Aws Flashcards
A Solutions Architect is designing an application that will encrypt all data in an Amazon Redshift cluster.Which action will encrypt the data at rest?A. Place the Redshift cluster in a private subnet.B. Use the AWS KMS Default Customer master key.C. Encrypt the Amazon EBS volumes.D. Encrypt the data using SSL/TLS.
B. Use the AWS KMS Default Customer master key.
A legacy application needs to interact with local storage using iSCSI. A team needs to design a reliable storage solution to provision all new storage on AWS.Which storage solution meets the legacy application requirements?A. AWS Snowball storage for the legacy application until the application can be re-architected.B. AWS Storage Gateway in cached mode for the legacy application storage to write data to Amazon S3.C. AWS Storage Gateway in stored mode for the legacy application storage to write data to Amazon S3.D. An Amazon S3 volume mounted on the legacy application server locally using the File Gateway service.
B. AWS Storage Gateway in cached mode for the legacy application storage to write data to Amazon S3.
A company is launching an application that it expects to be very popular. The company needs a database that can scale with the rest of the application. The schema will change frequently. The application cannot afford any downtime for database changes.Which AWS service allows the company to achieve these objectives?A. Amazon RedshiftB. Amazon DynamoDBC. Amazon RDS MySQLD. Amazon Aurora
B. Amazon DynamoDB; easy to change schema "schemaless"; NoSQL
A Solution Architect is designing a disaster recovery solution for a 5 TB Amazon Redshift cluster. The recovery site must be at least 500 miles (805 kilometers) from the live site.How should the Architect meet these requirements?A. Use AWS CloudFormation to deploy the cluster in a second region.B. Take a snapshot of the cluster and copy it to another Availability Zone.C. Modify the Redshift cluster to span two regions.D. Enable cross-region snapshots to a different region.
D. Enable cross-region snapshots to a different region; not AZ because AZ are only 100km range
A customer has written an application that uses Amazon S3 exclusively as a data store. The application works well until the customer increases the rate at which the application is updating information. The customer now reports that outdated data occasionally appears when the application accesses objects in Amazon S3.What could be the problem, given that the application logic is otherwise correct?A. The application is reading parts of objects from Amazon S3 using a range header.B. The application is reading objects from Amazon S3 using parallel object requests.C. The application is updating records by writing new objects with unique keys.D. The application is updating records by overwriting existing objects with the same keys.
D. The application is updating records by overwriting existing objects with the same keys.
A Solutions Architect is designing a new social media application. The application must provide a secure method for uploading profile photos. Each user should be able to upload a profile photo into a shared storage location for one week after their profile is created.Which approach will meet all of these requirements?A. Use Amazon Kinesis with AWS CloudTrail for auditing the specific times when profile photos are uploaded.B. Use Amazon EBS volumes with IAM policies restricting user access to specific time periods.C. Use Amazon S3 with the default private access policy and generate pre-signed URLs each time a new site profile is created.D. Use Amazon CloudFront with AWS CloudTrail for auditing the specific times when profile photos are uploaded.
C. Use Amazon S3 with the default private access policy and generate pre-signed URLs each time a new site profile is created.
A mobile application serves scientific articles from individual files in an Amazon S3 bucket. Articles older than 30 days are rarely read. Articles older than 60 days no longer need to be available through the application, but the application owner would like to keep them for historical purposes.Which cost-effective solution BEST meets these requirements?A. Create a Lambda function to move files older than 30 days to Amazon EBS and move files older than 60 days to Amazon Glacier.B. Create a Lambda function to move files older than 30 days to Amazon Glacier and move files older than 60 days to Amazon EBS.C. Create lifecycle rules to move files older than 30 days to Amazon S3 Standard Infrequent Access and move files older than 60 days to Amazon Glacier.D. Create lifecycle rules to move files older than 30 days to Amazon Glacier and move files older than 60 days to Amazon S3 Standard Infrequent Access.
C. Create lifecycle rules to move files older than 30 days to Amazon S3 Standard Infrequent Access and move files older than 60 days to Amazon Glacier.
An organization is currently hosting a large amount of frequently accessed data consisting of key-value pairs and semi-structured documents in their data center.They are planning to move this data to AWS.Which of one of the following services MOST effectively meets their needs?A. Amazon RedshiftB. Amazon RDSC. Amazon DynamoDBD. Amazon Aurora
C. Amazon DynamoDB; "semi-structured" or unstructured
A Lambda function must execute a query against an Amazon RDS database in a private subnet.Which steps are required to allow the Lambda function to access the Amazon RDS database? (Select two.)A. Create a VPC Endpoint for Amazon RDS.B. Create the Lambda function within the Amazon RDS VPC.C. Change the ingress rules of Lambda security group, allowing the Amazon RDS security group.D. Change the ingress rules of the Amazon RDS security group, allowing the Lambda security group.E. Add an Internet Gateway (IGW) to the VPC, route the private subnet to the IGW.
B. Create the Lambda function within the Amazon RDS VPC.D. Change the ingress rules of the Amazon RDS security group, allowing the Lambda security group.There is no VPC endpoint for RDS.
A Solutions Architect needs to build a resilient data warehouse using Amazon Redshift. The Architect needs to rebuild the Redshift cluster in another region.Which approach can the Architect take to address this requirement?A. Modify the Redshift cluster and configure cross-region snapshots to the other region.B. Modify the Redshift cluster to take snapshots of the Amazon EBS volumes each day, sharing those snapshots with the other region.C. Modify the Redshift cluster and configure the backup and specify the Amazon S3 bucket in the other region.D. Modify the Redshift cluster to use AWS Snowball in export mode with data delivered to the other region.
A. Modify the Redshift cluster and configure cross-region snapshots to the other region.
A popular e-commerce application runs on AWS. The application encounters performance issues. The database is unable to handle the amount of queries and load during peak times. The database is running on the RDS Aurora engine on the largest instance size available.What should an administrator do to improve performance?A. Convert the database to Amazon Redshift.B. Create a CloudFront distribution.C. Convert the database to use EBS Provisioned IOPS.D. Create one or more read replicas.
C. Convert the database to use EBS Provisioned IOPS.Not create read replicas because the problem could occur the next day then we would have to create replicas again.
A Solutions Architect is designing the architecture for a new three-tier web-based e-commerce site that must be available 24/7. Requests are expected to range from 100 to 10,000 each minute. Usage can vary depending on time of day, holidays, and promotions. The design should be able to handle these volumes, with the ability to handle higher volumes if necessary.How should the Architect design the architecture to ensure the web tier is cost-optimized and can handle the expected traffic? (Select two.)A. Launch Amazon EC2 instances in an Auto Scaling group behind an ELB.B. Store all static files in a multi-AZ Amazon Aurora database.C. Create an CloudFront distribution pointing to static content in Amazon S3.D. Use Amazon Route 53 to route traffic to the correct region.E. Use Amazon S3 multi-part uploads to improve upload times.
A. Launch Amazon EC2 instances in an Auto Scaling group behind an ELB.C. Create an CloudFront distribution pointing to static content in Amazon S3.
A Solution Architect is designing a three-tier web application. The Architect wants to restrict access to the database tier to accept traffic from the application servers only. However, these application servers are in an Auto Scaling group and may vary in quantity.How should the Architect configure the database servers to meet the requirements?A. Configure the database security group to allow database traffic from the application server IP addresses.B. Configure the database security group to allow database traffic from the application server security group.C. Configure the database subnet network ACL to deny all inbound non-database traffic from the application-tier subnet.D. Configure the database subnet network ACL to allow inbound database traffic from the application-tier subnet.
B. Configure the database security group to allow database traffic from the application server security group.
A call center application consists of a three-tier application using Auto Scaling groups to automatically scale resources as needed. Users report that every morning at 9:00 AM the system becomes very slow for about 15 minutes. A Solution Architect determines that a large percentage of the call center staff starts work at 9:00AM, so Auto Scaling does not have enough time to scale out to meet demand.How can the Architect fix the problem?A. Change the Auto Scaling group scale out event to scale based on network utilization.B. Create an Auto Scaling scheduled action to scale out the necessary resources at 8:30 AM every morning.C. Use Reserved Instances to ensure the system has reserved the right amount of capacity for the scale-up events.D. Permanently keep a steady state of instances that is needed at 9:00 AM to guarantee available resources, but leverage Spot Instances.
B. Create an Auto Scaling scheduled action to scale out the necessary resources at 8:30 AM every morning.
A customer owns a simple API for their website that receives about 1,000 requests each day and has an average response time of 50 ms. It is currently hosted on one c4.large instance.Which changes to the architecture will provide high availability at the LOWEST cost?A. Create an Auto Scaling group with a minimum of one instance and a maximum of two instances, then use an Application Load Balancer to balance the traffic.B. Recreate the API using Amazon API Gateway and use AWS Lambda as the service backend.C. Create an Auto Scaling group with a maximum of two instances, then use an Application Load Balancer to balance the traffic.D. Recreate the API using Amazon API Gateway and integrate the new API with the existing backend service.
B. Recreate the API using Amazon API Gateway and use AWS Lambda as the service backend.
A Solution Architect is designing an application that uses Amazon EBS volumes. The volumes must be backed up to a different region.How should the Architect meet this requirement?A. Create EBS snapshots directly from one region to another.B. Move the data to an Amazon S3 bucket and enable cross-region replication.C. Create EBS snapshots and then copy them to the desired region.D. Use a script to copy data from the current Amazon EBS volume to the destination Amazon EBS volume.
C. Create EBS snapshots and then copy them to the desired region.
A Solutions Architect is designing a log-processing solution that requires storage that supports up to 500 MB/s throughput. The data is sequentially accessed by an Amazon EC2 instance.Which Amazon storage type satisfies these requirements?A. EBS Provisioned IOPS SSD (io1)B. EBS General Purpose SSD (gp2)C. EBS Throughput Optimized HDD (st1)D. EBS Cold HDD (sc1)
C. EBS Throughput Optimized HDD (st1); "log processing" "sequential"
A Solutions Architect needs to design a solution that will enable a security team to detect, review, and perform root cause analysis of security incidents that occur in a cloud environment. The Architect must provide a centralized view of all API events for current and future AWS regions.How should the Architect accomplish this task?A. Enable AWS CloudTrail logging in each individual region. Repeat this for all future regions.B. Enable Amazon CloudWatch logs for all AWS services across all regions and aggregate them in a single Amazon S3 bucket.C. Enable AWS Trusted Advisor security checks and report all security incidents for all regions.D. Enable AWS CloudTrail by creating a new trail and apply the trail to all regions.
