Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Amazon Web Services > AWS Certified Associate > SOA-C03

SOA-C03 AWS Certified CloudOps Engineer - Associate Question and Answers

Question # 4

A company runs an application on Amazon EC2 that connects to an Amazon Aurora PostgreSQL database. A developer accidentally drops a table from the database, causing application errors. Two hours later, a CloudOps engineer needs to recover the data and make the application functional again.

Which solution will meet this requirement?

A.

Use the Aurora Backtrack feature to rewind the database to a specified time, 2 hours in the past.

B.

Perform a point-in-time recovery on the existing database to restore the database to a specified point in time, 2 hours in the past.

C.

Perform a point-in-time recovery and create a new database to restore the database to a specified point in time, 2 hours in the past. Reconfigure the application to use a new database endpoint.

D.

Create a new Aurora cluster. Choose the Restore data from S3 bucket option. Choose log files up to the failure time 2 hours in the past.

Full Access
Question # 5

A company uses Amazon EC2 Auto Scaling across multiple Availability Zones. The company must ensure that EC2 instances are provisioned in private subnets.

The company recently optimized its cloud infrastructure by reducing the number of NAT gateways in the company ' s VPC to one. Some EC2 instances lost internet connectivity after the infrastructure update. A CloudOps engineer must resolve the connectivity issue.

Which solution will meet this requirement?

A.

Replace the existing NAT gateway with a NAT instance in the same subnet.

B.

Update VPC route tables to target the existing NAT gateway for internet traffic.

C.

Update VPC route tables to target an internet gateway for internet traffic.

D.

Add secondary IP addresses to the existing NAT gateway.

Full Access
Question # 6

A CloudOps engineer is troubleshooting an AWS CloudFormation template whereby multiple Amazon EC2 instances are being created. The template is working in us-east-1, but it is failing in us-west-2 with the error code:

AMI [ami-12345678] does not exist

How should the CloudOps engineer ensure that the AWS CloudFormation template is working in every Region?

A.

Copy the source Region’s Amazon Machine Image (AMI) to the destination Region and assign it the same ID.

B.

Edit the AWS CloudFormation template to specify the Region code as part of the fully qualified AMI ID.

C.

Edit the AWS CloudFormation template to offer a drop-down list of all AMIs to the user by using the AWS::EC2::AMI::ImageId control.

D.

Modify the AWS CloudFormation template by including the AMI IDs in the Mappings section. Refer to the proper mapping within the template for the proper AMI ID.

Full Access
Question # 7

A company uses an organization in AWS Organizations to manage multiple AWS accounts. The company needs to send specific events from all the accounts in the organization to a new receiver account, where an AWS Lambda function will process the events.

A CloudOps engineer configures Amazon EventBridge to route events to a target event bus in the us-west-2 Region in the receiver account. The CloudOps engineer creates rules in both the sender and receiver accounts that match the specified events. The rules do not specify an account parameter in the event pattern. IAM roles are created in the sender accounts to allow PutEvents actions on the target event bus.

However, the first test events from the us-east-1 Region are not processed by the Lambda function in the receiving account.

What is the likely reason the events are not processed?

A.

Interface VPC endpoints for EventBridge are required in the sender accounts and receiver accounts.

B.

The target Lambda function is in a different AWS Region, which is not supported by EventBridge.

C.

The resource-based policy on the target event bus must be modified to allow PutEvents API calls from the sender accounts.

D.

The rule in the receiving account must specify { " account " : [ " sender-account-id " ]} in its event pattern and must include the receiving account ID.

Full Access
Question # 8

A company has an AWS Lambda function in Account A. The Lambda function needs to read the objects in an Amazon S3 bucket in Account B. A CloudOps engineer must create corresponding IAM roles in both accounts.

Which solution will meet these requirements?

A.

In Account A, create a Lambda execution role to assume the role in Account B. In Account B, create a role that the function can assume to gain access to the S3 bucket.

B.

In Account A, create a Lambda execution role that provides access to the S3 bucket. In Account B, create a role that the function can assume.

C.

In Account A, create a role that the function can assume. In Account B, create a Lambda execution role that provides access to the S3 bucket.

D.

In Account A, create a role that the function can assume to gain access to the S3 bucket. In Account B, create a Lambda execution role to assume the role in Account A.

Full Access
Question # 9

A CloudOps engineer is troubleshooting a website that will not load for users. The website is hosted by an Amazon CloudFront distribution that has an Amazon S3 bucket as the origin. The CloudFront distribution is named d111111abcdef8.cloudfront.net. The S3 bucket has the following Amazon Resource Name (ARN): arn:aws:s3:::example-com-website-files. The S3 bucket has S3 Block Public Access enabled. The CloudOps engineer examines the website ' s DNS CNAME records and discovers that the record value is set to s3.amazonaws.com/example-com-website-files/.

What should the CloudOps engineer do to configure the website for use with CloudFront?

A.

Disable S3 Block Public Access on the S3 bucket.

B.

Create an S3 access point in the same AWS Region where the S3 bucket is located. Configure the access point policy to allow CloudFront to read from the S3 bucket. Point the CNAME record to the S3 access point name.

C.

Modify the value of the DNS CNAME record to be arn:aws:s3:::example-com-website-files instead of the S3 URL.

D.

Modify the value of the DNS CNAME record to be d111111abcdef8.cloudfront.net instead of the S3 URL.

Full Access
Question # 10

A company has two AWS accounts connected by a transit gateway. Each account has one VPC in the same AWS Region. The company wants to simplify inbound and outbound rules in security groups by referencing security group IDs instead of IP CIDR blocks.

Which solution will meet this requirement?

A.

Create VPC peering connections and remove the transit gateway.

B.

Enable security group referencing support on the transit gateway.

C.

Enable security group referencing support on each transit gateway attachment.

D.

Deploy private NAT gateways in each VPC.

Full Access
Question # 11

A CloudOps engineer is preparing to deploy an application to Amazon EC2 instances that are in an Auto Scaling group. The application requires dependencies to be installed. Application updates are issued weekly.

