Aws Flashcards ionicons-v5-c

1. Which of the following describes a physical location around the world where AWS clusters data centers?A. EndpointB. CollectionC. FleetD. Region

1. D. A region is a named set of AWS resources in the same geographical area. A region comprises at least two Availability Zones. Endpoint, Collection, and Fleet do not describe a physical location around the world where AWS clusters data centers.

2. Each AWS region is composed of two or more locations that offer organizations the ability to operate production systems that are more highly available, fault tolerant, and scalable than would be possible using a single data center. What are these locations called?A. Availability ZonesB. Replication areasC. Geographic districtsD. Compute centers

2. A. An Availability Zone is a distinct location within a region that is insulated from failures in other Availability Zones and provides inexpensive, low-latency network connectivity to other Availability Zones in the same region. Replication areas, geographic districts, and compute centers are not terms used to describe AWS data center locations.

3. What is the deployment term for an environment that extends an existing on-premises infrastructure into the cloud to connect cloud resources to internal systems?A. All-in deploymentB. Hybrid deploymentC. On-premises deploymentD. Scatter deployment

3. B. A hybrid deployment is a way to connect infrastructure and applications between cloud-based resources and existing resources that are not located in the cloud. An all-in deployment refers to an environment that exclusively runs in the cloud. An on-premises deployment refers to an environment that runs exclusively in an organization's data center.

4. Which AWS Cloud service allows organizations to gain system-wide visibility into resource utilization, application performance, and operational health?A. AWS Identity and Access Management (IAM)B. Amazon Simple Notification Service (Amazon SNS)C. Amazon CloudWatchD. AWS CloudFormation

4. C. Amazon CloudWatch is a monitoring service for AWS Cloud resources and the applications organizations run on AWS. It allows organizations to collect and track metrics, collect and monitor log files, and set alarms. AWS IAM, Amazon SNS, and AWS CloudFormation do not provide visibility into resource utilization, application performance, and the operational health of your AWS resources.

5. Which of the following AWS Cloud services is a fully managed NoSQL database service?A. Amazon Simple Queue Service (Amazon SQS)B. Amazon DynamoDBC. Amazon ElastiCacheD. Amazon Relational Database Service (Amazon RDS)

5. B. Amazon DynamoDB is a fully managed, fast, and flexible NoSQL database service for all applications that need consistent, single-digit millisecond latency at any scale. Amazon SQS, Amazon ElastiCache, and Amazon RDS do not provide a NoSQL database service. Amazon SQS is a managed message queuing service. Amazon ElastiCache is a service that provides in-memory cache in the cloud. Finally, Amazon RDS provides managed relational databases.

6. Your company experiences fluctuations in traffic patterns to their e-commerce website based on flash sales. What service can help your company dynamically match the required compute capacity to the spike in traffic during flash sales?A. Auto ScalingB. Amazon GlacierC. Amazon Simple Notification Service (Amazon SNS)D. Amazon Virtual Private Cloud (Amazon VPC)

6. A. Auto Scaling helps maintain application availability and allows organizations to scale Amazon Elastic Compute Cloud (Amazon EC2) capacity up or down automatically according to conditions defined for the particular workload. Not only can it be used to help ensure that the desired number of Amazon EC2 instances are running, but it also allows resources to scale in and out to match the demands of dynamic workloads. Amazon Glacier, Amazon SNS, and Amazon VPC do not provide services to scale compute capacity automatically.

7. Your company provides an online photo sharing service. The development team is looking for ways to deliver image files with the lowest latency to end users so the website content is delivered with the best possible performance. What service can help speed up distribution of these image files to end users around the world?A. Amazon Elastic Compute Cloud (Amazon EC2)B. Amazon Route 53C. AWS Storage GatewayD. Amazon CloudFront

7. D. Amazon CloudFront is a web service that provides a CDN to speed up distribution of your static and dynamic web content—for example, .html, .css, .php, image, and media files—to end users. Amazon CloudFront delivers content through a worldwide network of edge locations. Amazon EC2, Amazon Route 53, and AWS Storage Gateway do not provide CDN services that are required to meet the needs for the photo sharing service.

8. Your company runs an Amazon Elastic Compute Cloud (Amazon EC2) instance periodically to perform a batch processing job on a large and growing filesystem. At the end of the batch job, you shut down the Amazon EC2 instance to save money but need to persist the filesystem on the Amazon EC2 instance from the previous batch runs. What AWS Cloud service can you leverage to meet these requirements?A. Amazon Elastic Block Store (Amazon EBS)B. Amazon DynamoDBC. Amazon GlacierD. AWS CloudFormation

8. A. Amazon EBS provides persistent block-level storage volumes for use with Amazon EC2 instances on the AWS Cloud. Amazon DynamoDB, Amazon Glacier, and AWS CloudFormation do not provide persistent block-level storage for Amazon EC2 instances. Amazon DynamoDB provides managed NoSQL databases. Amazon Glacier provides lowcost archival storage. AWS CloudFormation gives developers and systems administrators an easy way to create and manage a collection of related AWS resources.

9. What AWS Cloud service provides a logically isolated section of the AWS Cloud where organizations can launch AWS resources in a virtual network that they define?A. Amazon Simple Workflow Service (Amazon SWF)B. Amazon Route 53C. Amazon Virtual Private Cloud (Amazon VPC)D. AWS CloudFormation

9. C. Amazon VPC lets organizations provision a logically isolated section of the AWS Cloud where they can launch AWS resources in a virtual network that they define. Amazon SWF, Amazon Route 53, and AWS CloudFormation do not provide a virtual network. Amazon SWF helps developers build, run, and scale background jobs that have parallel or sequential steps. Amazon Route 53 provides a highly available and scalable cloud Domain Name System (DNS) web service. Amazon CloudFormation gives developers and systems administrators an easy way to create and manage a collection of related AWS resources.

10. B. Amazon SQS is a fast, reliable, scalable, fully managed message queuing service that allows organizations to decouple the components of a cloud application. With Amazon SQS, organizations can transmit any volume of data, at any level of throughput, without losing messages or requiring other services to be always available. AWS CloudTrail records AWS API calls, and Amazon Redshift is a data warehouse, neither of which would be useful as an architecture component for decoupling components. Amazon SNS provides a messaging bus complement to Amazon SQS; however, it doesn't provide the decoupling of components necessary for this scenario.

