AWS-SysOps Premium Bundle

AWS-SysOps Premium Bundle

AWS Certified SysOps Administrator Associate Certification Exam

4.5 
(1125 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Amazon AWS-SysOps Free Practice Questions

Q1. - (Topic 2) 

A user has created a VPC with CIDR 20.0.0.0/16 with only a private subnet and VPN connection using the VPC wizard. The user wants to connect to the instance in a private subnet over SSH. How should the user define the security rule for SSH? 

A. Allow Inbound traffic on port 22 from the user’s network B. The user has to create an instance in EC2 Classic with an elastic IP and configure the security group of a private subnet to allow SSH from that elastic IP 

C. The user can connect to a instance in a private subnet using the NAT instance 

D. Allow Inbound traffic on port 80 and 22 to allow the user to connect to a private subnet over the Internet 

Answer:

Explanation: 

The user can create subnets as per the requirement within a VPC. If the user wants to connect VPC from his own data centre, the user can setup a case with a VPN only subnet (private. which uses VPN access to connect with his data centre. When the user has configured this setup with Wizard, all network connections to the instances in the subnet will come from his data centre. The user has to configure the security group of the private subnet which allows the inbound traffic on SSH (port 22. from the data centre’s network range. 

Q2. - (Topic 2) 

A user has created an S3 bucket which is not publicly accessible. The bucket is having thirty objects which are also private. If the user wants to make the objects public, how can he configure this with minimal efforts? 

A. The user should select all objects from the console and apply a single policy to mark them public 

B. The user can write a program which programmatically makes all objects public using S3 SDK 

C. Set the AWS bucket policy which marks all objects as public 

D. Make the bucket ACL as public so it will also mark all objects as public 

Answer:

Explanation: 

A system admin can grant permission of the S3 objects or buckets to any user or make the objects public using the bucket policy and user policy. Both use the JSON-based access policy language. Generally if the user is defining the ACL on the bucket, the objects in the bucket do not inherit it and vice a versa. The bucket policy can be defined at the bucket level which allows the objects as well as the bucket to be public with a single policy applied to that bucket. 

Q3. - (Topic 1) 

Your team Is excited about the use of AWS because now they have access to programmable Infrastructure" You have been asked to manage your AWS infrastructure In a manner similar to the way you might manage application code You want to be able to deploy exact copies of different versions of your infrastructure, stage changes into different environments, revert back to previous versions, and identify what versions are running at any particular time (development test QA. production). 

Which approach addresses this requirement? 

A. Use cost allocation reports and AWS Opsworks to deploy and manage your infrastructure. 

B. Use AWS CloudWatch metrics and alerts along with resource tagging to deploy and manage your infrastructure. 

C. Use AWS Beanstalk and a version control system like GIT to deploy and manage your infrastructure. 

D. Use AWS CloudFormation and a version control system like GIT to deploy and manage your infrastructure. 

Answer:

Explanation: Reference: 

http://aws.amazon.com/opsworks/faqs/ 

Q4. - (Topic 3) 

A user is trying to launch an EBS backed EC2 instance under free usage. The user wants to achieve 

encryption of the EBS volume. How can the user encrypt the data at rest? 

A. Use AWS EBS encryption to encrypt the data at rest 

B. The user cannot use EBS encryption and has to encrypt the data manually or using a third party tool 

C. The user has to select the encryption enabled flag while launching the EC2 instance 

D. Encryption of volume is not available as a part of the free usage tier 

Answer:

Explanation: 

AWS EBS supports encryption of the volume while creating new volumes. It supports encryption of the data at rest, the I/O as well as all the snapshots of the EBS volume. The EBS supports encryption for the selected instance type and the newer generation instances, such as m3, c3, cr1, r3, g2. It is not supported with a micro instance. 

Q5. - (Topic 3) 

A user is configuring the Multi AZ feature of an RDS DB. The user came to know that this RDS DB does not use the AWS technology, but uses server mirroring to achieve HA. Which DB is the user using right now? 

A. My SQL 

B. Oracle 

C. MS SQL 

D. PostgreSQL 

Answer:

Explanation: 

Amazon RDS provides high availability and failover support for DB instances using Multi AZ deployments. In a Multi AZ deployment, Amazon RDS automatically provisions and maintains a synchronous standby replica in a different Availability Zone. Multi AZ deployments for Oracle, PostgreSQL, and MySQL DB instances use Amazon technology, while SQL Server (MS SQL. DB instances use SQL Server Mirroring. 

