SAA-C01 Premium Bundle

SAA-C01 Premium Bundle

AWS Certified Solutions Architect - Associate Certification Exam

4.5 
(48795 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Amazon-Web-Services SAA-C01 Free Practice Questions

Exambible offers free demo for SAA-C01 exam. "AWS Certified Solutions Architect - Associate", also known as SAA-C01 exam, is a Amazon-Web-Services Certification. This set of posts, Passing the Amazon-Web-Services SAA-C01 exam, will help you answer those questions. The SAA-C01 Questions & Answers covers all the knowledge points of the real exam. 100% real Amazon-Web-Services SAA-C01 exams and revised by experts!

Also have SAA-C01 free dumps questions for you:

NEW QUESTION 1
Which of the following approaches provides the lowest cost for Amazon Elastic Block Store snapshots while giving you the ability to fully restore data?

  • A. Maintain two snapshots: the original snapshot and the latest incremental snapshot.
  • B. Maintain a volume snapshot; subsequent snapshots will overwrite one another
  • C. Maintain a single snapshot the latest snapshot is both Incremental and complete.
  • D. Maintain the most current snapshot, archive the original and incremental to Amazon Glacie

Answer: C

Explanation:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-deleting-snapshot.html

NEW QUESTION 2
You are setting up security groups for both incoming traffic and outgoing traffic in your VPC network on the AWS CLI. Which of the following AWS CLI commands would you use for adding one or more incoming traffic rules to a security group?

  • A. authorize-security-group-egress
  • B. authorize-security-group-ingress
  • C. Grant-EC2SecurityGroupOutgress
  • D. Get-EC2SecurityGroup

Answer: B

Explanation:
When setting up security groups for incoming traffic in your VPC network, to add one or more ingress (incoming traffic) rules to a security group, authorize-security-group-ingress (AWS CLI). ec2-authorize (Amazon EC2 CLI). Grant-EC2SecurityGroupIngress (AWS Tools for Windows PowerShell) In computer networking, ingress filtering is a technique used to make sure that incoming packets are actually
from the networks that they claim to be from. In computer networking, egress filtering is the practice of monitoring and potentially restricting the flow of information outbound from one network to another. Typically, it is information from a private TCP/IP computer network to the Internet that is controlled.
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html

NEW QUESTION 3
How many relational database engines does RDS currently support?

  • A. Three: MySQL, Oracle and Microsoft SQL Server.
  • B. Just two: MySQL and Oracle.
  • C. Six: Amazon Aurora, Oracle, Microsoft SQL Server, PostgreSQL, MySQL and MariaDB.
  • D. Just one: MySQ

Answer: C

Explanation:
Amazon RDS provides you six familiar database engines to choose from, including Amazon Aurora, Oracle, Microsoft SQL Server, PostgreSQL, MySQL and MariaDB. https://aws.amazon.com/rds/?nc1=h_ls
SAA-C01 dumps exhibit

NEW QUESTION 4
You try to connect via SSH to a newly created Amazon EC2 instance and get one of the following error messages:
"Network error: Connection timed out" or "Error connecting to [instance], reason: -> Connection timed out: connect,"
You have confirmed that the network and security group rules are configured correctly and the instance is passing status checks. What steps should you take to identify the source of the behavior? Choose 2 answers

  • A. Verify that the private key file corresponds to the Amazon EC2 key pair assigned at launch.
  • B. Verify that your IAM user policy has permission to launch Amazon EC2 instances.
  • C. Verify that you are connecting with the appropriate user name for your AMI.
  • D. Verify that the Amazon EC2 Instance was launched with the proper IAM role.
  • E. Verify that your federation trust to AWS has been establishe

Answer: AC

NEW QUESTION 5
Which of the following statements is true of tagging an Amazon EC2 resource?

  • A. You don't need to specify the resource identifier while terminating a resource.
  • B. You can terminate, stop, or delete a resource based solely on its tags.
  • C. You can't terminate, stop, or delete a resource based solely on its tags.
  • D. You don't need to specify the resource identifier while stopping a resourc

Answer: C

Explanation:
You can assign tags only to resources that already exist. You can't terminate, stop, or delete a resource based solely on its tags; you must specify the resource identifier.

