Amazon AWS Certified Solutions Architect - Professional SAP-C01
Prev

There are 579 results

Next
#91 (Accuracy: 100% / 1 votes)
What is the maximum length for an instance profile name in AWS IAM?
  • A. 512 characters
  • B. 128 characters
  • C. 1024 characters
  • D. 64 characters
#92 (Accuracy: 100% / 1 votes)
An organization is planning to create a secure scalable application with AWS VPC and ELB. The organization has two instances already running and each instance has an ENI attached to it in addition to a primary network interface. The primary network interface and additional ENI both have an elastic IP attached to it.
If those instances are registered with ELB and the organization wants ELB to send data to a particular EIP of the instance, how can they achieve this?
  • A. The organization should ensure that the IP which is required to receive the ELB traffic is attached to a primary network interface.
  • B. It is not possible to attach an instance with two ENIs with ELB as it will give an IP conflict error.
  • C. The organization should ensure that the IP which is required to receive the ELB traffic is attached to an additional ENI.
  • D. It is not possible to send data to a particular IP as ELB will send to any one EIP.
#93 (Accuracy: 100% / 1 votes)
What is the maximum length for a certificate ID in AWS IAM?
  • A. 1024 characters
  • B. 512 characters
  • C. 64 characters
  • D. 128 characters
#94 (Accuracy: 100% / 1 votes)
Which of the following cache engines does Amazon ElastiCache support?
  • A. Amazon ElastiCache supports Memcached and Redis.
  • B. Amazon ElastiCache supports Redis and WinCache.
  • C. Amazon ElastiCache supports Memcached and Hazelcast.
  • D. Amazon ElastiCache supports Memcached only.
#95 (Accuracy: 100% / 1 votes)
You have been given the task to define multiple AWS Data Pipeline schedules for different activities in the same pipeline.
Which of the following would successfully accomplish this task?
  • A. Creating multiple pipeline definition files
  • B. Defining multiple pipeline definitions in your schedule objects file and associating the desired schedule to the correct activity via its schedule field
  • C. Defining multiple schedule objects in your pipeline definition file and associating the desired schedule to the correct activity via its schedule field
  • D. Defining multiple schedule objects in the schedule field
#96 (Accuracy: 100% / 2 votes)
By default, temporary security credentials for an IAM user are valid for a maximum of 12 hours, but you can request a duration as long as _________ hours.
  • A. 24
  • B. 36
  • C. 10
  • D. 48
#97 (Accuracy: 100% / 2 votes)
An organization is setting up a highly scalable application using Elastic Beanstalk.
They are using Elastic Load Balancing (ELB) as well as a Virtual Private Cloud (VPC) with public and private subnets.
They have the following requirements:
- All the EC2 instances should have a private IP
- All the EC2 instances should receive data via the ELB's.

Which of these will not be needed in this setup?
  • A. Launch the EC2 instances with only the public subnet.
  • B. Create routing rules which will route all inbound traffic from ELB to the EC2 instances.
  • C. Configure ELB and NAT as a part of the public subnet only.
  • D. Create routing rules which will route all outbound traffic from the EC2 instances through NAT.
#98 (Accuracy: 100% / 1 votes)
An organization has created multiple components of a single application for compartmentalization. Currently all the components are hosted on a single EC2 instance. Due to security reasons the organization wants to implement two separate SSLs for the separate modules although it is already using VPC.
How can the organization achieve this with a single instance?
  • A. You have to launch two instances each in a separate subnet and allow VPC peering for a single IP.
  • B. Create a VPC instance which will have multiple network interfaces with multiple elastic IP addresses.
  • C. Create a VPC instance which will have both the ACL and the security group attached to it and have separate rules for each IP address.
  • D. Create a VPC instance which will have multiple subnets attached to it and each will have a separate IP address.
#99 (Accuracy: 100% / 2 votes)
An organization is making software for the CIA in USA. CIA agreed to host the application on AWS but in a secure environment. The organization is thinking of hosting the application on the AWS GovCloud region. Which of the below mentioned difference is not correct when the organization is hosting on the AWS
GovCloud in comparison with the AWS standard region?
  • A. The billing for the AWS GovCLoud will be in a different account than the Standard AWS account.
  • B. GovCloud region authentication is isolated from Amazon.com.
  • C. Physical and logical administrative access only to U.S. persons.
  • D. It is physically isolated and has logical network isolation from all the other regions.
#100 (Accuracy: 100% / 1 votes)
How does in-memory caching improve the performance of applications in ElastiCache?
  • A. It improves application performance by deleting the requests that do not contain frequently accessed data.
  • B. It improves application performance by implementing good database indexing strategies.
  • C. It improves application performance by using a part of instance RAM for caching important data.
  • D. It improves application performance by storing critical pieces of data in memory for low-latency access.