The CloudOps engineer needs to implement a solution to incorporate the application updates on a regular basis. The solution also must conduct a vulnerability scan during Amazon Machine Image (AMI) creation.

What is the MOST operationally efficient solution that meets these requirements?

A.

Create a script that uses Packer and schedule a cron job.

B.

Install the application and dependencies on an EC2 instance and create an AMI.

C.

Use EC2 Image Builder with a custom recipe to install the application and dependencies.

D.

Invoke the EC2 CreateImage API operation by using an EventBridge scheduled rule.

Full Access
Question # 12

A company is implementing security and compliance by using AWS Trusted Advisor. The company’s CloudOps team is validating the list of Trusted Advisor checks that it can access.

Which factor will affect the quantity of available Trusted Advisor checks?

A.

Whether at least one Amazon EC2 instance is in the running state

B.

The AWS Support plan

C.

An AWS Organizations service control policy (SCP)

D.

Whether the AWS account root user has multi-factor authentication (MFA) enabled

Full Access
Question # 13

A CloudOps engineer creates a new VPC that contains a private subnet, a security group that allows all outbound traffic, and an endpoint for Amazon EC2 Instance Connect in a private subnet. The CloudOps engineer associates the security group with EC2 Instance Connect.

The CloudOps engineer launches an EC2 instance from an Amazon Linux Amazon Machine Image (AMI) in the private subnet. The CloudOps engineer launches the EC2 instance without an SSH key pair.

The CloudOps engineer tries to connect to the instance by using the EC2 Instance Connect endpoint. However, the connection fails.

How can the CloudOps engineer connect to the instance?

A.

Create an inbound rule in the security group to allow HTTPS traffic on port 443 from the private subnet.

B.

Create an inbound rule in the security group to allow SSH traffic on port 22 from the private subnet.

C.

Create an IAM instance profile that allows AWS Systems Manager Session Manager to access the EC2 instance. Associate the instance profile with the instance.

D.

Recreate the EC2 instance. Associate an SSH key pair with the instance.

Full Access
Question # 14

A CloudOps engineer must manage the security of an AWS account. Recently, an IAM user’s access key was mistakenly uploaded to a public code repository. The engineer must identify everything that was changed using this compromised key.

How should the CloudOps engineer meet these requirements?

A.

Create an Amazon EventBridge rule to send all IAM events to an AWS Lambda function for analysis.

B.

Query Amazon EC2 logs by using Amazon CloudWatch Logs Insights for all events initiated with the compromised access key within the suspected timeframe.

C.

Search AWS CloudTrail event history for all events initiated with the compromised access key within the suspected timeframe.

D.

Search VPC Flow Logs for all events initiated with the compromised access key within the suspected timeframe.

Full Access
Question # 15

A CloudOps engineer is responsible for a company ' s disaster recovery procedures. The company has a source Amazon S3 bucket in a production account, and it wants to replicate objects from the source to a destination S3 bucket in a nonproduction account. The CloudOps engineer configures S3 cross-Region, cross-account replication to copy the source S3 bucket to the destination S3 bucket. When the CloudOps engineer attempts to access objects in the destination S3 bucket, they receive an Access Denied error.

Which solution will resolve this problem?

A.

Modify the replication configuration to change object ownership to the destination S3 bucket owner.

B.

Ensure that the replication rule applies to all objects in the source S3 bucket and is not scoped to a single prefix.

C.

Retry the request when the S3 Replication Time Control (S3 RTC) has elapsed.

D.

Verify that the storage class for the replicated objects did not change between the source S3 bucket and the destination S3 bucket.

Full Access
Question # 16

A CloudOps engineer has an Amazon ECS service that runs a transaction processing application. The CloudOps engineer needs to deploy a new feature on the ECS service. The feature cannot have downtime during deployment. The feature must also have the ability to run an immediate one-step rollback if a performance-degrading bug is detected.

Which solution will meet these requirements?

A.

Configure a canary deployment by using an AWS CodeDeploy linear traffic shift with a 10% increment over 10 minutes.

B.

Implement a blue/green deployment by using AWS CodeDeploy.

C.

Configure the ECS service with a minimum healthy percentage of 100%. Use the default rolling update deployment type.

D.

Set the ECS service ' s desired count to double the current size. Manually terminate the old tasks after the new tasks are registered.

Full Access
Question # 17

A CloudOps engineer creates an AWS CloudFormation template to define an application stack that can be deployed in multiple AWS Regions. The CloudOps engineer also creates an Amazon CloudWatch dashboard by using the AWS Management Console. Each deployment of the application requires its own CloudWatch dashboard.

How can the CloudOps engineer automate the creation of the CloudWatch dashboard each time the application is deployed?

A.

Create a script by using the AWS CLI to run the aws cloudformation put-dashboard command with the name of the dashboard. Run the command each time a new CloudFormation stack is created.

B.

Export the existing CloudWatch dashboard as JSON. Update the CloudFormation template to define an AWS::CloudWatch::Dashboard resource. Include the exported JSON in the resource ' s DashboardBody property.

C.

Update the CloudFormation template to define an AWS::CloudWatch::Dashboard resource. Use the intrinsic Ref function to reference the ID of the existing CloudWatch dashboard.

D.

Update the CloudFormation template to define an AWS::CloudWatch::Dashboard resource. Specify the name of the existing dashboard in the DashboardName property.

Full Access
Question # 18

A company ' s CloudOps engineer is troubleshooting communication between the components of an application. The company configured VPC flow logs to be published to Amazon CloudWatch Logs. However, there are no logs in CloudWatch Logs.

What could be blocking the VPC flow logs from being published to CloudWatch Logs?

A.

The IAM policy attached to the IAM role for the flow log is missing the logs:CreateLogGroup permission.

B.

The IAM policy attached to the IAM role for the flow log is missing the logs:CreateExportTask permission.

C.

The VPC is configured for IPv6 addresses.

D.

The VPC is peered with another VPC in the AWS account.

Full Access
Question # 19

An application uses an Amazon Aurora MySQL DB cluster that includes one Aurora Replica. The application’s read performance degrades when there are more than 200 user connections. The number of user connections is approximately 180 on a consistent basis. Occasionally, the number of user connections increases rapidly to more than 200.