D. Enable AWS CloudTrail by creating a new trail and apply the trail to all regions.
A company plans to use AWS for all new batch processing workloads. The company's developers use Docker containers for the new batch processing. The system design must accommodate critical and non-critical batch processing workloads 24/7.How should a Solutions Architect design this architecture in a cost-efficient manner?A. Purchase Reserved Instances to run all containers. Use Auto Scaling groups to schedule jobs.B. Host a container management service on Spot Instances. Use Reserved Instances to run Docker containers.C. Use Amazon ECS orchestration and Auto Scaling groups: one with Reserve Instances, one with Spot Instances.D. Use Amazon ECS to manage container orchestration. Purchase Reserved Instances to run all batch workloads at the same time.
C. Use Amazon ECS orchestration and Auto Scaling groups: one with Reserve Instances, one with Spot Instances.
A company is evaluating Amazon S3 as a data storage solution for their daily analyst reports. The company has implemented stringent requirements concerning the security of the data at rest. Specifically, the CISO asked for the use of envelope encryption with separate permissions for the use of an envelope key, automated rotation of the encryption keys, and visibility into when an encryption key was used and by whom.Which steps should a Solutions Architect take to satisfy the security requirements requested by the CISO?A. Create an Amazon S3 bucket to store the reports and use Server-Side Encryption with Customer-Provided Keys (SSE-C).B. Create an Amazon S3 bucket to store the reports and use Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3).C. Create an Amazon S3 bucket to store the reports and use Server-Side Encryption with AWS KMS-Managed Keys (SSE-KMS).D. Create an Amazon S3 bucket to store the reports and use Amazon s3 versioning with Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3).
C. Create an Amazon S3 bucket to store the reports and use Server-Side Encryption with AWS KMS-Managed Keys (SSE-KMS); "automated rotation" "visibility"
A Solutions Architect is designing an application on AWS that uses persistent block storage. Data must be encrypted at rest.Which solution meets the requirement?A. Enable SSL on Amazon EC2 instances.B. Encrypt Amazon EBS volumes on Amazon EC2 instances.C. Enable server-side encryption on Amazon S3.D. Encrypt Amazon EC2 Instance Storage.
B. Encrypt Amazon EBS volumes on Amazon EC2 instances.
A company is launching a static website using the zone apex (mycompany.com). The company wants to use Amazon Route 53 for DNS.Which steps should the company perform to implement a scalable and cost-effective solution? (Choose two.)A. Host the website on an Amazon EC2 instance with ELB and Auto Scaling, and map a Route 53 alias record to the ELB endpoint.B. Host the website using AWS Elastic Beanstalk, and map a Route 53 alias record to the Beanstalk stack.C. Host the website on an Amazon EC2 instance, and map a Route 53 alias record to the public IP address of the Amazon EC2 instance.D. Serve the website from an Amazon S3 bucket, and map a Route 53 alias record to the website endpoint.E. Create a Route 53 hosted zone, and set the NS records of the domain to use Route 53 name servers.
D. Serve the website from an Amazon S3 bucket, and map a Route 53 alias record to the website endpoint.E. Create a Route 53 hosted zone, and set the NS records of the domain to use Route 53 name servers.
A manufacturing company captures data from machines running at customer sites. Currently, thousands of machines send data every 5 minutes, and this is expected to grow to hundreds of thousands of machines in the near future. The data is logged with the intent to be analyzed in the future as needed.What is the SIMPLEST method to store this streaming data at scale?A. Create an Amazon Kinesis Firehouse delivery stream to store the data in Amazon S3.B. Create an Auto Scaling group of Amazon EC2 servers behind ELBs to write the data into Amazon RDS.C. Create an Amazon SQS queue, and have the machines write to the queue.D. Create an Amazon EC2 server farm behind an ELB to store the data in Amazon EBS Cold HDD volumes.
A. Create an Amazon Kinesis Firehouse delivery stream to store the data in Amazon S3.
A bank is writing new software that is heavily dependent upon the database transactions for write consistency. The application will also occasionally generate reports on data in the database, and will do joins across multiple tables. The database must automatically scale as the amount of data grows.Which AWS service should be used to run the database?A. Amazon S3B. Amazon AuroraC. Amazon DynamoDBD. Amazon Redshift
B. Amazon AuroraBank transactions -> OLTP -> SQL DB -> Aurora/RDSRedshift: OLTA
A Solutions Architect is designing a new application that needs to access data in a different AWS account located within the same region. The data must not be accessed over the Internet.Which solution will meet these requirements with the LOWEST cost?A. Add rules to the security groups in each account.B. Establish a VPC Peering connection between accounts.C. Configure Direct Connect in each account.D. Add a NAT Gateway to the data account.
B. Establish a VPC Peering connection between accounts.Security groups for EC2, direct connect is on-prem to cloud connectivity, NAT gateway is over the internet
A Solutions Architect has a multi-layer application running in Amazon VPC. The application has an ELB Classic Load Balancer as the front end in a public subnet, and an Amazon EC2-based reverse proxy that performs content-based routing to two backend Amazon EC2 instances hosted in a private subnet. The Architect sees tremendous traffic growth and is concerned that the reverse proxy and current backend set up will be insufficient.Which actions should the Architect take to achieve a cost-effective solution that ensures the application automatically scales to meet traffic demand? (Select two.)A. Replace the Amazon EC2 reverse proxy with an ELB internal Classic Load Balancer.B. Add Auto Scaling to the Amazon EC2 backend fleet.C. Add Auto Scaling to the Amazon EC2 reverse proxy layer.D. Use t2 burstable instance types for the backend fleet.E. Replace both the frontend and reverse proxy layers with an ELB Application Load Balancer.
B. Add Auto Scaling to the Amazon EC2 backend fleet.E. Replace both the frontend and reverse proxy layers with an ELB Application Load Balancer.
A web application experiences high compute costs due to serving a high amount of static web content.How should the web server architecture be designed to be the MOST cost-efficient?A. Create an Auto Scaling group to scale out based on average CPU usage.B. Create an Amazon CloudFront distribution to pull static content from an Amazon S3 bucket.C. Leverage Reserved Instances to add additional capacity at a significantly lower price.D. Create a multi-region deployment using an Amazon Route 53 geolocation routing policy.Reveal Solution Discussion 6
B. Create an Amazon CloudFront distribution to pull static content from an Amazon S3 bucket.
A Solutions Architect plans to migrate NAT instances to NAT gateway. The Architect has NAT instances with scripts to manage high availability.What is the MOST efficient method to achieve similar high availability with NAT gateway?A. Remove source/destination check on NAT instances.B. Launch a NAT gateway in each Availability Zone.C. Use a mix of NAT instances and NAT gateway.D. Add an ELB Application Load Balancer in front of NAT gateway.
B. Launch a NAT gateway in each Availability Zone.
A Solutions Architect is designing a web application. The web and application tiers need to access the Internet, but they cannot be accessed from the Internet.Which of the following steps is required?A. Attach an Elastic IP address to each Amazon EC2 instance and add a route from the private subnet to the public subnet.B. Launch a NAT gateway in the public subnet and add a route to it from the private subnet.C. Launch Amazon EC2 instances in the public subnet and change the security group to allow outbound traffic on port 80.D. Launch a NAT gateway in the private subnet and deploy a NAT instance in the private subnet.
B. Launch a NAT gateway in the public subnet and add a route to it from the private subnet.
An application stack includes an Elastic Load Balancer in a public subnet, a fleet of Amazon EC2 instances in an Auto Scaling group, and an Amazon RDSMySQL cluster. Users connect to the application from the Internet. The application servers and database must be secure.How should a Solutions Architect perform this task?A. Create a private subnet for the Amazon EC2 instances and a public subnet for the Amazon RDS cluster.B. Create a private subnet for the Amazon EC2 instances and a private subnet for the Amazon RDS cluster.C. Create a public subnet for the Amazon EC2 instances and a private subnet for the Amazon RDS cluster.D. Create a public subnet for the Amazon EC2 instances and a public subnet for the Amazon RDS cluster.
B. Create a private subnet for the Amazon EC2 instances and a private subnet for the Amazon RDS cluster.
A legacy application running in premises requires a Solutions Architect to be able to open a firewall to allow access to several Amazon S3 buckets. The Architect has a VPN connection to AWS in place.How should the Architect meet this requirement?A. Create an IAM role that allows access from the corporate network to Amazon S3.B. Configure a proxy on Amazon EC2 and use an Amazon S3 VPC endpoint.C. Use Amazon API Gateway to do IP whitelisting.D. Configure IP whitelisting on the customerââ¬â¢s gateway.
B. Configure a proxy on Amazon EC2 and use an Amazon S3 VPC endpoint.
A Solutions Architect is designing solution with AWS Lambda where different environments require different database passwords.What should the Architect do to accomplish this in a secure and scalable way?A. Create a Lambda function for each individual environment.B. Use Amazon DynamoDB to store environmental variables.C. Use encrypted AWS Lambda environmental variables.D. Implement a dedicated Lambda function for distributing variables.
C. Use encrypted AWS Lambda environmental variables.
A news organization plans to migrate their 20 TB video archive to AWS. The files are rarely accessed, but when they are, a request is made in advance and a 3 to5-hour retrieval time frame is acceptable. However, when there is a breaking news story, the editors require access to archived footage within minutes.Which storage solution meets the needs of this organization while providing the LOWEST cost of storage?A. Store the archive in Amazon S3 Reduced Redundancy Storage.B. Store the archive in Amazon Glacier and use standard retrieval for all content.C. Store the archive in Amazon Glacier and pay the additional charge for expedited retrieval when needed.D. Store the archive in Amazon S3 with a lifecycle policy to move this to S3 Infrequent Access after 30 days.
