances from the Auto Scaling group 

D. Create an IAM user with the PutMetricData permission and put the credentials in a private repository and have applications on the server pull the credentials as needed 

Answer:

Q15. - (Topic 3) 

You have a proprietary data store on-premises that must be backed up daily by dumping the data store contents to a single compressed 50GB file and sending the file to AWS. Your SLAs state that any dump file backed up within the past 7 days can be retrieved within 2 hours. Your compliance department has stated that all data must be held indefinitely. The time required to restore the data store from a backup is approximately 1 hour. Your on-premise network connection is capable of sustaining 1gbps to AWS. 

Which backup methods to AWS would be most cost-effective while still meeting all of your requirements? 

A. Send the daily backup files to Glacier immediately after being generated 

B. Transfer the daily backup files to an EBS volume in AWS and take daily snapshots of the volume 

C. Transfer the daily backup files to S3 and use appropriate bucket lifecycle policies to send to Glacier 

D. Host the backup files on a Storage Gateway with Gateway-Cached Volumes and take daily snapshots 

Answer:

Explanation: Reference: 

http://aws.amazon.com/storagegateway/faqs/ 

Q16. - (Topic 3) 

A user has created a VPC with public and private subnets using the VPC wizard. Which of the below 

mentioned statements is true in this scenario? 

A. The AWS VPC will automatically create a NAT instance with the micro size 

B. VPC bounds the main route table with a private subnet and a custom route table with a public subnet 

C. The user has to manually create a NAT instance D. VPC bounds the main route table with a public subnet and a custom route table with a private subnet 

Answer:

Explanation: 

A Virtual Private Cloud (VPC. is a virtual network dedicated to the user’s AWS account. A user can create a subnet with VPC and launch instances inside that subnet. If the user has created a public private subnet, the instances in the public subnet can receive inbound traffic directly from the internet, whereas the instances in the private subnet cannot. If these subnets are created with Wizard, AWS will create a NAT instance of a smaller or higher size, respectively. The VPC has an implied router and the VPC wizard updates the main route table used with the private subnet, creates a custom route table and associates it with the public subnet. 

START AWS-SysOps EXAM