5. Your application stores critical data in Amazon Simple Storage Service (Amazon S3), which must be protected against inadvertent or intentional deletion. How can this data be protected? (Choose 2 answers)A. Use cross-region replication to copy data to another bucket automatically.B. Set a vault lock.C. Enable versioning on the bucket.D. Use a lifecycle policy to migrate data to Amazon Glacier.E. Enable MFA Delete on the bucket.

5. C, E. Versioning protects data against inadvertent or intentional deletion by storing all versions of the object, and MFA Delete requires a one-time code from a Multi-Factor Authentication (MFA) device to delete objects. Cross-region replication and migration to the Amazon Glacier storage class do not protect against deletion. Vault locks are a feature of Amazon Glacier, not a feature of Amazon S3.

10. What are some reasons to enable cross-region replication on an Amazon Simple Storage Service (Amazon S3) bucket? (Choose 2 answers)A. You want a backup of your data in case of accidental deletion.B. You have a set of users or customers who can access the second bucket with lowerlatency.C. For compliance reasons, you need to store data in a location at least 300 miles away from the first region.D. Your data needs at least five nines of durability.

10. B, C. Cross-region replication can help lower latency and satisfy compliance requirements on distance. Amazon S3 is designed for eleven nines durability for objects in a single region, so a second region does not significantly increase durability. Crossregion replication does not protect against accidental deletion.

13. What is needed before you can enable cross-region replication on an Amazon Simple Storage Service (Amazon S3) bucket? (Choose 2 answers)A. Enable versioning on the bucket.B. Enable a lifecycle rule to migrate data to the second region.C. Enable static website hosting.D. Create an AWS Identity and Access Management (IAM) policy to allow Amazon S3 to replicate objects on your behalf.

13. A, D. You must enable versioning before you can enable cross-region replication, and Amazon S3 must have IAM permissions to perform the replication. Lifecycle rules migrate data from one storage class to another, not from one bucket to another. Static website hosting is not a prerequisite for replication.

15. Amazon Simple Storage Service (S3) bucket policies can restrict access to an Amazon S3 bucket and objects by which of the following? (Choose 3 answers)A. Company nameB. IP address rangeC. AWS accountD. Country of originE. Objects with a specific prefix

15. B, C, E. Amazon S3 bucket policies cannot specify a company name or a country or origin, but they can specify request IP range, AWS account, and a prefix for objects that can be accessed.

18. You have valuable media files hosted on AWS and want them to be served only to authenticated users of your web application. You are concerned that your content could be stolen and distributed for free. How can you protect your content?A. Use static web hosting.B. Generate pre-signed URLs for content in the web application.C. Use AWS Identity and Access Management (IAM) policies to restrict access.D. Use logging to track your content.

18. B. Pre-signed URLs allow you to grant time-limited permission to download objects from an Amazon Simple Storage Service (Amazon S3) bucket. Static web hosting generally requires world-read access to all content. AWS IAM policies do not know who the authenticated users of the web app are. Logging can help track content loss, but not prevent it.

3. Which of the following must be specified when launching a new Amazon Elastic Compute Cloud (Amazon EC2) Windows instance? (Choose 2 answers)A. The Amazon EC2 instance IDB. Password for the administrator accountC. Amazon EC2 instance typeD. Amazon Machine Image (AMI)

3. C, D. The Amazon EC2 instance ID will be assigned by AWS as part of the launch process. The administrator password is assigned by AWS and encrypted via the public key. The instance type defines the virtual hardware and the AMI defines the initial software state. You must specify both upon launch.

4. You have purchased an m3.xlarge Linux Reserved instance in us-east-1a. In which ways can you modify this reservation? (Choose 2 answers)A. Change it into two m3.large instances.B. Change it to a Windows instance.C. Move it to us-east-1b.D. Change it to an m4.xlarge.

4. A, C. You can change the instance type only within the same instance type family, or you can change the Availability Zone. You cannot change the operating system nor the instance type family.

10. Which of the following are features of Amazon Elastic Block Store (Amazon EBS)?(Choose 2 answers)A. Data stored on Amazon EBS is automatically replicated within an Availability Zone.B. Amazon EBS data is automatically backed up to tape.C. Amazon EBS volumes can be encrypted transparently to workloads on the attached instance.D. Data on an Amazon EBS volume is lost when the attached instance is stopped.

10. A, C. There are no tapes in the AWS infrastructure. Amazon EBS volumes persist when the instance is stopped. The data is automatically replicated within an Availability Zone. Amazon EBS volumes can be encrypted upon creation and used by an instance in the same manner as if they were not encrypted.

13. You have a workload that requires 15,000 consistent IOPS for data that must be durable. What combination of the following steps do you need? (Choose 2 answers)A. Use an Amazon Elastic Block Store (Amazon EBS)-optimized instance.B. Use an instance store.C. Use a Provisioned IOPS SSD volume.D. Use a magnetic volume.

13. A, C. B and D are incorrect because an instance store will not be durable and a magnetic volume offers an average of 100 IOPS. Amazon EBS-optimized instances reserve network bandwidth on the instance for IO, and Provisioned IOPS SSD volumes provide the highest consistent IOPS.

19. You have a workload that requires 1 TB of durable block storage at 1,500 IOPS during normal use. Every night there is an Extract, Transform, Load (ETL) task that requires 3,000 IOPS for 15 minutes. What is the most appropriate volume type for this workload?A. Use a Provisioned IOPS SSD volume at 3,000 IOPS.B. Use an instance store.C. Use a general-purpose SSD volume.D. Use a magnetic volume.

19. C. A short period of heavy traffic is exactly the use case for the bursting nature of general-purpose SSD volumes—the rest of the day is more than enough time to build up enough IOPS credits to handle the nightly task. Instance stores are not durable, magnetic volumes cannot provide enough IOPS, and to set up a Provisioned IOPS SSD volume to handle the peak would mean spending money for more IOPS than you need.