A CloudOps engineer must implement a solution that will scale the application automatically as user demand increases or decreases.

Which solution will meet these requirements?

A.

Modify the DB cluster by increasing the Aurora Replica instance size.

B.

Modify the DB cluster by changing to serverless mode whenever the number of user connections exceeds 200.

C.

Migrate to a new Aurora DB cluster that has multiple writer instances. Modify the application’s database connection string.

D.

Create an auto scaling policy that has a target value of 195 for the DatabaseConnections metric.

Full Access
Question # 20

A company hosts a database on an Amazon RDS Multi-AZ DB instance. The database is not encrypted. The company’s new security policy requires all AWS resources to be encrypted at rest and in transit.

What should a CloudOps engineer do to encrypt the database?

A.

Configure encryption on the existing DB instance.

B.

Take a snapshot of the DB instance. Encrypt the snapshot. Restore the snapshot to the same DB instance.

C.

Encrypt the standby replica in a secondary Availability Zone. Promote the standby replica to the primary DB instance.

D.

Take a snapshot of the DB instance. Copy and encrypt the snapshot. Create a new DB instance by restoring the encrypted copy.

Full Access
Question # 21

A company moves workloads from public subnets to private subnets to improve security. During testing, the company discovers that servers in the private subnets cannot reach an external API. The VPC has a CIDR block of 10.0.0.0/16. The VPC contains two public subnets and two private subnets. The VPC has one internet gateway and has a NAT gateway in each of the private subnets.

The company must ensure that workloads that run in the private subnets can reach the external API.

Which solution will meet this requirement?

A.

Deploy an outbound-only internet gateway to allow traffic from private subnets to the internet. Edit the route tables to direct outbound traffic through the outbound-only internet gateway.

B.

Create and configure an Amazon API Gateway HTTP API as a proxy for the external API. Edit the route tables to direct outbound traffic to the HTTP API.

C.

Deploy a new NAT gateway that has an Elastic IP address in each public subnet. Edit the route tables to direct outbound traffic through the NAT gateways.

D.

Create a VPC interface endpoint. Edit the route tables to direct outbound traffic through the endpoint.

Full Access
Question # 22

A CloudOps engineer needs to track the costs of data transfer between AWS Regions. The CloudOps engineer must implement a solution to send alerts to an email distribution list when transfer costs reach 75% of a specific threshold.

What should the CloudOps engineer do to meet these requirements?

A.

Create an AWS Cost and Usage Report. Analyze the results in Amazon Athena. Configure an alarm to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic when costs reach 75% of the threshold. Subscribe the email distribution list to the topic.

B.

Create an Amazon CloudWatch billing alarm to detect when costs reach 75% of the threshold. Configure the alarm to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the email distribution list to the topic.

C.

Use AWS Budgets to create a cost budget for data transfer costs. Set an alert at 75% of the budgeted amount. Configure the budget to send a notification to the email distribution list when costs reach 75% of the threshold.

D.

Set up a VPC flow log. Set up a subscription filter to an AWS Lambda function to analyze data transfer. Configure the Lambda function to send a notification to the email distribution list when costs reach 75% of the threshold.

Full Access
Question # 23

A company uses an Amazon Simple Queue Service (Amazon SQS) queue and Amazon EC2 instances in an Auto Scaling group with target tracking for a web application. The company collects the ASGAverageNetworkIn metric but notices that instances do not scale fast enough during peak traffic. There are a large number of SQS messages accumulating in the queue.

A CloudOps engineer must reduce the number of SQS messages during peak periods.

Which solution will meet this requirement?

A.

Define and use a new custom Amazon CloudWatch metric based on the SQS ApproximateNumberOfMessagesDelayed metric in the target tracking policy.

B.

Define and use Amazon CloudWatch metric math to calculate the SQS queue backlog for each instance in the target tracking policy.

C.

Define and use step scaling by specifying a ChangeInCapacity value for the EC2 instances.

D.

Define and use simple scaling by specifying a ChangeInCapacity value for the EC2 instances.

Full Access
Question # 24

A company uses a large number of Linux-based Amazon EC2 instances to run business operations. The company uses AWS Systems Manager to manage the EC2 instances. The company wants to ensure that the Systems Manager Agent (SSM Agent) is always up to date with the latest version.

Which solution will meet this requirement in the MOST operationally efficient way?

A.

Enable the Auto update SSM Agent setting in Systems Manager Fleet Manager.

B.

Subscribe to SSM Agent GitHub notifications and use Lambda to update agents.

C.

Enable the Auto update SSM Agent setting in Systems Manager Patch Manager.

D.

Use GitHub notifications and a Systems Manager Automation document.

Full Access
Question # 25

A financial services company stores customer images in an Amazon S3 bucket in the us-east-1 Region. To comply with regulations, the company must ensure that all existing objects are replicated to an S3 bucket in a second AWS Region. If an object replication fails, the company must be able to retry replication for the object.

What solution will meet these requirements?

A.

Configure Amazon S3 Cross-Region Replication (CRR). Use Amazon S3 live replication to replicate existing objects.

B.

Configure Amazon S3 Cross-Region Replication (CRR). Use S3 Batch Replication to replicate existing objects.

C.

Configure Amazon S3 Cross-Region Replication (CRR). Use S3 Replication Time Control (S3 RTC) to replicate existing objects.

D.

Use S3 Lifecycle rules to move objects to the destination bucket in a second Region.

Full Access
Question # 26

A company runs applications that generate log files. The company stores the log files in Amazon S3. A CloudOps engineer must automatically process the log files whenever new files upload to the S3 bucket.

Which solution will meet this requirement?

A.

Configure an Amazon CloudWatch event rule that triggers on S3 PUT events and invokes an AWS Lambda function.

B.

Create a pipeline in AWS CodePipeline with a source stage that monitors the S3 bucket for new files and invokes an AWS Lambda function.

C.

Configure an S3 event notification to invoke an AWS Lambda function to process the new log files.

