AWS Solution Architect Associate Dump1
AWS Solution Architect Associate Dump1
AWS Solution Architect Associate Dump1
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
Explanation:
Key pairs consist of a public and private key, where you use the private key to create a digital signature, and then AWS uses the corresponding public key to
NEW QUESTION 1 validate the signature. Key pairs are used only for Amazon EC2 and Amazon CIoudFront.
A user is storing a large number of objects on AWS S3. The user wants to implement the search functionality among the objects. How can the user achieve this? Reference: http://docs.aws.amazon.com/generaI/latest/gr/aws-sec-cred-types.html
A. Yes
B. No NEW QUESTION 9
C. It does support in-place non-atomic updates In Amazon EC2, partial instance-hours are billed .
D. It is not defined
A. per second used in the hour
Answer: A B. per minute used
C. by combining partial segments into full hours
Explanation: D. as full hours
DynamoDB supports in-place atomic updates.
Reference: Answer: D
http://docs.aws.amazon.com/amazondynamodb/latest/developerguide/\NorkingWithItems.htmI#Working WithItems.AtomicCounters
Explanation:
Partial instance-hours are billed to the next hour. Reference: http://aws.amazon.com/ec2/faqs/
NEW QUESTION 5
In Amazon AWS, which of the following statements is true of key pairs?
NEW QUESTION 10
A. Key pairs are used only for Amazon SDKs. You are checking the workload on some of your General Purpose (SSD) and Provisioned IOPS (SSD) volumes and it seems that the I/O latency is higher than you
B. Key pairs are used only for Amazon EC2 and Amazon CIoudFront. require. You should probably check the to make sure that your application is not trying to drive more IOPS than you have
C. Key pairs are used only for Elastic Load Balancing and AWS IAM. provisioned.
D. Key pairs are used for all Amazon service
A. Amount of IOPS that are available
Answer: B B. Acknowledgement from the storage subsystem
C. Average queue length
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
D. Time it takes for the I/O operation to complete A. Define maintenance period for database engines
B. Launch Amazon RDS instances in a subnet
Answer: C C. Create, describe, modify, and delete DB instances
D. Control what IP addresses or EC2 instances can connect to your databases on a DB instance
Explanation:
In EBS workload demand plays an important role in getting the most out of your General Purpose (SSD) and Provisioned IOPS (SSD) volumes. In order for your Answer: D
volumes to deliver the amount of IOPS that are available, they need to have enough I/O requests sent to them. There is a relationship between the demand on the
volumes, the amount of IOPS that are available to them, and the latency of the request (the amount of time it takes for the I/O operation to complete). Explanation:
Latency is the true end-to-end client time of an I/O operation; in other words, when the client sends a IO, how long does it take to get an acknowledgement from In Amazon RDS, security groups are used to control what IP addresses or EC2 instances can connect to your databases on a DB instance.
the storage subsystem that the IO read or write is complete. When you first create a DB instance, its firewall prevents any database access except through rules specified by an associated security group.
If your I/O latency is higher than you require, check your average queue length to make sure that your application is not trying to drive more IOPS than you have Reference: http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.htmI
provisioned. You can maintain high IOPS while keeping latency down by maintaining a low average queue length (which is achieved by provisioning more IOPS for
your volume).
Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-workload-demand.htmI NEW QUESTION 23
An organization has created an application which is hosted on the AWS EC2 instance. The application stores images to S3 when the end user uploads to it. The
organization does not want to store the AWS secure credentials required to access the S3 inside the instance. Which of the below mentioned options is a possible
NEW QUESTION 10 solution to avoid any security threat?
Much of your company's data does not need to be accessed often, and can take several hours for retrieval time, so it's stored on Amazon Glacier. However
someone within your organization has expressed concerns that his data is more sensitive than the other data, and is wondering whether the high A. Use the IAM based single sign between the AWS resources and the organization application.
level of encryption that he knows is on S3 is also used on the much cheaper Glacier service. Which of the following statements would be most applicable in B. Use the IAM role and assign it to the instance.
regards to this concern? C. Since the application is hosted on EC2, it does not need credentials to access S3.
D. Use the X.509 certificates instead of the access and the secret access key
A. There is no encryption on Amazon Glacier, that's why it is cheaper.
B. Amazon Glacier automatically encrypts the data using AES-128 a lesser encryption method than Amazon S3 but you can change it to AES-256 if you are willing Answer: B
to pay more.
C. Amazon Glacier automatically encrypts the data using AES-256, the same as Amazon S3. Explanation:
D. Amazon Glacier automatically encrypts the data using AES-128 a lesser encryption method than Amazon S3. The AWS IAM role uses temporary security credentials to access AWS services. Once the role is assigned to an instance, it will not need any security credentials
to be stored on the instance. Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html
Answer: C
Answer: D
NEW QUESTION 12
is a fast, filexible, fully managed push messaging service. Explanation:
In AWS an access key is required in order to sign requests that you make using the command-line interface (CLI), using the AWS SDKs, or using direct API calls.
A. Amazon SNS Anyone who has the access key for your root account has unrestricted access to all the resources in your account, including billing information. One of the best
B. Amazon SES ways to protect your account is to not have an access key for your root account. We recommend that unless you must have a root access key (this is very rare),
C. Amazon SQS that you do not generate one. Instead, AWS best practice is to create one or more AWS Identity and Access Management (IAM) users, give them the necessary
D. Amazon FPS permissions, and use IAM users for everyday interaction with AWS.
Reference:
Answer: A http://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.htmI#root-password
Explanation:
Amazon Simple Notification Service (Amazon SNS) is a fast, filexible, fully managed push messaging service. Amazon SNS makes it simple and cost-effective to NEW QUESTION 32
push to mobile devices such as iPhone, iPad, Android, Kindle Fire, and internet connected smart devices, as well as pushing to other distributed services. You need to change some settings on Amazon Relational Database Service but you do not want the database to reboot immediately which you know might
Reference: http://aws.amazon.com/sns/?nc1=h_I2_as happen depending on the setting that you change. Which of the following will cause an immediate DB instance reboot to occur?
A. You change storage type from standard to PIOPS, and Apply Immediately is set to true.
NEW QUESTION 17 B. You change the DB instance class, and Apply Immediately is set to false.
As AWS grows, most of your cIients' main concerns seem to be about security, especially when all of their competitors also seem to be using AWS. One of your C. You change a static parameter in a DB parameter group.
clients asks you whether having a competitor who hosts their EC2 instances on the same physical host would make it easier for the competitor to hack into the D. You change the backup retention period for a DB instance from 0 to a nonzero value or from a nonzero value to 0, and Apply Immediately is set to false.
cIient's data. Which of the following statements would be the best choice to put your cIient's mind at rest?
Answer: A
A. Different instances running on the same physical machine are isolated from each other via a 256-bit Advanced Encryption Standard (AES-256).
B. Different instances running on the same physical machine are isolated from each other via the Xen hypervisor and via a 256-bit Advanced Encryption Standard Explanation:
(AES-256). A DB instance outage can occur when a DB instance is rebooted, when the DB instance is put into a state that prevents access to it, and when the database is
C. Different instances running on the same physical machine are isolated from each other via the Xen hypervisor. restarted. A reboot can occur when you manually reboot your DB instance or when you change a DB instance setting that requires a reboot before it can take
D. Different instances running on the same physical machine are isolated from each other via IAM permissions. effect.
A DB instance reboot occurs immediately when one of the following occurs:
Answer: C You change the backup retention period for a DB instance from 0 to a nonzero value or from a nonzero value to 0 and set Apply Immediately to true.
You change the DB instance class, and Apply Immediately is set to true.
Explanation: You change storage type from standard to PIOPS, and Apply Immediately is set to true.
Amazon Elastic Compute Cloud (EC2) is a key component in Amazon’s Infrastructure as a Service (IaaS), providing resizable computing capacity using server A DB instance reboot occurs during the maintenance window when one of the following occurs:
instances in AWS’s data centers. Amazon EC2 is designed to make web-scale computing easier by enabling you to obtain and configure capacity with minimal You change the backup retention period for a DB instance from 0 to a nonzero value or from a nonzero value to 0, and Apply Immediately is set to false.
friction. You change the DB instance class, and Apply Immediately is set to false. Reference:
You create and launch instances, which are collections of platform hardware and software. Different instances running on the same physical machine are isolated http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Troub|eshooting.htm|#CHAP_TroubI eshooting.Security
from each other via the Xen hypervisor.