1. What is the minimum size subnet that you can have in an Amazon VPC?A. /24B. /26C. /28D. /30

1. C. The minimum size subnet that you can have in an Amazon VPC is /28.

8. How many IGWs can you attach to an Amazon VPC at any one time?A. 1B. 2C. 3D. 4

8. A. You may only have one IGW for each Amazon VPC.

9. What aspect of an Amazon VPC is stateful?A. Network ACLsB. Security groupsC. Amazon DynamoDBD. Amazon S3

9. B. Security groups are stateful, whereas network ACLs are stateless.

11. Which of the following will occur when an Amazon Elastic Block Store (Amazon EBS)-backed Amazon EC2 instance in an Amazon VPC with an associated EIP is stopped and started? (Choose 2 answers)A. The EIP will be dissociated from the instance.B. All data on instance-store devices will be lost.C. All data on Amazon EBS devices will be lost.D. The ENI is detached.E. The underlying host for the instance is changed.

11. B, E. In the EC2-Classic network, the EIP will be disassociated with the instance; in the EC2-VPC network, the EIP remains associated with the instance. Regardless of the underlying network, a stop/start of an Amazon EBS-backed Amazon EC2 instance always changes the host computer.

13. Which of the following AWS resources would you use in order for an EC2-VPC instance to resolve DNS names outside of AWS?A. A VPC peering connectionB. A DHCP option setC. A routing ruleD. An IGW

13. B. A DHCP option set allows customers to define DNS servers for DNS name resolution, establish domain names for instances within an Amazon VPC, define NTP servers, and define the NetBIOS name servers.

14. Which of the following is the Amazon side of an Amazon VPN connection?A. An EIPB. A CGWC. An IGWD. A VPG

14. D. A CGW is the customer side of a VPN connection, and an IGW connects a network to the Internet. A VPG is the Amazon side of a VPN connection.

18. Which of the following Amazon VPC resources would you use in order for EC2-VPC instances to send traffic directly to Amazon S3?A. Amazon S3 gatewayB. IGWC. CGWD. VPC endpoint

18. D. An Amazon VPC endpoint enables you to create a private connection between your Amazon VPC and another AWS service without requiring access over the Internet or through a NAT device, VPN connection, or AWS Direct Connect.

19. What properties of an Amazon VPC must be specified at the time of creation? (Choose 2 answers)A. The CIDR block representing the IP address rangeB. One or more subnets for the Amazon VPCC. The region for the Amazon VPCD. Amazon VPC Peering relationships

19. A, C. The CIDR block is specified upon creation and cannot be changed. An Amazon VPC is associated with exactly one region which must be specified upon creation. You can add a subnet to an Amazon VPC any time after it has been created, provided its address range falls within the Amazon VPC CIDR block and does not overlap with the address range of any existing CIDR block. You can set up peering relationships between Amazon VPCs after they have been created.

20. Which Amazon VPC feature allows you to create a dual-homed instance? A. EIP addressB. ENIC. Security groupsD. CGW

20. B. Attaching an ENI associated with a different subnet to an instance can make the instance dual-homed.

1. Which of the following are required elements of an Auto Scaling group? (Choose 2 answers)A. Minimum sizeB. Health checksC. Desired capacityD. Launch configuration

1. A, D. An Auto Scaling group must have a minimum size and a launch configuration defined in order to be created. Health checks and a desired capacity are optional.

3. How long does Amazon CloudWatch keep metric data?A. 1 dayB. 2 daysC. 1 weekD. 2 weeks

3. D. Amazon CloudWatch metric data is kept for 2 weeks.

13. Which of the following are characteristics of the Auto Scaling service on AWS? (Choose 3 answers)A. Sends traffic to healthy instancesB. Responds to changing conditions by adding or terminating Amazon Elastic Compute Cloud (Amazon EC2) instancesC. Collects and tracks metrics and sets alarmsD. Delivers push notificationsE. Launches instances from a specified Amazon Machine Image (AMI)F. Enforces a minimum number of running Amazon EC2 instances

13. B, E, F. Auto Scaling responds to changing conditions by adding or terminating instances, launches instances from an AMI specified in the launch configuration associated with the Auto Scaling group, and enforces a minimum number of instances in the min-size parameter of the Auto Scaling group.

15. An Auto Scaling group may use: (Choose 2 answers)A. On-Demand InstancesB. Stopped instancesC. Spot InstancesD. On-premises instancesE. Already running instances if they use the same Amazon Machine Image (AMI) as the Auto Scaling group's launch configuration and are not already part of another Auto Scaling group

15. A, C. An Auto Scaling group may use On-Demand and Spot Instances. An Auto Scaling group may not use already stopped instances, instances running someplace other than AWS, and already running instances not started by the Auto Scaling group itself.

20. Auto Scaling supports which of the following plans for Auto Scaling groups? (Choose 3 answers)A. PredictiveB. ManualC. PreemptiveD. ScheduledE. DynamicF. End-user request drivenG. Optimistic

20. B, D, E. Auto Scaling supports maintaining the current size of an Auto Scaling group using four plans: maintain current levels, manual scaling, scheduled scaling, and dynamic scaling.

2. Which of the following are found in an IAM policy? (Choose 2 answers)A. Service NameB. RegionC. ActionD. Password

2. A, C. IAM policies are independent of region, so no region is specified in the policy. IAM policies are about authorization for an already-authenticated principal, so no password is needed.

4. Which of the following actions can be authorized by IAM? (Choose 2 answers)A. Installing ASP.NET on a Windows ServerB. Launching an Amazon Linux EC2 instanceC. Querying an Oracle databaseD. Adding a message to an Amazon Simple Queue Service (Amazon SQS) queue

4. B, D. IAM controls access to AWS resources only. Installing ASP.NET will require Windows operating system authorization, and querying an Oracle database will require Oracle authorization.

5. Which of the following are IAM security features? (Choose 2 answers)A. Password policiesB. Amazon DynamoDB global secondary indexesC. MFAD. Consolidated Billing

5. A, C. Amazon DynamoDB global secondary indexes are a performance feature of Amazon DynamoDB; Consolidated Billing is an accounting feature allowing all bills to roll up under a single account. While both are very valuable features, neither is a security feature.