Q6. - (Topic 1) 

You have been asked to leverage Amazon VPC BC2 and SOS to implement an application that submits and receives millions of messages per second to a message queue. You want to ensure your application has sufficient bandwidth between your EC2 instances and SQS Which option will provide the most scalable solution for communicating between the application and SQS? 

A. Ensure the application instances are properly configured with an Elastic Load Balancer 

B. Ensure the application instances are launched in private subnets with the EBS-optimized option enabled 

C. Ensure the application instances are launched in public subnets with the associate-public-IP-address=true option enabled 

D. Launch application instances in private subnets with an Auto Scaling group and Auto Scaling triggers configured to watch the SQS queue size 

Answer:

Explanation: Reference: 

http://www.cardinalpath.com/autoscaling-your-website-with-amazon-web-services-part-2/ 

Q7. - (Topic 2) 

A user has created a photo editing software and hosted it on EC2. The software accepts requests from the user about the photo format and resolution and sends a message to S3 to enhance the picture accordingly.Which of the below mentioned AWS services will help make a scalable software with the AWS infrastructure in this scenario? 

A. AWS Glacier 

B. AWS Elastic Transcoder 

C. AWS Simple Notification Service 

D. AWS Simple Queue Service 

Answer:

Explanation: 

Amazon Simple Queue Service (SQS. is a fast, reliable, scalable, and fully managed message queuing service. SQS provides a simple and cost-effective way to decouple the components of an application. The user can configure SQS, which will decouple the call between the EC2 application and S3. Thus, the application does not keep waiting for S3 to provide the data. 

Q8. - (Topic 3) 

A user has configured Auto Scaling with 3 instances. The user had created a new AMI after updating one of the instances. If the user wants to terminate two specific instances to ensure that Auto Scaling launches an instances with the new launch configuration, which command should he run? 

A. as-delete-instance-in-auto-scaling-group <Instance ID> --no-decrement-desired-capacity 

B. as-terminate-instance-in-auto-scaling-group <Instance ID> --update-desired-capacity 

C. as-terminate-instance-in-auto-scaling-group <Instance ID> --decrement-desired-capacity 

D. as-terminate-instance-in-auto-scaling-group <Instance ID> --no-decrement-desired-capacity 

Answer:

Explanation: 

The Auto Scaling command as-terminate-instance-in-auto-scaling-group <Instance ID> will terminate the specific instance ID. The user is required to specify the parameter as –no-decrement-desired-capacity to ensure that it launches a new instance from the launch config after terminating the instance. If the user specifies the parameter --decrement-desired-capacity then Auto Scaling will terminate the instance and decrease the desired capacity by 1. 

Q9. - (Topic 2) 

A user has configured an Auto Scaling group with ELB. The user has enabled detailed CloudWatch monitoring on Auto Scaling. Which of the below mentioned statements will help the user understand the functionality better? 

A. It is not possible to setup detailed monitoring for Auto Scaling 

B. In this case, Auto Scaling will send data every minute and will charge the user extra 

C. Detailed monitoring will send data every minute without additional charges 

D. Auto Scaling sends data every minute only and does not charge the user 

Answer:

Explanation: 

CloudWatch is used to monitor AWS as well as the custom services. It provides either basic or detailed monitoring for the supported AWS products. In basic monitoring, a service sends data points to CloudWatch every five minutes, while in detailed monitoring a service sends data points to CloudWatch every minute. Auto Scaling includes 7 metrics and 1 dimension, and sends data to CloudWatch every 5 minutes by default. The user can enable detailed monitoring for Auto Scaling, which sends data to CloudWatch every minute. However, this will have some extra-costs. 

Q10. - (Topic 1) 

You receive a frantic call from a new DBA who accidentally dropped a table containing all your customers. 

Which Amazon RDS feature will allow you to reliably restore your database to within 5 minutes of when the mistake was made? 