C. Store the archive in Amazon Glacier and pay the additional charge for expedited retrieval when needed.
A Solutions Architect is designing a Lambda function that calls an API to list all running Amazon RDS instances.How should the request be authorized?A. Create an IAM access and secret key, and store it in the Lambda function.B. Create an IAM role to the Lambda function with permissions to list all Amazon RDS instances.C. Create an IAM role to Amazon RDS with permissions to list all Amazon RDS instances.D. Create an IAM access and secret key, and store it in an encrypted RDS database.
B. Create an IAM role to the Lambda function with permissions to list all Amazon RDS instances.
A Solutions Architect is building a new feature using a Lambda to create metadata when a user uploads a picture to Amazon S3. All metadata must be indexed.Which AWS service should the Architect use to store this metadata?A. Amazon S3B. Amazon DynamoDBC. Amazon KinesisD. Amazon EFC
B. Amazon DynamoDB; "indexed" meaning database
An interactive, dynamic website runs on Amazon EC2 instances in a single subnet behind an ELB Classic Load Balancer.Which design changes will make the site more highly available?A. Move some Amazon EC2 instances to a subnet in a different way.B. Move the website to Amazon S3.C. Change the ELB to an Application Load Balancer.D. Move some Amazon EC2 instances to a subnet in the same Availability Zone.
A. Move some Amazon EC2 instances to a subnet in a different way; should be move in a different AZ
A Solutions Architect is designing a web application that is running on an Amazon EC2 instance. The application stores data in DynamoDB. The Architect needs to secure access to the DynamoDB table.What combination of steps does AWS recommend to achieve secure authorization? (Select two.)A. Store an access key on the Amazon EC2 instance with rights to the Dynamo DB table.B. Attach an IAM user to the Amazon EC2 instance.C. Create an IAM role with permissions to write to the DynamoDB table.D. Attach an IAM role to the Amazon EC2 instance.E. Attach an IAM policy to the Amazon EC2 instance.
C. Create an IAM role with permissions to write to the DynamoDB table.D. Attach an IAM role to the Amazon EC2 instance.
A Solutions Architect is about to deploy an API on multiple EC2 instances in an Auto Scaling group behind an ELB. The support team has the following operational requirements:1 They get an alert when the requests per second go over 50,0002 They get an alert when latency goes over 5 seconds3 They can validate how many times a day users call the API requesting highly-sensitive dataWhich combination of steps does the Architect need to take to satisfy these operational requirements? (Select two.)A. Ensure that CloudTrail is enabled.B. Create a custom CloudWatch metric to monitor the API for data access.C. Configure CloudWatch alarms for any metrics the support team requires.D. Ensure that detailed monitoring for the EC2 instances is enabled.E. Create an application to export and save CloudWatch metrics for longer term trending analysis.
A. Ensure that CloudTrail is enabled.C. Configure CloudWatch alarms for any metrics the support team requires.
A Solutions Architect is designing a highly-available website that is served by multiple web servers hosted outside of AWS. If an instance becomes unresponsive, the Architect needs to remove it from the rotation.What is the MOST efficient way to fulfill this requirement?A. Use Amazon CloudWatch to monitor utilization.B. Use Amazon API Gateway to monitor availability.C. Use an Amazon Elastic Load Balancer.D. Use Amazon Route 53 health checks.
D. Use Amazon Route 53 health checks; "web servers hosted outside of AWS"
A company hosts a popular web application. The web application connects to a database running in a private VPC subnet. The web servers must be accessible only to customers on an SSL connection. The RDS MySQL database server must be accessible only from the web servers.How should the Architect design a solution to meet the requirements without impacting running applications?A. Create a network ACL on the web serverââ¬â¢s subnet, and allow HTTPS inbound and MySQL outbound. Place both database and web servers on the same subnet.B. Open an HTTPS port on the security group for web servers and set the source to 0.0.0.0/0. Open the MySQL port on the database security group and attach it to the MySQL instance. Set the source to Web Server Security Group.C. Create a network ACL on the web serverââ¬â¢s subnet, and allow HTTPS inbound, and specify the source as 0.0.0.0/0. Create a network ACL on a database subnet, allow MySQL port inbound for web servers, and deny all outbound traffic.D. Open the MySQL port on the security group for web servers and set the source to 0.0.0.0/0. Open the HTTPS port on the database security group and attach it to the MySQL instance. Set the source to Web Server Security Group.
B. Open an HTTPS port on the security group for web servers and set the source to 0.0.0.0/0. Open the MySQL port on the database security group and attach it to the MySQL instance. Set the source to Web Server Security Group.
Which service should an organization use if it requires an easily managed and scalable platform to host its web application running on Nginx?A. AWS LambdaB. Auto ScalingC. AWS Elastic BeanstalkD. Elastic Load Balancing
C. AWS Elastic Beanstalk
A company is using AWS Key Management Service (AWS KMS) to secure their Amazon RDS databases. An auditor has recommended that the company log all use of their AWS KMS keys.What is the SIMPLEST solution?A. Associate AWS KMS metrics with Amazon CloudWatch.B. Use AWS CloudTrail to log AWS KMS key usage.C. Deploy a monitoring agent on the RDS instances.D. Poll AWS KMS periodically with a scheduled job.
B. Use AWS CloudTrail to log AWS KMS key usage.
A media company asked a Solutions Architect to design a highly available storage solution to serve as a centralized document store for their Amazon EC2 instances. The storage solution needs to be POSIX-compliant, scale dynamically, and be able to serve up to 100 concurrent EC2 instances.Which solution meets these requirements?A. Create an Amazon S3 bucket and store all of the documents in this bucket.B. Create an Amazon EBS volume and allow multiple users to mount that volume to their EC2 instance(s).C. Use Amazon Glacier to store all of the documents.D. Create an Amazon Elastic File System (Amazon EFS) to store and share the documents.
D. Create an Amazon Elastic File System (Amazon EFS) to store and share the documents; normally coincides with "POSIX"
An AWS workload in a VPC is running a legacy database on an Amazon EC2 instance. Data is stored on a 200GB Amazon EBS (gp2) volume. At peak load times, logs show excessive wait time.What solution should be implemented to improve database performance using persistent storage?A. Migrate the data on the Amazon EBS volume to an SSD-backed volume.B. Change the EC2 instance type to one with EC2 instance store volumes.C. Migrate the data on the EBS volume to provisioned IOPS SSD (io1).D. Change the EC2 instance type to one with burstable performance.
C. Migrate the data on the EBS volume to provisioned IOPS SSD (io1).
A company hosts a two-tier application that consists of a publicly accessible web server that communicates with a private database. Only HTTPS port 443 traffic to the web server must be allowed from the Internet.Which of the following options will achieve these requirements? (Choose two.)A. Security group rule that allows inbound Internet traffic for port 443.B. Security group rule that denies all inbound Internet traffic except port 443.C. Network ACL rule that allows port 443 inbound and all ports outbound for Internet traffic.D. Security group rule that allows Internet traffic for port 443 in both inbound and outbound.E. Network ACL rule that allows port 443 for both inbound and outbound for all Internet traffic.
A. Security group rule that allows inbound Internet traffic for port 443.C. Network ACL rule that allows port 443 inbound and all ports outbound for Internet traffic.
A company runs a legacy application with a single-tier architecture on an Amazon EC2 instance. Disk I/O is low, with occasional small spikes during business hours. The company requires the instance to be stopped from 8 PM to 8 AM daily.Which storage option is MOST appropriate for this workload?A. Amazon EC2 instance storageB. Amazon EBS General Purpose SSD (gp2) storageC. Amazon S3D. Amazon EBS Provision IOPS SSD (io1) storage
B. Amazon EBS General Purpose SSD (gp2) storage
As part of securing an API layer built on Amazon API gateway, a Solutions Architect has to authorize users who are currently authenticated by an existing identity provider. The users must be denied access for a period of one hour after three unsuccessful attempts.How can the Solutions Architect meet these requirements?A. Use AWS IAM authorization and add least-privileged permissions to each respective IAM role.B. Use an API Gateway custom authorizer to invoke an AWS Lambda function to validate each users identity.C. Use Amazon Cognito user pools to provide built-in user management.D. Use Amazon Cognito user pools to integrate with external identity providers.
B. Use an API Gateway custom authorizer to invoke an AWS Lambda function to validate each users identity.
An organization runs an online media site, hosted on-premises. An employee posted a product review that contained videos and pictures. The review went viral and the organization needs to handle the resulting spike in website traffic.What action would provide an immediate solution?A. Redesign the website to use Amazon API Gateway, and use AWS Lambda to deliver content.B. Add server instances using Amazon EC2 and use Amazon Route 53 with a failover routing policy.C. Serve the images and videos via an Amazon CloudFront distribution created using the news site as the origin.D. Use Amazon ElasticCache for Redis for caching and reducing the load requests from the origin.
C. Serve the images and videos via an Amazon CloudFront distribution created using the news site as the origin.
A client notices that their engineers often make mistakes when creating Amazon SQS queues for their backend system.Which action should a Solutions Architect recommend to improve this process?A. Use the AWS CLI to create queues using AWS IAM Access Keys.B. Write a script to create the Amazon SQS queue using AWS Lambda.C. Use AWS Elastic Beanstalk to automatically create the Amazon SQS queues.D. Use AWS CloudFormation Templates to manage the Amazon SQS queue creation.
D. Use AWS CloudFormation Templates to manage the Amazon SQS queue creation.
A development team is building an application with front-end and backend application tiers. Each tier consists of Amazon EC2 instances behind an ELB ClassicLoad Balancer. The instances run in Auto Scaling groups across multiple Availability Zones. The network team has allocated the 10.0.0.0/24 address space for this application. Only the front-end load balancer should be exposed to the Internet. There are concerns about the limited size of the address space and the ability of each tier to scale.What should the VPC subnet design be in each Availability Zone?A. One public subnet for the load balancer tier, one public subnet for the front-end tier, and one private subnet for the backend tier.B. One shared public subnet for all tiers of the application.C. One public subnet for the load balancer tier and one shared private subnet for the application tiers.D. One shared private subnet for all tiers of the application.
C. One public subnet for the load balancer tier and one shared private subnet for the application tiers.
A Solutions Architect must select the storage type for a big data application that requires very high sequential I/O. The data must persist if the instance is stopped.Which of the following storage types will provide the best fit at the LOWEST cost for the application?A. An Amazon EC2 instance store local SSD volume.B. An Amazon EBS provisioned IOPS SSD volume.C. An Amazon EBS throughput optimized HDD volume.D. An Amazon EBS general purpose SSD volume.