D.

Create an AWS Step Functions state machine with a wait state that monitors the S3 bucket for new files and invokes an AWS Lambda function.

Full Access
Question # 27

A company has a critical serverless application that uses multiple AWS Lambda functions. Each Lambda function generates 1 GB of log data daily in its own Amazon CloudWatch Logs log group. The company ' s security team asks for a count of application errors, grouped by type, across all of the log groups.

What should a CloudOps engineer do to meet this requirement?

A.

Perform a CloudWatch Logs Insights query that uses the stats command and count function.

B.

Perform a CloudWatch Logs search that uses the groupby keyword and count function.

C.

Perform an Amazon Athena query that uses the SELECT and GROUP BY keywords.

D.

Perform an Amazon RDS query that uses the SELECT and GROUP BY keywords.

Full Access
Question # 28

A CloudOps engineer is maintaining a web application that uses an Amazon CloudFront web distribution, an Application Load Balancer (ALB), Amazon RDS, and Amazon EC2 in a VPC. All services have logging enabled. The CloudOps engineer needs to investigate HTTP Layer 7 status codes from the web application.

Which log sources contain the status codes? (Select TWO.)

A.

VPC Flow Logs

B.

AWS CloudTrail logs

C.

ALB access logs

D.

CloudFront access logs

E.

RDS logs

Full Access
Question # 29

A SysOps administrator needs to encrypt an existing Amazon Elastic File System (Amazon EFS) file system by using an existing AWS KMS customer managed key.

Which solution will meet these requirements?

A.

Use Amazon EFS replication to create a new file system. Copy the data and metadata from the existing file system to the new file system. Specify the KMS customer managed key in the replication configuration. When the replication process finishes, fail over to the new encrypted file system.

B.

Directly modify the file system to use encryption. Specify the KMS customer managed key.

C.

Use Amazon EFS replication to create a new file system. Copy the data and metadata from the existing file system to the new file system. Generate a new TLS certificate. Specify the TLS certificate in the replication configuration. When the replication process finishes, fail over to the new encrypted file system.

D.

Create a new EFS file system that is encrypted with the KMS customer managed key. Create an Amazon EC2 instance to copy the files. Mount the encrypted file system and unencrypted file system on the instance. Copy all data from the unencrypted file system to the encrypted file system. Unmount the unencrypted file system and remove the temporary instance.

Full Access
Question # 30

A company runs several workloads on AWS. The company identifies five AWS Trusted Advisor service quota metrics to monitor in a specific AWS Region. The company wants to receive email notifications each time resource usage exceeds 60% of one of the service quotas.

Which solution will meet these requirements?

A.

Create five Amazon CloudWatch alarms, one for each Trusted Advisor service quota metric. Configure an Amazon Simple Notification Service (Amazon SNS) topic for email notification each time that usage exceeds 60% of one of the service quotas.

B.

Create five Amazon CloudWatch alarms, one for each Trusted Advisor service quota metric. Configure an Amazon Simple Queue Service (Amazon SQS) queue for email notification.

C.

Use the AWS Health Dashboard to monitor each Trusted Advisor service quota metric. Configure an Amazon SQS queue for email notification.

D.

Use the AWS Health Dashboard to monitor each Trusted Advisor service quota metric. Configure an Amazon SNS topic for email notification.

Full Access
Question # 31

A company hosts a web application on an Amazon EC2 instance. The web server logs are published to Amazon CloudWatch Logs. The log events have the same structure and include the HTTP response codes associated with user requests. The company needs to monitor the number of times the web server returns an HTTP 404 response.

What is the MOST operationally efficient solution that meets these requirements?

A.

Create a CloudWatch Logs metric filter that counts the number of times the web server returns an HTTP 404 response.

B.

Create a CloudWatch Logs subscription filter that counts the number of HTTP 404 responses.

C.

Create an AWS Lambda function that runs a CloudWatch Logs Insights query every hour.

D.

Create a script that runs a CloudWatch Logs Insights query every hour.

Full Access
Question # 32

A CloudOps engineer needs to create a report that shows how many bytes are sent to and received from each target group member for an Application Load Balancer (ALB).

Which combination of steps should the CloudOps engineer take to meet these requirements? (Select TWO.)

A.

Enable access logging for the ALB. Save the logs to an Amazon S3 bucket.

B.

Install the Amazon CloudWatch agent on the instances in the target group.

C.

Use Amazon Athena to query the ALB logs. Query the table. Use the received_bytes and sent_bytes fields to calculate the total bytes grouped by the target and port fields.

D.

Use Amazon Athena to query the ALB logs. Query the table. Use the received_bytes and sent_bytes fields to calculate the total bytes grouped by the client port field.

E.

Create an Amazon CloudWatch dashboard that shows the Sum statistic of the ProcessedBytes metric for the ALB.

Full Access
Question # 33

A company is migrating a legacy application to AWS. The application runs on EC2 instances across multiple Availability Zones behind an Application Load Balancer (ALB). The target group routing algorithm is set to weighted random, and the application requires session affinity (sticky sessions).

After deployment, users report random application errors that were not present before migration, even though target health checks are passing.

Which solution will meet this requirement?

A.

Set the routing algorithm of the target group to least outstanding requests.

B.

Turn on anomaly mitigation for the target group.

C.

Turn off the cross-zone load balancing attribute of the target group.

D.

Increase the deregistration delay attribute of the target group.

Full Access
Question # 34

A company plans to run a public web application on Amazon EC2 instances behind an Elastic Load Balancing (ELB) load balancer. The company’s security team wants to protect the website by using AWS Certificate Manager (ACM) certificates. The load balancer must automatically redirect any HTTP requests to HTTPS.

Which solution will meet these requirements?

A.

Create an Application Load Balancer that has one HTTPS listener on port 80. Attach an SSL/TLS certificate to port 80.

B.

Create an Application Load Balancer that has one HTTP listener on port 80 and one HTTPS listener on port 443. Attach an SSL/TLS certificate to port 443. Create a rule to redirect requests from port 80 to port 443.

C.