Amazon is active in the Xen community, which provides awareness of the latest developments. In addition, the AWS firewall resides within the hypervisor layer,
between the physical network interface and the instance's virtual interface. All packets must pass through this layer, thus an instance’s neighbors have no more NEW QUESTION 35
access to that instance than any other host on the Internet and can be treated as if they are on You are setting up a very complex financial services grid and so far it has 5 Elastic IP (EIP) addresses.
separate physical hosts. The physical RAM is separated using similar mechanisms. You go to assign another EIP address, but all accounts are limited to 5 Elastic IP addresses per region by default, so you aren't able to. What is the reason for
Reference: http://d0.awsstatic.com/whitepapers/Security/AWS%20Security%20Whitepaper.pdf this?
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
D. There are only 5 network interfaces per instanc In AWS EC2, while configuring a security group, the user needs to specify the IP address in CIDR notation. The CIDR IP range 10.20.30.40/32 says it is for a
single IP 10.20.30.40. If the user specifies the IP as 10.20.30.40 only, the security group will not accept and ask it in a CIRD format.
Answer: C Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html
Explanation:
Public (IPV4) internet addresses are a scarce resource. There is only a limited amount of public IP space available, and Amazon EC2 is committed to helping use NEW QUESTION 45
that space efficiently. You have been using T2 instances as your CPU requirements have not been that intensive. However you now start to think about larger instance types and start
By default, all accounts are limited to 5 Elastic IP addresses per region. If you need more than 5 Elastic IP addresses, AWS asks that you apply for your limit to be looking at M and IV|3 instances. You are a little confused as to the differences between them as they both seem to have the same ratio of CPU and memory.
raised. They will ask you to think through your use case and help them understand your need for additional addresses. Which statement below is incorrect as to why you would use one over the other?
Reference: http://aws.amazon.com/ec2/faqs/#How_many_instances_can_I_run_in_Amazon_EC2
A. M3 instances are less expensive than M1 instances.
B. IV|3 instances are configured with more swap memory than M instances.
NEW QUESTION 37 C. IV|3 instances provide better, more consistent performance that M instances for most use-cases.
You want to use AWS Import/Export to send data from your S3 bucket to several of your branch offices. What should you do if you want to send 10 storage units to D. M3 instances also offer SSD-based instance storage that delivers higher I/O performanc
AWS?
Answer: B
A. Make sure your disks are encrypted prior to shipping.
B. Make sure you format your disks prior to shipping. Explanation:
C. Make sure your disks are 1TB or more. Amazon EC2 allows you to set up and configure everything about your instances from your operating system up to your applications. An Amazon Nlachine Image
D. Make sure you submit a separate job request for each devic (AMI) is simply a packaged-up environment that includes all the necessary bits to set up and boot your instance.
M1 and M3 Standard instances have the same ratio of CPU and memory, some reasons below as to why you would use one over the other.
Answer: D IV|3 instances provide better, more consistent performance that M instances for most use-cases. M3 instances also offer SSD-based instance storage that delivers
higher I/O performance.
Explanation: M3 instances are also less expensive than M1 instances. Due to these reasons, we recommend M3 for applications that require general purpose instances with a
When using Amazon Import/Export, a separate job request needs to be submitted for each physical device even if they belong to the same import or export job. balance of compute, memory, and network resources.
Reference: http://docs.aws.amazon.com/AWSImportExport/latest/DG/Concepts.html However, if you need more disk storage than what is provided in M3 instances, you may still find M1 instances useful for running your applications.
Reference: https://aws.amazon.com/ec2/faqs/
NEW QUESTION 38
A user needs to run a batch process which runs for 10 minutes. This will only be run once, or at maximum twice, in the next month, so the processes will be NEW QUESTION 48
temporary only. The process needs 15 X-Large instances. The process downloads the code from S3 on each instance when it is launched, and then generates a A user wants to achieve High Availability with PostgreSQL DB. Which of the below mentioned functionalities helps achieve HA?
temporary log file. Once the instance is terminated, all the data will be lost. Which of the below mentioned pricing models should the user choose in this case?
A. Mu|ti AZ
A. Spot instance. B. Read Replica
B. Reserved instance. C. Multi region
C. On-demand instance. D. PostgreSQL does not support HA
D. EBS optimized instanc
Answer: A
Answer: A
Explanation:
Explanation: The Multi AZ feature allows the user to achieve High Availability. For Multi AZ, Amazon RDS automatically provisions and maintains a synchronous "standby"
In Amazon Web Services, the spot instance is useful when the user wants to run a process temporarily. The spot instance can terminate the instance if the other replica in a different Availability Zone. Reference: http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Welcome.html
user outbids the existing bid. In this case all storage is temporary and the data is not required to be persistent. Thus, the spot instance is a good option to save
money.
Reference: http://aws.amazon.com/ec2/purchasing-options/spot-instances/ NEW QUESTION 53
A user has created photo editing software and hosted it on EC2. The software accepts requests from the user about the photo format and resolution and sends a
message to S3 to enhance the picture accordingly. Which of the below mentioned AWS services will help make a scalable software with the AWS infrastructure in
NEW QUESTION 41 this scenario?
An existing client comes to you and says that he has heard that launching instances into a VPC (virtual private cloud) is a better strategy than launching instances
into a EC2-classic which he knows is what you currently do. You suspect that he is correct and he has asked you to do some research about this and get back to A. AWS Simple Notification Service
him. Which of the following statements is true in regards to what ability launching your instances into a VPC instead of EC2-Classic gives you? B. AWS Simple Queue Service
C. AWS Elastic Transcoder
A. All of the things listed here. D. AWS Glacier
B. Change security group membership for your instances while they're running
C. Assign static private IP addresses to your instances that persist across starts and stops Answer: B
D. Define network interfaces, and attach one or more network interfaces to your instances
Explanation:
Answer: A Amazon Simple Queue Service (SQS) is a fast, reliable, scalable, and fully managed message queuing service. SQS provides a simple and cost-effective way to
decouple the components of an application. The user can configure SQS, which will decouple the call between the EC2 application and S3. Thus, the application
Explanation: does not keep waiting for S3 to provide the data.
By launching your instances into a VPC instead of EC2-Classic, you gain the ability to: Assign static private IP addresses to your instances that persist across Reference: http://aws.amazon.com/sqs/faqs/
starts and stops Assign multiple IP addresses to your instances
Define network interfaces, and attach one or more network interfaces to your instances Change security group membership for your instances while they're
running NEW QUESTION 55
Control the outbound traffic from your instances (egress filtering) in addition to controlling the inbound traffic to them (ingress filtering) Which one of the following answers is not a possible state of Amazon CIoudWatch Alarm?
Add an additional layer of access control to your instances in the form of network access control lists (ACL)
Run your instances on single-tenant hardware A. INSUFFICIENT_DATA
Reference: http://media.amazonwebservices.com/AWS_CIoud_Best_Practices.pdf B. ALARM
C. OK
D. STATUS_CHECK_FAILED
NEW QUESTION 44
A user is accessing an EC2 instance on the SSH port for IP 10.20.30.40. Which one is a secure way to configure that the instance can be accessed only from this Answer: D
IP?
Explanation:
A. In the security group, open port 22 for IP 10.20.30.40 Amazon CIoudWatch Alarms have three possible states: OK: The metric is within the defined threshold ALARM: The metric is outside of the defined threshold
B. In the security group, open port 22 for IP 10.20.30.40/32 INSUFFICIENT_DATA: The alarm has just started, the metric is not available, or not enough data is available for the metric to determine the alarm state
C. In the security group, open port 22 for IP 10.20.30.40/24 Reference: http://docs.aws.amazon.com/AmazonCIoudWatch/latest/DeveloperGuide/AlarmThatSendsEmaiI.html
D. In the security group, open port 22 for IP 10.20.30.40/0
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
B. Detach Instance
C. AttachVoIume NEW QUESTION 71
D. Attachlnstance You have been asked to tighten up the password policies in your organization after a serious security breach, so you need to consider every possible security
measure. Which of the following is not an account password policy for IAM Users that can be set?
