getcertified4sure.com

Ultimate Guide: aws sysops exam questions




It is more faster and easier to pass the Amazon aws sysops exam dumps exam by using Certified Amazon AWS Certified SysOps Administrator Associate questuins and answers. Immediate access to the Improve aws sysops dumps Exam and find the same core area aws certified sysops administrator book questions with professionally verified answers, then PASS your exam with a high score now.

Q31. - (Topic 3) 

A user is trying to setup a security policy for ELB. The user wants ELB to meet the cipher supported by the client by configuring the server order preference in ELB security policy. Which of the below mentioned 

preconfigured policies supports this feature? 

A. ELBSecurity Policy-2014-01 

B. ELBSecurity Policy-2011-08 

C. ELBDefault Negotiation Policy 

D. ELBSample- OpenSSLDefault Cipher Policy 

Answer:

Explanation: 

Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. If the load balancer is configured to support the Server Order Preference, then the load balancer gets to select the first cipher in its list that matches any one of the ciphers in the client's list. When the user verifies the preconfigured policies supported by ELB, the policy “ELBSecurity Policy-2014-01” supports server order preference. 


Q32. - (Topic 3) 

When an EC2 instance mat is backed by an S3-Dased AMI is terminated, what happens to the data on the root volume? 

A. Data is automatically deleted 

B. Data is automatically saved as an EBS snapshot. 

C. Data is unavailable until the instance is restarted 

D. Data is automatically saved as an EBS volume. 

Answer:


Q33. - (Topic 3) 

A user is trying to send custom metrics to CloudWatch using the PutMetricData APIs. Which of the below 

mentioned points should the user needs to take care while sending the data to CloudWatch? 

A. The size of a request is limited to 8KB for HTTP GET requests and 40KB for HTTP POST requests 

B. The size of a request is limited to 128KB for HTTP GET requests and 64KB for HTTP POST requests 

C. The size of a request is limited to 40KB for HTTP GET requests and 8KB for HTTP POST requests 

D. The size of a request is limited to 16KB for HTTP GET requests and 80KB for HTTP POST requests 

Answer:

Explanation: 

With AWS CloudWatch, the user can publish data points for a metric that share not only the same time stamp, but also the same namespace and dimensions. CloudWatch can accept multiple data points in the same PutMetricData call with the same time stamp. The only thing that the user needs to take care of is that the size of a PutMetricData request is limited to 8KB for HTTP GET requests and 40KB for HTTP POST requests. 


Q34. - (Topic 1) 

What is a placement group? 

A. A collection of Auto Scaling groups in the same Region 

B. Feature that enables EC2 instances to interact with each other via nigh bandwidth, low latency connections 

C. A collection of Elastic Load Balancers in the same Region or Availability Zone 

D. A collection of authorized Cloud Front edge locations for a distribution 

Answer:

Explanation: Reference: 

http://aws.amazon.com/ec2/faqs/ 


Q35. - (Topic 2) 

A user is trying to connect to a running EC2 instance using SSH. However, the user gets a connection time out error. Which of the below mentioned options is not a possible reason for rejection? 

A. The access key to connect to the instance is wrong 

B. The security group is not configured properly 

C. The private key used to launch the instance is not correct 

D. The instance CPU is heavily loaded 

Answer:

Explanation: 

If the user is trying to connect to a Linux EC2 instance and receives the connection time out error the probable reasons are: Security group is not configured with the SSH port The private key pair is not right The user name to login is wrong The instance CPU is heavily loaded, so it does not allow more connections 


Q36. - (Topic 2) 

A user has configured a VPC with a new subnet. The user has created a security group. The user wants to configure that instances of the same subnet communicate with each other. How can the user configure this with the security group? 

A. There is no need for a security group modification as all the instances can communicate with each other inside the same subnet 

B. Configure the subnet as the source in the security group and allow traffic on all the protocols and ports 

C. Configure the security group itself as the source and allow traffic on all the protocols and ports 

D. The user has to use VPC peering to configure this 

Answer:

Explanation: 

A Virtual Private Cloud (VPC. is a virtual network dedicated to the user’s AWS account. AWS provides two features that the user can use to increase security in VPC: security groups and network ACLs. Security groups work at the instance level. If the user is using the default security group it will have a rule which allows the instances to communicate with other. For a new security group the user has to specify the rule, add it to define the source as the security group itself, and select all the protocols and ports for that source. 