Create an Application Load Balancer that has two TCP listeners on ports 80 and 443. Attach an SSL/TLS certificate to port 443.

D.

Create a Network Load Balancer with TCP listeners on ports 80 and 443. Attach an SSL/TLS certificate to port 443.

Full Access
Question # 35

A company uses AWS CloudFormation to manage a stack of Amazon EC2 instances on AWS. A CloudOps engineer needs to keep the instances and all of the instances ' data, even if someone deletes the stack.

Which solution will meet these requirements?

A.

Set the DeletionPolicy attribute to Snapshot for the EC2 instance resource in the CloudFormation template.

B.

Automate backups by using Amazon Data Lifecycle Manager (Amazon DLM).

C.

Create a backup plan in AWS Backup.

D.

Set the DeletionPolicy attribute to Retain for the EC2 instance resource in the CloudFormation template.

Full Access
Question # 36

A CloudOps engineer is examining the following AWS CloudFormation template:

AWSTemplateFormatVersion: ' 2010-09-09 '

Description: ' Creates an EC2 Instance '

Resources:

EC2Instance:

Type: AWS::EC2::Instance

Properties:

ImageId: ami-79fd7eee

InstanceType: m5n.large

SubnetId: subnet-1abc3d3fg

PrivateDnsName: ip-10-24-34-0.ec2.internal

Tags:

- Key: Name

Value: !Sub " ${AWS::StackName} Instance "

Why will the stack creation fail?

A.

The Outputs section of the CloudFormation template was omitted.

B.

The Parameters section of the CloudFormation template was omitted.

C.

The PrivateDnsName cannot be set from a CloudFormation template.

D.

The VPC was not specified in the CloudFormation template.

Full Access
Question # 37

A CloudOps engineer has successfully deployed a VPC with an AWS CloudFormation template. The CloudOps engineer wants to deploy the same template across multiple accounts that are managed through AWS Organizations.

Which solution will meet this requirement with the LEAST operational overhead?

A.

Assume the OrganizationAccountAccessRole IAM role from the management account. Deploy the template in each of the accounts.

B.

Create an AWS Lambda function to assume a role in each account. Deploy the template by using the AWS CloudFormation CreateStack API call.

C.

Create an AWS Lambda function to query for a list of accounts. Deploy the template by using the AWS CloudFormation CreateStack API call.

D.

Use AWS CloudFormation StackSets from the management account to deploy the template in each of the accounts.

Full Access
Question # 38

A company has a web application that is experiencing performance problems many times each night. A root cause analysis reveals sudden increases in CPU utilization that last 5 minutes on an Amazon EC2 Linux instance. A CloudOps engineer must find the process ID (PID) of the service or process that is consuming more CPU.

What should the CloudOps engineer do to collect the process utilization information with the LEAST amount of effort?

A.

Configure the Amazon CloudWatch agent procstat plugin to capture CPU process metrics.

B.

Configure an AWS Lambda function to run every minute to capture the PID and send a notification.

C.

Log in to the EC2 instance each night and run the top command.

D.

Use the default Amazon CloudWatch CPUUtilization metric.

Full Access
Question # 39

A CloudOps engineer must ensure that all of a company ' s current and future Amazon S3 buckets have logging enabled. If an S3 bucket does not have logging enabled, an automated process must enable logging for the S3 bucket.

Which solution will meet these requirements?

A.

Use AWS Trusted Advisor to perform a check for S3 buckets that do not have logging enabled. Configure the check to enable logging for S3 buckets that do not have logging enabled.

B.

Configure an S3 bucket policy that requires all current and future S3 buckets to have logging enabled.

C.

Use the s3-bucket-logging-enabled AWS Config managed rule. Add a remediation action that uses an AWS Lambda function to enable logging.

D.

Use the s3-bucket-logging-enabled AWS Config managed rule. Add a remediation action that uses the AWS-ConfigureS3BucketLogging AWS Systems Manager Automation runbook.

Full Access
Question # 40

A company needs to upload gigabytes of files daily to Amazon S3 and requires higher throughput and faster upload speeds.

Which action should a CloudOps engineer take?

A.

Create an Amazon CloudFront distribution with the GET HTTP method allowed and the S3 bucket as an origin.

B.

Create an Amazon ElastiCache cluster and enable caching for the S3 bucket.

C.

Set up AWS Global Accelerator and configure it with the S3 bucket.

D.

Enable S3 Transfer Acceleration and use the acceleration endpoint when uploading files.

Full Access
Question # 41

A company hosts a production MySQL database on an Amazon Aurora single-node DB cluster. The database is queried heavily for reporting purposes. The DB cluster is experiencing periods of performance degradation because of high CPU utilization and maximum connections errors. A CloudOps engineer needs to improve the stability of the database.

Which solution will meet these requirements?

A.

Create an Aurora Replica node. Create an Auto Scaling policy to scale replicas based on CPU utilization. Ensure that all reporting requests use the read-only connection string.

B.

Create a second Aurora MySQL single-node DB cluster in a second Availability Zone. Ensure that all reporting requests use the connection string for this additional node.

C.

Create an AWS Lambda function that caches reporting requests. Ensure that all reporting requests call the Lambda function.

D.

Create a multi-node Amazon ElastiCache cluster. Ensure that all reporting requests use the ElastiCache cluster. Use the database if the data is not in the cache.

Full Access
Question # 42

A company uses Amazon S3 for object storage. A CloudOps engineer notices that the company’s Amazon S3 usage has doubled every month across all the company’s S3 buckets for the previous year. The company stores and consumes data in the same AWS Region where the data is generated. The company never accesses data that is older than 30 days. The CloudOps engineer needs to optimize Amazon S3 costs for the company.

Which solution will meet this requirement with the LEAST operational overhead?

A.

Create an AWS Lambda function to delete data that is older than 30 days. Use an Amazon EventBridge cron expression to invoke the function monthly.

B.

Use S3 Storage Lens to identify objects that are older than 30 days across all S3 buckets.

C.

Modify the object creation lifecycle to check for and delete any objects that were created more than 30 days ago.

D.

Configure an S3 Lifecycle policy to expire any object that was created more than 30 days ago.

