getcertified4sure.com

Today Big Q: aws certified sysops administrator salary?




Cause all that matters here is passing the Amazon aws sysops exam exam. Cause all that you need is a high score of sysops aws AWS Certified SysOps Administrator Associate exam. The only one thing you need to do is downloading Actualtests aws sysops training exam study guides now. We will not let you down with our money-back guarantee.

Q51. - (Topic 2) 

A user has created a VPC with CIDR 20.0.0.0/24. The user has created a public subnet with CIDR 20.0.0.0/25 and a private subnet with CIDR 20.0.0.128/25. The user has launched one instance each in the private and public subnets. Which of the below mentioned options cannot be the correct IP address (private IP. assigned to an instance in the public or private subnet? 

A. 20.0.0.255 

B. 20.0.0.132 

C. 20.0.0.122 

D. 20.0.0.55 

Answer:

Explanation: 

When the user creates a subnet in VPC, he specifies the CIDR block for the subnet. In this case the user has created a VPC with the CIDR block 20.0.0.0/24, which supports 256 IP addresses (20.0.0.0 to 20.0.0.255.. The public subnet will have IP addresses between 20.0.0.0 - 20.0.0.127 and the private subnet will have IP addresses between 20.0.0.128 -20.0.0.255. AWS reserves the first four IP addresses and the last IP address in each subnet’s CIDR block. These are not available for the user to use. Thus, the instance cannot have an IP address of 20.0.0.255 


Q52. - (Topic 3) 

A sys admin is using server side encryption with AWS S3. Which of the below mentioned statements helps the user understand the S3 encryption functionality? 

A. The server side encryption with the user supplied key works when versioning is enabled 

B. The user can use the AWS console, SDK and APIs to encrypt or decrypt the content for server side encryption with the user supplied key 

C. The user must send an AES-128 encrypted key 

D. The user can upload his own encryption key to the S3 console 

Answer:

Explanation: 

AWS S3 supports client side or server side encryption to encrypt all data at rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key. The encryption with the user supplied key (SSE-C. does not work with the AWS console. The S3 does not store the keys and the user has to send a key with each request. The SSE-C works when the user has enabled versioning. 


Q53. - (Topic 2) 

A user is trying to understand the ACL and policy for an S3 bucket. Which of the below mentioned policy 

permissions is equivalent to the WRITE ACL on a bucket? 

A. s3:GetObjectAcl 

B. s3:GetObjectVersion 

C. s3:ListBucketVersions 

D. s3:DeleteObject 

Answer:

Explanation: 

Amazon S3 provides a set of operations to work with the Amazon S3 resources. Each AWS S3 bucket can have an ACL (Access Control List. or bucket policy associated with it. The WRITE ACL list allows the other AWS accounts to write/modify to that bucket. The equivalent S3 bucket policy permission for it is s3:DeleteObject. 


Q54. - (Topic 2) 

A system admin is managing buckets, objects and folders with AWS S3. Which of the below mentioned statements is true and should be taken in consideration by the sysadmin? 

A. The folders support only ACL 

B. Both the object and bucket can have an Access Policy but folder cannot have policy 

C. Folders can have a policy 

D. Both the object and bucket can have ACL but folders cannot have ACL 

Answer:

Explanation: 

A sysadmin can grant permission to the S3 objects or the buckets to any user or make objects public using the bucket policy and user policy. Both use the JSON-based access policy language. Generally if user is defining the ACL on the bucket, the objects in the bucket do not inherit it and vice a versa. The bucket policy can be defined at the bucket level which allows the objects as well as the bucket to be public with a single policy applied to that bucket. It cannot be applied at the object level. The folders are similar to objects with no content. Thus, folders can have only ACL and cannot have a policy. 


Q55. - (Topic 3) 

A user has launched an EC2 Windows instance from an instance store backed AMI. The user wants to convert the AMI to an EBS backed AMI. How can the user convert it? 

A. Attach an EBS volume to the instance and unbundle all the AMI bundled data inside the EBS 

B. A Windows based instance store backed AMI cannot be converted to an EBS backed AMI 

C. It is not possible to convert an instance store backed AMI to an EBS backed AMI 

D. Attach an EBS volume and use the copy command to copy all the ephermal content to the EBS Volume 

Answer:

Explanation: 

Generally when a user has launched an EC2 instance from an instance store backed AMI, it can be converted to an EBS backed AMI provided the user has attached the EBS volume to the instance and unbundles the AMI data to it. However, if the instance is a Windows instance, AWS does not allow this. In this case, since the instance is a Windows instance, the user cannot convert it to an EBS backed AMI. 


