Amazon AWS Certified SysOps Administrator - Associate SOA-C02
Prev

There are 349 results

Next
#331 (Accuracy: 100% / 2 votes)
A company is hosting applications on Amazon EC2 instances. The company is hosting a database on an Amazon RDS for PostgreSQL DB instance. The company requires all connections to the DB instance to be encrypted.

What should a SysOps administrator do to meet this requirement?
  • A. Allow SSL connections to the database by using an inbound security group rule.
  • B. Encrypt the database by using an AWS Key Management Service (AWS KMS) encryption key.
  • C. Enforce SSL connections to the database by using a custom parameter group.
  • D. Patch the database with SSL/TLS by using a custom PostgreSQL extension.
#332 (Accuracy: 100% / 3 votes)
A company recently migrated its application to a VPC on AWS. An AWS Site-to-Site VPN connection connects the company’s on-premises network to the VPC. The application retrieves customer data from another system that resides on premises. The application uses an on-premises DNS server to resolve domain records. After the migration, the application is not able to connect to the customer data because of name resolution errors.

Which solution will give the application the ability to resolve the internal domain names?
  • A. Launch EC2 instances in the VPC. On the EC2 instances, deploy a custom DNS forwarder that forwards all DNS requests to the on-premises DNS server. Create an Amazon Route 53 private hosted zone that uses the EC2 instances for name servers.
  • B. Create an Amazon Route 53 Resolver outbound endpoint. Configure the outbound endpoint to forward DNS queries against the on-premises domain to the on-premises DNS server.
  • C. Set up two AWS Direct Connect connections between the AWS environment and the on-premises network. Set up a link aggregation group (LAG) that includes the two connections. Change the VPC resolver address to point to the on-premises DNS server.
  • D. Create an Amazon Route 53 public hosted zone for the on-premises domain. Configure the network ACLs to forward DNS requests against the on-premises domain to the Route 53 public hosted zone.
#333 (Accuracy: 100% / 2 votes)
A company runs an application on Amazon EC2 instances. The EC2 instances are in an Auto Scaling group and run behind an Application Load Balancer (ALB). The application experiences errors when total requests exceed 100 requests per second. A SysOps administrator must collect information about total requests for a 2-week period to determine when requests exceeded this threshold.

What should the SysOps administrator do to collect this data?
  • A. Use the ALB’s RequestCount metric. Configure a time range of 2 weeks and a period of 1 minute. Examine the chart to determine peak traffic times and volumes.
  • B. Use Amazon CloudWatch metric math to generate a sum of request counts for all the EC2 instances over a 2-week period. Sort by a 1-minute interval.
  • C. Create Amazon CloudWatch custom metrics on the EC2 launch configuration templates to create aggregated request metrics across all the EC2 instances.
  • D. Create an Amazon EventBridge (Amazon CloudWatch Events) rule. Configure an EC2 event matching pattern that creates a metric that is based on EC2 requests. Display the data in a graph.
#334 (Accuracy: 100% / 2 votes)
A company’s reporting job that used to run in 15 minutes is now taking an hour to run. An application generates the reports. The application runs on Amazon EC2 instances and extracts data from an Amazon RDS for MySQL database.

A SysOps administrator checks the Amazon CloudWatch dashboard for the RDS instance and notices that the Read IOPS metrics are high, even when the reports are not running.
The SysOps administrator needs to improve the performance and the availability of the RDS instance.

Which solution will meet these requirements?
  • A. Configure an Amazon ElastiCache cluster in front of the RDS instance. Update the reporting job to query the ElastiCache cluster.
  • B. Deploy an RDS read replica. Update the reporting job to query the reader endpoint.
  • C. Create an Amazon CloudFront distribution. Set the RDS instance as the origin. Update the reporting job to query the CloudFront distribution.
  • D. Increase the size of the RDS instance.
#335 (Accuracy: 93% / 7 votes)
A company is running an application on premises and wants to use AWS for data backup. All of the data must be available locally. The backup application can write only to block-based storage that is compatible with the Portable Operating System Interface (POSIX).