Answer: A
A. Force IAM users to contact an account administrator when the user has allowed his or her password to expue.
Explanation: B. A minimum password length.
If your volume stays in the detaching state, you can force the detachment by clicking Force Detach. Reference: C. Force IAM users to contact an account administrator when the user has entered his password incorrectly.
http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/ebs-detaching-volume.html D. Prevent IAM users from reusing previous password
Answer: C
NEW QUESTION 62
An organization has a statutory requirement to protect the data at rest for data stored in EBS volumes. Which of the below mentioned options can the organization Explanation:
use to achieve data protection? IAM users need passwords in order to access the AWS Management Console. (They do not need passwords if they will access AWS resources programmatically
by using the CLI, AWS SDKs, or the APIs.)
A. Data replication. You can use a password policy to do these things: Set a minimum password length.
B. Data encryption. Require specific character types, including uppercase letters, lowercase letters, numbers, and non-alphanumeric characters. Be sure to remind your users that
C. Data snapshot. passwords are case sensitive. Allow all IAM users to change their own passwords.
D. All the options listed her Require IAM users to change their password after a specified period of time (enable password expiration). Prevent IAM users from reusing previous passwords.
Force IAM users to contact an account administrator when the user has allowed his or her password to expue.
Answer: D Reference: http://docs.aws.amazon.com/|AM/Iatest/UserGuide/Using_ManagingPasswordPoIicies.htm|
Explanation:
For protecting the Amazon EBS data at REST, the user can use options, such as Data Encryption (Windows / Linux / third party based), Data Replication (AWS NEW QUESTION 73
internally replicates data for redundancy), A major client who has been spending a lot of money on his internet service provider asks you to set up an AWS Direct Connection to try and save him some
and Data Snapshot (for point in time backup). money. You know he needs high-speed connectMty. Which connection port speeds are available on AWS Direct Connect?
Reference: http://media.amazonwebservices.com/AWS_Security_Best_Practices.pdf
A. 500Mbps and 1Gbps
B. 1Gbps and 10Gbps
NEW QUESTION 67 C. 100Mbps and 1Gbps
You have a number of image files to encode. In an Amazon SQS worker queue, you create an Amazon SQS message for each file specifying the command (jpeg- D. 1Gbps
encode) and the location of the file in Amazon S3. Which of the following statements best describes the functionality of Amazon SQS?
Answer: B
A. Amazon SQS is a distributed queuing system that is optimized for horizontal scalability, not for single-threaded sending or receMng speeds.
B. Amazon SQS is for single-threaded sending or receMng speeds. Explanation:
C. Amazon SQS is a non-distributed queuing system. AWS Direct Connect is a network service that provides an alternative to using the internet to utilize AWS cloud services.
D. Amazon SQS is a distributed queuing system that is optimized for vertical scalability and for single-threaded sending or receMng speeds. Using AWS Direct Connect, data that would have previously been transported over the Internet can now be delivered through a private network connection
between AWS and your datacenter or corporate network.
Answer: A 1Gbps and 10Gbps ports are available. Speeds of 50Mbps, 100Mbps, 200Mbps, 300Mbps, 400Mbps, and 500Mbps can be ordered from any APN partners
supporting AWS Direct Connect.
Explanation: Reference: https://aws.amazon.com/directconnect/faqs/
Amazon SQS is a distributed queuing system that is optimized for horizontal scalability, not for
single-threaded sending or receMng speeds. A single client can send or receive Amazon SQS messages at a rate of about 5 to 50 messages per second. Higher
receive performance can be achieved by requesting multiple messages (up to 10) in a single call. It may take several seconds before a message that has been to NEW QUESTION 76
a queue is available to be received. In Amazon EC2, what is the limit of Reserved Instances per Availability Zone each month?
Reference: http://media.amazonwebservices.com/AWS_Storage_Options.pdf
A. 5
B. 20
NEW QUESTION 68 C. 50
Select the correct statement: Within Amazon EC2, when using Linux instances, the device name D. 10
/dev/sda1 is .
Answer: B
A. reserved for EBS volumes
B. recommended for EBS volumes Explanation:
C. recommended for instance store volumes There are 20 Reserved Instances per Availability Zone in each month.
D. reserved for the root device Reference: http://docs.aws.amazon.com/generaI/latest/gr/aws_service_Iimits.html
Answer: D
NEW QUESTION 81
Explanation: You have just set up yourfirst Elastic Load Balancer (ELB) but it does not seem to be configured properly. You discover that before you start using ELB, you have
Within Amazon EC2, when using a Linux instance, the device name /dev/sda1 is reserved for the root device. to configure the listeners for your load balancer. Which protocols does ELB use to support the load balancing of applications?
Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/device_naming.htmI
A. HTTP and HTTPS
B. HTTP, HTTPS , TCP, SSL and SSH
NEW QUESTION 69 C. HTTP, HTTPS , TCP, and SSL
You receive the following request from a client to quickly deploy a static website for them, specifically on AWS. The requirements are low-cost, reliable, online D. HTTP, HTTPS , TCP, SSL and SFTP
storage, and a reliable and cost-effective way to route customers to the website, as well as a way to deliver content with low latency and high data transfer speeds
so that visitors to his website don't experience unnecessary delays. What do you think would be the minimum AWS services that could fulfill the cIient's request? Answer: C
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
A. Set a target value and choose whether the alarm will trigger when the value is greater than (>), greater than or equal to (>=), less than (<), or less than or equal Reference: http://docs.aws.amazon.com/cloudhsm/latest/userguide/ha-best-practices.html
to (<=) that value.
B. Thresholds need to be set in IAM not CIoudWatch
C. Only default thresholds can be set you can't choose your own thresholds. NEW QUESTION 92
D. Set a target value and choose whether the alarm will trigger when the value hits this threshold You have been asked to build AWS infrastructure for disaster recovery for your local applications and within that you should use an AWS Storage Gateway as part
of the solution. Which of the following best describes the function of an AWS Storage Gateway?
Answer: A
A. Accelerates transferring large amounts of data between the AWS cloud and portable storage devices .
Explanation: B. A web service that speeds up distribution of your static and dynamic web content.
Amazon CIoudWatch is a monitoring service for AWS cloud resources and the applications you run on AWS. You can use Amazon CIoudWatch to collect and C. Connects an on-premises software appliance with cloud-based storage to provide seamless and secure integration between your on-premises IT environment
track metrics, collect and monitor log files, and set and AWS's storage infrastructure.
alarms. D. Is a storage service optimized for infrequently used data, or "cold data."
When you create an alarm, you first choose the Amazon CIoudWatch metric you want it to monitor. Next, you choose the evaluation period (e.g., five minutes or
one hour) and a statistical value to measure (e.g., Average or Maximum). Answer: C
To set a threshold, set a target value and choose whether the alarm will trigger when the value is greater than (>), greater than or equal to (>=), less than (<), or
less than or equal to (<=) that value. Explanation:
Reference: http://aws.amazon.com/cIoudwatch/faqs/ AWS Storage Gateway connects an on-premises software appliance with cloud-based storage to provide seamless integration with data security features between
your on-premises IT environment and the Amazon Web Services (AWS) storage infrastructure. You can use the service to store data in the AWS cloud for scalable
and cost-effective storage that helps maintain data security. AWS Storage Gateway offers both volume-based and tape-based storage solutions:
NEW QUESTION 88 Volume gateways Gateway-cached volumes Gateway-stored volumes
A gaming company comes to you and asks you to build them infrastructure for their site. They are not sure how big they will be as with all start ups they have Gateway-virtual tape library (VTL)
limited money and big ideas. What they do tell you is that if the game becomes successful, like one of their previous games, it may rapidly grow to millions of users Reference:
and generate tens (or even hundreds) of thousands of writes and reads per second. After http://media.amazonwebservices.com/architecturecenter/AWS_ac_ra_disasterrecovery_07.pdf
considering all of this, you decide that they need a fully managed NoSQL database service that provides fast and predictable performance with seamless
scalability. Which of the following databases do you think would best fit their needs?