7. Which of the following are based on temporary security tokens? (Choose 2 answers)A. Amazon EC2 rolesB. MFAC. Root userD. Federation

7. A, D. Amazon EC2 roles provide a temporary token to applications running on the instance; federation maps policies to identities from other sources via temporary tokens.

1. Which AWS database service is best suited for traditional Online Transaction Processing (OLTP)?A. Amazon RedshiftB. Amazon Relational Database Service (Amazon RDS)C. Amazon GlacierD. Elastic Database

1. B. Amazon RDS is best suited for traditional OLTP transactions. Amazon Redshift, on the other hand, is designed for OLAP workloads. Amazon Glacier is designed for cold archival storage.

2. Which AWS database service is best suited for non-relational databases?A. Amazon RedshiftB. Amazon Relational Database Service (Amazon RDS)C. Amazon GlacierD. Amazon DynamoDB

2. D. Amazon DynamoDB is best suited for non-relational databases. Amazon RDS and Amazon Redshift are both structured relational databases.

3. You are a solutions architect working for a media company that hosts its website on AWS. Currently, there is a single Amazon Elastic Compute Cloud (Amazon EC2) Instance on AWS with MySQL installed locally to that Amazon EC2 Instance. You have been asked to make the company's production environment more resilient and to increase performance. You suggest that the company split out the MySQL database onto an Amazon RDS Instance with Multi-AZ enabled. This addresses the company's increased resiliency requirements. Now you need to suggest how you can increase performance. Ninety-nine percent of the company's end users are magazine subscribers who will be reading additional articles on the website, so only one percent of end users will need to write data to the site. What should you suggest to increase performance?A. Alter the connection string so that if a user is going to write data, it is written to the secondary copy of the Multi-AZ database.B. Alter the connection string so that if a user is going to write data, it is written to the primary copy of the Multi-AZ database.C. Recommend that the company use read replicas, and distribute the traffic across multiple read replicas.D. Migrate the MySQL database to Amazon Redshift to take advantage of columnar storage and maximize performance.

3. C. In this scenario, the best idea is to use read replicas to scale out the database and thus maximize read performance. When using Multi-AZ, the secondary database is not accessible and all reads and writes must go to the primary or any read replicas.

4. Which AWS Cloud service is best suited for Online Analytics Processing (OLAP)?A. Amazon RedshiftB. Amazon Relational Database Service (Amazon RDS)C. Amazon GlacierD. Amazon DynamoDB

4. A. Amazon Redshift is best suited for traditional OLAP transactions. While Amazon RDS can also be used for OLAP, Amazon Redshift is purpose-built as an OLAP data warehouse.

13. Which of the following techniques can you use to help you meet Recovery Point Objective (RPO) and Recovery Time Objective (RTO) requirements? (Choose 3 answers)A. DB snapshotsB. DB option groupsC. Read replicaD. Multi-AZ deployment

13. A, C, D. DB snapshots allow you to back up and recover your data, while read replicas and a Multi-AZ deployment allow you to replicate your data and reduce the time to failover.

20. Which of the following workloads are a good fit for running on Amazon Redshift? (Choose 2 answers)A. Transactional database supporting a busy e-commerce order processing websiteB. Reporting database supporting back-office analyticsC. Data warehouse used to aggregate multiple disparate data sourcesD. Manage session state and user profile data for thousands of concurrent users

20. B, C. Amazon Redshift is an Online Analytical Processing (OLAP) data warehouse designed for analytics, Extract, Transform, Load (ETL), and high-speed querying. It is not well suited for running transactional applications that require high volumes of small inserts or updates.

3. Which of the following are features of Amazon Simple Notification Service (Amazon SNS)? (Choose 3 answers)A. PublishersB. ReadersC. SubscribersD. Topic

3. A, C, D. Publishers, subscribers, and topics are the correct answers. You have subscribers to an Amazon SNS topic, not readers.

6. Which of the following options are valid properties of an Amazon Simple Queue Service (Amazon SQS) message? (Choose 2 answers)A. DestinationB. Message IDC. TypeD. Body

6. B, D. The valid properties of an SQS message are Message ID and Body. Each message receives a system-assigned Message ID that Amazon SQS returns to you in the SendMessage response. The Message Body is composed of name/value pairs and the unstructured, uninterpreted content.

12. Your application polls an Amazon Simple Queue Service (Amazon SQS) queue frequently and returns immediately, often with empty ReceiveMessageResponses. What is one thing that can be done to reduce Amazon SQS costs?A. Pricing on Amazon SQS does not include a cost for service requests; therefore, there is no concern.B. Increase the timeout value for short polling to wait for messages longer before returning a response.C. Change the message visibility value to a higher number.D. Use long polling by supplying a WaitTimeSeconds of greater than 0 seconds when calling ReceiveMessage.

12. D. Long polling allows your application to poll the queue, and, if nothing is there, Amazon Elastic Compute Cloud (Amazon EC2) waits for an amount of time you specify (between 1 and 20 seconds). If a message arrives in that time, it is delivered to your application as soon as possible. If a message does not arrive in that time, you need to execute the ReceiveMessage function again.

17. In Amazon Simple Workflow Service (Amazon SWF), a decider is responsible for what?A. Executing each step of the workB. Defining work coordination logic by specifying work sequencing, timing, and failure conditionsC. Executing your workflowD. Registering activities and workflow with Amazon SWF

17. B. The decider schedules the activity tasks and provides input data to the activity workers. The decider also processes events that arrive while the workflow is in progress and closes the workflow when the objective has been completed.

1. Which type of record is commonly used to route traffic to an IPv6 address?A. An A recordB. A CNAMEC. An AAAA recordD. An MX record

1. C. An AAAA record is used to route traffic to an IPv6 address, whereas an A record is used to route traffic to an IPv4 address.

4. Which type of DNS record should you use to resolve an IP address to a domain name?A. An A recordB. A C NameC. An SPF recordD. A PTR record

4. D. A PTR record is used to resolve an IP address to a domain name, and it is commonly referred to as "reverse DNS."

5. You host a web application across multiple AWS regions in the world, and you need to configure your DNS so that your end users will get the fastest network performance possible. Which routing policy should you apply?A. Geolocation routingB. Latency-based routingC. Simple routingD. Weighted routing

5. B. You want your users to have the fastest network access possible. To do this, you would use latency-based routing. Geolocation routing would not achieve this as well as latencybased routing, which is specifically geared toward measuring the latency and thus would direct you to the AWS region in which you would have the lowest latency.

