Amazon AWS Certified SysOps Administrator - Associate SOA-C01
Prev

There are 439 results

Next
#181 (Accuracy: 100% / 2 votes)
A user has created a queue named `myqueue` in US-East region with AWS SQS. The user's AWS account ID is 123456789012. If the user wants to perform some action on this queue, which of the below Queue URL should he use?
  • A. http://sqs.us-east-1.amazonaws.com/123456789012/myqueue
  • B. http://sqs.amazonaws.com/123456789012/myqueue
  • C. http://sqs. 123456789012.us-east-1.amazonaws.com/myqueue
  • D. http:// 123456789012.sqs. us-east-1.amazonaws.com/myqueue
#182 (Accuracy: 100% / 1 votes)
A company's AWS account users are launching Amazon EC2 instances without required cost allocation tags. A SysOps administrator needs to prevent users within an organization in AWS Organizations from launching new EC2 instances that do not have the required tags. The solution must require the least possible operational overhead.
Which solution meets these requirements?
  • A. Set up an AWS Lambda function that will initiate a run instance event and check for the required tags. Configure the function to prevent the launch of EC2 instances if the tags are missing.
  • B. Set up an AWS Config rule to monitor for EC2 instances that lack the required tags.
  • C. Set up a service control policy (SCP) that prevents the launch of EC2 instances that lack the required tags. Attach the SCP to the organization root.
  • D. Set up an Amazon CloudWatch alarm to stop any EC2 instances that lack the required tags.
#183 (Accuracy: 100% / 1 votes)
A company wants to store sensitive data in Amazon S3. The S3 bucket and its contents must be accessible only from the on-premises corporate network.
What should a SysOps administrator do to configure the S3 bucket policy statement?
  • A. Use a Deny effect with a condition based on the aws:sourceVpc key.
  • B. Use a Deny effect with a condition based on the NotIpAddress key.
  • C. Use an Allow effect with a condition based on the IpAddress key.
  • D. Use an Allow effect with a condition based on the s3:LocationConstraint key.
#184 (Accuracy: 100% / 2 votes)
A company needs to implement a system for object-based storage in a write-once, read-many (WORM) model. Objects cannot be deleted or changed after they are stored, even by an AWS account root user or administrators.
Which solution will meet these requirements?
  • A. Set up Amazon S3 Cross-Region Replication and run daily updates.
  • B. Set up Amazon S3 Object Lock in governance mode with S3 Versioning enabled.
  • C. Set up Amazon S3 Object Lock in compliance mode with S3 Versioning enabled.
  • D. Set up an Amazon S3 Lifecycle policy to move the objects to Amazon S3 Glacier.
#185 (Accuracy: 100% / 1 votes)
A company is using an Amazon ElastiCache for Redis cluster in a production environment. To align with the company's technical requirements, a SysOps administrator needs to select a deployment to provide increased availability and fault tolerance.
Which action should the SysOps administrator take to accomplish this goal?
  • A. Deploy the ElastiCache cluster with Memcached as the engine.
  • B. Deploy the Redis cluster within an Auto Scaling group to launch replicas across multiple Availability Zones.
  • C. Verify that cluster mode is disabled. Increase the number of shards.
  • D. Verify that Multi-AZ with automatic failover is enabled. Place replicas in multiple Availability Zones.
#186 (Accuracy: 100% / 1 votes)
A company's finance department wants to receive a monthly report showing AWS resource usage by department.
Which solution should be used to meet the requirements?
  • A. Configure AWS Cost and Usage reports for each department. Run the reports monthly.
  • B. Schedule a monthly report for each department using AWS Budgets.
  • C. Run a monthly AWS CloudTrail report of resource usage by tag using department codes.
  • D. Tag all resources with department codes. Generate a monthly cost allocation report.
#187 (Accuracy: 100% / 1 votes)
A company is concerned about a security vulnerability impacting its Linux operating system.
What should the SysOps Administrator do to alleviate this concern?
  • A. Patch the vulnerability with Amazon Inspector.
  • B. Provide an AWS Trusted Advisor report showing which Amazon EC2 instances have been patched.
  • C. Redeploy the Amazon EC2 instances using AWS CloudFormation.
  • D. Patch the Linux operating system using AWS Systems Manager.
#188 (Accuracy: 100% / 1 votes)
A local agency plans to deploy 500 Raspberry Pi devices throughout a city. All the devices need to be managed centrally, and their configurations need to be consistent.
What is the BEST service for managing these devices?
  • A. AWS Config
  • B. AWS Systems Manager
  • C. Amazon Inspector
  • D. AWS Service Catalog
#189 (Accuracy: 100% / 1 votes)
A workload has been moved from a data center to AWS. Previously, vulnerability scans were performed nightly by an external testing company. There is a mandate to continue the vulnerability scans in the AWS environment with third-party testing occurring at least once each month.
What solution allows the vulnerability scans to continue without violating the AWS Acceptable Use Policy?
  • A. The existing nightly scan can continue with a few changes. The external testing company must be notified of the new IP address of the workload and the security group of the workload must be modified to allow scans from the external company's IP range.
  • B. If the external company is a vendor in the AWS Marketplace, notify them of the new IP address of the workload.
  • C. Submit a penetration testing request every 90 days and have the external company test externally when the request is approved.
  • D. AWS performs vulnerability testing behind the scenes daily and patches instances as needed. If a vulnerability cannot be automatically addressed, a notification email is distributed.
#190 (Accuracy: 100% / 1 votes)
Is it possible to protect the connections between your application servers and your MySQL instances using SSL encryption?
  • A. Yes, it is possible but only in certain regions.
  • B. Yes
  • C. No
  • D. Yes, it is possible but only in VPC.