NEW QUESTION 6
Disabling automated backups disables the point-in-time recovery feature.

  • A. True
  • B. False

Answer: A

NEW QUESTION 7
When will you incur costs with an Elastic IP address (EIP)?

  • A. When an EIP is allocated.
  • B. When it is allocated and associated with a running instance.
  • C. When it is allocated and associated with a stopped instance.
  • D. Costs are incurred regardless of whether the EIP is associated with a running instanc

Answer: C

Explanation:
You are allowed one EIP to be attached to a running instance at no charge. otherwise, it will incur a small fee. in this case, the instance is stopped, and thus, the EIP will be billed at the normal rate. http://aws.amazon.com/ec2/pricing/

NEW QUESTION 8
Making your snapshot public shares all snapshot data with everyone. Can the snapshots with AWS Marketplace product codes be made public?

  • A. No
  • B. Yes

Answer: A

Explanation:
"Making your snapshot public shares all snapshot data with everyone; however, snapshots with AWS Marketplace product codes cannot be made public. Encrypted snapshots cannot be shared between
accounts or made public." http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-modifyingsnapshot- permissions.html
"This is not a valid option for encrypted snapshots or snapshots with AWS Marketplace product codes."

NEW QUESTION 9
The _____ IAM policy element describes the specific action or actions that will be allowed or denied.

  • A. Principal
  • B. Action
  • C. Vendor
  • D. Not Principal

Answer: B

Explanation:
The Action element describes the specific action or actions that will be allowed or denied. Statements must include either an Action or NotAction element. Each AWS service has its own set of actions that describe tasks that you can perform with that service. http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements.html

NEW QUESTION 10
A customer has a single 3-TB volume on-premises that is used to hold a large repository of images
and print layout files. This repository is growing at 500 GB a year and must be presented as a single logical volume. The customer is becoming increasingly constrained with their local storage capacity and wants an off-site backup of this data, while maintaining low-latency access to their frequently accessed data. Which AWS Storage Gateway configuration meets the customer requirements?

  • A. Gateway-Cached volumes with snapshots scheduled to Amazon S3
  • B. Gateway-Stored volumes with snapshots scheduled to Amazon S3
  • C. Gateway-Virtual Tape Library with snapshots to Amazon S3
  • D. Gateway-Virtual Tape Library with snapshots to Amazon Glacier

Answer: A

NEW QUESTION 11
Which of the following is true of Amazon CloudWatch?

  • A. Amazon CloudWatch monitors Amazon Web Services (AWS) resources and the applications that run on AWS in real-time.
  • B. Amazon CloudWatch is a web service that gives businesses an easy and cost effective way to distribute content with low latency and high data transfer speeds.
  • C. Amazon CloudWatch runs code without provisioning or managing servers.
  • D. None of these are tru

Answer: A

Explanation:
Amazon CloudWatch monitors your Amazon Web Services (AWS) resources and the applications you run on AWS in real-time.
You can use CloudWatch to collect and track metrics, which are variables you can measure for your resources and applications. CloudWatch alarms send notifications or automatically make changes to the resources you are monitoring based on rules that you define. For example, you can monitor the CPU usage and disk reads and writes of your Amazon EC2 instances and then use this data to determine whether you should launch additional instances to handle increased load. You can also use this data to stop under-used instances to save money. In addition to monitoring the built-in metrics that come with AWS, you can monitor your own custom metrics.
With CloudWatch, you gain system-wide visibility into resource utilization, application performance, and operational health. http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/WhatIsCloudWatch.html

NEW QUESTION 12
Which of the following activities is NOT performed by the Auto Scaling policy?

  • A. Changing instance types
  • B. Scaling up instance counts
  • C. Maintaining current instance levels
  • D. Scaling down instance counts

Answer: A

Explanation:
Auto Scaling policies can scale up or down based on the user-defined policies, health status checks or schedules. It also performs a health check on the instances, terminates unhealthy instances, and launches healthy instances to maintain the current instance level. Scaling provides you with options, outside of scaling policies, to override attributes from the instance and use the values that you need. For example, you can override the instance type using AWS CLI commands. http://docs.aws.amazon.com/autoscaling/latest/userguide/create-lc-with-instanceID.html

NEW QUESTION 13
Without _____ , you must either create multiple AWS accounts-each with its own billing and subscriptions to AWS products-or your employees must share the security credentials of a single AWS account.