Full Access
Question # 43

A company operates compute resources in a VPC and in the company’s on-premises data center. The company already has an AWS Direct Connect connection between the VPC and the on-premises data center.

A CloudOps engineer needs to ensure that Amazon EC2 instances in the VPC can resolve DNS names for hosts in the on-premises data center.

Which solution will meet this requirement with the LEAST amount of ongoing maintenance?

A.

Create an Amazon Route 53 private hosted zone. Populate the zone with the hostnames and IP addresses of the hosts in the on-premises data center.

B.

Create an Amazon Route 53 Resolver outbound endpoint. Add the IP addresses of an on-premises DNS server for the domain names that need to be forwarded.

C.

Set up a forwarding rule for reverse DNS queries in Amazon Route 53 Resolver. Set the enableDnsHostnames attribute to true for the VPC.

D.

Add the hostnames and IP addresses for the on-premises hosts to the /etc/hosts file of each EC2 instance.

Full Access
Question # 44

A company runs a web application on three Amazon EC2 instances behind an Application Load Balancer (ALB). The company notices that random periods of increased traffic cause a degradation in the application’s performance.

A CloudOps engineer must scale the application to meet the increased traffic.

Which solution meets these requirements?

A.

Create an Amazon CloudWatch alarm to monitor application latency and increase the size of each EC2 instance if the desired threshold is reached.

B.

Create an Amazon EventBridge rule to monitor application latency and add an EC2 instance to the ALB if the desired threshold is reached.

C.

Deploy the application to an Auto Scaling group of EC2 instances with a target tracking scaling policy. Attach the ALB to the Auto Scaling group.

D.

Deploy the application to an Auto Scaling group of EC2 instances with a scheduled scaling policy. Attach the ALB to the Auto Scaling group.

Full Access
Question # 45

A finance company stores confidential data in an Amazon S3 bucket. The company uses Amazon Quick Suite, previously known as Amazon QuickSight, to analyze the data and create dashboard reports. The company requires that all data access and connections to Quick Suite remain within the company’s VPC network boundary.

Which solution will meet these requirements?

A.

Create an interface VPC endpoint for Quick Suite. Configure the endpoint to connect to Quick Suite within the VPC by using AWS PrivateLink. Create a manifest file that points to the S3 data. Grant Quick Suite permission to access the S3 bucket.

B.

Set up a VPC endpoint for Quick Suite. Use an Amazon EC2 instance as a proxy to establish a direct connection between the VPC and Quick Suite. Create a manifest file that points to the S3 data. Store the manifest on the EC2 instance. Grant Quick Suite permission to access the EC2 instance.

C.

Configure an Amazon S3 VPC gateway endpoint. Route all data from Quick Suite through the endpoint to transfer data. Grant Quick Suite permission to access the S3 bucket.

D.

Configure a NAT gateway in the company’s VPC. Route all data from Quick Suite through the NAT gateway to transfer data. Grant Quick Suite permission to access the S3 bucket.

Full Access
Question # 46

A company moves workloads from public subnets to private subnets to improve security. During testing, servers in the private subnets cannot reach an external API. The VPC has a CIDR block of 10.0.0.0/16, two public subnets, two private subnets, one internet gateway, and a NAT gateway in each private subnet.

The company must ensure that workloads in the private subnets can reach the external API.

Which solution will meet this requirement?

A.

Deploy an outbound-only internet gateway and update route tables.

B.

Create an Amazon API Gateway HTTP API as a proxy.

C.

Deploy a NAT gateway in each public subnet and update private subnet route tables.

D.

Create a VPC interface endpoint and update route tables.

Full Access
Question # 47

A company runs applications on Amazon EC2 instances. The company wants to ensure that SSH ports on the EC2 instances are never open. The company has enabled AWS Config and has set up the restricted-ssh AWS managed rule.

A CloudOps engineer must implement a solution to remediate SSH port access for noncompliant security groups.

What should the engineer do to meet this requirement with the MOST operational efficiency?

A.

Configure the AWS Config rule to identify noncompliant security groups. Configure the rule to use the AWS-PublishSNSNotification AWS Systems Manager Automation runbook to send notifications about noncompliant resources.

B.

Configure the AWS Config rule to identify noncompliant security groups. Configure the rule to use the AWS-DisableIncomingSSHOnPort22 AWS Systems Manager Automation runbook to remediate noncompliant resources.

C.

Make an AWS Config API call to search for noncompliant security groups. Disable SSH access for noncompliant security groups by using a Deny rule.

D.

Configure the AWS Config rule to identify noncompliant security groups. Manually update each noncompliant security group to remove the Allow rule.

Full Access
Question # 48

A company uses AWS Organizations to manage its AWS environment. The company implements a process that uses prebuilt Amazon Machine Images (AMIs) to launch instances as a security measure. All AMIs are tagged automatically with a key named ApprovedAMI.

The company wants to ensure that employees can use only the approved prebuilt AMIs to launch new instances.

Which solution will meet this requirement?

A.

Implement a tag policy for the company ' s organization to require users to set the ApprovedAMI tag to launch new EC2 instances.

B.

Implement an IAM policy that includes an aws:ResourceTag/ApprovedAMI condition.

C.

Set up an AWS Config required-tags rule to prevent users from launching any nonapproved AMIs.

D.

Use Amazon GuardDuty to constantly monitor DefenseEvasion:EC2/UnusualDoHActivity findings.

Full Access
Question # 49

A company’s security policy prohibits connecting to Amazon EC2 instances through SSH and RDP. Instead, staff must use AWS Systems Manager Session Manager. Users report they cannot connect to one Ubuntu instance, even though they can connect to others.

What should a CloudOps engineer do to resolve this issue?

A.

Add an inbound rule for port 22 in the security group associated with the Ubuntu instance.

B.

Assign the AmazonSSMManagedInstanceCore managed policy to the EC2 instance profile for the Ubuntu instance.

C.

Configure the SSM Agent to log in with a user name of " ubuntu " .

D.

Generate a new key pair, configure Session Manager to use this new key pair, and provide the private key to the users.