Q56. - (Topic 1) 

When preparing for a compliance assessment of your system built inside of AWS. what are three best-practices for you to prepare for an audit? 

Choose 3 answers 

A. Gather evidence of your IT operational controls 

B. Request and obtain applicable third-party audited AWS compliance reports and certifications 

C. Request and obtain a compliance and security tour of an AWS data center for a pre-assessment security review 

D. Request and obtain approval from AWS to perform relevant network scans and in-depth penetration tests of your system's Instances and endpoints 

E. Schedule meetings with AWS's third-party auditors to provide evidence of AWS compliance that maps to your control objectives 

Answer: A,B,D 


Q57. - (Topic 3) 

An organization (account ID 123412341234. has configured the IAM policy to allow the user to modify his 

credentials. What will the below mentioned statement allow the user to perform? 

"Version": "2012-10-17", 

"Statement": [{ 

"Effect": "Allow", 

"Action": [ 

"iam:AddUserToGroup", 

"iam:RemoveUserFromGroup", 

"iam:GetGroup" 

], 

"Resource": "arn:aws:iam:: 123412341234:group/TestingGroup" 

}] 

A. The IAM policy will throw an error due to an invalid resource name 

B. The IAM policy will allow the user to subscribe to any IAM group 

C. Allow the IAM user to update the membership of the group called TestingGroup 

D. Allow the IAM user to delete the TestingGroup 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. If the organization (account ID 123412341234. wants their users to manage their subscription to the groups, they should create a relevant policy for that. The below mentioned policy allows the respective IAM user to update the membership of the group called MarketingGroup. 

"Version": "2012-10-17", 

"Statement": [{ 

"Effect": "Allow", 

"Action": [ 

"iam:AddUserToGroup", 

"iam:RemoveUserFromGroup", 

"iam:GetGroup" 

], 

"Resource": "arn:aws:iam:: 123412341234:group/ TestingGroup " 

}] 


Q58. - (Topic 1) 

You have been asked to leverage Amazon VPC BC2 and SOS to implement an application that submits and receives millions of messages per second to a message queue. You want to ensure your application has sufficient bandwidth between your EC2 instances and SQS Which option will provide the most scalable solution for communicating between the application and SQS? 

A. Ensure the application instances are properly configured with an Elastic Load Balancer 

B. Ensure the application instances are launched in private subnets with the EBS-optimized option enabled 

C. Ensure the application instances are launched in public subnets with the associate-public-IP-address=true option enabled 

D. Launch application instances in private subnets with an Auto Scaling group and Auto Scaling triggers configured to watch the SQS queue size 

Answer:

Explanation: Reference: 

http://www.cardinalpath.com/autoscaling-your-website-with-amazon-web-services-part-2/ 


Q59. - (Topic 3) 

A user is using the AWS SQS to decouple the services. Which of the below mentioned operations is not 

supported by SQS? 

A. SendMessageBatch 

B. DeleteMessageBatch 

C. CreateQueue 

D. DeleteMessageQueue 

Answer:

Explanation: 

Amazon Simple Queue Service (SQS. is a fast, reliable, scalable, and fully managed message queuing service. SQS provides a simple and cost-effective way to decouple the components of an application. The user can perform the following set of operations using the Amazon SQS: 

CreateQueue, ListQueues, DeleteQueue, SendMessage, SendMessageBatch, 

ReceiveMessage, DeleteMessage, DeleteMessageBatch, ChangeMessageVisibility, 

ChangeMessageVisibilityBatch, SetQueueAttributes, GetQueueAttributes, GetQueueUrl, 

AddPermission and RemovePermission. Operations can be performed only by the AWS account owner or an AWS account that the account owner has delegated to. 


Q60. - (Topic 2) 

A user has launched an EBS backed EC2 instance. The user has rebooted the instance. Which of the below mentioned statements is not true with respect to the reboot action? 

A. The private and public address remains the same 

B. The Elastic IP remains associated with the instance 

C. The volume is preserved 

D. The instance runs on a new host computer 

Answer:

Explanation: 

A user can reboot an EC2 instance using the AWS console, the Amazon EC2 CLI or the Amazon EC2 API. Rebooting an instance is equivalent to rebooting an operating system. However, it is recommended that the user use the Amazon EC2 to reboot the instance instead of running the operating system reboot command from the instance. The instance remains on the same host computer and maintains its public DNS name, private IP address, and any data on its instance store volumes. It typically takes a few minutes for the reboot to complete, but the time it takes to reboot depends on the instance configuration.