getcertified4sure.com

Resources to aws sysops administrator




Exam Code: aws sysops training (Practice Exam Latest Test Questions VCE PDF)
Exam Name: AWS Certified SysOps Administrator Associate
Certification Provider: Amazon
Free Today! Guaranteed Training- Pass aws certified sysops administrator book Exam.

Q101. - (Topic 1) 

You are currently hosting multiple applications in a VPC and have logged numerous port scans coming in from a specific IP address block. Your security team has requested that all access from the offending IP address block be denied for the next 24 hours. 

Which of the following is the best method to quickly and temporarily deny access from the specified IP address block? 

A. Create an AD policy to modify Windows Firewall settings on all hosts in the VPC to deny access from the IP address block 

B. Modify the Network ACLs associated with all public subnets in the VPC to deny access from the IP address block 

C. Add a rule to all of the VPC 5 Security Groups to deny access from the IP address block 

D. Modify the Windows Firewall settings on all Amazon Machine Images (AMIs) that your organization uses in that VPC to deny access from the IP address block 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_SecurityGroups.html 


Q102. - (Topic 2) 

A user has created an ELB with Auto Scaling. Which of the below mentioned offerings from ELB helps the user to stop sending new requests traffic from the load balancer to the EC2 instance when the instance is being deregistered while continuing in-flight requests? 

A. ELB sticky session 

B. ELB deregistration check 

C. ELB connection draining 

D. ELB auto registration Off 

Answer:

Explanation: 

The Elastic Load Balancer connection draining feature causes the load balancer to stop sending new requests to the back-end instances when the instances are deregistering or become unhealthy, while ensuring that inflight requests continue to be served. 


Q103. - (Topic 1) 

When preparing for a compliance assessment of your system built inside of AWS. what are three best-practices for you to prepare for an audit? 

Choose 3 answers 

A. Gather evidence of your IT operational controls 

B. Request and obtain applicable third-party audited AWS compliance reports and certifications 

C. Request and obtain a compliance and security tour of an AWS data center for a pre-assessment security review 

D. Request and obtain approval from AWS to perform relevant network scans and in-depth penetration tests of your system's Instances and endpoints 

E. Schedule meetings with AWS's third-party auditors to provide evidence of AWS compliance that maps to your control objectives 

Answer: A,B,D 


Q104. - (Topic 2) 

A user is planning to use AWS Cloud formation for his automatic deployment requirements. Which of the below mentioned components are required as a part of the template? 

A. Parameters 

B. Outputs 

C. Template version 

D. Resources 

Answer:

Explanation: 

AWS Cloud formation is an application management tool which provides application modelling, deployment, configuration, management and related activities. The template is a JSON-format, text-based file that describes all the AWS resources required to deploy and run an application. It can have option fields, such as Template Parameters, Output, Data tables, and Template file format version. The only mandatory value is Resource. The user can define the AWS services which will be used/ created by this template inside the Resource section 


Q105. - (Topic 3) 

A user has created an EBS volume of 10 GB and attached it to a running instance. The user is trying to access EBS for first time. Which of the below mentioned options is the correct statement with respect to a first time EBS access? 

A. The volume will show a size of 8 GB 

B. The volume will show a loss of the IOPS performance the first time 

C. The volume will be blank 

D. If the EBS is mounted it will ask the user to create a file system 

Answer:

Explanation: 

A user can create an EBS volume either from a snapshot or as a blank volume. If the volume is from a snapshot it will not be blank. The volume shows the right size only as long as it is mounted. This shows that the file system is created. When the user is accessing the volume the AWS EBS will wipe out the block storage or instantiate from the snapshot. Thus, the volume will show a loss of IOPS. It is recommended that the user should pre warm the EBS before use to achieve better IO. 


Q106. - (Topic 3) 

A user has enabled versioning on an S3 bucket. The user is using server side encryption for data at rest. If the user is supplying his own keys for encryption (SSE-C., what is recommended to the user for the purpose of security? 

