Amazon AWS Certified SysOps Administrator - Associate SOA-C01
Prev

There are 439 results

Next
#391 (Accuracy: 100% / 1 votes)
An organization is concerned that its Amazon RDS databases are not protected. The solution to address this issue must be low cost, protect against table corruption that could be overlooked for several days, and must offer a 30-day window of protection.
How can these requirements be met?
  • A. Enable Multi-AZ on the RDS instance to maintain the data in a second Availability Zone.
  • B. Create a read replica of the RDS instance to maintain the data in a second region.
  • C. Ensure that automated backups are enabled and set the appropriate retention period.
  • D. Enable versioning in RDS to recover altered table data when needed.
#392 (Accuracy: 100% / 2 votes)
A Developer created an AWS Lambda function and has asked the SysOps Administrator to make this function run every 15 minutes.
What is the MOST efficient way to accomplish this request?
  • A. Create an Amazon EC2 instance and schedule a cron to invoke the Lambda function.
  • B. Create a Repeat Time variable inside the Lambda function to invoke the Lamdba function.
  • C. Create a second Lambda function to monitor and invoke the first Lamdba function.
  • D. Create an Amazon CloudWatch scheduled event to invoke the Lambda function.
#393 (Accuracy: 100% / 1 votes)
A SysOps Administrator must evaluate storage solutions to replace a company's current user-shared drives infrastructure. Any solution must support security controls that enable Portable Operating System Interface (POSIX) permissions and Network File System protocols. Additionally, any solution must be accessible from multiple Amazon EC2 instances and on-premises servers connected to the Amazon VPC.
Which AWS service meets the user drive requirements?
  • A. Amazon S3
  • B. Amazon EFS
  • C. Amazon EBS
  • D. Amazon SQS
#394 (Accuracy: 100% / 1 votes)
Malicious traffic is reaching company web servers. A SysOps Administrator is tasked with blocking this traffic. The malicious traffic is distributed over many IP addresses and represents much higher traffic than is typically seen from legitimate users.
How should the Administrator protect the web servers?
  • A. Create a security group for the web servers and add deny rules for malicious sources.
  • B. Set the network access control list for the web servers' subnet and add deny entries.
  • C. Place web servers behind AWS WAF and establish the rate limit to create a blacklist.
  • D. Use Amazon CloudFront to cache all pages and remove the traffic from the web servers.
#395 (Accuracy: 100% / 2 votes)
A SysOps Administrator is troubleshooting Amazon EC2 connectivity issues to the internet. The EC2 instance is in a private subnet. Below is the route table that is applied to the subnet of the EC2 instance.

Destination `" 10.2.0.0/16 -

Target `" local -

Status `" Active -

Propagated `" No -

Destination `" 0.0.0.0/0 -

Target `" nat-xxxxxxx -

Status `" Blackhole -

Propagated `" No -
What has caused the connectivity issue?
  • A. The NAT gateway no longer exists.
  • B. There is no route to the internet gateway.
  • C. The routes are no longer propagating.
  • D. There is no route rule with a destination for the internet.
#396 (Accuracy: 100% / 1 votes)
A SysOps Administrator is creating additional Amazon EC2 instances and receives an InstanceLimitExceeded error.
What is the cause of the issue and how can it be resolved?
  • A. The Administrator has requested too many instances at once and must request fewer instances in batches.
  • B. The concurrent running instance limit has been reached, and an EC2 limit increase request must be filed with AWS Support.
  • C. AWS does not currently have enough available capacity and a different instance type must be used.
  • D. The Administrator must specify the maximum number of instances to be created while provisioning EC2 instances.
#397 (Accuracy: 100% / 3 votes)
An Amazon EBS volume attached to an EC2 instance was recently modified. Part of the modification included increasing the storage capacity. The SysOps
Administrator notices that the increased storage capacity is not reflected in the file system.

Which step should the Administrator complete to use the increased storage capacity?
  • A. Restart the EC2 instance.
  • B. Extend the volume's file system.
  • C. Detach the EBS volume, resize it, and attach it.
  • D. Take an EBS snapshot and restore it to the bigger volume.
#398 (Accuracy: 100% / 1 votes)
A recent audit found that most resources belonging to the Development team were in violation of patch compliance standards. The resources were properly tagged.
Which service should be used to quickly remediate the issue and bring the resources back into compliance?
  • A. AWS Config
  • B. Amazon Inspector
  • C. AWS Trusted Advisor
  • D. AWS Systems Manager
#399 (Accuracy: 100% / 1 votes)
A SysOps Administrator is using AWS CloudFormation to deploy resources but would like to manually address any issues that the template encounters.
What should the Administrator add to the template to support the requirement?
  • A. Enable Termination Protection on the stack
  • B. Set the OnFailure parameter to ג€DO_NOTHINGג€
  • C. Restrict the IAM permissions for CloudFormation to delete resources
  • D. Set the DeleteStack API action to ג€Noג€
#400 (Accuracy: 100% / 1 votes)
A company has deployed a new application running on Amazon EC2 instances. The application team must verify for the Security team that all common vulnerabilities and exposures have been addressed, both now and regularly throughout the application's lifespan.
How can the Application team satisfy the Security team's requirement?
  • A. Perform regular assessments with Amazon Inspector
  • B. Perform regular assessments with AWS Trusted Advisor
  • C. Integrate AWS Personal Health Dashboard with Amazon CloudWatch events to get security notifications
  • D. Grant the Administrator and Security team access to AWS Artifact