C. An Amazon EBS throughput optimized HDD volume; "high sequential I/O"
Two Auto Scaling applications, Application A and Application B, currently run within a shared set of subnets. A Solutions Architect wants to make sure thatApplication A can make requests to Application B, but Application B should be denied from making requests to Application A.Which is the SIMPLEST solution to achieve this policy?A. Using security groups that reference the security groups of the other applicationB. Using security groups that reference the application serverââ¬â¢s IP addressesC. Using Network Access Control Lists to allow/deny traffic based on application IP addressesD. Migrating the applications to separate subnets from each other
A. Using security groups that reference the security groups of the other applicationNot C - NACL is at subnet level
An application is running on an Amazon EC2 instance in a private subnet. The application needs to read and write data onto Amazon Kinesis Data Streams, and corporate policy requires that this traffic should not go to the internet.How can these requirements be met?A. Configure a NAT gateway in a public subnet and route all traffic to Amazon Kinesis through the NAT gateway.B. Configure a gateway VPC endpoint for Kinesis and route all traffic to Kinesis through the gateway VPC endpoint.C. Configure an interface VPC endpoint for Kinesis and route all traffic to Kinesis through the gateway VPC endpoint.D. Configure an AWS Direct Connect private virtual interface for Kinesis and route all traffic to Kinesis through the virtual interface.
C. Configure an interface VPC endpoint for Kinesis and route all traffic to Kinesis through the gateway VPC endpoint.Not B; gateway VPC only for S3 or DynamoDB
A Solutions Architect is building an application that stores object data. Compliance requirements state that the data stored is immutable.Which service meets these requirements?A. Amazon S3B. Amazon GlacierC. Amazon EFSD. AWS Storage Gateway
B. Amazon Glacier; "immutable"
A Solutions Architect is defining a shared Amazon S3 bucket where corporate applications will save objects.How can the Architect ensure that when an application uploads an object to the Amazon S3 bucket, the object is encrypted?A. Set a CORS configuration.B. Set a bucket policy to encrypt all Amazon S3 objects.C. Enable default encryption on the bucket.D. Set permission for users.
C. Enable default encryption on the bucket.
A data analytics startup company asks a Solutions Architect to recommend an AWS data store options for indexed data. The data processing engine will generate and input more than 64 TB of processed data every day, with item sizes reaching up to 300 KB. The startup is flexible with data storage and is more interested in a database that requires minimal effort to scale with a growing dataset size.Which AWS data store service should the Architect recommend?A. Amazon RDSB. Amazon RedshiftC. Amazon DynamoDBD. Amazon S3
C. Amazon DynamoDB"indexed" is NoSQL meaning DynamoDB; S3 is not a database; Redshift is SQL data warehouse; RDS is SQL DB
A Solutions Architect needs to allow developers to have SSH connectivity to web servers. The requirements are as follows:â Limit access to users origination from the corporate network.â Web servers cannot have SSH access directly from the Internet.â Web servers reside in a private subnet.Which combination of steps must the Architect complete to meet these requirements? (Choose two.)A. Create a bastion host that authenticates users against the corporate directory.B. Create a bastion host with security group rules that only allow traffic from the corporate network.C. Attach an IAM role to the bastion host with relevant permissions.D. Configure the web servers security group to allow SSH traffic from a bastion host.E. Deny all SSH traffic from the corporate network in the inbound network ACL.
B. Create a bastion host with security group rules that only allow traffic from the corporate network.D. Configure the web servers security group to allow SSH traffic from a bastion host.
A Solutions Architect needs to use AWS to implement pilot light disaster recovery for a three-tier web application hosted in an on-premises datacenter.Which solution allows rapid provision of working, fully-scaled production environment?A. Continuously replicate the production database server to Amazon RDS. Use AWS CloudFormation to deploy the application and any additional servers if necessary.B. Continuously replicate the production database server to Amazon RDS. Create one application load balancer and register on-premises servers. Configure ELB Application Load Balancer to automatically deploy Amazon EC2 instances for application and additional servers if the on-premises application is down.C. Use a scheduled Lambda function to replicate the production database to AWS. Use Amazon Route 53 health checks to deploy the application automatically to Amazon S3 if production is unhealthy.D. Use a scheduled Lambda function to replicate the production database to AWS. Register on-premises servers to an Auto Scaling group and deploy the application and additional servers if production is unavailable.
A. Continuously replicate the production database server to Amazon RDS. Use AWS CloudFormation to deploy the application and any additional servers if necessary.
A Solutions Architect is designing a solution that can monitor memory and disk space utilization of all Amazon EC2 instances running Amazon Linux andWindows.Which solution meets this requirement?A. Default Amazon CloudWatch metrics.B. Custom Amazon CloudWatch metrics.C. Amazon Inspector resource monitoring.D. Default monitoring of Amazon EC2 instances.
B. Custom Amazon CloudWatch metrics.Default CloudWatch does not come with memory monitoring.
A Solutions Architect is creating a new relational database. The Compliance team will use the database, and mandates that data content must be stored across three different Availability Zones.Which of the following options should the Architect Use?A. Amazon AuroraB. Amazon RDS MySQL with Multi-AZ enabledC. Amazon DynamoDBD. Amazon ElastiCache
A. Amazon AuroraBy default, Aurora deploys in 3 AZ's
A company needs to quickly ensure that all files created in an Amazon S3 bucket in us-east-1 are also available in another bucket in ap-southeast-2.Which option represents the SIMPLIEST way to implement this design?A. Add an S3 lifecycle rule to move any files from the bucket in us-east-1 to the bucket in ap-southeast-2.B. Create a Lambda function to be triggered for every new file in us-east-1 that copies the file to the bucket in ap-southeast-2.C. Use SNS to notify the bucket in ap-southeast-2 to create a file whenever the file is created in the bucket in us-east-1.D. Enable versioning and configure cross-region replication from the bucket in us-east-1 to the bucket in ap-southeast-2.
D. Enable versioning and configure cross-region replication from the bucket in us-east-1 to the bucket in ap-southeast-2.
An organization has a long-running image processing application that runs on Spot Instances that will be terminated when interrupted. A highly available workload must be designed to respond to Spot Instance interruption notices. The solution must include a two-minute warning when there is not enough capacity.How can these requirements be met?A. Use Amazon CloudWatch Events to invoke an AWS Lambda function that can launch On-Demand Instances.B. Regularly store data from the application on Amazon DynamoDB. Increase the maximum number of instances in the AWS Auto Scaling group.C. Manually place a bid for additional Spot Instances at a higher price in the same AWS Region and Availability Zone.D. Ensure that the Amazon Machine Image associated with the application has the latest configurations for the launch configuration.
A. Use Amazon CloudWatch Events to invoke an AWS Lambda function that can launch On-Demand Instances.
A company has an Amazon RDS-managed online transaction processing system that has very heavy read and write. The Solutions Architect notices throughput issues with the system.How can the responsiveness of the primary database be improved?A. Use asynchronous replication for standby to maximize throughput during peak demand.B. Offload SELECT queries that can tolerate stale data to READ replica.C. Offload SELECT and UPDATE queries to READ replica.D. Offload SELECT query that needs the most current data to READ replica.
B. Offload SELECT queries that can tolerate stale data to READ replica.
A company is designing a failover strategy in Amazon Route 53 for its resources between two AWS Regions. The company must have the ability to route a user"â¢s traffic to the region with least latency, and if both regions are healthy, Route 53 should route traffic to resources in both regions.Which strategy should the Solutions Architect recommend?A. Configure active-active failover using Route 53 latency DNS records.B. Configure active-passive failover using Route 53 latency DNS records.C. Configure active-active failover using Route 53 failover DNS records.D. Configure active-passive failover using Route 53 failover DNS records.
A. Configure active-active failover using Route 53 latency DNS records.
A Solutions Architect is deploying a new production MySQL database on AWS. It is critical that the database is highly available.What should the Architect do to achieve this goal with Amazon RDS?A. Create a read replica of the primary database and deploy it in a different AWS Region.B. Enable multi-AZ to create a standby database in a different Availability Zone.C. Enable multi-AZ to create a standby database in a different AWS Region.D. Create a read replica of the primary database and deploy it in a different Availability Zone.
B. Enable multi-AZ to create a standby database in a different Availability Zone.
A company hosts a website on premises. The website has a mix of static and dynamic content, but users experience latency when loading static files.Which AWS service can help reduce latency?A. Amazon CloudFront with on-premises servers as the originB. ELB Application Load BalancerC. Amazon Route 53 latency-based routingD. Amazon EFS to store and server static files
A. Amazon CloudFront with on-premises servers as the origin
A media company has deployed a multi-tier architecture on AWS. Web servers are deployed in two Availability Zones using an Auto Scaling group with a defaultAuto Scaling termination policy. The web servers"⢠Auto Scaling group currently has 15 instances running.Which instance will be terminated first during a scale-in operation?A. The instance with the oldest launch configuration.B. The instance in the Availability Zone that has most instances.C. The instance closest to the next billing hour.D. The oldest instance in the group.
B. The instance in the Availability Zone that has most instances.
A retail company has sensors placed in its physical retail stores. The sensors send messages over HTTP when customers interact with in-store product displays.A Solutions Architect needs to implement a system for processing those sensor messages; the results must be available for the Data Analysis team.Which architecture should be used to meet these requirements?A. Implement an Amazon API Gateway to server as the HTTP endpoint. Have the API Gateway trigger an AWS Lambda function to process the messages, and save the results to an Amazon DynamoDB table.B. Create an Amazon EC2 instance to server as the HTTP endpoint and to process the messages. Save the results to Amazon S3 for the Data Analysis team to download.C. Use Amazon Route 53 to direct incoming sensor messages to a Lambda function to process the message and save the results to a Amazon DynamoDB table.D. Use AWS Direct Connect to connect sensors to DynamoDB so that data can be written directly to a DynamoDB table where it can be accessed by the Data Analysis team.
A. Implement an Amazon API Gateway to server as the HTTP endpoint. Have the API Gateway trigger an AWS Lambda function to process the messages, and save the results to an Amazon DynamoDB table.