6. Which DNS record should you use to configure the transmission of email to your intended mail server?A. SPF recordsB. A recordsC. MX recordsD. SOA record

6. C. You would use Mail eXchange (MX) records to define which inbound destination mail server should be used.

7. Which DNS records are commonly used to stop email spoofing and spam?A. MX recordsB. SPF recordsC. A recordsD. C names

7. B. SPF records are used to verify authorized senders of mail from your domain.

9. Which DNS record must all zones have by default?A. SPFB. TXTC. MXD. SOA

9. D. The start of a zone is defined by the SOA; therefore, all zones must have an SOA record by default.

11. Which type of DNS record should you use to resolve a domain name to another domain name?A. An A recordB. A CNAME recordC. An SPF recordD. A PTR record

11. B. The CNAME record maps a name to another name. It should be used only when there are no other records on that name.

12. Which is a function that Amazon Route 53 does not perform?A. Domain registrationB. DNS serviceC. Load balancingD. Health checks

12. C. Amazon Route 53 performs three main functions: domain registration, DNS service, and health checking.

15. Which port number is used to serve requests by DNS?A. 22B. 53C. 161D. 389

15. B. DNS uses port number 53 to serve requests.

19. Amazon Route 53 cannot route queries to which AWS resource?A. Amazon CloudFront distributionB. Elastic Load Balancing load balancerC. Amazon EC2D. AWS OpsWorks

19. D. Amazon Route 53 can route queries to a variety of AWS resources such as an Amazon CloudFront distribution, an Elastic Load Balancing load balancer, an Amazon EC2 instance, a website hosted in an Amazon S3 bucket, and an Amazon Relational Database (Amazon RDS).

1. Which of the following objects are good candidates to store in a cache? (Choose 3 answers)A. Session stateB. Shopping cartC. Product catalogD. Bank account balance

1. A, B, C. Many types of objects are good candidates to cache because they have the potential to be accessed by numerous users repeatedly. Even the balance of a bank account could be cached for short periods of time if the back-end database query is slow to respond.

2. Which of the following cache engines are supported by Amazon ElastiCache? (Choose 2 answers)A. MySQLB. MemcachedC. RedisD. Couchbase

2. B, C. Amazon ElastiCache supports Memcached and Redis cache engines. MySQL is not a cache engine, and Couchbase is not supported.

4. How many nodes can you add to an Amazon ElastiCache cluster running Redis?A. 1B. 5C. 20D. 100

4. A. Redis clusters can only contain a single node; however, you can group multiple clusters together into a replication group.

8. You are working on a mobile gaming application and are building the leaderboard feature to track the top scores across millions of users. Which AWS services are best suited for this use case?A. Amazon RedshiftB. Amazon ElastiCache using MemcachedC. Amazon ElastiCache using RedisD. Amazon Simple Storage Service (S3)

8. C. Amazon ElastiCache with Redis provides native functions that simplify the development of leaderboards. With Memcached, it is more difficult to sort and rank large datasets. Amazon Redshift and Amazon S3 are not designed for high volumes of small reads and writes, typical of a mobile game.

10. Which cache engines does Amazon ElastiCache support? (Choose 2 answers)A. MemcachedB. RedisC. MembaseD. Couchbase

10. A, B. Amazon ElastiCache supports both Memcached and Redis. You can run selfmanaged installations of Membase and Couchbase using Amazon Elastic Compute Cloud (Amazon EC2).

1. What origin servers are supported by Amazon CloudFront? (Choose 3 answers)A. An Amazon Route 53 Hosted ZoneB. An Amazon Simple Storage Service (Amazon S3) bucketC. An HTTP server running on Amazon Elastic Compute Cloud (Amazon EC2)D. An Amazon EC2 Auto Scaling GroupE. An HTTP server running on-premises

1. B, C, E. Amazon CloudFront can use an Amazon S3 bucket or any HTTP server, whether or not it is running in Amazon EC2. A Route 53 Hosted Zone is a set of DNS resource records, while an Auto Scaling Group launches or terminates Amazon EC2 instances automatically. Neither can be specified as an origin server for a distribution.

2. A, C. The site in A is "popular" and supports "users around the world," key indicators that CloudFront is appropriate. Similarly, the site in C is "heavily used," and requires private content, which is supported by Amazon CloudFront. Both B and D are corporate use cases where the requests come from a single geographic location or appear to come from one (because of the VPN). These use cases will generally not see benefit from Amazon CloudFront.

6. Your company wants to extend their existing Microsoft Active Directory capability into an Amazon Virtual Private Cloud (Amazon VPC) without establishing a trust relationshipwith the existing on-premises Active Directory. Which of the following is the best approach to achieve this goal?A. Create and connect an AWS Directory Service AD Connector.B. Create and connect an AWS Directory Service Simple AD.C. Create and connect an AWS Directory Service for Microsoft Active Directory (Enterprise Edition).D. None of the above

6. B. Simple AD is a Microsoft Active Directory-compatible directory that is powered by Samba 4. Simple AD supports commonly used Active Directory features such as user accounts, group memberships, domain-joining Amazon Elastic Compute Cloud (Amazon EC2) instances running Linux and Microsoft Windows, Kerberos-based Single Sign-On (SSO), and group policies.

8. Which cryptographic method is used by AWS Key Management Service (AWS KMS) to encrypt data?A. Password-based encryptionB. AsymmetricC. Shared secretD. Envelope encryption

8. D. AWS KMS uses envelope encryption to protect data. AWS KMS creates a data key, encrypts it under a Customer Master Key (CMK), and returns plaintext and encrypted versions of the data key to you. You use the plaintext key to encrypt data and store the encrypted key alongside the encrypted data. You can retrieve a plaintext data key only if you have the encrypted data key and you have permission to use the corresponding master key.