  • A. Amazon RDS
  • B. Amazon Glacier
  • C. Amazon EMR
  • D. Amazon IAM

Answer: D

NEW QUESTION 14
_____ is a fully managed service for real-time processing of streaming data at massive scale.

  • A. AWS Data Pipeline
  • B. Amazon Kinesis
  • C. AWS CloudHSM
  • D. Amazon Elastic Compute Cloud

Answer: B

Explanation:
Amazon Kinesis is a fully managed service for real-time processing of streaming data at massive scale. Amazon Kinesis can collect and process hundreds of terabytes of data per hour from hundreds of thousands of sources, allowing you to easily write applications that process information in realtime from sources such as web site click-streams, marketing and financial information,
manufacturing instrumentation and social media, and operational logs and metering data. http://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/kinesis.html

NEW QUESTION 15
You're trying to delete an SSL certificate from the IAM certificate store, and you're getting the message "Certificate: <certificate-id> is being used by CloudFront." Which of the following statements is probably the reason why you are getting this error?

  • A. Before you can delete an SSL certificate, you need to either rotate SSL certificates or revert from using a custom SSL certificate to using the default CloudFront certificate.
  • B. You can't delete SSL certificate
  • C. You need to request it from AWS.
  • D. Before you can delete an SSL certificate, you need to set up the appropriate access level in IAM
  • E. Before you can delete an SSL certificate you need to set up https on your serve

Answer: A

Explanation:
CloudFront is a web service that speeds up distribution of your static and dynamic web content, for example, .html, .css, .php, and image files, to end users. Every CloudFront web distribution must be associated either with the default CloudFront certificate or with a custom SSL certificate.
Before you can delete an SSL certificate, you need to either rotate SSL certificates (replace the
current custom SSL certificate with another custom SSL certificate) or revert from using a custom SSL certificate to using the default CloudFront certificate.

NEW QUESTION 16
The one-time payment for Reserved Instances is ____ refundable if the reservation is cancelled.

  • A. always
  • B. in some circumstances
  • C. never

Answer: C

Explanation:
the one-time fee is non-refundable.
https://aws.amazon.com/ec2/purchasing-options/reserved-instances/buyer/
SAA-C01 dumps exhibit

NEW QUESTION 17
In order to optimize performance for a compute cluster that requires low inter-node latency, which of the following feature should you use?

  • A. Multiple Availability Zones
  • B. AWS Direct Connect
  • C. EC2 Dedicated Instances
  • D. Placement Groups
  • E. VPC private subnets

Answer: D

Explanation:
A placement group is a logical grouping of instances within a single Availability Zone. Using placement groups enables applications to participate in a low-latency, 10 Gigabits per second (Gbps) network. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/placement-groups.html References:

NEW QUESTION 18
By default, EBS volumes that are created and attached to an instance at launch are deleted when that instance is terminated. You can modify this behavior by changing the value of the flag to false when you launch the instance

  • A. DeleteOnTermination
  • B. RemoveOnDeletion
  • C. RemoveOnTermination
  • D. TerminateOnDeletion

Answer: A

Explanation:
By default, Amazon EBS root device volumes are automatically deleted when the instance terminates. However, by default, any additional EBS volumes that you attach at launch, or any EBS volumes that you attach to an existing instance persist even after the instance terminates.
This behavior is controlled by the volume’s DeleteOnTermination attribute, which you can modify. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/terminating-instances.html

NEW QUESTION 19
Amazon RDS DB snapshots and automated backups are stored in

  • A. Amazon S3
  • B. Amazon ECS Volume
  • C. Amazon RDS
  • D. Amazon EMR

Answer: A

NEW QUESTION 20
When automatic failover occurs, Amazon RDS will emit a DB Instance event to inform you that automatic failover occurred. You can use the ____ to return information about events related to your DB Instance

  • A. FetchFailure
  • B. DescriveFailure
  • C. DescribeEvents
  • D. FetchEvents

Answer: C

Explanation:
Q: Will I be alerted when automatic failover occurs?
Yes, Amazon RDS will emit a DB Instance event to inform you that automatic failover occurred. You can use the DescribeEvents to return information about events related to your DB Instance, or click the "DB Events" section of the AWS Management Console
https://aws.amazon.com/rds/faqs/

NEW QUESTION 21
Is Federated Storage Engine currently supported by Amazon RDS for MySQL?