A company has an Amazon RDS database backing its production website. The Sales team needs to run queries against the database to track training program effectiveness. Queries against the production database cannot impact performance, and the solution must be easy to maintain.How can these requirements be met?A. Use an Amazon Redshift database. Copy the product database into Redshift and allow the team to query it.B. Use an Amazon RDS read replica of the production database and allow the team to query against it.C. Use multiple Amazon EC2 instances running replicas of the production database, placed behind a load balancer.D. Use an Amazon DynamoDB table to store a copy of the data.
B. Use an Amazon RDS read replica of the production database and allow the team to query against it.
A company must collect temperature data from thousands of remote weather devices. The company must also store this data in a data warehouse to run aggregations and visualizations.Which services will meet these requirements? (Choose two.)A. Amazon Kinesis Data FirehouseB. Amazon SQSC. Amazon RedshiftD. Amazon SNSE. Amazon DynamoDB
A. Amazon Kinesis Data FirehouseC. Amazon Redshift
An online company wants to conduct real-time sentiment analysis about its products from its social media channels using SQL.Which of the following solutions has the LOWEST cost and operational burden?A. Set up a streaming data ingestion application on Amazon EC2 and connect it to a Hadoop cluster for data processing. Send the output to Amazon S3 and use Amazon Athena to analyze the data.B. Configure the input stream using Amazon Kinesis Data Streams. Use Amazon Kinesis Data Analytics to write SQL queries against the stream.C. Configure the input stream using Amazon Kinesis Data Streams. Use Amazon Kinesis Data Firehose to send data to an Amazon Redshift cluster, and then query directly against Amazon RedshiftD. Set up streaming data ingestion application on Amazon EC2 and send the output to Amazon S3 using Kinesis Data Firehose. Use Athena to analyze the data.
B. Configure the input stream using Amazon Kinesis Data Streams. Use Amazon Kinesis Data Analytics to write SQL queries against the stream.
Which requirements must be met in order for a Solutions Architect to specify that an Amazon EC2 instance should stop rather than terminate when its SpotInstance is interrupted? (Choose two.)A. The Spot Instance request type must be one-time.B. The Spot Instance request type must be persistent.C. The root volume must be an Amazon EBS volume.D. The root volume must be an instance store volume.E. The launch configuration is changed.
B. The Spot Instance request type must be persistent.C. The root volume must be an Amazon EBS volume.
An application hosted on AWS uses object storage for storing internal reports that are accessed daily by the CFO. Currently, these reports are publicly available.How should a Solutions Architect re-design this architecture to prevent unauthorized access to these reports?A. Encrypt the files on the client side and store the files on Amazon Glacier, then decrypt the reports on the client side.B. Move the files to Amazon ElastiCache and provide a username and password for downloading the reports.C. Specify the use of AWS KMS server-side encryption at the time of an object creation on Amazon S3.D. Store the files on Amazon S3 and use the application to generate S3 pre-signed URLs to users.
D. Store the files on Amazon S3 and use the application to generate S3 pre-signed URLs to users.
A team has an application that detects new objects being uploaded into an Amazon S3 bucket. The uploads trigger a Lambda function to write object metadata into an Amazon DynamoDB table and RDS PostgreSQL database.Which action should the team take to ensure high availability?A. Enable cross-region replication in the Amazon S3 bucket.B. Create a Lambda function for each Availability Zone the application is deployed in.C. Enable multi-AZ on the RDS PostgreSQL database.D. Create a DynamoDB stream for the DynamoDB table.
C. Enable multi-AZ on the RDS PostgreSQL database.Because everything else is highly available.
A company wants to improve the performance of their web application after receiving customer complaints. An analysis concluded that the same complex database queries were causing increased latency.What should a Solutions Architect recommend to improve the application"â¢s performance?A. Migrate the database to MySQL.B. Use Amazon RedShift to analyze the queries.C. Integrate Amazon ElastiCache into the application.D. Use a Lambda-triggered request to the backend database.
C. Integrate Amazon ElastiCache into the application.
A Solutions Architect is designing a solution that will include a database in Amazon RDS. Corporate security policy mandates that the database, its logs, and its backups are all encrypted.Which is the MOST efficient option to fulfill the security policy using Amazon RDS?A. Launch an Amazon RDS instance with encryption enabled. Enable encryption for logs and backups.B. Launch an Amazon RDS instance. Enable encryption for database, logs and backups.C. Launch an Amazon RDS instance with encryption enabled. Logs and backups are automatically encrypted.D. Launch an Amazon RDS instance. Enable encryption for backups. Encrypt logs with a database-engine feature.
C. Launch an Amazon RDS instance with encryption enabled. Logs and backups are automatically encrypted.Can't encrypt RDS after it has been created.
A company"â¢s policy requires that all data stored in Amazon S3 is encrypted. The company wants to use the option with the least overhead and does not want to manage any encryption keys.Which of the following options will meet the company"â¢s requirements?A. AWS CloudHSMB. AWS Trusted AdvisorC. Server Side Encryption (SSE-S3)D. Server Side Encryption (SSE-KMS)
C. Server Side Encryption (SSE-S3); "least overhead" you have to manage the key with KMS
A company has gigabytes of web log files stored in an Amazon S3 bucket. A Solutions Architect wants to copy those files into Amazon Redshift for analysis. The company"â¢s security policy mandates that data is encrypted at rest both in the Amazon Redshift cluster and the Amazon S3 bucket.Which process will fulfill the security requirements?A. Enable server-side encryption on the Amazon S3 bucket. Launch an unencrypted Amazon Redshift cluster. Copy the data into the Amazon Redshift cluster.B. Enable server-side encryption on the Amazon S3 bucket. Copy data from the Amazon S3 bucket into an unencrypted Redshift cluster. Enable encryption on the cluster.C. Launch an encrypted Amazon Redshift cluster. Copy the data from the Amazon S3 bucket into the Amazon Redshift cluster. Copy data back to the Amazon S3 bucket in encrypted form.D. Enable server-side encryption on the Amazon S3 bucket. Launch an encrypted Amazon Redshift cluster. Copy the data into the Amazon Redshift cluster.
D. Enable server-side encryption on the Amazon S3 bucket. Launch an encrypted Amazon Redshift cluster. Copy the data into the Amazon Redshift cluster.
An application runs on Amazon EC2 instances in an Auto Scaling group. When instances are terminated, the Systems Operations team cannot determine the route cause, because the logs reside on the terminated instances and are lost.How can the root cause be determined?A. Use ephemeral volumes to store the log files.B. Use a scheduled Amazon CloudWatch Event to take regular Amazon EBS snapshots.C. Use an Amazon CloudWatch agent to push the logs to Amazon CloudWatch Logs.D. Use AWS CloudTrail to pull the logs from the Amazon EC2 instances.
C. Use an Amazon CloudWatch agent to push the logs to Amazon CloudWatch Logs.
A Solutions Architect is designing a customer order processing application that will likely have high usage spikes.What should the Architect do to ensure that customer orders are not lost before being written to an Amazon RDS database? (Choose two.)A. Use Amazon CloudFront to deliver the application front end.B. Use Elastic Load Balancing with a round-robin routing algorithm.C. Have the orders written into an Amazon SQS queue.D. Scale the number of processing nodes based on pending order volume.E. Have a standby Amazon RDS instance in a separate Availability Zone.
C. Have the orders written into an Amazon SQS queue.D. Scale the number of processing nodes based on pending order volume.
Employees from several companies use an application once a year during a specific 30-day period. The periods are different for each company. Traffic to the application spikes during these 30-day periods.How can the application be designed to handle these traffic spikes?A. Use an Amazon Route 53 latency routing policy to route traffic to an Amazon EC2 instance with the least lag time.B. Use Amazon S3 to cache static elements of the website requests.C. Use an Auto Scaling group to scale the number of EC2 instances to match the site traffic.D. Use Amazon Cloud Front to serve static assets to decrease the load on the EC2 instances.
C. Use an Auto Scaling group to scale the number of EC2 instances to match the site traffic.
A company has instances in private subnets that require outbound access to the internet.This requires:A. Assigning a public IP address to the instance.B. Updating the route table associated with the subnet to point internet traffic through a NAT gateway.C. Updating the security group associated with the subnet to allow ingress on 0.0.0.0/0.D. Routing traffic from the instance through a VPC endpoint that has internet access.
B. Updating the route table associated with the subnet to point internet traffic through a NAT gateway.
An organization runs an online voting system for a television program. During broadcasts, hundreds of thousands of votes are submitted within minutes and sent to a front-end fleet of auto-scaled Amazon EC2 instances. The EC2 instances push the votes to an RDBMS database. The database is unable to keep up with the front-end connection requests.What is the MOST efficient and cost-effective way of ensuring that votes are processed in a timely manner?A. Each front-end node should send votes to an Amazon SQS queue. Provision worker instances to read the SQS queue and process the message information into RDBMS database.B. As the load on the database increases, horizontally-scale the RDBMS database with additional memory-optimized instances. When voting has ended, scale down the additional instances.C. Re-provision the RDBMS database with larger, memory-optimized instances. When voting ends, re-provision the back-end database with smaller instances.D. Send votes from each front-end node to Amazon DynamoDB. Provision worker instances to process the votes in DynamoDB into the RDBMS database.
A. Each front-end node should send votes to an Amazon SQS queue. Provision worker instances to read the SQS queue and process the message information into RDBMS database.
An application that runs on an Amazon EC2 instance must make secure calls to Amazon S3 buckets.Which steps can a Solutions Architect take to ensure that the calls are made without exposing credentials?A. Generate an access key ID and a secret key, and assign an IAM role with least privilege.B. Create an IAM policy granting access to all services and assign it to the Amazon EC2 instance profile.C. Create an IAM role granting least privilege and assign it to the Amazon EC2 instance profile.D. Generate temporary access keys to grant users temporary access to the Amazon EC2 instance.
C. Create an IAM role granting least privilege and assign it to the Amazon EC2 instance profile.
A Solutions Architect needs to design a centralized logging solution for a group of web applications running on Amazon EC2 instances. The solution requires minimal development effort due to budget constraints.Which of the following should the Architect recommend?A. Create a crontab job script in each instance to push the logs regularly to Amazon S3.B. Install and configure Amazon CloudWatch Logs agent in the Amazon EC2 instances.C. Enable Amazon CloudWatch Events in the AWS Management Console.D. Enable AWS CloudTrail to map all API calls invoked by the applications.