A. The user should not use his own security key as it is not secure 

B. Configure S3 to rotate the user’s encryption key at regular intervals 

C. Configure S3 to store the user’s keys securely with SSL 

D. Keep rotating the encryption key manually at the client side 

Answer:

Explanation: 

AWS S3 supports client side or server side encryption to encrypt all data at Rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key (SSE-C.. Since S3 does not store the encryption keys in SSE-C, it is recommended that the user should manage keys securely and keep rotating them regularly at the client side version. 


Q107. - (Topic 3) 

A user has created a VPC with a subnet and a security group. The user has launched an instance in that 

subnet and attached a public IP. The user is still unable to connect to the instance. The internet gateway has also been created. What can be the reason for the error? 

A. The internet gateway is not configured with the route table 

B. The private IP is not present 

C. The outbound traffic on the security group is disabled 

D. The internet gateway is not configured with the security group 

Answer:

Explanation: 

A Virtual Private Cloud (VPC. is a virtual network dedicated to the user’s AWS account. AWS provides two features the user can use to increase security in VPC: security groups and network ACLs. Security groups work at the instance level. When a user launches an instance and wants to connect to an instance, he needs an internet gateway. The internet gateway should be configured with the route table to allow traffic from the internet. 


Q108. - (Topic 3) 

A user has created a VPC with CIDR 20.0.0.0/16 using VPC Wizard. The user has created a public CIDR 

(20.0.0.0/24. and a VPN only subnet CIDR (20.0.1.0/24. along with the hardware VPN access to connect to the user’s data centre. Which of the below mentioned components is not present when the VPC is setup with the wizard? 

A. Main route table attached with a VPN only subnet 

B. A NAT instance configured to allow the VPN subnet instances to connect with the internet 

C. Custom route table attached with a public subnet 

D. An internet gateway for a public subnet 

Answer:

Explanation: 

The user can create subnets as per the requirement within a VPC. If the user wants to connect VPC from his own data centre, he can setup a public and VPN only subnet which uses hardware VPN access to connect with his data centre. When the user has configured this setup with Wizard, it will update the main route table used with the VPN-only subnet, create a custom route table and associate it with the public subnet. It also creates an internet gateway for the public subnet. The wizard does not create a NAT instance by default. The user can create it manually and attach it with a VPN only subnet. 


Q109. - (Topic 1) 

Your application currently leverages AWS Auto Scaling to grow and shrink as load Increases/ decreases and has been performing well Your marketing team expects a steady ramp up in traffic to follow an upcoming campaign that will result in a 20x growth in traffic over 4 weeks Your forecast for the approximate number of Amazon EC2 instances necessary to meet the peak demand is 175. 

What should you do to avoid potential service disruptions during the ramp up in traffic? 

A. Ensure that you have pre-allocated 175 Elastic IP addresses so that each server will be able to obtain one as it launches 

B. Check the service limits in Trusted Advisor and adjust as necessary so the forecasted count remains within limits. 

C. Change your Auto Scaling configuration to set a desired capacity of 175 prior to the launch of the marketing campaign 

D. Pre-warm your Elastic Load Balancer to match the requests per second anticipated during peak demand prior to the marketing campaign 

Answer:


Q110. - (Topic 1) 

An organization has configured a VPC with an Internet Gateway (IGW). pairs of public and 

private subnets (each with one subnet per Availability Zone), and an Elastic Load Balancer (ELB) configured to use the public subnets The application s web tier leverages the ELB. Auto Scaling and a mum-AZ RDS database instance The organization would like to eliminate any potential single points ft failure in this design. 

What step should you take to achieve this organization's objective? 

A. Nothing, there are no single points of failure in this architecture. 

B. Create and attach a second IGW to provide redundant internet connectivity. 

C. Create and configure a second Elastic Load Balancer to provide a redundant load balancer. 

D. Create a second multi-AZ RDS instance in another Availability Zone and configure replication to provide a redundant database. 

Answer: