Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Amazon Web Services > AWS Certified Associate > SOA-C03

SOA-C03 AWS Certified CloudOps Engineer - Associate Question and Answers

Question # 4

A CloudOps engineer created a VPC with a private subnet, a security group allowing all outbound traffic, and an endpoint for EC2 Instance Connect in the private subnet. The EC2 instance was launched without an SSH key pair, using the same subnet and security group. However, the engineer cannot connect via EC2 Instance Connect endpoint.

How can the CloudOps engineer connect to the instance?

A.

Create an inbound rule in the security group to allow HTTPS traffic on port 443 from the private subnet.

B.

Create an inbound rule in the security group to allow SSH traffic on port 22 from the private subnet.

C.

Create an IAM instance profile that allows AWS Systems Manager Session Manager to access the EC2 instance. Associate the instance profile with the instance.

D.

Recreate the EC2 instance. Associate an SSH key pair with the instance.

Full Access
Question # 5

A company runs a critical application on Amazon EC2 instances. The application uses an Auto Scaling group to scale based on traffic to the application. To comply with regulations, the company must patch all EC2 instances with the latest security patches every day without any downtime.

Which solution will meet these requirements with the LEAST operational overhead?

A.

Use AWS Systems Manager Automation to create a patched Amazon Machine Image (AMI). Update the Auto Scaling group launch template. Initiate an instance refresh.

B.

Use AWS CloudFormation to provision and patch a new EC2 instance. Create an AMI of the new instance. Update the Auto Scaling group launch template to use the new AMI. Use AWS Config to replace the existing instances.

C.

Use AWS Lambda functions to launch and patch a new EC2 instance. Create an AMI of the new instance. Update the Auto Scaling group launch template to use the new AMI. Manually initiate a rolling update.

D.

Use AWS Systems Manager Automation to create a patched AMI. Update the Auto Scaling group launch template to use the new AMI. Use AWS Config to replace the existing instances.

Full Access
Question # 6

A CloudOps engineer must manage the security of an AWS account. Recently, an IAM user’s access key was mistakenly uploaded to a public code repository. The engineer must identify everything that was changed using this compromised key.

How should the CloudOps engineer meet these requirements?

A.

Create an Amazon EventBridge rule to send all IAM events to an AWS Lambda function for analysis.

B.

Query Amazon EC2 logs by using Amazon CloudWatch Logs Insights for all events initiated with the compromised access key within the suspected timeframe.

C.

Search AWS CloudTrail event history for all events initiated with the compromised access key within the suspected timeframe.

D.

Search VPC Flow Logs for all events initiated with the compromised access key within the suspected timeframe.

Full Access
Question # 7

A company’s application servers in AWS account 111122223333 use a security group sg-1234abcd. They need to access a database hosted in account 444455556666. The VPCs are connected using a VPC peering connection (pcx-b04deed9).

A CloudOps engineer must configure the database’s security group to allow new connections only from the application servers.

What should the engineer do?

A.

Add an inbound rule to the database's security group. Reference 111122223333/sg-1234abcd as the source.

B.

Add an inbound rule to the database's security group. Reference pcx-b04deed9/sg-1234abcd as the source.

C.

Add an inbound rule to the database's security group. Reference sg-1234abcd as the source.

D.

Add an inbound rule to the database's security group. Reference 444455556666/sg-1234abcd as the source.

Full Access
Question # 8

A company hosts a web application on an Amazon EC2 instance. The web server logs are published to Amazon CloudWatch Logs. The log events have the same structure and include the HTTP response codes associated with user requests. The company needs to monitor the number of times the web server returns an HTTP 404 response.

What is the MOST operationally efficient solution that meets these requirements?

A.

Create a CloudWatch Logs metric filter that counts the number of times the web server returns an HTTP 404 response.

B.

Create a CloudWatch Logs subscription filter that counts the number of HTTP 404 responses.

C.

Create an AWS Lambda function that runs a CloudWatch Logs Insights query every hour.

D.

Create a script that runs a CloudWatch Logs Insights query every hour.

Full Access
Question # 9

A company uses Amazon ElastiCache (Redis OSS) to cache application data. A CloudOps engineer must implement a solution to increase the resilience of the cache and minimize the recovery time objective (RTO).

Which solution will meet these requirements?

A.

Replace ElastiCache (Redis OSS) with ElastiCache (Memcached).

B.

Create an Amazon EventBridge rule to initiate a backup every hour.

C.

Create a read replica in a second Availability Zone and enable Multi-AZ for the Redis replication group.

D.

Enable automatic backups and restore the backups when necessary.

Full Access
Question # 10

A company has users that deploy Amazon EC2 instances that have more volume performance capacity than is required. A CloudOps engineer needs to review all Amazon Elastic Block Store (Amazon EBS) volumes that are associated with the instances and create cost optimization recommendations based on IOPS and throughput.

What should the CloudOps engineer do to meet these requirements in the MOST operationally efficient way?

A.

Use the monitoring graphs in the EC2 console to view metrics for EBS volumes. Review the consumed space against the provisioned space on each volume. Identify any volumes that have low utilization.

B.

Stop the EC2 instances from the EC2 console. Change the EC2 instance type to Amazon EBS-optimized. Start the EC2 instances.

C.

Opt in to AWS Compute Optimizer. Allow sufficient time for metrics to be gathered. Review the Compute Optimizer findings for EBS volumes.

D.

Install the fio tool onto the EC2 instances and create a .cfg file to approximate the required workloads. Use the benchmark results to gauge whether the provisioned EBS volumes are of the most appropriate type.

Full Access
Question # 11

A company uses AWS CloudFormation to manage a stack of Amazon EC2 instances on AWS. A CloudOps engineer needs to keep the instances and all of the instances' data, even if someone deletes the stack.

Which solution will meet these requirements?

A.

Set the DeletionPolicy attribute to Snapshot for the EC2 instance resource in the CloudFormation template.

B.

Automate backups by using Amazon Data Lifecycle Manager (Amazon DLM).

C.

Create a backup plan in AWS Backup.

D.

Set the DeletionPolicy attribute to Retain for the EC2 instance resource in the CloudFormation template.

Full Access
Question # 12

A company uses AWS Systems Manager Session Manager to manage EC2 instances in the eu-west-1 Region. The company wants private connectivity using VPC endpoints.

Which VPC endpoints are required to meet these requirements? (Select THREE.)

A.

com.amazonaws.eu-west-1.ssm

B.

com.amazonaws.eu-west-1.ec2messages

C.

com.amazonaws.eu-west-1.ec2

D.

com.amazonaws.eu-west-1.ssmmessages

E.

com.amazonaws.eu-west-1.s3

F.

com.amazonaws.eu-west-1.states

Full Access
Question # 13

A company plans to run a public web application on Amazon EC2 instances behind an Elastic Load Balancing (ELB) load balancer. The company’s security team wants to protect the website by using AWS Certificate Manager (ACM) certificates. The load balancer must automatically redirect any HTTP requests to HTTPS.

Which solution will meet these requirements?

A.

Create an Application Load Balancer that has one HTTPS listener on port 80. Attach an SSL/TLS certificate to port 80.

B.

Create an Application Load Balancer that has one HTTP listener on port 80 and one HTTPS listener on port 443. Attach an SSL/TLS certificate to port 443. Create a rule to redirect requests from port 80 to port 443.

C.

Create an Application Load Balancer that has two TCP listeners on ports 80 and 443. Attach an SSL/TLS certificate to port 443.

D.

Create a Network Load Balancer with TCP listeners on ports 80 and 443. Attach an SSL/TLS certificate to port 443.

Full Access
Question # 14

A company plans to migrate several of its high-performance computing (HPC) virtual machines to Amazon EC2. The deployment must minimize network latency and maximize network throughput between the instances.

Which placement group strategy should the CloudOps engineer choose?

A.

Deploy the instances in a cluster placement group in one Availability Zone.

B.

Deploy the instances in a partition placement group in two Availability Zones.

C.

Deploy the instances in a partition placement group in one Availability Zone.

D.

Deploy the instances in a spread placement group in two Availability Zones.

Full Access
Question # 15

A CloudOps engineer has created a VPC that contains a public subnet and a private subnet. Amazon EC2 instances that were launched in the private subnet cannot access the internet. The default network ACL is active on all subnets in the VPC, and all security groups allow outbound traffic.

Which solution will provide the EC2 instances in the private subnet with access to the internet?

A.

Create a NAT gateway in the public subnet. Create a route from the private subnet to the NAT gateway.

B.

Create a NAT gateway in the public subnet. Create a route from the public subnet to the NAT gateway.

C.

Create a NAT gateway in the private subnet. Create a route from the public subnet to the NAT gateway.

D.

Create a NAT gateway in the private subnet. Create a route from the private subnet to the NAT gateway.

Full Access
Question # 16

A company observes a dramatic increase in 500 status code responses from an HTTP application that runs on Amazon EC2 instances. The EC2 instances are in an Auto Scaling group and use EC2 health checks for resiliency. The company uses Amazon CloudWatch to collect logs for the EC2 instances and the HTTP server logs.

A CloudOps engineer investigates the cause of the status codes. The CloudOps engineer finds that errors correlate with times when the Auto Scaling group was either replacing EC2 instances or performing scale-in actions. The CloudOps engineer needs to improve the resiliency of the application's architecture.

Which solution will meet this requirement?

A.

Reconfigure the Auto Scaling group to increase the default cooldown configuration.

B.

Reconfigure the EC2 instance health checks to use Elastic Load Balancing (ELB) health checks.

C.

Reconfigure the Auto Scaling group to increase the minimum capacity configuration.

D.

Reconfigure the EC2 instance health checks to increase the health check grace period.

Full Access
Question # 17

A company runs a web application on three Amazon EC2 instances behind an Application Load Balancer (ALB). The company notices that random periods of increased traffic cause a degradation in the application’s performance.

A CloudOps engineer must scale the application to meet the increased traffic.

Which solution meets these requirements?

A.

Create an Amazon CloudWatch alarm to monitor application latency and increase the size of each EC2 instance if the desired threshold is reached.

B.

Create an Amazon EventBridge rule to monitor application latency and add an EC2 instance to the ALB if the desired threshold is reached.

C.

Deploy the application to an Auto Scaling group of EC2 instances with a target tracking scaling policy. Attach the ALB to the Auto Scaling group.

D.

Deploy the application to an Auto Scaling group of EC2 instances with a scheduled scaling policy. Attach the ALB to the Auto Scaling group.

Full Access
Question # 18

A company runs an application on Amazon EC2 that connects to an Amazon Aurora PostgreSQL database. A developer accidentally drops a table from the database, causing application errors. Two hours later, a CloudOps engineer needs to recover the data and make the application functional again.

Which solution will meet this requirement?

A.

Use the Aurora Backtrack feature to rewind the database to a specified time, 2 hours in the past.

B.

Perform a point-in-time recovery on the existing database to restore the database to a specified point in time, 2 hours in the past.

C.

Perform a point-in-time recovery and create a new database to restore the database to a specified point in time, 2 hours in the past. Reconfigure the application to use a new database endpoint.

D.

Create a new Aurora cluster. Choose the Restore data from S3 bucket option. Choose log files up to the failure time 2 hours in the past.

Full Access
Question # 19

A company has an AWS CloudFormation template that includes an AWS::EC2::Instance resource and a custom resource (Lambda function). The Lambda function fails because it runs before the EC2 instance is launched.

Which solution will resolve this issue?

A.

Add a DependsOn attribute to the custom resource. Specify the EC2 instance in the DependsOn attribute.

B.

Update the custom resource's service token to point to a valid Lambda function.

C.

Update the Lambda function to use the cfn-response module to send a response to the custom resource.

D.

Use the Fn::If intrinsic function to check for the EC2 instance before the custom resource runs.

Full Access
Question # 20

A company applies user-defined tags to AWS resources. Twenty days after applying the tags, the company notices that the tags cannot be used to filter views in the AWS Cost Explorer console.

What is the reason for this issue?

A.

It takes at least 30 days before tags can be used in Cost Explorer.

B.

The company has not activated the user-defined tags for cost allocation.

C.

The company has not created an AWS Cost and Usage Report.

D.

The company has not created a usage budget in AWS Budgets.

Full Access
Question # 21

A CloudOps engineer creates a new VPC that contains a private subnet, a security group that allows all outbound traffic, and an endpoint for Amazon EC2 Instance Connect in a private subnet. The CloudOps engineer associates the security group with EC2 Instance Connect.

The CloudOps engineer launches an EC2 instance from an Amazon Linux Amazon Machine Image (AMI) in the private subnet. The CloudOps engineer launches the EC2 instance without an SSH key pair.

The CloudOps engineer tries to connect to the instance by using the EC2 Instance Connect endpoint. However, the connection fails.

How can the CloudOps engineer connect to the instance?

A.

Create an inbound rule in the security group to allow HTTPS traffic on port 443 from the private subnet.

B.

Create an inbound rule in the security group to allow SSH traffic on port 22 from the private subnet.

C.

Create an IAM instance profile that allows AWS Systems Manager Session Manager to access the EC2 instance. Associate the instance profile with the instance.

D.

Recreate the EC2 instance. Associate an SSH key pair with the instance.

Full Access
Question # 22

A company has a web application that is experiencing performance problems many times each night. A root cause analysis reveals sudden increases in CPU utilization that last 5 minutes on an Amazon EC2 Linux instance. A CloudOps engineer must find the process ID (PID) of the service or process that is consuming more CPU.

What should the CloudOps engineer do to collect the process utilization information with the LEAST amount of effort?

A.

Configure the Amazon CloudWatch agent procstat plugin to capture CPU process metrics.

B.

Configure an AWS Lambda function to run every minute to capture the PID and send a notification.

C.

Log in to the EC2 instance each night and run the top command.

D.

Use the default Amazon CloudWatch CPUUtilization metric.

Full Access
Question # 23

A CloudOps engineer needs to track the costs of data transfer between AWS Regions. The CloudOps engineer must implement a solution to send alerts to an email distribution list when transfer costs reach 75% of a specific threshold.

What should the CloudOps engineer do to meet these requirements?

A.

Create an AWS Cost and Usage Report. Analyze the results in Amazon Athena. Configure an alarm to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic when costs reach 75% of the threshold. Subscribe the email distribution list to the topic.

B.

Create an Amazon CloudWatch billing alarm to detect when costs reach 75% of the threshold. Configure the alarm to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the email distribution list to the topic.

C.

Use AWS Budgets to create a cost budget for data transfer costs. Set an alert at 75% of the budgeted amount. Configure the budget to send a notification to the email distribution list when costs reach 75% of the threshold.

D.

Set up a VPC flow log. Set up a subscription filter to an AWS Lambda function to analyze data transfer. Configure the Lambda function to send a notification to the email distribution list when costs reach 75% of the threshold.

Full Access
Question # 24

A company has an application that collects notifications from thousands of alarm systems. Notifications include alarm notifications and information notifications. All notifications are stored in an Amazon Simple Queue Service (Amazon SQS) queue. Amazon EC2 instances in an Auto Scaling group process the messages.

A CloudOps engineer needs to prioritize alarm notifications over information notifications.

Which solution will meet these requirements?

A.

Scale the Auto Scaling group faster when message volume increases.

B.

Use Amazon SNS fanout to send messages to all EC2 instances.

C.

Add an Amazon DynamoDB stream to accelerate processing.

D.

Create separate SQS queues for alarm notifications and information notifications and process alarm messages first.

Full Access
Question # 25

A company uses a large number of Linux-based Amazon EC2 instances to run business operations. The company uses AWS Systems Manager to manage the EC2 instances. The company wants to ensure that the Systems Manager Agent (SSM Agent) is always up to date with the latest version.

Which solution will meet this requirement in the MOST operationally efficient way?

A.

Enable the Auto update SSM Agent setting in Systems Manager Fleet Manager.

B.

Subscribe to SSM Agent GitHub notifications and use Lambda to update agents.

C.

Enable the Auto update SSM Agent setting in Systems Manager Patch Manager.

D.

Use GitHub notifications and a Systems Manager Automation document.

Full Access
Question # 26

A company's developers manually install software modules on Amazon EC2 instances to deploy new versions of a service. A security audit finds that instances contain inconsistent and unapproved modules.

A CloudOps engineer must create a new instance image that contains only approved software.

Which solution will meet these requirements?

A.

Use Amazon Detective to continuously find and uninstall unauthorized modules from the instances.

B.

Use Amazon GuardDuty to create and deploy an Amazon Machine Image (AMI) that includes only the approved modules.

C.

Use AWS Systems Manager Run Command to install the approved modules on all running instances during an in-place update.

D.

Use EC2 Image Builder to create and test an Amazon Machine Image (AMI) that includes only the approved modules. Update the deployment workflow to use the new AMI.

Full Access
Question # 27

A company uses an AWS Lambda function to process user uploads to an Amazon S3 bucket. The Lambda function runs in response to Amazon S3 PutObject events.

A SysOps administrator needs to set up monitoring for the Lambda function. The SysOps administrator wants to receive a notification through an Amazon Simple Notification Service (Amazon SNS) topic if the function takes more than 10 seconds to process an event.

Which solution will meet this requirement?

A.

Collect Amazon CloudWatch logs for the Lambda function. Create a metric filter to extract the PostRuntimeExtensionsDuration metric from the logs. Create a CloudWatch alarm to publish a notification to the SNS topic when the function runtime exceeds 10 seconds.

B.

Collect Amazon CloudWatch metrics for the Lambda function to extract the function runtime. Create a CloudWatch alarm to publish a notification to the SNS topic when the runtime exceeds 10 seconds.

C.

Configure an Amazon CloudWatch metric filter to capture the runtime of the Lambda function. Set the function's timeout setting to 10 seconds. Create an SNS subscription to alert the SysOps administrator if the function times out.

D.

Use Amazon CloudWatch Logs Insights to query Lambda logs for the function runtime. Set up a CloudWatch alarm based on the query result. Configure Amazon SNS to send notifications when function runtime exceeds 10 seconds.

Full Access
Question # 28

A CloudOps engineer has created an AWS Service Catalog portfolio and shared it with a second AWS account in the company, managed by a different CloudOps engineer.

Which action can the CloudOps engineer in the second account perform?

A.

Add a product from the imported portfolio to a local portfolio.

B.

Add new products to the imported portfolio.

C.

Change the launch role for the products contained in the imported portfolio.

D.

Customize the products in the imported portfolio.

Full Access
Question # 29

A company hosts a static website on an Amazon S3 bucket behind an Amazon CloudFront distribution. When the company deploys a new version of the website, users sometimes do not see the new content until the next day.

A CloudOps engineer must implement a solution to display updates to the website as quickly as possible.

Which solution will meet this requirement?

A.

Configure the CloudFront distribution to add a custom Cache-Control header to requests for content from the S3 bucket.

B.

Modify the distribution settings to specify the protocol as HTTPS only.

C.

Attach the CachingOptimized managed cache policy to the distribution.

D.

Create a CloudFront invalidation.

Full Access
Question # 30

A company is implementing security and compliance by using AWS Trusted Advisor. The company’s CloudOps team is validating the list of Trusted Advisor checks that it can access.

Which factor will affect the quantity of available Trusted Advisor checks?

A.

Whether at least one Amazon EC2 instance is in the running state

B.

The AWS Support plan

C.

An AWS Organizations service control policy (SCP)

D.

Whether the AWS account root user has multi-factor authentication (MFA) enabled

Full Access
Question # 31

A CloudOps engineer is configuring an Amazon CloudFront distribution to use an SSL/TLS certificate. The CloudOps engineer must ensure automatic certificate renewal.

Which combination of steps will meet this requirement? (Select TWO.)

A.

Use a certificate issued by AWS Certificate Manager (ACM).

B.

Use a certificate issued by a third-party certificate authority (CA).

C.

Configure CloudFront to automatically renew the certificate when the certificate expires.

D.

Configure email validation for the certificate.

E.

Configure DNS validation for the certificate.

Full Access
Question # 32

A company’s architecture team must receive immediate email notifications whenever new Amazon EC2 instances are launched in the company’s main AWS production account.

What should a CloudOps engineer do to meet this requirement?

A.

Create a user data script that sends an email message through a smart host connector. Include the architecture team's email address in the user data script as the recipient. Ensure that all new EC2 instances include the user data script as part of a standardized build process.

B.

Create an Amazon Simple Notification Service (Amazon SNS) topic and a subscription that uses the email protocol. Enter the architecture team's email address as the subscriber. Create an Amazon EventBridge rule that reacts when EC2 instances are launched. Specify the SNS topic as the rule's target.

C.

Create an Amazon Simple Queue Service (Amazon SQS) queue and a subscription that uses the email protocol. Enter the architecture team's email address as the subscriber. Create an Amazon EventBridge rule that reacts when EC2 instances are launched. Specify the SQS queue as the rule's target.

D.

Create an Amazon Simple Notification Service (Amazon SNS) topic. Configure AWS Systems Manager to publish EC2 events to the SNS topic. Create an AWS Lambda function to poll the SNS topic. Configure the Lambda function to send any messages to the architecture team's email address.

Full Access
Question # 33

A company is migrating a legacy application to AWS. The application runs on EC2 instances across multiple Availability Zones behind an Application Load Balancer (ALB). The target group routing algorithm is set to weighted random, and the application requires session affinity (sticky sessions).

After deployment, users report random application errors that were not present before migration, even though target health checks are passing.

Which solution will meet this requirement?

A.

Set the routing algorithm of the target group to least outstanding requests.

B.

Turn on anomaly mitigation for the target group.

C.

Turn off the cross-zone load balancing attribute of the target group.

D.

Increase the deregistration delay attribute of the target group.

Full Access
Question # 34

A company uses AWS CloudFormation to manage a stack of Amazon EC2 instances. A CloudOps engineer needs to keep the EC2 instances and their data even if the stack is deleted.

Which solution will meet these requirements?

A.

Set the DeletionPolicy attribute to Snapshot.

B.

Use Amazon Data Lifecycle Manager (DLM).

C.

Create an AWS Backup plan.

D.

Set the DeletionPolicy attribute to Retain.

Full Access
Question # 35

A company has a stateful web application that is hosted on Amazon EC2 instances in an Auto Scaling group. The instances run behind an Application Load Balancer (ALB) that has a single target group. The ALB is configured as the origin in an Amazon CloudFront distribution. Users are reporting random logouts from the web application.

Which combination of actions should a CloudOps engineer take to resolve this problem? (Select TWO.)

A.

Change to the least outstanding requests algorithm on the ALB target group.

B.

Configure cookie forwarding in the CloudFront distribution cache behavior.

C.

Configure header forwarding in the CloudFront distribution cache behavior.

D.

Enable group-level stickiness on the ALB listener rule.

E.

Enable sticky sessions on the ALB target group.

Full Access
Question # 36

A CloudOps engineer is troubleshooting an AWS CloudFormation stack creation that failed. Before the CloudOps engineer can identify the problem, the stack and its resources are deleted. For future deployments, the CloudOps engineer must preserve any resources that CloudFormation successfully created.

What should the CloudOps engineer do to meet this requirement?

A.

Set the value of the DisableRollback parameter to False during stack creation.

B.

Set the value of the OnFailure parameter to DO_NOTHING during stack creation.

C.

Specify a rollback configuration that has a rollback trigger of DO_NOTHING during stack creation.

D.

Set the value of the OnFailure parameter to ROLLBACK during stack creation.

Full Access
Question # 37

A company uses an Amazon Simple Queue Service (Amazon SQS) queue and Amazon EC2 instances in an Auto Scaling group with target tracking for a web application. The company collects the ASGAverageNetworkIn metric but notices that instances do not scale fast enough during peak traffic. There are a large number of SQS messages accumulating in the queue.

A CloudOps engineer must reduce the number of SQS messages during peak periods.

Which solution will meet this requirement?

A.

Define and use a new custom Amazon CloudWatch metric based on the SQS ApproximateNumberOfMessagesDelayed metric in the target tracking policy.

B.

Define and use Amazon CloudWatch metric math to calculate the SQS queue backlog for each instance in the target tracking policy.

C.

Define and use step scaling by specifying a ChangeInCapacity value for the EC2 instances.

D.

Define and use simple scaling by specifying a ChangeInCapacity value for the EC2 instances.

Full Access
Question # 38

A CloudOps engineer creates an AWS CloudFormation template to define an application stack that can be deployed in multiple AWS Regions. The CloudOps engineer also creates an Amazon CloudWatch dashboard by using the AWS Management Console. Each deployment of the application requires its own CloudWatch dashboard.

How can the CloudOps engineer automate the creation of the CloudWatch dashboard each time the application is deployed?

A.

Create a script by using the AWS CLI to run the aws cloudformation put-dashboard command with the name of the dashboard. Run the command each time a new CloudFormation stack is created.

B.

Export the existing CloudWatch dashboard as JSON. Update the CloudFormation template to define an AWS::CloudWatch::Dashboard resource. Include the exported JSON in the resource's DashboardBody property.

C.

Update the CloudFormation template to define an AWS::CloudWatch::Dashboard resource. Use the intrinsic Ref function to reference the ID of the existing CloudWatch dashboard.

D.

Update the CloudFormation template to define an AWS::CloudWatch::Dashboard resource. Specify the name of the existing dashboard in the DashboardName property.

Full Access
Question # 39

A SysOps administrator is configuring an Auto Scaling group of Amazon EC2 instances for an application. The average CPU utilization of the instances in the Auto Scaling group must remain at approximately 40% when the load on the application changes.

Which solution will meet this requirement in the MOST operationally efficient manner?

A.

Create a scheduled scaling action. Configure the action to run at times when the application typically experiences an increase in traffic.

B.

Configure a simple scaling policy. Create an Amazon CloudWatch alarm that enters ALARM state when CPU utilization is greater than 40%. Associate the alarm with the scaling policy.

C.

Configure a step scaling policy. Create an Amazon CloudWatch alarm that enters ALARM state when CPU utilization is greater than 40%. Associate the alarm with the scaling policy.

D.

Configure a target tracking scaling policy. Specify a target value of 40 for average CPU utilization.

Full Access
Question # 40

A global company runs a critical primary workload in the us-east-1 Region. The company wants to ensure business continuity with minimal downtime in case of a workload failure. The company wants to replicate the workload to a second AWS Region.

A CloudOps engineer needs a solution that achieves a recovery time objective (RTO) of less than 10 minutes and a zero recovery point objective (RPO) to meet service level agreements.

Which solution will meet these requirements?

A.

Implement a pilot light architecture that provides real-time data replication in the second Region. Configure Amazon Route 53 health checks and automated DNS failover.

B.

Implement a warm standby architecture that provides regular data replication in a second Region. Configure Amazon Route 53 health checks and automated DNS failover.

C.

Implement an active-active architecture that provides real-time data replication across two Regions. Use Amazon Route 53 health checks and a weighted routing policy.

D.

Implement a custom script to generate a regular backup of the data and store it in an S3 bucket that is in a second Region. Use the backup to launch the application in the second Region in the event of a workload failure.

Full Access
Question # 41

A company hosts a production MySQL database on an Amazon Aurora single-node DB cluster. The database is queried heavily for reporting purposes. The DB cluster is experiencing periods of performance degradation because of high CPU utilization and maximum connections errors. A CloudOps engineer needs to improve the stability of the database.

Which solution will meet these requirements?

A.

Create an Aurora Replica node. Create an Auto Scaling policy to scale replicas based on CPU utilization. Ensure that all reporting requests use the read-only connection string.

B.

Create a second Aurora MySQL single-node DB cluster in a second Availability Zone. Ensure that all reporting requests use the connection string for this additional node.

C.

Create an AWS Lambda function that caches reporting requests. Ensure that all reporting requests call the Lambda function.

D.

Create a multi-node Amazon ElastiCache cluster. Ensure that all reporting requests use the ElastiCache cluster. Use the database if the data is not in the cache.

Full Access
Question # 42

A CloudOps engineer is creating a simple, public-facing website running on Amazon EC2. The CloudOps engineer created the EC2 instance in an existing public subnet and assigned an Elastic IP address. The CloudOps engineer created a new security group that allows incoming HTTP traffic from 0.0.0.0/0. The CloudOps engineer also created a new network ACL and applied it to the subnet to allow incoming HTTP traffic from 0.0.0.0/0. However, the website cannot be reached from the internet.

What is the cause of this issue?

A.

The CloudOps engineer did not create an outbound rule that allows ephemeral port return traffic in the new network ACL.

B.

The CloudOps engineer did not create an outbound rule in the security group that allows HTTP traffic from port 80.

C.

The Elastic IP address assigned to the EC2 instance has changed.

D.

There is an additional network ACL associated with the subnet that denies inbound HTTP traffic.

Full Access
Question # 43

A company has a critical serverless application that uses multiple AWS Lambda functions. Each Lambda function generates 1 GB of log data daily in its own Amazon CloudWatch Logs log group. The company's security team asks for a count of application errors, grouped by type, across all of the log groups.

What should a CloudOps engineer do to meet this requirement?

A.

Perform a CloudWatch Logs Insights query that uses the stats command and count function.

B.

Perform a CloudWatch Logs search that uses the groupby keyword and count function.

C.

Perform an Amazon Athena query that uses the SELECT and GROUP BY keywords.

D.

Perform an Amazon RDS query that uses the SELECT and GROUP BY keywords.

Full Access
Question # 44

A CloudOps engineer wants to configure observability of specific metrics for a public website that runs on Amazon Elastic Kubernetes Service (Amazon EKS). The CloudOps engineer wants to observe latency, traffic, errors, and saturation metrics. The CloudOps engineer wants to define service level objectives (SLOs) and monitor service level indicators (SLIs). The CloudOps engineer also wants to correlate metrics, logs, and traces to support faster issue resolution.

Which solution will meet these requirements with the LEAST operational effort?

A.

Use Amazon CloudWatch Application Signals to automatically collect and monitor the specified metrics for the EKS workloads.

B.

Configure AWS Distro for OpenTelemetry and use Amazon Managed Service for Prometheus and Amazon Managed Grafana.

C.

Configure Amazon CloudWatch RUM and CloudWatch Synthetics canaries.

D.

Configure Amazon CloudWatch Application Insights.

Full Access
Question # 45

A company deploys an application on Amazon EC2 instances in an Auto Scaling group behind an Application Load Balancer (ALB). The company wants to protect the application from SQL injection attacks.

Which solution will meet this requirement?

A.

Deploy AWS Shield Advanced in front of the ALB. Enable SQL injection filtering.

B.

Deploy AWS Shield Standard in front of the ALB. Enable SQL injection filtering.

C.

Deploy a vulnerability scanner on each EC2 instance. Continuously scan the application code.

D.

Deploy AWS WAF in front of the ALB. Subscribe to an AWS Managed Rule for SQL injection filtering.

Full Access
Question # 46

A company uses AWS Organizations to manage multiple AWS accounts. A CloudOps engineer must identify all IPv4 ports open to 0.0.0.0/0 across the organization’s accounts.

Which solution will meet this requirement with the LEAST operational effort?

A.

Use the AWS CLI to print all security group rules for review.

B.

Review AWS Trusted Advisor findings in an organizational view for the Security Groups – Specific Ports Unrestricted check.

C.

Create an AWS Lambda function to gather security group rules from all accounts. Aggregate the findings in an Amazon S3 bucket.

D.

Enable Amazon Inspector in each account. Run an automated workload discovery job.

Full Access
Question # 47

A company runs a retail website on multiple Amazon EC2 instances behind an Application Load Balancer (ALB). The company must secure traffic to the website over an HTTPS connection.

Which combination of actions should a SysOps administrator take to meet these requirements? (Select TWO.)

A.

Attach the certificate to each EC2 instance.

B.

Attach the certificate to the ALB.

C.

Create a private certificate in AWS Certificate Manager (ACM).

D.

Create a public certificate in AWS Certificate Manager (ACM).

E.

Export the certificate, and attach it to the website.

Full Access
Question # 48

A company runs thousands of Amazon EC2 instances that are based on the Amazon Linux 2 Amazon Machine Image (AMI). A SysOps administrator must implement a solution to record commands and output from any user that needs an interactive session on one of the EC2 instances. The solution must log the data to a durable storage location. The solution also must provide automated notifications and alarms that are based on the log data.

Which solution will meet these requirements with the MOST operational efficiency?

A.

Configure command session logging on each EC2 instance. Configure the unified Amazon CloudWatch agent to send session logs to Amazon CloudWatch Logs. Set up query filters and alerts by using Amazon Athena.

B.

Require all users to use a central bastion host when they need command line access to an EC2 instance. Configure the unified Amazon CloudWatch agent on the bastion host to send session logs to Amazon CloudWatch Logs. Set up a metric filter and a metric alarm for relevant security findings in CloudWatch Logs.

C.

Require all users to use AWS Systems Manager Session Manager when they need command line access to an EC2 instance. Configure Session Manager to stream session logs to Amazon CloudWatch Logs. Set up a metric filter and a metric alarm for relevant security findings in CloudWatch Logs.

D.

Configure command session logging on each EC2 instance. Require all users to use AWS Systems Manager Run Command documents when they need command line access to an EC2 instance. Configure the unified Amazon CloudWatch agent to send session logs to Amazon CloudWatch Logs. Set up CloudWatch alarms that are based on Amazon Athena query results.

Full Access
Question # 49

A CloudOps engineer is examining the following AWS CloudFormation template:

AWSTemplateFormatVersion: '2010-09-09'

Description: 'Creates an EC2 Instance'

Resources:

EC2Instance:

Type: AWS::EC2::Instance

Properties:

ImageId: ami-79fd7eee

InstanceType: m5n.large

SubnetId: subnet-1abc3d3fg

PrivateDnsName: ip-10-24-34-0.ec2.internal

Tags:

- Key: Name

Value: !Sub "${AWS::StackName} Instance"

Why will the stack creation fail?

A.

The Outputs section of the CloudFormation template was omitted.

B.

The Parameters section of the CloudFormation template was omitted.

C.

The PrivateDnsName cannot be set from a CloudFormation template.

D.

The VPC was not specified in the CloudFormation template.

Full Access