B. Install and configure Amazon CloudWatch Logs agent in the Amazon EC2 instances.
A Solutions Architect is designing a three-tier web application that includes an Auto Scaling group of Amazon EC2 instances running behind an ELB Classic LoadBalancer. The security team requires that all web servers must be accessible only through the Load Balancer, and that none of the web servers are directly accessible from the Internet.How should the Architect meet these requirements?A. Use a Load Balancer installed on an Amazon EC2 instance.B. Configure the web servers"⢠security group to deny traffic from the public Internet.C. Create an Amazon CloudFront distribution in front of the ELB Classic Load Balancer.D. Configure the web tier security group to allow only traffic from the ELB Classic Load Balancer.
D. Configure the web tier security group to allow only traffic from the ELB Classic Load Balancer.
A Solutions Architect is designing a web application that will be hosted on Amazon EC2 instances in a public subnet. The web application uses a MySQL database in a private subnet. The database should be accessible to database administrators.Which of the following options should the Architect recommend? (Choose two.)A. Create a bastion host in a public subnet, and use the bastion host to connect to the database.B. Log in to the web servers in the public subnet to connect to the database.C. Perform DB maintenance after using SSH to connect to the NAT Gateway in a public subnet.D. Create an IPSec VPN tunnel between the customer site and the VPC, and use the VPN tunnel to connect to the database.E. Attach an Elastic IP address to the database.
A. Create a bastion host in a public subnet, and use the bastion host to connect to the database.D. Create an IPSec VPN tunnel between the customer site and the VPC, and use the VPN tunnel to connect to the database.
A Solutions Architect is designing a service that must have four Amazon EC2 instances running between 8 AM and 6 PM daily. The service requires one EC2 instance outside of those hours.What is the MOST cost-effective way to provide enough compute?A. Use one Amazon EC2 Reserved Instance and use an Auto Scaling group to add and remove EC2 instances based on CPU utilization.B. Use one Amazon EC2 On-Demand instance and use an Auto Scaling group to add and remove EC2 instances based on CPU utilization.C. Use one Amazon EC2 On-Demand instance and use an Auto Scaling Group scheduled action to add three EC2 Spot instances at 7:30 AM and remove three instances at 6:10 PM.D. Use one Amazon EC2 Reserved Instance and use an Auto Scaling Group scheduled action to add three EC2 On-Demand instances at 7:30 AM and remove three instances at 6:10 PM.
D. Use one Amazon EC2 Reserved Instance and use an Auto Scaling Group scheduled action to add three EC2 On-Demand instances at 7:30 AM and remove three instances at 6:10 PM.
A company plans to use an Amazon VPC to deploy a web application consisting of an elastic load balancer, a fleet of web and application servers, and anAmazon RDS MySQL database that should not be accessible from the Internet. The proposed design must be highly available and distributed over two AvailabilityZones.What would be the MOST appropriate VPC design for this specific use case?A. Two public subnets for the elastic load balancer, two public subnets for the web servers, and two public subnets for Amazon RDS.B. One public subnet for the elastic load balancer, two private subnets for the web servers, and two private subnets for Amazon RDS.C. One public subnet for the elastic load balancer, one public subnet for the web servers, and one private subnet for the database.D. Two public subnets for the elastic load balancer, two private subnets for the web servers, and two private subnets for RDS.
D. Two public subnets for the elastic load balancer, two private subnets for the web servers, and two private subnets for RDS.
A workload in an Amazon VPC consists of a single web server launched from a custom AMI. Session state is stored in a database.How should the Solutions Architect modify this workload to be both highly available and scalable?A. Create a launch configuration with a desired capacity of two web servers across multiple Availability Zones. Create an Auto Scaling group with the AMI ID of the web server image. Use Amazon Route 53 latency-based routing to balance traffic across the Auto Scaling group.B. Create a launch configuration with the AMI ID of the web server image. Create an Auto Scaling group using the newly-created launch configuration, and a desired capacity of two web servers across multiple regions. Use an Application Load Balancer (ALB) to balance traffic across the Auto Scaling group.C. Create a launch configuration with the AMI ID of the web server image. Create an Auto Scaling group using the newly-created launch configuration, and a desired capacity of two web servers across multiple Availability Zones. Use an ALB to balance traffic across the Auto Scaling group.D. Create a launch configuration with the AMI ID of the web server image. Create an Auto Scaling group using the newly-created launch configuration, and a desired capacity of two web servers across multiple Availability Zones. Use Amazon Route 53 weighted routing to balance traffic across the Auto Scaling group.
C. Create a launch configuration with the AMI ID of the web server image. Create an Auto Scaling group using the newly-created launch configuration, and a desired capacity of two web servers across multiple Availability Zones. Use an ALB to balance traffic across the Auto Scaling group.
As part of a migration strategy, a Solutions Architect needs to analyze workloads that can be optimized for performance and cost. The Solutions Architect has identified a stateless application that serves static content as a potential candidate to move to the cloud. The Solutions Architect has the flexibility to choose an identity solution between Facebook, Twitter, and Amazon.Which AWS solution offers flexibility and ease of use, and the LEAST operational overhead for this migration?A. Use AWS Identity and Access Management (IAM) for managing identities, and migrate the application to run on Amazon S3, Amazon API Gateway, and AWS Lambda.B. Use a third-party solution for managing identities, and migrate the application to run on Amazon S3, EC2 Spot Instances, and Amazon EC2.C. Use Amazon Cognito for managing identities, and migrate the application to run on Amazon S3, Amazon API Gateway, and AWS Lambda.D. Use Amazon Cognito for managing identities, and migrate the application to run on Amazon S3, EC2 Spot Instances, and Amazon EC2.
C. Use Amazon Cognito for managing identities, and migrate the application to run on Amazon S3, Amazon API Gateway, and AWS Lambda.
A company needs to capture all client connection information from its Application Load Balancer every five minutes. This data will be used to analyze traffic patterns and troubleshoot the application.How can a Solutions Architect meet this requirement?A. Enable AWS CloudTrail for the Application Load Balancer.B. Enable Access Logs on the Application Load Balancer.C. Install CloudWatch Agent on the Application Load Balancer.D. Enable CloudWatch metrics on the Application Load Balancer.
B. Enable Access Logs on the Application Load Balancer.
A Solutions Architect was tasked with reviewing several templates that build VPCs and ensuring that they meet specific security requirements. After reviewing the templates, the Architect realizes that all of the templates are missing important security best practices.What should the Architect do to implement security best practices in an efficient manner?A. Use VPC peering to enforce network consistencyB. Restrict users from deploying an AWS CloudFormation templateC. Provide the teams a nested AWS CloudFormation template that builds the VPC correctlyD. Create AWS Identity and Access Management (IAM) policies that enforce the corporate VPC architecture standards
C. Provide the teams a nested AWS CloudFormation template that builds the VPC correctly
An application currently stores objects in Amazon S3-Standard. The application accesses new objects frequently for one week. After one week, they are accessed occasionally for analysis batch jobs. A Solutions Architect has been asked to reduce storage costs for the application while allowing immediate access for batch jobs.How can costs be reduced without reducing data durability?A. Create a lifecycle policy that moves Amazon S3 data to Amazon S3 One Zone-Infrequent Access storage after 7 days. After 30 days, move the data to Amazon Glacier.B. Keep the data on Amazon S3, and create a lifecycle policy to move S3 data to Amazon Glacier after 7 days.C. Move all Amazon S3 data to S3 Standard-Infrequent Access storage, and create a lifecycle policy to move the data to Amazon Glacier after 7 days.D. Keep the data on Amazon S3, then create a lifecycle policy to move the data to S3 Standard-Infrequent Access storage after 7 days.
D. Keep the data on Amazon S3, then create a lifecycle policy to move the data to S3 Standard-Infrequent Access storage after 7 days.
An AWS Lambda function requires access to an Amazon RDS for SQL Server instance. It is against company policy to store passwords in Lambda functions.How can a Solutions Architect enable the Lambda function to retrieve the database password without violating company policy?A. Add an IAM policy for IAM database access to the Lambda execution role.B. Store a one-way hash of the password in the Lambda function.C. Have the Lambda function use the AWS Systems Manager Parameter Store.D. Connect to the Amazon RDS for SQL Server instance by using a role assigned to the Lambda function.
C. Have the Lambda function use the AWS Systems Manager Parameter Store.
A company has two different types of reporting needs on their 200-GB data warehouse:â Data scientists run a small number of concurrent ad hoc SQL queries that can take several minutes each to run.â Display screens throughout the company run many fast SQL queries to populate dashboards.Which design would meet these requirements with the LEAST cost?A. Replicate relevant data between Amazon Redshift and Amazon DynamoDB. Data scientists use Redshift. Dashboards use DynamoDB.B. Configure auto-replication between Amazon Redshift and Amazon RDS. Data scientists use Redshift. Dashboards use RDS.C. Use Amazon Redshift for both requirements, with separate query queues configured in workload management.D. Use Amazon Redshift for Data Scientists. Run automated dashboard queries against Redshift and store the results in Amazon ElastiCache. Dashboards query ElastiCache.
C. Use Amazon Redshift for both requirements, with separate query queues configured in workload management.
A company has an application that uses Amazon CloudFront for content that is hosted on an Amazon S3 bucket. After an unexpected refresh, the users are still seeing old content.Which step should the Solutions Architect take to ensure that new content is displayed?A. Perform a cache refresh on the CloudFront distribution that is serving the content.B. Perform an invalidation on the CloudFront distribution that is serving the content.C. Create a new cache behavior path with the updated content.D. Change the TTL value for removing the old objects.