NEW QUESTION 93
A. Amazon DynamoDB An organization has a statutory requirement to protect the data at rest for the S3 objects. Which of the below mentioned options need not be enabled by the
B. Amazon Redshift organization to achieve data security?
C. Any non-relational database.
D. Amazon SimpIeDB A. MFA delete for S3 objects
B. Client side encryption
Answer: A C. Bucket versioning
D. Data replication
Explanation:
Amazon DynamoDB is a fully managed NoSQL database service that provides fast and predictable Answer: D
performance with seamless scalability. Amazon DynamoDB enables customers to offload the administrative burdens of operating and scaling distributed
databases to AWS, so they don’t have to worry about hardware provisioning, setup and configuration, replication, software patching, or cluster scaHng. Explanation:
Today’s web-based applications generate and consume massive amounts of data. For example, an AWS S3 provides multiple options to achieve the protection of data at REST. The options include Permission (Policy), Encryption (Client and Server Side), Bucket
online game might start out with only a few thousand users and a light database workload consisting of 10 writes per second and 50 reads per second. However, if Versioning and MFA based delete. The user can enable any of these options to achieve data protection. Data replication is an internal facility by AWS where S3
the game becomes successful, it may rapidly grow to millions of users and generate tens (or even hundreds) of thousands of writes and reads per second. It may replicates each object across all the Availability Zones and the organization need not
also create terabytes or more of data per day. Developing your applications against Amazon DynamoDB enables you to start small and simply dial-up your request enable it in this case.
capacity for a table as your requirements scale, without incurring downtime. You pay highly cost-efficient rates for the request capacity you provision, and let Reference: http://media.amazonwebservices.com/AWS_Security_Best_Practices.pdf
Amazon DynamoDB do the work over partitioning your data and traffic over sufficient server capacity to meet your needs. Amazon DynamoDB does the database
management and administration, and you simply store and request your data. Automatic replication and failover provides built-in fault tolerance, high availability,
and data durability. Amazon DynamoDB gives you the peace of mind that your database is fully managed and can grow with your application requirements. NEW QUESTION 98
Reference: http://aws.amazon.com/dynamodb/faqs/ Which of the following features are provided by Amazon EC2?
A. Exadata Database Machine, Optimized Storage Management, Flashback Technology, and Data Warehousing
NEW QUESTION 89 B. Instances, Amazon Machine Images (AMIs), Key Pairs, Amazon EBS Volumes, Firewall, Elastic IP address, Tags, and Virtual Private Clouds (VPCs)
You're trying to delete an SSL certificate from the IAM certificate store, and you're getting the message "Certificate: <certificate-id> is being used by CIoudFront." C. Real Application Clusters (RAC), Elasticache Machine Images (EMIs), Data Warehousing, Flashback Technology, Dynamic IP address
Which of the following statements is probably the reason why you are getting this error? D. Exadata Database Machine, Real Application Clusters (RAC), Data Guard, Table and Index Partitioning, and Data Pump Compression
A. Before you can delete an SSL certificate, you need to either rotate SSL certificates or revert from using a custom SSL certificate to using the default CIoudFront Answer: B
certificate.
B. You can't delete SSL certificates . You need to request it from AWS. Explanation:
C. Before you can delete an SSL certificate, you need to set up the appropriate access level in IAM Amazon EC2 provides the following features:
D. Before you can delete an SSL certificate you need to set up https on your serve · Virtual computing environments, known as instances;
· Pre-configured templates for your instances, known as Amazon Nlachine Images (AMIs), that package the bits you need for your server (including the operating
Answer: A system and additional software)
· Various configurations of CPU, memory, storage, and networking capacity for your instances, known as instance types
Explanation: · Secure login information for your instances using key pairs (AWS stores the public key, and you store the private key in a secure place)
CIoudFront is a web service that speeds up distribution of your static and dynamic web content, for example, .htmI, .css, .php, and image files, to end users. · Storage volumes for temporary data that's deleted when you stop or terminate your instance, known as instance store volumes
Every CIoudFront web distribution must be associated either with the default CIoudFront certificate or with a custom SSL certificate. Before you can delete an SSL · Persistent storage volumes for your data using Amazon Elastic Block Store (Amazon EBS), known as Amazon EBS volumes
certificate, you need to either rotate SSL certificates (replace the current custom SSL certificate with another custom SSL certificate) or revert from using a custom · MuItipIe physical locations for your resources, such as instances and Amazon EBS volumes, known as regions and Availability Zones
SSL certificate to using the default CIoudFront certificate. · A firewall that enables you to specify the protocols, ports, and source IP ranges that can reach your instances using security groups
Reference: http://docs.aws.amazon.com/AmazonCIoudFront/latest/Deve|operGuide/Troubleshooting.htm| · Static IP addresses for dynamic cloud computing, known as Elastic IP addresses
· Metadata, known as tags, that you can create and assign to your Amazon EC2 resources
· Virtual networks you can create that are logically isolated from the rest of the AWS cloud, and that you can optionally connect to your own network, known as
NEW QUESTION 90 virtual private clouds (VPCs).
In relation to AWS CIoudHSM, High-availability (HA) recovery is hands-off resumption by failed HA group members. Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/concepts.html
Prior to the introduction of this function, the HA feature provided redundancy and performance, but required that a failed/lost group member be reinstated.
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
Answer: B
NEW QUESTION 118
Explanation: A user has hosted an application on EC2 instances. The EC2 instances are configured with ELB and Auto Scaling. The application server session time out is 2
In AWS CIoudHSM, you can perform a remote backup/restore of a Luna SA partition if you have purchased a Luna Backup HSM. hours. The user wants to configure connection draining to ensure that all in-flight requests are supported by ELB even though the instance is being deregistered.
Reference: http://docs.aws.amazon.com/cloudhsm/latest/userguide/cloud-hsm-backup-restore.html What time out period should the user specify for connection draining?
A. 1 hour
NEW QUESTION 108 B. 30 minutes
A user has defined an AutoScaIing termination policy to first delete the instance with the nearest billing hour. AutoScaIing has launched 3 instances in the US- C. 5 minutes
East-1A region and 2 instances in the US-East-1 B region. One of the instances in the US-East-1B region is running nearest to the billing hour. Which instance will D. 2 hours
AutoScaIing terminate first while executing the termination action?
Answer: A
A. Random Instance from US-East-1A
B. Instance with the nearest billing hour in US-East-1 B Explanation:
C. Instance with the nearest billing hour in US-East-1A The Elastic Load Balancer connection draining feature causes the load balancer to stop sending new requests to the back-end instances when the instances are
D. Random instance from US-East-1B deregistering or become unhealthy, while ensuring that in-flight requests continue to be served. The user can specify a maximum time of 3600
seconds (1 hour) for the load balancer to keep the connections alive before reporting the instance as deregistered. If the user does not specify the maximum
Answer: C timeout period, by default, the load balancer will close the connections to the deregistering instance after 300 seconds.
Reference:
Explanation: http://docs.aws.amazon.com/EIasticLoadBaIancing/latest/DeveIoperGuide/config-conn-drain.htmI
Even though the user has configured the termination policy, before AutoScaIing selects an instance to terminate, it first identifies the Availability Zone that has
more instances than the other Availability Zones used by the group. Within the selected Availability Zone, it identifies the instance that matches the specified
termination policy. NEW QUESTION 122
Reference: http://docs.aws.amazon.com/AutoScaIing/latest/DeveIoperGuide/us-termination-policy.html How can you apply more than 100 rules to an Amazon EC2-Classic?