9. Which AWS service records Application Program Interface (API) calls made on your account and delivers log files to your Amazon Simple Storage Service (Amazon S3)bucket?A. AWS CloudTrailB. Amazon CloudWatchC. Amazon KinesisD. AWS Data Pipeline

9. A. AWS CloudTrail records important information about each API call, including the name of the API, the identity of the caller, the time of the API call, the request parameters, and the response elements returned by the AWS Cloud service.

10. You are trying to decrypt ciphertext with AWS KMS and the decryption operation is failing. Which of the following are possible causes? (Choose 2 answers)A. The private key does not match the public key in the ciphertext.B. The plaintext was encrypted along with an encryption context, and you are not providing the identical encryption context when calling the Decrypt API.C. The ciphertext you are trying to decrypt is not valid.D. You are not providing the correct symmetric key to the Decrypt API.

10. B, C. Encryption context is a set of key/value pairs that you can pass to AWS KMS when you call the Encrypt, Decrypt, ReEncrypt, GenerateDataKey, and GenerateDataKeyWithoutPlaintext APIs. Although the encryption context is not included in the ciphertext, it is cryptographically bound to the ciphertext during encryption and must be passed again when you call the Decrypt (or ReEncrypt) API. Invalid ciphertext for decryption is plaintext that has been encrypted in a different AWS account or ciphertext that has been altered since it was originally encrypted.

13. Which service allows you to process nearly limitless streams of data in flight?A. Amazon Kinesis FirehoseB. Amazon Elastic MapReduce (Amazon EMR)C. Amazon RedshiftD. Amazon Kinesis Streams

13. D. The Amazon Kinesis services enable you to work with large data streams. Within the Amazon Kinesis family of services, Amazon Kinesis Firehose saves streams to AWS storage services, while Amazon Kinesis Streams provide the ability to process the data in the stream.

16. Your organization uses Chef heavily for its deployment automation. What AWS cloud service provides integration with Chef recipes to start new application server instances, configure application server software, and deploy applications?A. AWS Elastic BeanstalkB. Amazon KinesisC. AWS OpsWorksD. AWS CloudFormation

16. C. AWS OpsWorks uses Chef recipes to start new app server instances, configure application server software, and deploy applications. Organizations can leverage Chef recipes to automate operations like software configurations, package installations, database setups, server scaling, and code deployment.

18. Your company's IT management team is looking for an online tool to provide recommendations to save money, improve system availability and performance, and to help close security gaps. What can help the management team?A. Cloud-initB. AWS Trusted AdvisorC. AWS ConfigD. Configuration Recorder

18. B. AWS Trusted Advisor inspects your AWS environment and makes recommendations when opportunities exist to save money, improve system availability and performance, or help close security gaps. AWS Trusted Advisor draws upon best practices learned from the aggregated operational history of serving hundreds of thousands of AWS customers.

19. Your company works with data that requires frequent audits of your AWS environment to ensure compliance with internal policies and best practices. In order to perform these audits, you need access to historical configurations of your resources to evaluate relevant configuration changes. Which service will provide the necessary information for your audits?A. AWS ConfigB. AWS Key Management Service (AWS KMS)C. AWS CloudTrailD. AWS OpsWorks

19. A. AWS Config is a fully managed service that provides you with an AWS resource inventory, configuration history, and configuration change notifications to enable security and governance. With AWS Config, you can discover existing and deleted AWS resources, determine your overall compliance against rules, and dive into configuration details of a resource at any point in time. These capabilities enable compliance auditing.

5. How many access keys may an AWS Identity and Access Management (IAM) user have active at one time?A. 0B. 1C. 2D. 3

5. C. IAM permits users to have no more than two active access keys at one time.

8. Which of the following Elastic Load Balancing options ensure that the load balancer determines which cipher is used for a Secure Sockets Layer (SSL) connection?A. Client Server Cipher SuiteB. Server Cipher OnlyC. First Server CipherD. Server Order Preference

8. D. Elastic Load Balancing supports the Server Order Preference option for negotiating connections between a client and a load balancer. During the SSL connection negotiation process, the client and the load balancer present a list of ciphers and protocols that they each support, in order of preference. By default, the first cipher on the client's list that matches any one of the load balancer's ciphers is selected for the SSL connection. If the load balancer is configured to support Server Order Preference, then the load balancer selects the first cipher in its list that is in the client's list of ciphers. This ensures that the load balancer determines which cipher is used for SSL connection. If you do not enable Server Order Preference, the order of ciphers presented by the client is used to negotiate connections between the client and the load balancer.

11. Which security scheme is used by the AWS Multi-Factor Authentication (AWS MFA) token?A. Time-Based One-Time Password (TOTP)B. Perfect Forward Secrecy (PFC)C. Ephemeral Diffie Hellman (EDH)D. Split-Key Encryption (SKE)

11. A. A virtual MFA device uses a software application that generates six-digit authentication codes that are compatible with the TOTP standard, as described in RFC 6238.

14. Which of the following public identity providers are supported by Amazon Cognito Identity?A. AmazonB. GoogleC. FacebookD. All of the above

14. D. Amazon Cognito Identity supports public identity providers—Amazon, Facebook, and Google—as well as unauthenticated identities.

16. Which of the following Amazon Virtual Private Cloud (Amazon VPC) elements acts as a stateless firewall?A. Security groupB. Network Access Control List (ACL)C. Network Address Translation (NAT) instanceD. An Amazon VPC endpoint

16. B. A network ACL is an optional layer of security for your Amazon VPC that acts as a firewall for controlling traffic in and out of one or more subnets. You might set up network ACLs with rules similar to your security groups in order to add an additional layer of security to your Amazon VPC.

17. Which of the following is the most recent version of the AWS digital signature calculation process?A. Signature Version 1B. Signature Version 2C. Signature Version 3D. Signature Version 4

17. D. The Signature Version 4 signing process describes how to add authentication information to AWS requests. For security, most requests to AWS must be signed with an access key (Access Key ID [AKI] and Secret Access Key [SAK]). If you use the AWS Command Line Interface (AWS CLI) or one of the AWS Software Development Kits (SDKs), those tools automatically sign requests for you based on credentials that you specify when you configure the tools. However, if you make direct HTTP or HTTPS calls to AWS, you must sign the requests yourself.