  • A. Only for Oracle RDS instances
  • B. No
  • C. Yes
  • D. Only in VPC

Answer: B

NEW QUESTION 22
What does Amazon ELB stand for?

  • A. Elastic Linux Box.
  • B. Encrypted Linux Box.
  • C. Encrypted Load Balancing.
  • D. Elastic Load Balancin

Answer: D

NEW QUESTION 23
What is a security group in Amazon AWS?

  • A. A UNIX Group that gives permission to edit security settings
  • B. An authorized group of instances that control access to other resources
  • C. A virtual firewall that controls the traffic for one or more instances
  • D. An Access Control List (ACL) for AWS resources

Answer: C

Explanation:
A security group acts as a virtual firewall that controls the traffic for one or more instances. When you launch an instance, you associate one or more security groups with the instance. You add rules to each security group that allow traffic to or from its associated instances. You can modify the rules for a security group at any time; the new rules are automatically applied to all instances that are associated with the security group. When we decide whether to allow traffic to reach an instance, we
evaluate all the rules from all the security groups that are associated with the instance. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html

NEW QUESTION 24
AWS IAM permissions can be assigned in two ways:

  • A. as role-based or as resource-based.
  • B. as identity-based or as resource-based.
  • C. as security group-based or as key-based.
  • D. as user-based or as key-base

Answer: B

Explanation:
Permissions can be assigned in two ways: as identity-based or as resource-based. Identity-based, or IAM permissions are attached to an IAM user, group, or role and let you specify what that user, group, or role can do. For example, you can assign permissions to the IAM user named Bob, stating that he has permission to use the Amazon Elastic Compute Cloud (Amazon EC2) RunInstances action and that he has permission to get items from an Amazon DynamoDB table named MyCompany. The user Bob might also be granted access to manage his own IAM security credentials. Identity-based permissions can be managed or inline. Resource-based permissions are attached to a resource. You
can specify resource-based permissions for Amazon S3 buckets, Amazon Glacier vaults, Amazon SNS topics, Amazon SQS queues, and AWS Key Management Service encryption keys. Resource-based permissions let you specify who has access to the resource and what actions they can perform on it. Resource-based policies are inline only, not managed. http://docs.aws.amazon.com/IAM/latest/UserGuide/access_permissions.html

NEW QUESTION 25
An AWS customer is deploying an application mat is composed of an AutoScaling group of EC2 Instances.
The customers’ security policy requires that every outbound connection from these instances to any other service within the customers
Virtual Private Cloud must be authenticated using a unique x 509 certificate that contains the specific instance-id.
In addition, an x 509 certificates must Designed by the customer's Key management service in order to be trusted for authentication.
Which of the following configurations will support these requirements?

  • A. Configure an IAM Role that grants access to an Amazon S3 object containing a signed certificate and configure me Auto Scaling group to launch instances with this role Have the instances bootstrap get the certificate from Amazon S3 upon first boot.
  • B. Embed a certificate into the Amazon Machine Image that is used by the Auto Scaling group Have the launched instances generate a certificate signature request with the instance's assigned instanceid to the Key management service for signature.
  • C. Configure the Auto Scaling group to send an SNS notification of the launch of a new instance to the trusted key management servic
  • D. Have the Key management service generate a signed certificateand send it directly to the newly launched instance.
  • E. Configure the launched instances to generate a new certificate upon first boot Have the Key management service poll the AutoScaling group for associated instances and send new instances a certificate signature (hat contains the specific instance-id.

Answer: A

Explanation:
http://jayendrapatil.com/tag/iam/

NEW QUESTION 26
......

100% Valid and Newest Version SAA-C01 Questions & Answers shared by Surepassexam, Get Full Dumps HERE: https://www.surepassexam.com/SAA-C01-exam-dumps.html (New 288 Q&As)


START SAA-C01 EXAM