Explanation:
With Amazon EBS encryption, you can now create an encrypted EBS volume and attach it to a supported instance type. Data on the volume, disk I/O, and NEW QUESTION 124
snapshots created from the volume are then all encrypted. The encryption occurs on the servers that host the EC2 instances, providing encryption of data as it When controlling access to Amazon EC2 resources, each Amazon EBS Snapshot has a attribute that controls which AWS accounts can use the snapshot.
moves between EC2 instances and EBS storage. EBS encryption is based on the industry standard AES-256 cryptographic algorithm.
To get started, simply enable encryption when you create a new EBS volume using the AWS Management Console, API, or CLI. Amazon EBS encryption is A. createVoIumePermission
available for all the latest EC2 instances in all commercially available AWS regions. B. LaunchPermission
Reference: C. SharePermission
https://aws.amazon.com/about-aws/whats-new/2014/05/21/Amazon-EBS-encryption-now-avai|abIe/ D. RequestPermission
Answer: A
NEW QUESTION 115
While controlling access to Amazon EC2 resources, which of the following acts as a firewall that controls the traffic allowed to reach one or more instances? Explanation:
Each Amazon EBS Snapshot has a createVoIumePermission attribute that you can set to one or more AWS Account IDs to share the AM with those AWS
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
Accounts. To allow several AWS Accounts to use a particular EBS snapshot, you can use the snapshots's createVoIumePermission attribute to include a list of the months resu Iting in significant financial losses. Your CIO is strongly agreeing to move the application to AWS. While working on achieving buy-in from the other
accounts that can use it. company executives, he asks you to develop a disaster recovery plan to help improve Business continuity in the short term. He specifies a target Recovery Time
Reference: http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/UsingIAM.html Objective (RTO) of 4 hours and a Recovery Point Objective (RPO) of 1 hour or less. He also asks you to implement the solution within 2 weeks. Your database is
200GB in size and you have a 20Mbps Internet connection.
How would you do this while minimizing costs?
NEW QUESTION 128
A customer has a 10 GB AWS Direct Connect connection to an AWS region where they have a web application hosted on Amazon Elastic Computer Cloud (EC2). A. Create an EBS backed private AMI which includes a fresh install of your applicatio
The application has dependencies on an on-premises mainframe database that uses a BASE (Basic Available. Sort stale Eventual consistency) rather than an B. Develop a CIoudFormation template which includes your AMI and the required EC2, AutoScaIing, and ELB resources to support deploying the application
ACID (Atomicity. Consistency isolation. Durability) consistency model. across Multiple- Availability-Zone
The application is exhibiting undesirable behavior because the database is not able to handle the volume of writes. How can you reduce the load on your on- C. Asynchronously replicate transactions from your on-premises database to a database instance in AWS across a secure VPN connection.
premises database resources in the most D. Deploy your application on EC2 instances within an Auto Scaling group across multiple availability zone
cost-effective way? E. Asynchronously replicate transactions from your on-premises database to a database instance in AWS across a secure VPN connection.
F. Create an EBS backed private AMI which includes a fresh install of your applicatio
A. Use an Amazon Elastic Map Reduce (EMR) S3DistCp as a synchronization mechanism between the on-premises database and a Hadoop cluster on AWS. G. Setup a script in your data center to backup the local database every 1 hour and to encrypt and copy the resulting file to an 53 bucket using multi-part upload.
B. Modify the application to write to an Amazon SQS queue and develop a worker process to flush the queue to the on-premises database. H. Install your application on a compute-optimized EC2 instance capable of supporting the application 's average loa
C. Modify the application to use DynamoDB to feed an EMR cluster which uses a map function to write to the on-premises database. I. Synchronously replicate transactions from your on-premises database to a database instance in AWS across a secure Direct Connect connection.
D. Provision an RDS read-replica database on AWS to handle the writes and synchronize the two databases using Data Pipeline.
Answer: A
Answer: A
Explanation:
Explanation: Overview of Creating Amazon EBS-Backed AMIs
Reference: https://aws.amazon.com/blogs/aws/category/amazon-elastic-map-reduce/ First, launch an instance from an AMI that's similar to the AMI that you'd like to create. You can connect to your instance and customize it. When the instance is
configured correctly, ensure data integrity by
stopping the instance before you create an AMI, then create the image. When you create an Amazon EBS-backed AMI, we automatically register it for you.
NEW QUESTION 130 Amazon EC2 powers down the instance before creating the AMI to ensure that everything on the instance is stopped and in a consistent state during the creation
You have launched an EC2 instance with four (4) 500GB EBS Provisioned IOPS volumes attached The EC2 Instance Is EBS-Optimized and supports 500 Mbps process. If you're confident that your instance is in a consistent state appropriate for AMI creation, you can tell Amazon EC2 not to power down and reboot the
throughput between EC2 and EBS The two EBS volumes are configured as a single RAID o device, and each Provisioned IOPS volume is provisioned with instance. Some file systems, such as XFS, can freeze and unfreeze actMty, making it safe to create the image without rebooting the instance.
4.000 IOPS (4 000 16KB reads or writes) for a total of 16.000 random IOPS on the instance The EC2 Instance initially delivers the expected 16 000 IOPS random During the AMI-creation process, Amazon EC2 creates snapshots of your instance's root volume and any other EBS volumes attached to your instance. If any
read and write performance Sometime later in order to increase the total random 1/0 performance of the instance, you add an additional two 500 GB EBS volumes attached to the instance are encrypted, the new AMI only launches successfully on instances that support Amazon EBS encryption. For more information,
Provisioned IOPS volumes to the RAID Each volume Is provisioned to 4.000 IOPs like the original four for a total of 24.000 IOPS on the EC2 instance Monitoring see Amazon EBS Encryption.
shows that the EC2 instance CPU utilization increased from 50% to 70%. but the total random IOPS measured at the instance level does not increase at all. Depending on the size of the volumes, it can take several minutes for the AMI-creation process to complete (sometimes up to 24 hours).You may find it more
What is the problem and a valid solution? efficient to create snapshots of your volumes prior to creating your AMI. This way, only small, incremental snapshots need to be created when the AMI is created,
and the process completes more quickly (the total time for snapshot creation remains the same). For more information, see Creating an Amazon EBS Snapshot.
A. Larger storage volumes support higher Provisioned IOPS rates: increase the provisioned volumestorage of each of the 6 EBS volumes to ITB After the process completes, you have a new AMI and snapshot created from the root volume of the instance. When you launch an instance using the new AMI,
B. The EBS-Optimized throughput limits the total IOPS that can be utilized use an EBS-Optimized instance that provides larger throughput. we create a new EBS volume for its root volume using the snapshot. Both the AMI and the snapshot incur charges to your account until you delete them. For more
C. Small block sizes cause performance degradation, limiting the 1'0 throughput, configure the instance device driver and file system to use 64KB blocks to information, see Deregistering Your AMI.
increase throughput. If you add instance-store volumes or EBS volumes to your instance in addition to the root device volume, the block device mapping for the new AMI contains
D. RAID 0 only scales linearly to about 4 devices, use RAID 0 with 4 EBS Provisioned IOPS volumes but increase each Provisioned IOPS EBS volume to 6.000 information for these volumes, and the block device mappings for instances that you launch from the new AMI automatically contain information for these volumes.
IOPS. The instance-store volumes specified in the block device mapping for the new instance are new and don't contain any data from the instance store volumes of the
E. The standard EBS instance root volume limits the total IOPS rate, change the instant root volume to also be a 500GB 4.000 Provisioned IOPS volume. instance you used to create the AMI. The data on EBS volumes persists. For more information, see Block Device Mapping.
Answer: E
NEW QUESTION 135
Your system recently experienced down time during the troubleshooting process. You found that a new administrator mistakenly terminated several production
NEW QUESTION 131 EC2 instances.
A web design company currently runs several FTP servers that their 250 customers use to upload and download large graphic files They wish to move this system Which of the following strategies will help prevent a similar situation in the future? The administrator still must be able to:
to AWS to make it more scalable, but they wish to maintain customer privacy and Keep costs to a minimum. - launch, start stop, and terminate development resources.
What AWS architecture would you recommend? - launch and start production instances.
A. ASK their customers to use an 53 client instead of an FTP clien A. Create an IAM user, which is not allowed to terminate instances by leveraging production EC2 termination protection.