Full Access
Question # 50

A company hosts a static website on Amazon S3. An Amazon CloudFront distribution presents this site to global users. The company uses the Managed-CachingDisabled CloudFront cache policy. The company ' s developers confirm that they frequently update a file in Amazon S3 with new information.

Users report that the website presents correct information when the website first loads the file. However, the users ' browsers do not retrieve the updated file after a refresh.

What should a SysOps administrator recommend to fix this issue?

A.

Add a Cache-Control header field with max-age=0 to the S3 object.

B.

Change the CloudFront cache policy to Managed-CachingOptimized.

C.

Disable bucket versioning in the S3 bucket configuration.

D.

Enable content compression in the CloudFront configuration.

Full Access
Question # 51

A company runs a critical application by using Amazon DynamoDB. During a recent deployment, the application accidentally wrote incorrect data to a DynamoDB table. The table has point-in-time recovery (PITR) enabled with continuous backups. DynamoDB Streams is enabled on the table. The company’s recovery point objective (RPO) is 2 minutes.

A CloudOps engineer must restore the table to its state from 2 minutes before the corruption occurred.

Which solution will meet these requirements?

A.

Use PITR to restore the table to 2 minutes before the incorrect data was written. Update the existing table in place.

B.

Create a new table by using PITR to restore the table from 2 minutes before the corruption occurred. Update the application to reference the new table.

C.

Restore the most recent on-demand snapshot. Use DynamoDB Streams to replay all transactions since the snapshot was taken.

D.

Use DynamoDB Streams to replay the table’s change events in reverse order to undo the writing of the incorrect data.

Full Access
Question # 52

A CloudOps engineer has created an AWS Service Catalog portfolio and shared it with a second AWS account in the company, managed by a different CloudOps engineer.

Which action can the CloudOps engineer in the second account perform?

A.

Add a product from the imported portfolio to a local portfolio.

B.

Add new products to the imported portfolio.

C.

Change the launch role for the products contained in the imported portfolio.

D.

Customize the products in the imported portfolio.

Full Access
Question # 53

A medical research company uses an Amazon Bedrock powered AI assistant with agents and knowledge bases to provide physicians quick access to medical study protocols. The company needs to generate audit reports that contain user identities, usage data for Bedrock agents, access data for knowledge bases, and interaction parameters.

Which solution will meet these requirements?

A.

Use AWS CloudTrail to log API events from generative AI workloads. Store the events in CloudTrail Lake. Use SQL-like queries to generate reports.

B.

Use Amazon CloudWatch to capture generative AI application logs. Stream the logs to Amazon OpenSearch Service. Use an OpenSearch dashboard visualization to generate reports.

C.

Use Amazon CloudWatch to log API events from generative AI workloads. Send the events to an Amazon S3 bucket. Use Amazon Athena queries to generate reports.

D.

Use AWS CloudTrail to capture generative AI application logs. Stream the logs to Amazon Managed Service for Apache Flink. Use SQL queries to generate reports.

Full Access
Question # 54

A company has users that deploy Amazon EC2 instances with more Amazon EBS performance capacity than required. A CloudOps engineer must review all EBS volumes and create cost optimization recommendations based on IOPS and throughput.

What should the CloudOps engineer do in the MOST operationally efficient way?

A.

Review EC2 console monitoring graphs manually.

B.

Change instance types to EBS-optimized.

C.

Opt in to AWS Compute Optimizer and review EBS volume recommendations.

D.

Run fio benchmarks on each instance.

Full Access
Question # 55

A company is storing backups in an Amazon S3 bucket. These backups must not be deleted for at least 3 months after creation.

What should the CloudOps engineer do?

A.

Configure an IAM policy that denies the s3:DeleteObject action for all users. Three months after an object is written, remove the policy.

B.

Enable S3 Object Lock on a new S3 bucket in compliance mode. Place all backups in the new S3 bucket with a retention period of 3 months.

C.

Enable S3 Versioning on the existing S3 bucket. Configure S3 Lifecycle rules to protect the backups.

D.

Enable S3 Object Lock on a new S3 bucket in governance mode. Place all backups in the new S3 bucket with a retention period of 3 months.

Full Access
Question # 56

A company must ensure that all Amazon EC2 Windows instances that are launched in an AWS account have a third-party agent installed. The company uses AWS Systems Manager, and the Windows instances are tagged appropriately. The company must deploy periodic updates to the third-party agent when the updates become available.

Which combination of steps will meet these requirements with the LEAST operational effort? (Select TWO.)

A.

Create a Systems Manager Distributor package for the third-party agent.

B.

Create a Systems Manager OpsItem that includes the tag value for Windows. Attach Systems Manager inventory to the OpsItem.

C.

Create an AWS Lambda function. Program the Lambda function to log in to each instance and to install or update the third-party agent as needed.

D.

Create a Systems Manager State Manager association to run the AWS-RunRemoteScript document. Populate the details of the third-party agent package.

E.

Create a Systems Manager State Manager association to run the AWS-ConfigureAWSPackage document. Populate the details of the third-party agent package. Specify instance targets based on the appropriate tag value for Windows.

Full Access
Question # 57

A company ' s developers manually install software modules on Amazon EC2 instances to deploy new versions of a service. A security audit finds that instances contain inconsistent and unapproved modules.

A CloudOps engineer must create a new instance image that contains only approved software.

Which solution will meet these requirements?

A.

Use Amazon Detective to continuously find and uninstall unauthorized modules from the instances.

B.

Use Amazon GuardDuty to create and deploy an Amazon Machine Image (AMI) that includes only the approved modules.

C.

Use AWS Systems Manager Run Command to install the approved modules on all running instances during an in-place update.

D.

Use EC2 Image Builder to create and test an Amazon Machine Image (AMI) that includes only the approved modules. Update the deployment workflow to use the new AMI.

Full Access
Question # 58

A CloudOps engineer has an Amazon S3 bucket and a new AWS Lambda function. The CloudOps engineer tries to configure a new event notification from the S3 bucket to the Lambda function by using the Lambda console. The configuration fails and returns the following error: “Unable to validate the following destination configurations.”

