getcertified4sure.com

The only aws certified sysops administrator pdf resources for you




Our pass rate is high to 98.9% and the similarity percentage between our aws sysops certification study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Amazon aws certified sysops administrator associate exam in just one try? I am currently studying for the Amazon aws certified sysops administrator pdf exam. Latest Amazon aws sysops exam questions Test exam practice questions and answers, Try Amazon aws certified sysops administrator pdf Brain Dumps First.

Q21. - (Topic 3) 

A user has created a VPC with CIDR 20.0.0.0/16. The user has created one subnet with CIDR 20.0.0.0/16 by mistake. The user is trying to create another subnet of CIDR 20.0.0.1/24. How can the user create the second subnet? 

A. There is no need to update the subnet as VPC automatically adjusts the CIDR of the first subnet based on the second subnet’s CIDR 

B. The user can modify the first subnet CIDR from the console 

C. It is not possible to create a second subnet as one subnet with the same CIDR as the VPC has been created 

D. The user can modify the first subnet CIDR with AWS CLI 

Answer:

Explanation: 

A Virtual Private Cloud (VPC. is a virtual network dedicated to the user’s AWS account. A user can create a subnet with VPC and launch instances inside the subnet. The user can create a subnet with the same size of VPC. However, he cannot create any other subnet since the CIDR of the second subnet will conflict with the first subnet. The user cannot modify the CIDR of a subnet once it is created. Thus, in this case if required, the user has to delete the subnet and create new subnets. 


Q22. - (Topic 3) 

An AWS root account owner is trying to create a policy to access RDS. Which of the below mentioned 

statements is true with respect to the above information? 

A. Create a policy which allows the users to access RDS and apply it to the RDS instances 

B. The user cannot access the RDS database if he is not assigned the correct IAM policy 

C. The root account owner should create a policy for the IAM user and give him access to the RDS services 

D. The policy should be created for the user and provide access for RDS 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. If the account owner wants to create a policy for RDS, the owner has to create an IAM user and define the policy which entitles the IAM user with various RDS services such as Launch Instance, Manage security group, Manage parameter group etc. 


Q23. - (Topic 1) 

You are using ElastiCache Memcached to store session state and cache database queries in your infrastructure. You notice in CloudWatch that Evictions and GetMisses are Doth very high. 

What two actions could you take to rectify this? 

Choose 2 answers 

A. Increase the number of nodes in your cluster 

B. Tweak the max_item_size parameter 

C. Shrink the number of nodes in your cluster 

D. Increase the size of the nodes in the duster 

Answer: B,D 


Q24. - (Topic 1) 

You run a web application where web servers on EC2 Instances are In an Auto Scaling group Monitoring over the last 6 months shows that 6 web servers are necessary to handle the minimum load During the day up to 12 servers are needed Five to six days per year, the number of web servers required might go up to 15. 

What would you recommend to minimize costs while being able to provide hill availability? 

A. 6 Reserved instances (heavy utilization). 6 Reserved instances {medium utilization), rest covered by On-Demand instances 

B. 6 Reserved instances (heavy utilization). 6 On-Demand instances, rest covered by Spot Instances 

C. 6 Reserved instances (heavy utilization) 6 Spot instances, rest covered by On-Demand instances 

D. 6 Reserved instances (heavy utilization) 6 Reserved instances (medium utilization) rest covered by Spot instances 

Answer:


Q25. - (Topic 3) 

A user wants to find the particular error that occurred on a certain date in the AWS MySQL RDS DB. Which of the below mentioned activities may help the user to get the data easily? 

A. It is not possible to get the log files for MySQL RDS 

B. Find all the transaction logs and query on those records 

C. Direct the logs to the DB table and then query that table 

D. Download the log file to DynamoDB and search for the record 

Answer:

Explanation: 

The user can view, download, and watch the database logs using the Amazon RDS console, the Command Line Interface (CLI. or the Amazon RDS API. For the MySQL RDS, the user can view the error log, slow query log, and general logs. The user can also view the MySQL logs easily by directing the logs to a database table in the main database and querying that table. 


Q26. - (Topic 2) 

An organization has created 5 IAM users. The organization wants to give them the same login ID but different passwords. How can the organization achieve this? 

A. The organization should create a separate login ID but give the IAM users the same alias so that each one can login with their alias 

B. The organization should create each user in a separate region so that they have their own URL to login 

C. It is not possible to have the same login ID for multiple IAM users of the same account 

D. The organization should create various groups and add each user with the same login ID to different groups. The user can login with their own group ID 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. Whenever the organization is creating an IAM user, there should be a unique ID for each user. It is not possible to have the same login ID for multiple users. The names of users,groups, roles, instance profiles must be alphanumeric, including the following common characters: plus (+., equal (=., comma (,., period (.., at (@., and dash (-.. 


Q27. - (Topic 3) 

A user has setup a CloudWatch alarm on the EC2 instance for CPU utilization. The user has setup to receive a notification on email when the CPU utilization is higher than 60%. The user is running a virus scan on the same instance at a particular time. The user wants to avoid receiving an email at this time. What should the user do? 

A. Remove the alarm 

B. Disable the alarm for a while using CLI 

C. Modify the CPU utilization by removing the email alert 

D. Disable the alarm for a while using the console 

Answer:

Explanation: 

Amazon CloudWatch alarm watches a single metric over a time period that the user specifies and performs one or more actions based on the value of the metric relative to a given threshold over a number of time periods. When the user has setup an alarm and it is know that for some unavoidable event the status may change to Alarm, the user can disable the alarm using the DisableAlarmActions API or from the command line mon-disable-alarm-actions. 


Q28. - (Topic 3) 

What would happen to an RDS (Relational Database Service) multi-Availability Zone deployment if the primary DB instance fails? 

A. The IP of the primary DB Instance is switched to the standby DB Instance. 

B. A new DB instance is created in the standby availability zone. 

C. The canonical name record (CNAME) is changed from primary to standby. 

D. The RDS (Relational Database Service) DB instance reboots. 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_RebootInstance.html 


Q29. - (Topic 3) 

A user has configured ELB with SSL using a security policy for secure negotiation between the client and load balancer. Which of the below mentioned security policies is supported by ELB? 

A. Dynamic Security Policy 

B. All the other options 

C. Predefined Security Policy 

D. Default Security Policy 

Answer:

Explanation: 

Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. ELB supports two policies: Predefined Security Policy, which comes with predefined cipher and SSL protocols; Custom Security Policy, which allows the user to configure a policy. 


Q30. - (Topic 1) 

What are characteristics of Amazon S3? Choose 2 answers 

A. Objects are directly accessible via a URL 

B. S3 should be used to host a relational database 

C. S3 allows you to store objects or virtually unlimited size 

D. S3 allows you to store virtually unlimited amounts of data 

E. S3 offers Provisioned IOPS 

Answer: A,D