B. Create a single 53 bucket Create an IAM user for each customer Put the IAM Users in a Group that has an IAM policy that permits access to sub-directories B. Leverage resource based tagging along with an IAM user, which can prevent specific users from terminating production EC2 resources.
within the bucket via use of the 'username' Policy variable. C. Leverage EC2 termination protection and multi-factor authentication, which together require users to authenticate before terminating EC2 instances
C. Create a single 53 bucket with Reduced Redundancy Storage turned on and ask their customers to use an 53 client instead of an FTP client Create a bucket for D. Create an IAM user and apply an IAM role which prevents users from terminating production EC2 instances.
each customer with a Bucket Policy that permits access only to that one customer.
D. Create an auto-scaling group of FTP servers with a scaling policy to automatically scale-in when minimum network traffic on the auto-scaling group is below a Answer: B
given threshol
E. Load a central list of ftp users from 53 as part of the user Data startup script on each Instance. Explanation:
F. Create a single 53 bucket with Requester Pays turned on and ask their customers to use an 53 client instead of an FTP client Create a bucket tor each Working with volumes
customer with a Bucket Policy that permits access only to that one customer. When an API action requires a caller to specify multiple resources, you must create a policy statement that allows users to access all required resources. If you
need to use a Condition element with one or more of these resources, you must create multiple statements as shown in this example.
Answer: A The following policy allows users to attach volumes with the tag "volume_user=iam-user-name" to instances with the tag "department=dev", and to detach those
volumes from those instances. If you attach this policy to an IAM group, the aws:username policy variable gives each IAM user in the group permission to attach or
detach volumes from the instances with a tag named voIume_ user that has his or her IAM user name as a value.
NEW QUESTION 132 {
You would like to create a mirror image of your production environment in another region for disaster recovery purposes. Which of the following AWS resources do "Version": "2012-10-I7",
not need to be recreated in the second region? (Choose 2 answers) "Statement": [{
"Effect": "A||ow", "Action": [ "ec2:AttachVoIume",
A. Route 53 Record Sets "ec2:DetachVoIume" I,
B. IM Roles "Resource": "arn :aws:ec2:us-east-1:123456789012:instanee/*", "Condition": {
C. Elastic IP Addresses (EIP) "StringEqua|s": { "ec2:ResourceTag/department": "dev" I
D. EC2 Key Pairs I I,
E. Launch configurations {
F. Security Groups "Effect": "A||ow", "Action": [ "ec2:AttachVoIume", "ec2:DetachVoIume" I,
"Resource": "arn:aws:ec2:us-east-1:123456789012:voIume/*", "Condition": {
Answer: AC "StringEqua|s": {
"ec2:ResourceTag/voIume_user": "${aws:username}" I
Explanation: IIII
Reference: Launching instances (Runlnstances)
http://tech.com/wp-content/themes/optimize/download/AWSDisaster_Recovery.pdf (page 6) The Runlnstances API action launches one or more instances. Runlnstances requires an AM and creates an instance; and users can specify a key pair and
security group in the request. Launching into EC2-VPC requires a subnet, and creates a network interface. Launching from an Amazon EBS-backed AM creates a
volume. Therefore, the user must have permission to use these Amazon EC2 resources. The caller can also configure the instance using optional parameters to
NEW QUESTION 134 Run Instances, such as the instance type and a subnet. You can create a policy statement that requires users to specify an optional parameter, or restricts users to
Your company currently has a 2-tier web application running in an on-premises data center. You have experienced several infrastructure failures in the past two particular values for a parameter. The examples in this section demonstrate some of the many possible ways that you can control the configuration of an instance
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
There is no such thing as "NIost appropriate" without knowing all your goals. I find your scenarios very fuzzy, since you can obviously mix-n-match between them. I A. End-to-end protection of data in transit
think you should decide by layers instead: Load Balancer Layer: ELB or just DNS, or roll-your-own. (Using DNS+EIPs is slightly cheaper, but less reliable than B. End-to-end Identity authentication
ELB.) C. Data encryption across the Internet
Storage Layer for 17TB of Images: This is the perfect use case for 53. Off-load all the web requests directly to the relevant JPEGs in 53. Your EC2 boxes just D. Protection of data in transit over the Internet
generate links to them. E. Peer identity authentication between VPN gateway and customer gateway
If your app already serves it's own images (not links to images), you might start with EFS. But more than likely, you can just setup a web server to re-write or re- F. Data integrity protection across the Internet
direct all JPEG links to 53 pretty easily.
If you use 53, don't serve directly from the bucket- Serve via a CNAME in domain you control. That way, you can switch in C|oudFront easily. Answer: C0EF
EBS will be way more expensive, and you'II need 2x the drives if you need 2 boxes. Yuck. Consider a smaller storage format. For example, JPEG200 or WebP or
other tools might make for smaller images. There is also the DejaVu format from a while back.
Cache Layer: Adding Cloud Front in front of 53 will help people on the other side of the world-- well, possibly. Typical archives follow a power law. The long tail of NEW QUESTION 152
requests means that most JPEGs won't be requested enough to be in the cache. So you are only speeding up the most popular objects. You can always wait, and You are designing an intrusion detection prevention (IDS/IPS) solution for a customer web application in a single VPC. You are considering the options for
switch in CF later after you know your costs better. (In some cases, it can actually lower costs.) implementing IOS IPS protection for traffic coming from the Internet.
You can also put CIoudFront in front of your app, since your archive search results should be fairly static. This will also allow you to run with a smaller instance Which of the following options would you consider? (Choose 2 answers)
type, since CF will handle much of the load if you do it right.
Database Layer: A few options: A. Implement IDS/IPS agents on each Instance running In VPC
Use whatever your current server does for now, and replace with something else down the road. Don't under-estimate this approach, sometimes it's better to start B. Configure an instance in each subnet to switch its network interface card to promiscuous mode and analyze network traffic.
now and optimize later. C. Implement Elastic Load Balancing with SSL listeners In front of the web applications
Use RDS to run MySQL/ Postgres D. Implement a reverse proxy layer in front of web servers and configure IDS/ IPS agents on each reverse proxy server.
I'm not as familiar with EIasticSearch I Cloudsearch, but obviously Cloudsearch will be less maintenance+setup.
App Layer: Answer: BD
When creating the app layer from scratch, consider Cloud Formation and/or OpsWorks. It's extra stuff to learn, but helps down the road.
Java+ Tomcat is right up the alley of E|asticBeanstaIk. (Basically EC2 + Autoscale + ELB).
Preventing Abuse: When you put something in a public 53 bucket, people will hot-link it from their web pages. If you want to prevent that, your app on the EC2 box NEW QUESTION 153
can generate signed links to 53 that expire in a few hours. Now everyone will be forced to go thru the app, and the app can apply rate limiting, etc. Saving money: Your company policies require encryption of sensitive data at rest. You are considering the possible options for protecting data while storing it at rest on an EBS
If you don't mind having downtime: data volume, attached to an EC2 instance. Which of these options would allow you to encrypt your data at rest? (Choose 3 answers)
run everything in one AZ (both DBs and EC2s). You can always add servers and AZs down the road, as long as it's architected to be stateless. In fact, you should
use multiple regions if you want it to be really robust. A. Implement third party volume encryption tools
use Reduced Redundancy in 53 to save a few hundred bucks per month (Someone will have to "go fix it" every time it breaks, including having an off-line copy to B. Do nothing as EBS volumes are encrypted by default
repair 53.) C. Encrypt data inside your applications before storing it on EBS
Buy Reserved Instances on your EC2 boxes to make them cheaper. (Start with the RI market and buy a partially used one to get started.) It's just a coupon saying D. Encrypt data using native data encryption drivers at the file system level
"if you run this type of box in this AZ, you will save on the per-hour costs." You can get 1/2 to 1/3 off easily. E. Implement SSL/TLS for all services running on the server
Rewrite the application to use less memory and CPU -that way you can run on fewer/ smaller boxes. (Nlay or may not be worth the investment.)
If your app will be used very infrequently, you will save a lot of money by using Lambda. I'd be worried that it would be quite slow if you tried to run a Java Answer: ACD
application on it though ..
