getcertified4sure.com

Foolproof aws sysops certification dumps tips




Act now and download your Amazon aws certified sysops administrator pdf test today! Do not waste time for the worthless Amazon sysops aws tutorials. Download Latest Amazon AWS Certified SysOps Administrator Associate exam with real questions and answers and begin to learn Amazon aws sysops administrator with a classic professional.

Q181. - (Topic 3) 

A user had aggregated the CloudWatch metric data on the AMI ID. The user observed some abnormal 

behaviour of the CPU utilization metric while viewing the last 2 weeks of data. The user wants to share that data with his manager. How can the user achieve this easily with the AWS console? 

A. The user can use the copy URL functionality of CloudWatch to share the exact details 

B. The user can use the export data option from the CloudWatch console to export the current data point 

C. The user has to find the period and data and provide all the aggregation information to the manager 

D. The user can use the CloudWatch data copy functionality to copy the current data points 

Answer:

Explanation: 

Amazon CloudWatch provides the functionality to graph the metric data generated either by the AWS services or the custom metric to make it easier for the user to analyse. The console provides the option to save the URL or bookmark it so that it can be used in the future by typing the same URL. The Copy URL functionality is available under the console when the user selects any metric to view. 


Q182. - (Topic 3) 

An organization has setup multiple IAM users. The organization wants that each IAM user accesses the IAM console only within the organization and not from outside. How can it achieve this? 

A. Create an IAM policy with the security group and use that security group for AWS console login 

B. Create an IAM policy with a condition which denies access when the IP address range is not from the organization 

C. Configure the EC2 instance security group which allows traffic only from the organization’s IP range 

D. Create an IAM policy with VPC and allow a secure gateway between the organization and AWS Console 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. The user can add conditions as a part of the IAM policies. The condition can be set on AWS Tags, Time, and Client IP as well as on many other parameters. If the organization wants the user to access only from a specific IP range, they should set an IAM policy condition which denies access when the IP is not in a certain range. E.g. The sample policy given below denies all traffic when the IP is not in a certain range. 

"Statement": [{ 

"Effect": "Deny", 

"Action": "*", 

"Resource": "*", 

"Condition": { 

"NotIpAddress": { 

"aws:SourceIp": ["10.10.10.0/24", "20.20.30.0/24"] 

}] 


Q183. - (Topic 1) 

When an EC2 EBS-backed (EBS root) instance is stopped, what happens to the data on any ephemeral store volumes? 

A. Data will be deleted and win no longer be accessible 

B. Data is automatically saved in an EBS volume. 

C. Data is automatically saved as an EBS snapshot 

D. Data is unavailable until the instance is restarted 

Answer:


Q184. - (Topic 1) 

You are managing a legacy application Inside VPC with hard coded IP addresses in its configuration. 

Which two mechanisms will allow the application to failover to new instances without the need for reconfiguration? Choose 2 answers 

A. Create an ELB to reroute traffic to a failover instance 

B. Create a secondary ENI that can be moved to a failover instance 

C. Use Route53 health checks to fail traffic over to a failover instance 

D. Assign a secondary private IP address to the primary ENIO that can be moved to a failover instance 

Answer: A,D 


Q185. - (Topic 3) 

You have a business-to-business web application running in a VPC consisting of an Elastic Load Balancer (ELB), web servers, application servers and a database. Your web application should only accept traffic from pre-defined customer IP addresses. 

Which two options meet this security requirement? Choose 2 answers A. Configure web server VPC security groups to allow traffic from your customers' IPs 

B. Configure your web servers to filter traffic based on the ELB's "X-forwarded-for" header 

C. Configure ELB security groups to allow traffic from your customers' IPs and deny all outbound traffic 

D. Configure a VPC NACL to allow web traffic from your customers' IPs and deny all outbound traffic 

Answer: A,B 


Q186. - (Topic 3) 

A user has launched an EC2 instance and deployed a production application in it. The user wants to prohibit any mistakes from the production team to avoid accidental termination. 

How can the user achieve this? 

A. The user can the set DisableApiTermination attribute to avoid accidental termination 

B. It is not possible to avoid accidental termination 

C. The user can set the Deletion termination flag to avoid accidental termination 

D. The user can set the InstanceInitiatedShutdownBehavior flag to avoid accidental termination 

Answer:

Explanation: 

It is always possible that someone can terminate an EC2 instance using the Amazon EC2 console, command line interface or API by mistake. If the admin wants to prevent the instance from being accidentally terminated, he can enable termination protection for that instance. The DisableApiTermination attribute controls whether the instance can be terminated using the console, CLI or API. By default, termination protection is disabled for an EC2 instance. When it is set it will not allow the user to terminate the instance from CLI, API or the console. 