B. Perform an invalidation on the CloudFront distribution that is serving the content.
A company expects its user base to increase five times over one year. Its application is hosted in one region and uses an Amazon RDS MySQL database, an ELBApplication Load Balancer, and Amazon ECS to host the website and its microservices.Which design changes should a Solutions Architect recommend to support the expected growth? (Choose two.)A. Move static files from ECS to Amazon S3B. Use an Amazon Route 53 geolocation routing policyC. Scale the environment based on real-time AWS CloudTrail logsD. Create a dedicated Elastic Load Balancer for each microserviceE. Create RDS read replicas and change the application to use these replicas
A. Move static files from ECS to Amazon S3E. Create RDS read replicas and change the application to use these replicas
A web application is running on Amazon EC2 instances behind an Elastic Load Balancing Application Load Balancer (ALB). The EC2 instances should receive no traffic, except for web requests to the application.Based on these requirements, what security group rules should be put on the Amazon EC2 instances?A. An inbound rule allowing traffic from the security group attached to the ALBB. An inbound rule allowing traffic from the network ACLs attached to the ALBC. An outbound rule allowing traffic to the security group attached to the ALBD. An outbound rule blocking all traffic to the Internet
A. An inbound rule allowing traffic from the security group attached to the ALB
A Solutions Architect must migrate a monolithic on-premises application to AWS. It is a web application with a load balancer, web server, application server, and relational database. The key requirement driving the migration is that the application should perform better and be more elastic.Which of the following architectures would meet these requirements?A. Re-host the application on Amazon EC2 with lift and shift of existing application code. Configure an Elastic Load Balancing load balancer to handle incoming requests. Use Amazon CloudWatch alarms to receive notification of scaling issues. Increase and decrease the size of the Amazon EC2 instances using AWS CLI or AWS Management Console as required.B. Re-architect the application as a three-tier application. Move the database to Amazon RDS. Use read replicas and Amazon ElastiCache with RDS for better performance. Use an Application Load Balancer to forward incoming requests to web and application servers running on-premises.C. Re-platform the application as a three-tier application. Use Elastic Load Balancing for incoming requests. Use EC2 for web and application tiers. Use RDS at the database tier. Use CloudWatch alarms and Auto Scaling for horizontal scaling at the web tier.D. Re-architect the application as Service Oriented Architecture (SOA). Run database and application servers on-premises. Run web-facing EC2 servers. Use an Enterprise Service Bus to handle communications between different parts of the application running on-premises and in the cloud.
C. Re-platform the application as a three-tier application. Use Elastic Load Balancing for incoming requests. Use EC2 for web and application tiers. Use RDS at the database tier. Use CloudWatch alarms and Auto Scaling for horizontal scaling at the web tier.B has it "on prem" still
A company has asked the Solutions Architect to modify its AWS-hosted internal application to allow for load balancing. The customer requests always come from the company domain (example.net). The company requires that incoming HTTP and HTTPS traffic is routed based on the path element of the URL in the request.Which implementation can satisfy all requirements?A. Configure a Network Load Balancer with listeners for appropriate path patterns for the target groups.B. Configure an Application Load Balancer with host-based routing based on the domain field in the HTTP header.C. Configure a Network Load Balancer and enable cross-zone load balancing to ensure that all EC2 instances are used.D. Configure an Application Load Balancer with listeners for appropriate path patterns for the target group.
D. Configure an Application Load Balancer with listeners for appropriate path patterns for the target group.
A Solutions Architect has been asked to deliver video content stored on Amazon S3 to specific users from Amazon CloudFront while restricting access by unauthorized users.How can the Architect implement a solution to meet these requirements?A. Configure CloudFront to use signed-URLs to access Amazon S3.B. Store the videos as private objects in Amazon S3, and let CloudFront serve the objects by using only Origin Access Identity (OAI).C. Use Amazon S3 static website as the origin of CloudFront, and configure CloudFront to deliver the videos by generating a signed URL for users.D. Use OAI for CloudFront to access private S3 objects and select the Restrict Viewer Access option in CloudFront cache behavior to use signed URLs.
D. Use OAI for CloudFront to access private S3 objects and select the Restrict Viewer Access option in CloudFront cache behavior to use signed URLs.
A customer is looking for a storage archival solution for 1,000 TB of data. The customer requires that the solution be durable and data be available within a few hours of requesting it, but not exceeding a day. The solution should be as cost-effective as possible. To meet security compliance policies, data must be encrypted at rest. The customer expects they will need to fetch the data two times in a year.Which storage solution should a Solutions Architect recommend to meet these requirements?A. Copy data to Amazon S3 buckets by using server-side encryption. Move data to Amazon S3 to reduce redundancy storage (RRS).B. Copy data to encrypted Amazon EBS volumes, then store data into Amazon S3.C. Copy each object into a separate Amazon Glacier vault, and let Amazon Glacier take care of encryption.D. Copy data to Amazon S3 with server-side encryption. Configure lifecycle management policies to move data to Amazon Glacier after 0 days.
D. Copy data to Amazon S3 with server-side encryption. Configure lifecycle management policies to move data to Amazon Glacier after 0 days.
A web application runs on 10 EC2 instances launched from a single customer Amazon Machine Image (AMI). The EC2 instances are behind an InternetApplication Load Balancer. Amazon Route 53 provides DNS for the application.How should a Solutions Architect automate recovery when a web server instance stops replying to request?A. Launch the instances in an Auto Scaling group with an Elastic Load Balancing health check.B. Launch instances in multiple Availability Zones and set the load balancer to Multi-AZ.C. Add CloudWatch alarm actions for each instance to restart if the Status Check (Any) fails.D. Add Route 53 records for each instance with an instance health check.
C. Add CloudWatch alarm actions for each instance to restart if the Status Check (Any) fails.CloudWatch can "recover" instances
A company has an application that accesses a MySQL database installed on a single EC2 instance. The instance recently experienced a fault and brought down the entire application for several hours. The company wants to address the issue but is concerned about spending too much time modifying application code or managing the legacy application.What should the Solutions Architect recommend to remove this single point of failure with the FEWEST changes to the application code and the LEAST amount of administrative effort?A. Implement a caching layer by using Amazon ElastiCache to store query results of frequently accessed information.B. Deploy a second EC2 instance with MySQL installed, and configure replication between this instance and the existing MySQL instance.C. Migrate the database to an RDS MySQL Multi-AZ DB instance, and point the application servers to the new RDS instance.D. Create a DynamoDB table to use as a cache layer, and update the application to query data from Amazon DynamoDB before querying MySQL.
C. Migrate the database to an RDS MySQL Multi-AZ DB instance, and point the application servers to the new RDS instance.
A company plans to migrate a website to AWS to use a serverless architecture. The website contains both static and dynamic content and is accessed by users across the world. The website should maintain sessions for returning users to improve the user experience.Which service should a Solutions Architect use for a cost-efficient solution with the LOWEST latency?A. Amazon S3, AWS Lambda, Amazon API Gateway, and Amazon DynamoDBB. Amazon CloudFront, AWS Lambda, API Gateway, and Amazon RDSC. Amazon CloudFront, Elastic Load Balancing, Amazon EC2, and Amazon RDSD. Amazon S3, Amazon CloudFront, AWS Lambda, Amazon API Gateway, and Amazon DynamoDB.
D. Amazon S3, Amazon CloudFront, AWS Lambda, Amazon API Gateway, and Amazon DynamoDB.
A Solution Architect is designing a two-tier application for maximum security, with a web tier running on EC2 instances and the data stored in an RDS DB instance.The web tier should accept user access only through HTTPS connections (port 443) from the Internet, and the data must be encrypted in transit to and from the database.What combination of steps will MOST securely meet the stated requirements? (Choose two.)A. Create a security group for the web tier instances that allows inbound traffic only over port 443.B. Enforce Transparent Data Encryption (TDE) on the RDS database.C. Create a network ACL that allows inbound traffic only over port 443.D. Configure the web servers to communicate with RDS by using SSL, and issue certificates to the web tier EC2 instances.E. Create a customer master key in AWS KMS and apply it to encrypt the RDS instance.
A. Create a security group for the web tier instances that allows inbound traffic only over port 443.D. Configure the web servers to communicate with RDS by using SSL, and issue certificates to the web tier EC2 instances.
A credit card processing application, hosted on an on-premises server, needs to communicate directly with a database hosted on an Amazon EC2 instance running in a private subnet of a VPC. Compliance requirements state that end-to-end communication should be encrypted.Which solution will ensure that this requirement is met?A. Use HTTPS for traffic over VPC peering between the VPC and the on-premises datacenter.B. Use HTTPS for traffic over the Internet between the on-premises server and the Amazon EC2 instance.C. Use HTTPS for traffic over a VPN connection between the VPC and the on-premises datacenter.D. Use HTTPS for traffic over gateway VPC endpoints that have been configured for the Amazon EC2 instance.
C. Use HTTPS for traffic over a VPN connection between the VPC and the on-premises datacenter.
A Solutions Architect has a three-tier web application that serves customers worldwide. Analysis reveals that product images take more time to load than expected.Which action will improve the image load time?A. Store product images on Amazon EBS-optimized storage volumesB. Store product images in an Amazon S3 bucketC. Use an Amazon CloudFront distribution for product imagesD. Use an Auto Scaling group to add instances for product images
C. Use an Amazon CloudFront distribution for product images
A gaming application is heavily dependent on caching and uses Amazon ElastiCache for Redis. The application performance was recently degraded due to failure of the cache node.What should a Solutions Architect recommend to minimize performance degradation in the future?A. Migrate from ElastiCache to Amazon RDSB. Configure automatic backup to save cache dataC. Configure ElastiCache Multi-AZ with automatic failoverD. Use Auto Scaling to provision cache nodes based on CPU usage
C. Configure ElastiCache Multi-AZ with automatic failover
A Solutions Architect is designing a solution to send Amazon CloudWatch Alarm notifications to a group of users on a smartphone mobile application.What are the key steps to this solution? (Choose two.)A. Configure the CloudWatch Alarm to send the notification to an Amazon SNS topic whenever there is an alarm.B. Configure the CloudWatch Alarm to send the notification to a mobile phone number whenever there is an alarm.C. Configure the CloudWatch Alarm to send the notification to the email addresses whenever there is an alarm.D. Create the platform endpoints for mobile devices and subscribe the SNS topic with platform endpoints.E. Subscribe the SNS topic with an Amazon SQS queue, and poll the messages continuously from the queue. Use each mobile platform"â¢s libraries to send the message to the mobile application.
A. Configure the CloudWatch Alarm to send the notification to an Amazon SNS topic whenever there is an alarm.D. Create the platform endpoints for mobile devices and subscribe the SNS topic with platform endpoints.