The engineer confirms that the new Lambda function and the function’s IAM role are correctly configured.

What is the cause of this error?

A.

The maximum number of S3 event notification destinations has been exceeded for the S3 bucket.

B.

The S3 bucket owner needs to grant the Lambda function explicit cross-account permissions by using a resource policy.

C.

The new Lambda function’s resource-based policy is missing the lambda:InvokeFunction permission for Amazon S3.

D.

The S3 bucket has an existing stale event notification that points to a deleted or permission-deficient resource.

Full Access
Question # 59

A company plans to migrate several of its high-performance computing (HPC) virtual machines to Amazon EC2. The deployment must minimize network latency and maximize network throughput between the instances.

Which placement group strategy should the CloudOps engineer choose?

A.

Deploy the instances in a cluster placement group in one Availability Zone.

B.

Deploy the instances in a partition placement group in two Availability Zones.

C.

Deploy the instances in a partition placement group in one Availability Zone.

D.

Deploy the instances in a spread placement group in two Availability Zones.

Full Access
Question # 60

An Amazon EC2 instance is running an application that uses Amazon Simple Queue Service (Amazon SQS) queues. A CloudOps engineer must ensure that the application can read, write, and delete messages from the SQS queues.

Which solution will meet these requirements in the MOST secure manner?

A.

Create an IAM user with permissions and embed credentials in the application configuration.

B.

Create an IAM user with permissions and export credentials as environment variables.

C.

Create and associate an IAM role for EC2. Attach a policy that allows sqs:* permissions.

D.

Create and associate an IAM role for EC2. Attach a policy that allows SendMessage, ReceiveMessage, and DeleteMessage permissions.

Full Access
Question # 61

A company deploys an application on Amazon EC2 instances in an Auto Scaling group behind an Application Load Balancer (ALB). The company wants to protect the application from SQL injection attacks.

Which solution will meet this requirement?

A.

Deploy AWS Shield Advanced in front of the ALB. Enable SQL injection filtering.

B.

Deploy AWS Shield Standard in front of the ALB. Enable SQL injection filtering.

C.

Deploy a vulnerability scanner on each EC2 instance. Continuously scan the application code.

D.

Deploy AWS WAF in front of the ALB. Subscribe to an AWS Managed Rule for SQL injection filtering.

Full Access
Question # 62

A company needs to monitor its website ' s availability to end users. The company needs a solution to provide an Amazon Simple Notification Service (Amazon SNS) notification if the website ' s uptime decreases to less than 99%. The monitoring must provide an accurate view of the user experience on the website.

Which solution will meet these requirements?

A.

Create an Amazon CloudWatch alarm that is based on the website’s logs that are published to a CloudWatch Logs log group. Configure the alarm to publish an SNS notification if the number of HTTP 4xx and 5xx errors exceeds a specified threshold.

B.

Create an Amazon CloudWatch alarm that is based on the website ' s published metrics in CloudWatch. Configure the alarm to publish an SNS notification based on anomaly detection.

C.

Create an Amazon CloudWatch Synthetics heartbeat monitoring canary. Associate the canary with the website’s URL. Create a CloudWatch alarm for the canary. Configure the alarm to publish an SNS notification if the value of the SuccessPercent metric is less than 99%.

D.

Create an Amazon CloudWatch Synthetics broken link checker monitoring canary. Associate the canary with the website’s URL. Create a CloudWatch alarm for the canary. Configure the alarm to publish an SNS notification if the value of the SuccessPercent metric is less than 99%.

Full Access
Question # 63

A user working in the Amazon EC2 console increased the size of an Amazon Elastic Block Store (Amazon EBS) volume attached to an Amazon EC2 Windows instance. The change is not reflected in the file system.

What should a CloudOps engineer do to resolve this issue?

A.

Extend the file system with operating system-level tools to use the new storage capacity.

B.

Reattach the EBS volume to the EC2 instance.

C.

Reboot the EC2 instance that is attached to the EBS volume.

D.

Take a snapshot of the EBS volume. Replace the original volume with a volume that is created from the snapshot.

Full Access
Question # 64

A CloudOps engineer is troubleshooting an implementation of Amazon CloudWatch Synthetics. The CloudWatch Synthetics results must be sent to an Amazon S3 bucket.

The CloudOps engineer has copied the configuration of an existing canary that runs on a VPC that has an internet gateway attached. However, the CloudOps engineer cannot get the canary to successfully start on a private VPC that has no internet access.

What should the CloudOps engineer do to successfully run the canary on the private VPC?

A.

Ensure that the DNS resolution option and the DNS hostnames option are turned on in the VPC. Add the synthetics:GetCanaryRuns permission to the VPC. On the S3 bucket, add the IgnorePublicAcls permission to the CloudWatch Synthetics role.

B.

Ensure that the DNS resolution option and the DNS hostnames option are turned off in the VPC. Create a gateway VPC endpoint for Amazon S3. Add the permissions to allow CloudWatch Synthetics to use the S3 endpoint.

C.

Ensure that the DNS resolution option and the DNS hostnames option are turned off in the VPC. Add a security group to the canary to allow outbound traffic on the DNS port. Add the permissions to allow CloudWatch Synthetics to write to the S3 bucket.

D.

Ensure that the DNS resolution option and the DNS hostnames option are turned on in the VPC. Create an interface VPC endpoint for CloudWatch. Create a gateway VPC endpoint for Amazon S3. Add the permissions to allow CloudWatch Synthetics to use both endpoints.

Full Access
Question # 65

A company runs a retail website on multiple Amazon EC2 instances behind an Application Load Balancer (ALB). The company must secure traffic to the website over an HTTPS connection.

Which combination of actions should a SysOps administrator take to meet these requirements? (Select TWO.)

A.

Attach the certificate to each EC2 instance.

B.

Attach the certificate to the ALB.

C.

Create a private certificate in AWS Certificate Manager (ACM).

D.

Create a public certificate in AWS Certificate Manager (ACM).

E.

Export the certificate, and attach it to the website.

Full Access