Q37. - (Topic 2) 

A user has configured an Auto Scaling group with ELB. The user has enabled detailed CloudWatch monitoring on Elastic Load balancing. Which of the below mentioned statements will help the user understand this functionality better? 

A. ELB sends data to CloudWatch every minute only and does not charge the user 

B. ELB will send data every minute and will charge the user extra 

C. ELB is not supported by CloudWatch 

D. It is not possible to setup detailed monitoring for ELB 

Answer:

Explanation: 

CloudWatch is used to monitor AWS as well as the custom services. It provides either basic or detailed monitoring for the supported AWS products. In basic monitoring, a service sends data points to CloudWatch every five minutes, while in detailed monitoring a service sends data points to CloudWatch every minute. Elastic Load Balancing includes 10 metrics and 2 dimensions, and sends data to CloudWatch every minute. This does not cost extra. 


Q38. - (Topic 1) 

How can the domain's zone apex for example "myzoneapexdomain com" be pointed towards an Elastic Load Balancer? 

A. By using an AAAA record 

B. By using an A record 

C. By using an Amazon Route 53 CNAME record 

D. By using an Amazon Route 53 Alias record 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resource-record-sets-choosing-alias-non-alias.html 


Q39. - (Topic 2) 

A user has launched an EBS backed EC2 instance. What will be the difference while performing the restart or stop/start options on that instance? 

A. For restart it does not charge for an extra hour, while every stop/start it will be charged as a separate hour 

B. Every restart is charged by AWS as a separate hour, while multiple start/stop actions during a single hour will be counted as a single hour 

C. For every restart or start/stop it will be charged as a separate hour 

D. For restart it charges extra only once, while for every stop/start it will be charged as a separate hour 

Answer:

Explanation: 

For an EC2 instance launched with an EBS backed AMI, each time the instance state is changed from stop to start/ running, AWS charges a full instance hour, even if these transitions happen multiple times within a single hour. Anyway, rebooting an instance AWS does not charge a new instance billing hour. 

Topic 3, Volume C 

154. - (Topic 3) 

A user has created a VPC with a public subnet. The user has terminated all the instances which are part of the subnet. Which of the below mentioned statements is true with respect to this scenario? 

A. The user cannot delete the VPC since the subnet is not deleted 

B. All network interface attached with the instances will be deleted 

C. When the user launches a new instance it cannot use the same subnet 

D. The subnet to which the instances were launched with will be deleted 

Answer:

Explanation: 

A Virtual Private Cloud (VPC. is a virtual network dedicated to the user’s AWS account. A user can create a subnet with VPC and launch instances inside that subnet. When an instance is launched it will have a network interface attached with it. The user cannot delete the subnet until he terminates the instance and deletes the network interface. When the user terminates the instance all the network interfaces attached with it are also deleted. 


Q40. - (Topic 3) 

A user has created a VPC with public and private subnets. The VPC has CIDR 20.0.0.0/16. The private subnet uses CIDR 20.0.1.0/24 and the public subnet uses CIDR 20.0.0.0/24. The user is planning to host a web server in the public subnet (port 80. and a DB server in the private subnet (port 3306.. The user is configuring a security group of the NAT instance. Which of the below mentioned entries is not required for the NAT security group? 

A. For Inbound allow Source: 20.0.1.0/24 on port 80 

B. For Outbound allow Destination: 0.0.0.0/0 on port 80 

C. For Inbound allow Source: 20.0.0.0/24 on port 80 

D. For Outbound allow Destination: 0.0.0.0/0 on port 443 

Answer:

Explanation: 

A user can create a subnet with VPC and launch instances inside that subnet. If the user has created a public private subnet to host the web server and DB server respectively, the user should configure that the instances in the private subnet can connect to the internet using the NAT instances. The user should first configure that NAT can receive traffic on ports 80 and 443 from the private subnet. Thus, allow ports 80 and 443 in Inbound for the private subnet 20.0.1.0/24. Now to route this traffic to the internet configure ports 80 and Amazon AWS-SysOps : Practice Test 

443 in Outbound with destination 0.0.0.0/0. The NAT should not have an entry for the public subnet CIDR.