19. Which of the following describes how Amazon Elastic MapReduce (Amazon EMR) protects access to the cluster?A. The master node and the slave nodes are launched into an Amazon Virtual Private Cloud (Amazon VPC).B. The master node supports a Virtual Private Network (VPN) connection from the key specified at cluster launch.C. The master node is launched into a security group that allows Secure Shell (SSH) and service access, while the slave nodes are launched into a separate security group that only permits communication with the master node.D. The master node and slave nodes are launched into a security group that allows SSH and service access.

19. C. Amazon EMR starts your instances in two Amazon Elastic Compute Cloud (Amazon EC2) security groups, one for the master and another for the slaves. The master security group has a port open for communication with the service. It also has the SSH port open to allow you to securely connect to the instances via SSH using the key specified at startup. The slaves start in a separate security group, which only allows interaction with the master instance. By default, both security groups are set up to prevent access from external sources, including Amazon EC2 instances belonging to other customers. Because these are security groups in your account, you can reconfigure them using the standard Amazon EC2 tools or dashboard.

11. The AWS control environment is in place for the secure delivery of AWS Cloud service offerings. Which of the following does the collective control environment NOT explicitly include?A. PeopleB. EnergyC. TechnologyD. Processes

11. B. The collective control environment includes people, processes, and technology necessary to establish and maintain an environment that supports the operating effectiveness of AWS control framework. Energy is not a discretely identified part of the control environment, therefore B is the correct answer.

1. When designing a loosely coupled system, which AWS services provide an intermediate durable storage layer between components? (Choose 2 answers)A. Amazon CloudFrontB. Amazon KinesisC. Amazon Route 53D. AWS CloudFormationE. Amazon Simple Queue Service (Amazon SQS)

1. B, E. Amazon Kinesis is a platform for streaming data on AWS, offering powerful services to make it easy to load and analyze streaming data. Amazon SQS is a fast, reliable, scalable, and fully managed message queuing service. Amazon SQS makes it simple and cost-effective to decouple the components of a cloud application.

2. Which of the following options will help increase the availability of a web server farm? (Choose 2 answers)A. Use Amazon CloudFront to deliver content to the end users with low latency and high data transfer speeds.B. Launch the web server instances across multiple Availability Zones.C. Leverage Auto Scaling to recover from failed instances.D. Deploy the instances in an Amazon Virtual Private Cloud (Amazon VPC).E. Add more CPU and RAM to each instance.

2. B, C. Launching instances across multiple Availability Zones helps ensure the application is isolated from failures in a single Availability Zone, allowing the application to achieve higher availability. Whether you are running one Amazon EC2 instance or thousands, you can use Auto Scaling to detect impaired Amazon EC2 instances and unhealthy applications and replace the instances without your intervention. This ensures that your application is getting the compute capacity that you expect, thereby maintaining your availability.

3. Which of the following AWS Cloud services are designed according to the Multi-AZ principle? (Choose 2 answers)A. Amazon DynamoDBB. Amazon ElastiCacheC. Elastic Load BalancingD. Amazon Virtual Private Cloud (Amazon VPC)E. Amazon Simple Storage Service (Amazon S3)

3. A, E. Amazon DynamoDB runs across AWS proven, high-availability data centers. The service replicates data across three facilities in an AWS region to provide fault tolerance in the event of a server failure or Availability Zone outage. Amazon S3 provides durable infrastructure to store important data and is designed for durability of 99.999999999% of objects. Your data is redundantly stored across multiple facilities and multiple devices in each facility. While Elastic Load Balancing and Amazon ElastiCache can be deployed across multiple Availability Zones, you must explicitly take such steps when creating them.

4. Your e-commerce site was designed to be stateless and currently runs on a fleet of Amazon Elastic Compute Cloud (Amazon EC2) instances. In an effort to control cost and increase availability, you have a requirement to scale the fleet based on CPU and network utilization to match the demand curve for your site. What services do you need to meet this requirement? (Choose 2 answers)A. Amazon CloudWatchB. Amazon DynamoDBC. Elastic Load BalancingD. Auto ScalingE. Amazon Simple Storage Service (Amazon S3)

4. A, D. Auto Scaling enables you to follow the demand curve for your applications closely, reducing the need to provision Amazon EC2 capacity manually in advance. For example, you can set a condition to add new Amazon EC2 instances in increments to the Auto Scaling group when the average CPU and network utilization of your Amazon EC2 fleet monitored in Amazon CloudWatch is high; similarly, you can set a condition to remove instances in the same increments when CPU and network utilization are low.

6. When building a Distributed Denial of Service (DDoS)-resilient architecture, how does Amazon Virtual Private Cloud (Amazon VPC) help minimize the attack surface area? (Choose 3 answers)A. Reduces the number of necessary Internet entry pointsB. Combines end user traffic with management trafficC. Obfuscates necessary Internet entry points to the level that untrusted end users cannot access themD. Adds non-critical Internet entry points to the architectureE. Scales the network to absorb DDoS attacks

6. A, C, D. The attack surface is composed of the different Internet entry points that allow access to your application. The strategy to minimize the attack surface area is to (a) reduce the number of necessary Internet entry points, (b) eliminate non-critical Internet entry points, (c) separate end user traffic from management traffic, (d) obfuscate necessary Internet entry points to the level that untrusted end users cannot access them, and (e) decouple Internet entry points to minimize the effects of attacks. This strategy can be accomplished with Amazon VPC.

7. Your e-commerce application provides daily and ad hoc reporting to various business units on customer purchases. This is resulting in an extremely high level of read traffic to your MySQL Amazon Relational Database Service (Amazon RDS) instance. What can you do to scale up read traffic without impacting your database's performance?A. Increase the allocated storage for the Amazon RDS instance.B. Modify the Amazon RDS instance to be a Multi-AZ deployment.C. Create a read replica for an Amazon RDS instance.D. Change the Amazon RDS instance DB engine version.