We're missing some information like load, latency expectations from search, indexing speed, size of the search index, etc. But with what you've given us, I would
go with 53 as the storage for the files (53 rocks. It is really, really awesome). If you're stuck with the commercial search application, then on EC2 instances with NEW QUESTION 155
autoscaling and an ELB. If you are allowed an alternative search engine, Elasticsearch is probably your best bet. I'd run it on EC2 instead ofthe AWS Elasticsearch Your team has a tomcat-based Java application you need to deploy into development, test and production environments. After some research, you opt to use
service, as IMHO it's not ready yet. Don't autoscale Elasticsearch automatically though, it'II cause all sorts of issues. I have zero experience with CIoudSearch so I Elastic Beanstalk due to its tight integration with your developer tools and RDS due to its ease of management. Your QA team lead points out that you need to roll
can't comment on that. Regardless of which option, I'd use Cloud Formation for all of it. a sanitized set of production data into your environment on a nightly basis. Similarly, other software teams in your org want access to that same restored data via
their EC2 instances in your VPC .The
optimal setup for persistence and security that meets the above requirements would be the following.
NEW QUESTION 145
You are designing a multi-platform web application for AWS The application will run on EC2 instances and will be accessed from PCs. tablets and smart phones A. Create your RDS instance as part of your Elastic Beanstalk definition and alter its security group to allow access to it from hosts in your application subnets.
Supported accessing platforms are Windows. MACOS. IOS and Android Separate sticky session and SSL certificate setups are required for different platform B. Create your RDS instance separately and add its IP address to your appIication's DB connection strings in your code Alter its security group to allow access to it
types which of the following describes the most cost effective and performance efficient architecture setup? from hosts within your VPC's IP address block.
C. Create your RDS instance separately and pass its DNS name to your app's DB connection string as an environment variabl
A. Setup a hybrid architecture to handle session state and SSL certificates on-prem and separate EC2 Instance groups running web applications for different D. Create a security group for client machines and add it as a valid source for DB traffic to the security group of the RDS instance itself.
platform types running in a VPC E. Create your RDS instance separately and pass its DNS name to your's DB connection string as an environment variable Alter its security group to allow access
B. Set up one ELB for all platforms to distribute load among multiple instance under it Each EC2 instance implements ail functionality for a particular platform. to It from hosts In your application subnets.
C. Set up two ELBs The first ELB handles SSL certificates for all platforms and the second ELB handles session stickiness for all platforms for each ELB run
separate EC2 instance groups to handle the web application for each platform. Answer: A
D. Assign multiple ELBS to an EC2 instance or group of EC2 instances running the common components of the web application, one ELB for each platform type
Session stickiness and SSL termination are done at the ELBs.
NEW QUESTION 158
Answer: D Your customer is willing to consolidate their log streams (access logs application logs security logs etc.) in one single system. Once consolidated, the customer
wants to analyze these logs in real time based on heuristics. From time to time, the customer needs to validate heuristics, which requires going back to data
samples extracted from the last 12 hours?
NEW QUESTION 149 What is the best approach to meet your customer's requirements?
You've been hired to enhance the overall security posture for a very large e-commerce site They have a well architected multi-tier application running in a VPC that
uses ELBs in front of both the web and the app A. Send all the log events to Amazon SQ
tier with static assets served directly from 53 They are using a combination of RDS and DynamoOB for their dynamic data and then archMng nightly into 53 for B. Setup an Auto Scaling group of EC2 sewers to consume the logs and apply the heuristics.
further processing with EMR C. Send all the log events to Amazon Kinesis develop a client process to apply heuristics on the logs
They are concerned because they found QUESTION able log entries and suspect someone is attempting to gain unauthorized access. D. Configure Amazon Cloud Trail to receive custom logs, use EMR to apply heuristics the logs
Which approach provides a cost effective scalable mitigation to this kind of attack? E. Setup an Auto Scaling group of EC2 syslogd servers, store the logs on 53 use EMR to apply heuristics on the logs
A. Recommend that they lease space at a DirectConnect partner location and establish a IG DirectConnect connection to their vPC they would then establish Answer: B
Internet connectMty into their space, filter the traffic in hardware Web Application Firewall (WAF). And then pass the traffic through the DirectConnect connection
into their application running in their VPC, Explanation:
B. Add previously identified hostile source IPs as an explicit INBOUND DENY NACL to the web tier sub net. The throughput of an Amazon Kinesis stream is designed to scale without limits via increasing the number of shards within a stream. However, there are certain
C. Add a WAF tier by creating a new ELB and an AutoScaIing group of EC2 Instances running a host based WAF They would redirect Route 53 to resolve to the limits you should keep in mind while using Amazon Kinesis Streams:
new WAF tier ELB The WAF tier would thier pass the traffic to the current web tier The web tier Security Groups would be updated to only allow traffic from the By default, Records of a stream are accessible for up to 24 hours from the time they are added to the stream. You can raise this limit to up to 7 days by enabling
WAF tier Security Group extended data retention.
D. Remove all but TLS 1 2 from the web tier ELB and enable Advanced Protocol Filtering This will enable the ELB itself to perform WAF functionality. The maximum size of a data blob (the data payload before Base64-encoding) within one record is 1 megabyte (MB).
Each shard can support up to 1000 PUT records per second.
Answer: C For more information about other API level limits, see Amazon Kinesis Streams Limits.
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
Answer: A A. eu-west-1
B. us-east-1
C. us-east-2
NEW QUESTION 167 D. ap-southeast-1
Every user you create in the IAM system starts with _ _
Answer: B
A. Partial permissions
B. Full permissions
C. No permissions NEW QUESTION 193
Out of the stripping options available for the EBS volumes, which one has the following disadvantage : 'Doubles the amount of 1/0 required from the instance to
Answer: C EBS compared to RAID 0, because you're mirroring all writes to a pair of volumes, limiting how much you can stripe.'?
A. Raid 0
NEW QUESTION 172 B. RAID 1+0 (RAID 10)
Can you create IAM security credentials for existing users? C. Raid 1
D. Raid
A. Yes, existing users can have security credentials associated with their account.
B. No, IAM requires that all users who have credentials set up are not existing users Answer: B
C. No, security credentials are created within GROUPS, and then users are associated to GROUPS at a later time.
D. Yes, but only IAM credentials, not ordinary security credential
NEW QUESTION 195
Answer: A Can Amazon 53 uploads resume on failure or do they need to restart?
A. http://254.169.169.254/Iatest/ Answer: C
B. http://169.169.254.254/|atesU
C. http://127.0.0.1/|atest/
D. http://I69.254.169.254/|atest/ NEW QUESTION 209
What does specifying the mapping /dev/sdc=none when launching an instance do'?
Answer: D
A. Prevents /dev/sdc from creating the instance.
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
Answer: B
NEW QUESTION 215
Will my standby RDS instance be in the same Availability Zone as my primary?
NEW QUESTION 239
A. Only for Oracle RDS types Can I use Provisioned IOPS with VPC?
B. Yes
C. Only if configured at launch A. Only Oracle based RDS
D. No B. No
C. Only with MSSQL based RDS
Answer: D D. Yes for all RDS instances
Answer: D
NEW QUESTION 220
In the Launch Db Instance Wizard, where can I select the backup and maintenance options?
NEW QUESTION 242
A. Under DB INSTANCE DETAILS Can I encrypt connections between my application and my DB Instance using SSL?
B. Under REVI EW
C. Under MANAGEMENT OPTIONS A. No
D. Under ENGINE SELECTION B. Yes
C. Only in VPC
Answer: C D. Only in certain regions
Answer: B
NEW QUESTION 222
SQL Sewer _ store log ins and passwords in the master database.
