getcertified4sure.com

Surprising aws certified sysops administrator associate




Want to know Examcollection aws sysops pdf Exam practice test features? Want to lear more about Amazon AWS Certified SysOps Administrator Associate certification experience? Study Real Amazon aws certified sysops administrator associate answers to Down to date aws sysops exam dumps questions at Examcollection. Gat a success with an absolute guarantee to pass Amazon aws certified sysops administrator associate (AWS Certified SysOps Administrator Associate) test on your first attempt.

Q81. - (Topic 3) 

An organization has created a Queue named “modularqueue” with SQS. The organization is not performing any operations such as SendMessage, ReceiveMessage, DeleteMessage, GetQueueAttributes, SetQueueAttributes, AddPermission, and RemovePermission on the queue. What can happen in this scenario? 

A. AWS SQS sends notification after 15 days for inactivity on queue 

B. AWS SQS can delete queue after 30 days without notification 

C. AWS SQS marks queue inactive after 30 days 

D. AWS SQS notifies the user after 2 weeks and deletes the queue after 3 weeks. 

Answer:

Explanation: 

Amazon SQS can delete a queue without notification if one of the following actions hasn't been performed on it for 30 consecutive days: SendMessage, ReceiveMessage, DeleteMessage, GetQueueAttributes, SetQueueAttributes, AddPermission, and RemovePermission. 


Q82. - (Topic 3) 

A user has configured Auto Scaling with the minimum capacity as 2 and the desired capacity as 2. The user is trying to terminate one of the existing instance with the command: 

as-terminate-instance-in-auto-scaling-group<Instance ID> --decrement-desired-capacity 

What will Auto Scaling do in this scenario? 

A. Terminates the instance and does not launch a new instance 

B. Terminates the instance and updates the desired capacity to 1 

C. Terminates the instance and updates the desired capacity and minimum size to 1 

D. Throws an error 

Answer:

Explanation: 

The Auto Scaling command as-terminate-instance-in-auto-scaling-group <Instance ID> will terminate the specific instance ID. The user is required to specify the parameter as --decrement-desired-capacity. Then Auto Scaling will terminate the instance and decrease the desired capacity by 1. In this case since the minimum size is 2, Auto Scaling will not allow the desired capacity to go below 2. Thus, it will throw an error. 


Q83. - (Topic 3) 

A user has created a VPC with CIDR 20.0.0.0/24. The user has used all the IPs of CIDR and wants to increase the size of the VPC. The user has two subnets: public (20.0.0.0/28. and private (20.0.1.0/28.. How can the user change the size of the VPC? 

A. The user can delete all the instances of the subnet. Change the size of the subnets to 20.0.0.0/32 and 20.0.1.0/32, respectively. Then the user can increase the size of the VPC using CLI 

B. It is not possible to change the size of the VPC once it has been created 

C. The user can add a subnet with a higher range so that it will automatically increase the size of the VPC 

D. The user can delete the subnets first and then modify the size of the VPC 

Answer:

Explanation: 

Once the user has created a VPC, he cannot change the CIDR of that VPC. The user has to terminate all the instances, delete the subnets and then delete the VPC. Create a new VPC with a higher size and launch instances with the newly created VPC and subnets. 


Q84. - (Topic 3) 

An organization has launched 5 instances: 2 for production and 3 for testing. The organization wants that one particular group of IAM users should only access the test instances and not the production ones. How can the organization set that as a part of the policy? 

A. Launch the test and production instances in separate regions and allow region wise access to the group 

B. Define the IAM policy which allows access based on the instance ID 

C. Create an IAM policy with a condition which allows access to only small instances 

D. Define the tags on the test and production servers and add a condition to the IAM policy which allows access to specific tags 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. The user can add conditions as a part of the IAM policies. The condition can be set on AWS Tags, Time, and Client IP as well as on various parameters. If the organization wants the user to access only specific instances he should define proper tags and add to the IAM policy condition. 

The sample policy is shown below. 

"Statement": [ 

"Action": "ec2:*", 

"Effect": "Allow", 

"Resource": "*", 

"Condition": { 

"StringEquals": { 

"ec2:ResourceTag/InstanceType": "Production" 


Q85. - (Topic 3) 

A user has created a VPC with the public and private subnets using the VPC wizard. The VPC has CIDR 

20.0.0.0/16. The public subnet uses CIDR 20.0.1.0/24. The user is planning to host a web server in the public subnet (port 80. and a DB server in the private subnet (port 3306.. The user is configuring a security group for the public subnet (WebSecGrp. and the private subnet (DBSecGrp.. Which of the below mentioned entries is required in the web server security group (WebSecGrp.? 