A. Multi-AZ RDS 

B. RDS snapshots 

C. RDS read replicas 

D. RDS automated backup 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.BackingUpAndRestoringAmazonRDSInstances.html 

Q11. - (Topic 3) 

A user has configured an HTTPS listener on an ELB. The user has not configured any security policy which can help to negotiate SSL between the client and ELB. What will ELB do in this scenario? 

A. By default ELB will select the first version of the security policy 

B. By default ELB will select the latest version of the policy 

C. ELB creation will fail without a security policy 

D. It is not required to have a security policy since SSL is already installed 

Answer:

Explanation: 

Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. If the user has created an HTTPS/SSL listener without associating any security policy, Elastic Load Balancing will, bydefault, associate the latest version of the ELBSecurityPolicy-YYYY-MM with the load balancer. 

Q12. - (Topic 2) 

An organization is using AWS since a few months. The finance team wants to visualize the pattern of AWS spending. Which of the below AWS tool will help for this requirement? 

A. AWS Cost Manager 

B. AWS Cost Explorer 

C. AWS CloudWatch 

D. AWS Consolidated Billing 

Answer:

Explanation: 

The AWS Billing and Cost Management console includes the Cost Explorer tool for viewing AWS cost data as a graph. It does not charge extra to user for this service. With Cost Explorer the user can filter graphs using resource tags or with services in AWS. If the organization is using Consolidated Billing it helps generate report based on linked accounts. This will help organization to identify areas that require further inquiry. The organization can view trends and use that to understand spend and to predict future costs. 

Q13. - (Topic 3) 

You run a web application with the following components Elastic Load Balancer (EL8), 3 Web/Application servers, 1 MySQL RDS database with read replicas, and Amazon Simple Storage Service (Amazon S3) for static content. Average response time for users is increasing slowly. 

What three CloudWatch RDS metrics will allow you to identify if the database is the bottleneck? Choose 3 answers 

A. The number of outstanding IOs waiting to access the disk. 

B. The amount of write latency. 

C. The amount of disk space occupied by binary logs on the master. 

D. The amount of time a Read Replica DB Instance lags behind the source DB Instance 

E. The average number of disk I/O operations per second. 

Answer: A,B,D 

Q14. - (Topic 1) 

You have been asked to automate many routine systems administrator backup and recovery activities. Your current plan is to leverage AWS-managed solutions as much as possible and automate the rest with the AWS CLI and scripts. 

Which task would be best accomplished with a script? 

A. Creating daily EBS snapshots with a monthly rotation of snapshots 

B. Creating daily RDS snapshots with a monthly rotation of snapshots 

C. Automatically detect and stop unused or underutilized EC2 instances 

D. Automatically add Auto Scaled EC2 instances to an Amazon Elastic Load Balancer 

Answer:

Q15. - (Topic 3) 

A user has launched an EC2 instance from an instance store backed AMI. The user has attached an additional instance store volume to the instance. The user wants to create an AMI from the running instance. Will the AMI have the additional instance store volume data? 

A. Yes, the block device mapping will have information about the additional instance store volume 

B. No, since the instance store backed AMI can have only the root volume bundled 

C. It is not possible to attach an additional instance store volume to the existing instance store backed AMI instance 

D. No, since this is ephermal storage it will not be a part of the AMI 

Answer:

Explanation: 

When the user has launched an EC2 instance from an instance store backed AMI and added an instance store volume to the instance in addition to the root device volume, the block device mapping for the new AMI contains the information for these volumes as well. In addition, the block device mappings for the instances those are launched from the new AMI will automatically contain information for these volumes. 

Q16. - (Topic 3) 

A root account owner has given full access of his S3 bucket to one of the IAM users using the bucket ACL. When the IAM user logs in to the S3 console, which actions can he perform? 

A. He can just view the content of the bucket 

B. He can do all the operations on the bucket 

C. It is not possible to give access to an IAM user using ACL 

D. The IAM user can perform all operations on the bucket using only API/SDK 

Answer:

Explanation: 

Each AWS S3 bucket and object has an ACL (Access Control List. associated with it. An ACL is a list of grants identifying the grantee and the permission granted. The user can use ACLs to grant basic read/write permissions to other AWS accounts. ACLs use an Amazon S3–specific XML schema. The user cannot grant permissions to other users (IAM users. in his account. 

START AWS-SysOps EXAM