NEW QUESTION 246
A. can be configured to but by default does not What are the four levels of AWS Premium Support?
B. doesn't
C. does A. Basic, Developer, Business, Enterprise
B. Basic, Startup, Business, Enterprise
Answer: C C. Free, Bronze, Silver, Gold
D. All support is free
A. 1/0 operations to the database are suspended for a few minutes while the backup is in progress.
B. 1/0 operations to the database are sent to a Replica (if available) for a few minutes while the backup is in progress. NEW QUESTION 252
C. 1/0 operations will be functioning normally Please select the Amazon EC2 resource which cannot be tagged.
D. 1/0 operations to the database are suspended for an hour while the backup is in progress
A. images (AM|s, kernels, RAM disks)
Answer: A B. Amazon EBS volumes
C. Elastic IP addresses
D. VPCs
NEW QUESTION 231
When running my DB Instance as a MuIti-AZ deployment, can I use the standby for read or write operations? Answer: C
A. Yes
B. Only with MSSQL based RDS NEW QUESTION 253
C. Only for Oracle RDS instances Can the string value of 'Key' be prefixed with :aws:"?
D. No
A. Only in GovC|oud
Answer: D B. Only for 53 not EC2
C. Yes
D. No
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
A. Both A and B
NEW QUESTION 255 B. None of these
What is the type of monitoring data (for Amazon EBS volumes) which is available automatically in 5- minute periods at no charge called? C. VPC Addresses
D. EC2 Addresses
A. Basic
B. Primary Answer: A
C. Detailed
D. Local
NEW QUESTION 273
Answer: A Is it possible to access your EBS snapshots?
A. No
NEW QUESTION 258 B. Yes
When automatic failover occurs, Amazon RDS will emit a DB Instance event to inform you that automatic failover occurred. You can use the to ret urn information
about events related to your DB Instance Answer: A
A. FetchFai|ure
B. DescriveFai|ure NEW QUESTION 276
C. DescribeEvents Which Amazon storage do you think is the best for my database-style applications that frequently encounter many random reads and writes across the dataset?
D. FetchEvents
A. None of these.
Answer: C B. Amazon Instance Storage
C. Any of these
D. Amazon EBS
NEW QUESTION 260
D0 the Amazon EBS volumes persist independently from the running life of an Amazon EC2 instance? Answer: D
A. Allow no inbound traffic, Allow all outbound traffic and Allow instances associated with this security group to talk to each other
B. Allow all inbound traffic, Allow no outbound traffic and Allow instances associated with this security group to talk to each other NEW QUESTION 281
C. Allow no inbound traffic, Allow all outbound traffic and Does NOT allow instances associated with this security group to talk to each other In the 'Detailed ' monitoring data available for your Amazon EBS volumes, Provisioned IOPS volumes automatically send _ minute metrics to Amazon
D. AI low all inbound traffic, Allow all outbound traffic and Does NOT allow instances associated with this security group to talk to each other C|oudWatch.
Answer: A A. 5
B. 2
C. 1
NEW QUESTION 263 D. 3
Can I initiate a "forced failover" for my MySQL Multi-AZ DB Instance deployment?
Answer: C
A. Only in certain regions
B. Only in VPC
C. Yes NEW QUESTION 282
D. No It is advised that you watch the Amazon C|oudWatch " _ " metric (available via the AWS Management Console or Amazon Cloud Watch APIs) carefully and
recreate the Read Replica should it fall behind due to replication errors.
Answer: A
A. Write Lag
B. Read Replica
NEW QUESTION 265 C. Replica Lag
Is the encryption of connections between my application and my DB Instance using SSL for the MySQL server engines available? D. Single Replica
A. Yes Answer: C
B. Only in VPC
C. Only in certain regions
D. No NEW QUESTION 287
Can the string value of 'Key' be prefixed with laws'?
Answer: A
A. No
B. Only for EC2 not 53
NEW QUESTION 270 C. Yes
Which AWS instance address has the following characteristics? :" If you stop an instance, its Elastic IP address is unmapped, and you must remap it when you D. Only for 53 not EC
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
A. You can create an encrypted tunnel to VPC, but you don't own the connection. Answer: A
B. Yes, it's called Amazon Dedicated Connection.
C. No, AWS only allows access from the public Internet.
D. Yes, it's called Direct Connec NEW QUESTION 332
In the Amazon RDS Oracle DB engine, the Database Diagnostic Pack and the Database Tuning Pack are only available with _ _
Answer: D
A. Oracle Standard Edition
B. Oracle Express Edition
NEW QUESTION 303 C. Oracle Enterprise Edition
Can I detach the primary (ethO) network interface when the instance is running or stopped? D. None of these
A. Amazon RDS
NEW QUESTION 308 B. Amazon Glacier
REST or Query requests are HTIP or HTIPS requests that use an HTIP verb (such as GET or POST) and a parameter named Action or Operation that specifies C. Amazon EMR
the API you are calling. D. Amazon IAM
A. FALSE Answer: D
B. TRUE
NEW QUESTION 322 A. 1/0 operations to the database are suspended for an hour while the backup is in progress.
To help you manage your Amazon EC2 instances, images, and other Amazon EC2 resources, you can assign your own metadata to each resource in the form of B. 1/0 operations to the database are sent to a Replica (if available) for a few minutes while the backup is in progress.
__ C. 1/0 operations will be functioning normally
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
D. 1/0 operations to the database are suspended for a few minutes while the backup is in progres Explanation:
Reference: http://aws.amazon.com/eIasticIoadba|ancing/
Answer: D
A. Detach the volume and attach it to another EC2 instance in the other AZ. Answer: CE
B. Simply create a new volume in the other AZ and specify the original volume as the source.
C. Create a snapshot of the volume, and create a new volume from the snapshot in the other AZ. Explanation:
D. Detach the volume, then use the ec2-migrate-voiume command to move it to another A Reference:
http://docs.aws.amazon.com/AmazonCioudFront/latest/DeveIoperGuide/private-contentrestricting-access
Answer: C -to-s3.htmI
Answer: A Answer: D
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader 100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As) https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
Explanation: Answer: D
Reference: http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_SettingUpUser.htmI
NEW QUESTION 398 A. MySQL Installed on two Amazon EC2 Instances in a single Availability Zone
You are deploying an application to track GPS coordinates of delivery trucks in the United States. Coordinates are transmitted from each delivery t ruck once every B. Amazon RDS for MySQL with Multi-AZ
three seconds. You need to design an architecture that will enable real-time processing of these coordinates from multiple consumers. Which service should you C. Amazon EIastiCache
use to implement data ingestion? D. Amazon DynamoDB
Answer: A
NEW QUESTION 415
A t2.medium EC2 instance type must be launched with what type of Amazon Machine Image (AMI)?
NEW QUESTION 401
A photo-sharing service stores pictures in Amazon Simple Storage Service (53) and allows application sign-in using an OpenID Connect-compatible identity A. An Instance store Hardware Virtual Machine AMI
provider. Which AWS Security Token Service approach to temporary access should you use for the Amazon 53 operations? B. An Instance store Paravirtual AMI
C. An Amazon EBS-backed Hardware Virtual Machine AMI
A. SANIL-based Identity Federation D. An Amazon EBS-backed Paravirtual AMI
B. Cross-Account Access
C. AWS Identity and Access Management roles Answer: A
D. Web Identity Federation
Explanation:
The Leader of IT Certification visit - https://www.certleader.com The Leader of IT Certification visit - https://www.certleader.com
100% Valid and Newest Version AWS-Solution-Architect-Associate Questions & Answers shared by Certleader
https://www.certleader.com/AWS-Solution-Architect-Associate-dumps.html (315 Q&As)
Reference: http://docs.aws.amazon.com/AWSEC2/Iatest/UserGuide/ec2-instanee-resize.htmI
Answer: D
A. Use a HTTPS GET to the Amazon 53 bucket where the files are located.
B. Restore by implementing a lifecycle policy on the Amazon 53 bucket.
C. IV|ake an Amazon Glacier Restore API ca II to load the files into another Amazon 53 bucket within four to six hours.
D. Launch a new AWS Storage Gateway instance AM in Amazon EC2, and restore from a gateway snapshot
E. Create an Amazon EBS volume from a gateway snapshot, and mount it to an Amazon EC2 instance.
F. Launch an AWS Storage Gateway virtual iSCSI device at the branch office, and restore from a gateway snapshot
Answer: ADF