A. Configure Destination as DB Security group ID (DbSecGrp. for port 3306 Outbound 

B. 80 for Destination 0.0.0.0/0 Outbound 

C. Configure port 3306 for source 20.0.0.0/24 InBound 

D. Configure port 80 InBound for source 20.0.0.0/16 

Answer:

Explanation: 

A user can create a subnet with VPC and launch instances inside that subnet. If the user has created a public private subnet to host the web server and DB server respectively, the user should configure that the instances in the public subnet can receive inbound traffic directly from the internet. Thus, the user should configure port 80 with source 0.0.0.0/0 in InBound. The user should configure that the instance in the public subnet can send traffic to the private subnet instances on the DB port. Thus, the user should configure the DB Amazon AWS-SysOps : Practice Test 

security group of the private subnet (DbSecGrp. as the destination for port 3306 in Outbound. 


Q86. - (Topic 2) 

An organization is using AWS since a few months. The finance team wants to visualize the pattern of AWS spending. Which of the below AWS tool will help for this requirement? 

A. AWS Cost Manager 

B. AWS Cost Explorer 

C. AWS CloudWatch 

D. AWS Consolidated Billing 

Answer:

Explanation: 

The AWS Billing and Cost Management console includes the Cost Explorer tool for viewing AWS cost data as a graph. It does not charge extra to user for this service. With Cost Explorer the user can filter graphs using resource tags or with services in AWS. If the organization is using Consolidated Billing it helps generate report based on linked accounts. This will help organization to identify areas that require further inquiry. The organization can view trends and use that to understand spend and to predict future costs. 


Q87. - (Topic 2) 

An organization is planning to create 5 different AWS accounts considering various security requirements. The organization wants to use a single payee account by using the 

consolidated billing option. Which of the below mentioned statements is true with respect to the above information? 

A. Master (Payee. account will get only the total bill and cannot see the cost incurred by each account 

B. Master (Payee. account can view only the AWS billing details of the linked accounts 

C. It is not recommended to use consolidated billing since the payee account will have access to the linked accounts 

D. Each AWS account needs to create an AWS billing policy to provide permission to the payee account 

Answer:

Explanation: 

AWS consolidated billing enables the organization to consolidate payments for multiple Amazon Web Services (AWS. accounts within a single organization by making a single paying account. Consolidated billing enables the organization to see a combined view of the AWS charges incurred by each account as well as obtain a detailed cost report for each of the individual AWS accounts associated with the paying account. The payee account will not have any other access than billing data of linked accounts. 


Q88. - (Topic 3) 

A user has created a VPC with CIDR 20.0.0.0/16. The user has created one subnet with CIDR 20.0.0.0/16 in this VPC. The user is trying to create another subnet with the same VPC for CIDR 20.0.0.1/24. What will happen in this scenario? 

A. The VPC will modify the first subnet CIDR automatically to allow the second subnet IP range 

B. It is not possible to create a subnet with the same CIDR as VPC 

C. The second subnet will be created 

D. It will throw a CIDR overlaps error 

Answer:

Explanation: 

A Virtual Private Cloud (VPC. is a virtual network dedicated to the user’s AWS account. A user can create a subnet with VPC and launch instances inside that subnet. The user can create a subnet with the same size of VPC. However, he cannot create any other subnet since the CIDR of the second subnet will conflict with the first subnet. 


Q89. - (Topic 3) 

How can you secure data at rest on an EBS volume? 

A. Encrypt the volume using the S3 server-side encryption service. 

B. Attach the volume to an instance using EC2's SSL interface. 

C. Create an IAM policy that restricts read and write access to the volume. 

D. Write the data randomly instead of sequentially. 

E. Use an encrypted file system m top of the EBS volume. 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/IAM/latest/UserGuide/policies_examples.html 


Q90. - (Topic 3) 

Which method can be used to prevent an IP address block from accessing public objects in an S3 bucket? 

A. Create a bucket policy and apply it to the bucket 

B. Create a NACL and attach it to the VPC of the bucket 

C. Create an ACL and apply it to all objects in the bucket 

D. Modify the IAM policies of any users that would access the bucket 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html