7. C. Amazon RDS read replicas provide enhanced performance and durability for Amazon RDS instances. This replication feature makes it easy to scale out elastically beyond the capacity constraints of a single Amazon RDS instance for read-heavy database workloads. You can create one or more replicas of a given source Amazon RDS instance and serve high-volume application read traffic from multiple copies of your data, thereby increasing aggregate read throughput.

8. Your website is hosted on a fleet of web servers that are load balanced across multiple Availability Zones using an Elastic Load Balancer (ELB). What type of record set in Amazon Route 53 can be used to point myawesomeapp.com to your website?A. Type A Alias resource record setB. MX record setC. TXT record setD. CNAME record set

8. A. An alias resource record set can point to an ELB. You cannot create a CNAME record at the top node of a Domain Name Service (DNS) namespace, also known as the zone apex, as the case in this example. Alias resource record sets can save you time because Amazon Route 53 automatically recognizes changes in the resource record sets to which the alias resource record set refers.

10. You are running a suite of microservices on AWS Lambda that provide the business logic and access to data stored in Amazon DynamoDB for your task management system. You need to create well-defined RESTful Application Program Interfaces (APIs) for these microservices that will scale with traffic to support a new mobile application. What AWS Cloud service can you use to create the necessary RESTful APIs?A. Amazon KinesisB. Amazon API GatewayC. Amazon CognitoD. Amazon Elastic Compute Cloud (Amazon EC2) Container Registry

10. B. Amazon API Gateway is a fully managed service that makes it easy for developers to publish, maintain, monitor, and secure APIs at any scale. You can create an API that acts as a "front door" for applications to access data, business logic, or functionality from your code running on AWS Lambda. Amazon API Gateway handles all of the tasks involved in accepting and processing up to hundreds of thousands of concurrent API calls, including traffic management, authorization and access control, monitoring, and API version management.

12. You are changing your application to move session state information off the individual Amazon Elastic Compute Cloud (Amazon EC2) instances to take advantage of the elasticity and cost benefits provided by Auto Scaling. Which of the following AWS Cloud services is best suited as an alternative for storing session state information?A. Amazon DynamoDBB. Amazon RedshiftC. Amazon Storage GatewayD. Amazon Kinesis

12. A. Amazon DynamoDB is a NoSQL database store that is a great choice as an alternative due to its scalability, high-availability, and durability characteristics. Many platforms provide open-source, drop-in replacement libraries that allow you to store native sessions in Amazon DynamoDB. Amazon DynamoDB is a great candidate for a session storage solution in a share-nothing, distributed architecture.

14. Which of the following are best practices for managing AWS Identity and Access Management (IAM) user access keys? (Choose 3 answers)A. Embed access keys directly into application code.B. Use different access keys for different applications.C. Rotate access keys periodically.D. Keep unused access keys for an indefinite period of time.E. Configure Multi-Factor Authentication (MFA) for your most sensitive operations.

14. B, C, E. You should protect AWS user access keys like you would your credit card numbers or any other sensitive secret. Use different access keys for different applications so that you can isolate the permissions and revoke the access keys for individual applications if an access key is exposed. Remember to change access keys on a regular basis. For increased security, it is recommended to configure MFA for any sensitive operations. Remember to remove any IAM users that are no longer needed so that the user's access to your resources is removed. Always avoid having to embed access keys in an application.

15. A, B, E. You can enable AWS CloudTrail in your AWS account to get logs of API calls and related events' history in your account. AWS CloudTrail records all of the API access events as objects in an Amazon S3 bucket that you specify at the time you enable AWS CloudTrail. You can take advantage of Amazon S3's bucket notification feature by directing Amazon S3 to publish object-created events to AWS Lambda. Whenever AWS CloudTrail writes logs to your Amazon S3 bucket, Amazon S3 can then invoke your AWS Lambda function by passing the Amazon S3 object-created event as a parameter. The AWS Lambda function code can read the log object and process the access records logged by AWS CloudTrail.

16. Government regulations require that your company maintain all correspondence for a period of seven years for compliance reasons. What is the best storage mechanism to keep this data secure in a cost-effective manner?A. Amazon S3B. Amazon GlacierC. Amazon EBSD. Amazon EFS

16. B. Amazon Glacier enables businesses and organizations to retain data for months, years, or decades, easily and cost effectively. With Amazon Glacier, customers can retain more of their data for future analysis or reference, and they can focus on their business instead of operating and maintaining their storage infrastructure. Customers can also use Amazon Glacier Vault Lock to meet regulatory and compliance archiving requirements.

18. Your company provides transcoding services for amateur producers to format their short films to a variety of video formats. Which service provides the best option for storing the videos?A. Amazon GlacierB. Amazon Simple Storage Service (Amazon S3)C. Amazon Relational Database Service (Amazon RDS)D. AWS Storage Gateway

18. B. Amazon S3 provides highly durable and available storage for a variety of content. Amazon S3 can be used as a big data object store for all of the videos. Amazon S3's low cost combined with its design for durability of 99.999999999% and for up to 99.99% availability make it a great storage choice for transcoding services.

20. Your Amazon Virtual Private Cloud (Amazon VPC) includes multiple private subnets.The instances in these private subnets must access third-party payment ApplicationProgram Interfaces (APIs) over the Internet. Which option will provide highly availableInternet access to the instances in the private subnets?A. Create an AWS Storage Gateway in each Availability Zone and configure your routing to ensure that resources use the AWS Storage Gateway in the same Availability Zone.B. Create a customer gateway in each Availability Zone and configure your routing to ensure that resources use the customer gateway in the same Availability Zone.C. Create a Network Address Translation (NAT) gateway in each Availability Zone and configure your routing to ensure that resources use the NAT gateway in the same Availability Zone.D. Create a NAT gateway in one Availability Zone and configure your routing to ensure that resources use that NAT gateway in all the Availability Zones.

20. C. You can use a NAT gateway to enable instances in a private subnet to connect to the Internet or other AWS services, but prevent the Internet from initiating a connection with those instances. If you have resources in multiple Availability Zones and they share one NAT gateway, resources in the other Availability Zones lose Internet access in the event that the NAT gateway's Availability Zone is down. To create an Availability Zone independent architecture, create a NAT gateway in each Availability Zone and configure your routing to ensure that resources use the NAT gateway in the same Availability Zone.