Q187. - (Topic 1) 

You have an Auto Scaling group associated with an Elastic Load Balancer (ELB). You have noticed that instances launched via the Auto Scaling group are being marked unhealthy due to an ELB health check, but these unhealthy instances are not being terminated 

What do you need to do to ensure trial instances marked unhealthy by the ELB will be terminated and replaced? 

A. Change the thresholds set on the Auto Scaling group health check 

B. Add an Elastic Load Balancing health check to your Auto Scaling group 

C. Increase the value for the Health check interval set on the Elastic Load Balancer 

D. Change the health check set on the Elastic Load Balancer to use TCP rather than HTTP checks 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/AutoScaling/latest/DeveloperGuide/as-add-elb-healthcheck.html 

Add an Elastic Load Balancing Health Check to your Auto Scaling Group 

By default, an Auto Scaling group periodically reviews the results of EC2 instance status to determine the health state of each instance. However, if you have associated your Auto Scaling group with an Elastic Load Balancing load balancer, you can choose to use the Elastic Load Balancing health check. In this case, Auto Scaling determines the health status of your instances by checking the results of both the EC2 instance status check and the Elastic Load Balancing instance health check. 

For information about EC2 instance status checks, see.Monitor Instances With Status Checks.in the.Amazon EC2 User Guide for Linux Instances. For information about Elastic Load Balancing health checks, see.Health Check.in the.Elastic Load Balancing Developer Guide. 

This topic shows you how to add an Elastic Load Balancing health check to your Auto Scaling group, assuming that you have created a load balancer and have registered the load balancer with your Auto Scaling group. If you have not registered the load balancer with your Auto Scaling group, see.Set Up a Scaled and Load-Balanced Application. 

Auto Scaling marks an instance unhealthy if the calls to the Amazon EC2 action.DescribeInstanceStatus.return any state other than.running, the system status shows.impaired, or the calls to Elastic Load Balancing action.DescribeInstanceHealth.returns.OutOfService.in the instance state field. 

If there are multiple load balancers associated with your Auto Scaling group, Auto Scaling checks the health state of your EC2 instances by making health check calls to each load balancer. For each call, if the Elastic Load Balancing action returns any state other than.InService, the instance is marked as unhealthy. After Auto Scaling marks an instance as unhealthy, it remains in that state, even if subsequent calls from other load balancers return an.InService.state for the same instance. 


Q188. - (Topic 2) 

An organization, which has the AWS account ID as 999988887777, has created 50 IAM users. All the users are added to the same group cloudacademy. If the organization has enabled that each IAM user can login with the AWS console, which AWS login URL will the IAM users use? 

A. https:// 999988887777.signin.aws.amazon.com/console/ 

B. https:// signin.aws.amazon.com/cloudacademy/ 

C. https:// cloudacademy.signin.aws.amazon.com/999988887777/console/ 

D. https:// 999988887777.aws.amazon.com/ cloudacademy/ 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. Once the organization has created the IAM users, they will have a separate AWS console URL to login to the AWS console. The console login URL for the IAM user will be https:// AWS_Account_ID.signin.aws.amazon.com/console/. It uses only the AWS account ID and does not depend on the group or user ID. 


Q189. - (Topic 3) 

A user has configured ELB with SSL using a security policy for secure negotiation between the client and load balancer. Which of the below mentioned security policies is supported by ELB? 

A. Dynamic Security Policy 

B. All the other options 

C. Predefined Security Policy 

D. Default Security Policy 

Answer:

Explanation: 

Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. ELB supports two policies: Predefined Security Policy, which comes with predefined cipher and SSL protocols; Custom Security Policy, which allows the user to configure a policy. 


Q190. - (Topic 3) 

A user has configured an EC2 instance in the US-East-1a zone. The user has enabled detailed monitoring of the instance. The user is trying to get the data from CloudWatch using a CLI. Which of the below mentioned CloudWatch endpoint URLs should the user use? 

A. monitoring.us-east-1.amazonaws.com 

B. monitoring.us-east-1-a.amazonaws.com 

C. monitoring.us-east-1a.amazonaws.com 

D. cloudwatch.us-east-1a.amazonaws.com 

Answer:

Explanation: 

The CloudWatch resources are always region specific and they will have the end point as region specific. If the user is trying to access the metric in the US-East-1 region, the endpoint URL will be: monitoring.us-east- 1.amazonaws.com