Which backup solution will meet these requirements?
  • A. Configure the backup software to use Amazon S3 as the target for the data backups.
  • B. Configure the backup software to use Amazon S3 Glacier as the target for the data backups.
  • C. Use AWS Storage Gateway, and configure it to use gateway-cached volumes.
  • D. Use AWS Storage Gateway, and configure it to use gateway-stored volumes.
#336 (Accuracy: 100% / 2 votes)
A company is undergoing an external audit of its systems, which run wholly on AWS. A SysOps administrator must supply documentation of Payment Card Industry Data Security Standard (PCI DSS) compliance for the infrastructure managed by AWS.

Which set of actions should the SysOps administrator take to meet this requirement?
  • A. Download the applicable reports from the AWS Artifact portal and supply these to the auditors.
  • B. Download complete copies of the AWS CloudTrail log files and supply these to the auditors.
  • C. Download complete copies of the AWS CloudWatch logs and supply these to the auditors.
  • D. Provide the auditors with administrative access to the production AWS account so that the auditors can determine compliance.
#337 (Accuracy: 100% / 4 votes)
A SysOps administrator noticed that the cache hit ratio for an Amazon CloudFront distribution is less than 10%.

Which collection of configuration changes will increase the cache hit ratio for the distribution? (Choose two.)
  • A. Ensure that only required cookies, query strings, and headers are forwarded in the Cache Behavior Settings.
  • B. Change the Viewer Protocol Policy to use HTTPS only.
  • C. Configure the distribution to use presigned cookies and URLs to restrict access to the distribution.
  • D. Enable automatic compression of objects in the Cache Behavior Settings.
  • E. Increase the CloudFront time to live (TTL) settings in the Cache Behavior Settings.
#338 (Accuracy: 100% / 3 votes)
A company uses AWS Organizations to manage its AWS accounts. A SysOps administrator must create a backup strategy for all Amazon EC2 instances across all the company’s AWS accounts.

Which solution will meet these requirements in the MOST operationally efficient way?
  • A. Deploy an AWS Lambda function to each account to run EC2 instance snapshots on a scheduled basis.
  • B. Create an AWS CloudFormation stack set in the management account to add an AutoBackup=True tag to every EC2 instance.
  • C. Use AWS Backup in the management account to deploy policies for all accounts and resources.
  • D. Use a service control policy (SCP) to run EC2 instance snapshots on a scheduled basis in each account.
#339 (Accuracy: 100% / 4 votes)
A company manages an application that uses Amazon ElastiCache for Redis with two extra-large nodes spread across two different Availability Zones. The company’s IT team discovers that the ElastiCache for Redis cluster has 75% freeable memory. The application must maintain high availability.

What is the MOST cost-effective way to resize the cluster?
  • A. Decrease the number of nodes in the ElastiCache for Redis cluster from 2 to 1.
  • B. Deploy a new ElastiCache for Redis cluster that uses large node types. Migrate the data from the original cluster to the new cluster. After the process is complete, shut down the original cluster.
  • C. Deploy a new ElastiCache for Redis cluster that uses large node types. Take a backup from the original cluster, and restore the backup in the new cluster. After the process is complete, shut down the original cluster.
  • D. Perform an online resizing for the ElastiCache for Redis cluster. Change the node types from extra-large nodes to large nodes.
#340 (Accuracy: 100% / 6 votes)
A company wants to archive sensitive data on Amazon S3 Glacier. The company’s regulatory and compliance requirements do not allow any modifications to the data by any account.

Which solution meets these requirements?
  • A. Attach a vault lock policy to an S3 Glacier vault that contains the archived data. Use the lock ID to validate the vault lock policy after 24 hours.
  • B. Attach a vault lock policy to an S3 Glacier vault that contains the archived data. Use the lock ID to validate the vault lock policy within 24 hours.
  • C. Configure S3 Object Lock in governance mode. Upload all files after 24 hours.
  • D. Configure S3 Object Lock in governance mode. Upload all files within 24 hours.