A company uses Amazon S3 for storing a variety of files. A Solutions Architect needs to design a feature that will allow users to instantly restore any deleted files within 30 days of deletion.Which is the MOST cost-efficient solution?A. Create lifecycle policies that move the objects to Amazon Glacier and delete them after 30 days.B. Enable cross-region replication. Empty the replica bucket every 30 days using an AWS Lambda function.C. Enable versioning and create a lifecycle policy to remove expired versions after 30 days.D. Enable versioning and MFA Delete. Using a Lambda function, remove MFA delete from objects more than 30 days old.
C. Enable versioning and create a lifecycle policy to remove expired versions after 30 days.
During performance testing of an application, the Amazon RDS database caused a performance bottleneck.What steps can be taken to improve the database performance? (Choose two.)A. Change the RDS database instance to multiple Availability Zones.B. Scale up to a larger RDS instance type.C. Redirect read queries to RDS read replicas.D. Scale out using an Auto Scaling group for RDS.E. Use RDS in a separate AWS Region.
B. Scale up to a larger RDS instance type.C. Redirect read queries to RDS read replicas.
A Solutions Architect must design an Amazon DynamoDB table to store data about customer activities. The data is used to analyze recent customer behavior, so data that is less than a week old is heavily accessed and older data is accessed infrequently. Data that is more than one month old never needs to be referenced by the application, but needs to be archived for year-end analytics.What is the MOST cost-efficient way to meet these requirements? (Choose two.)A. Use DynamoDB time-to-live settings to expire items after a certain time period.B. Provision a higher write capacity unit to minimize the number of partitions.C. Create separate tables for each week"â¢s data with higher throughput for the current week.D. Pre-process data to consolidate multiple records to minimize write operations.E. Export the old table data from DynamoDB to Amazon S3 using AWS Data Pipeline, and delete the old table.
C. Create separate tables for each week"â¢s data with higher throughput for the current week.E. Export the old table data from DynamoDB to Amazon S3 using AWS Data Pipeline, and delete the old table.
A large media site has multiple applications in Amazon ECS. A Solutions Architect needs to use content metadata and route traffic to specific services.What is the MOST efficient method to perform this task?A. Use an AWS Classic Load Balancer with a host-based routing option to route traffic to the correct service.B. Use the AWS CLI to update Amazon Route 53 hosted zone to route traffic as services get updated.C. Use an AWS Application Load Balancer with host-based routing option to route traffic to the correct service.D. Use Amazon CloudFront to manage and route traffic to the correct service.
C. Use an AWS Application Load Balancer with host-based routing option to route traffic to the correct service.
A Solutions Architect must build a secure document ""storage platform that allows clients to access data stored on Amazon S3. Documents must be readily available for the first 15 days. After that, documents need not be readily available, and storage costs should be reduced as much as possible.Which of the following approaches will satisfy these requirements?A. Create a lifecycle rule to transition the documents from the STANDARD storage class to the STANDARD_IA storage class after 15 days, and then to the GLACIER storage class after an additional 15 days.B. Create a lifecycle rule to transition the documents from the STANDARD storage class to the GLACIER storage class after 30 days.C. Create a lifecycle rule to transition documents from the STANDARD storage class to the STANDARD_IA storage class after 30 days and then to the GLACIER storage class after an additional 30 days.D. Create a lifecycle rule to transition the documents from the STANDARD storage class to the GLACIER storage class after 15 days.
D. Create a lifecycle rule to transition the documents from the STANDARD storage class to the GLACIER storage class after 15 days.
A Solutions Architect needs to configure scaling policies based on Amazon CloudWatch metrics for an Auto Scaling group. The application running on the instances is memory intensive.How can the Architect meet this requirement?A. Enable detailed monitoring on the Amazon EC2 instances.B. Publish custom metrics to CloudWatch from the application.C. Configuration lifecycle policies for the Amazon EC2 instances.D. Set up high-resolution alarms for the Auto Scaling group
B. Publish custom metrics to CloudWatch from the application.
A customer has a service based out of Oregon, U.S. and Paris, France. The application is storing data in an S3 bucket located in Oregon, and that data is updated frequently. The Paris office is experiencing slow response times when retrieving objects.What should a Solutions Architect do to resolve the slow response times for the Paris office?A. Set up an S3 bucket based in Paris, and enable cross-region replication from the Oregon bucket to the Paris bucket.B. Create an Application Load Balancer that load balances data retrieval between the Oregon S3 bucket and a new Paris S3 bucket.C. Create an Amazon CloudFront distribution with the bucket located in Oregon as the origin and set the Maximum Time to Live (TTL) for cache behavior to 0.D. Set up an S3 bucket based in Paris, and enable a lifecycle management rule to transition data from the Oregon bucket to the Paris bucket.
A. Set up an S3 bucket based in Paris, and enable cross-region replication from the Oregon bucket to the Paris bucket.
A company uses AWS Elastic Beanstalk to deploy a web application running on c4.large instances. Users are reporting high latency and failed requests. Further investigation reveals that the EC2 instances are running at or near 100% CPU utilization.What should a Solutions Architect do to address the performance issues?A. Use time-based scaling to scale the number of instances based on periods of high load.B. Modify the scaling triggers in Elastic Beanstalk to use the CPUUtilization metric.C. Swap the c4.large instances with the m4.large instance type.D. Create an additional Auto Scaling group, and configure Amazon EBS to use both Auto Scaling groups to increase the scaling capacity.
B. Modify the scaling triggers in Elastic Beanstalk to use the CPUUtilization metric.
A Solutions Architect is working on a PCI-compliant architecture that needs to call an external service provider"â¢s API. The external provider requires IP whitelisting to verify the calling party.How should the Solutions Architect provide the external party with the IP addresses for whitelisting?A. Use an API Gateway in proxy mode, and provide the API Gateway"â¢s IP address to the external service provider.B. Associate a public elastic network interface to a published stage/endpoint in API Gateway, exposing the AWS Lambda function, and provide the IP address for the public network interface to the external party to whitelist.C. Deploy the Lambda function in private subnets and route outbound traffic through a NAT gateway. Provide the NAT gateway"â¢s Elastic IP address to the external service provider.D. Provide the external party the allocated AWS IP address range for Lambda functions, and send change notifications by using a subscription to the AmazonIpSpaceChanged SNS topic.
C. Deploy the Lambda function in private subnets and route outbound traffic through a NAT gateway. Provide the NAT gateway"â¢s Elastic IP address to the external service provider.
A Solutions Architect is designing a shared file system for a company. Multiple users will be accessing it at any given time. Different teams will have their own directories, and the company wants to secure files so that users can access only files owned by their team.How should the Solutions Architect design this?A. Use Amazon EFS and control permissions by using file-level permissions.B. Use Amazon S3 and control permissions by using ACLs.C. Use Amazon EFS and control permissions by using security groups.D. Use AWS Storage Gateway and control permissions by using AWS Identity and Access Management (IAM)
A. Use Amazon EFS and control permissions by using file-level permissions.
A company requires operating system permission on a relational database server.What should a Solutions Architect suggest as a configuration for a highly available database architecture?A. Multiple EC2 instances in a database replication configuration that uses two Availability Zones.B. A standalone Amazon EC2 instance with a selected database installed.C. Amazon RDS in a Multi-AZ configuration with Provisioned IOPS.D. Multiple EC2 instances in a replication configuration that uses two placement groups.
A. Multiple EC2 instances in a database replication configuration that uses two Availability Zones.
An application has a web tier that runs on EC2 instances in a public subnet. The application tier instances run in private subnets across two Availability Zones. All traffic is IPv4 only, and each subnet has its own custom route table.A new feature requires that application tier instances can call an external service over the Internet; however, they must still not be accessible to Internet traffic.What should be done to allow the application servers to connect to the Internet, maintain high availability, and minimize administrative overhead?A. Add an Amazon egress-only internet gateway to each private subnet. Alter each private subnet"â¢s route table to include a route from 0.0.0.0/0 to the egress-only internal gateway in the same Availability Zone.B. Add an Amazon NAT Gateway to each public subnet. Alter each private subnet"â¢s route table to include a route from 0.0.0.0/0 to the NAT Gateway in the same Availability Zone.C. Add an Amazon NAT instance to one of the public subnets Alter each private subnet"â¢s route table to include a route from 0.0.0.0/0 to the Internet gateway in the VPC.D. Add an Amazon NAT Gateway to each private subnet. Alter each private subnet"â¢s route table to include a route from 0.0.0.0/0 to the NAT Gateway in the other Availability Zone.
B. Add an Amazon NAT Gateway to each public subnet. Alter each private subnet"â¢s route table to include a route from 0.0.0.0/0 to the NAT Gateway in the same Availability Zone.
An application uses an Amazon SQS queue as a transport mechanism to deliver data to a group of EC2 instances for processing. The application owner wants to add a mechanism to archive the incoming data without modifying application code on the EC2 instances.How can this application be re-architected to archive the data without modifying the processing instances?A. Trigger a Lambda function by using Amazon CloudWatch Events to retrieve messages from the SQS queue and archive to Amazon S3.B. Use an Amazon SNS topic to fan out the data to the SQS queue in addition to a Lambda function that records the data to an S3 bucket.C. Set up an Amazon Kinesis Data Stream so that multiple instances can receive data. Add a separate EC2 instance that is configured to archive all data it receives.D. Write the data to an S3 bucket, and use an SQS queue for S3 event notifications to tell the instances where to retrieve the data.
B. Use an Amazon SNS topic to fan out the data to the SQS queue in addition to a Lambda function that records the data to an S3 bucket.
A company has a web application running in a Docker container that connects to a MySQL server in an on-premises data center. The deployment and maintenance of this application are becoming time-consuming and slowing down new feature releases. The company wants to migrate the application to AWS and use services that helps facilitate infrastructure management and deployment.Which architectures should the company consider on AWS? (Choose two.)A. Amazon ECS for the web application, and an Amazon RDS for MySQL for the database.B. AWS Elastic Beanstalk Docker Multi-container either for the web application or database.C. AWS Elastic Beanstalk Docker Single Container for the web application, and an Amazon RDS for MySQL for the database.D. AWS CloudFormation with Lambda Custom Resources without VPC for the web application, and an Amazon RDS for MySQL database.E. AWS CloudFormation with Lambda Custom Resources running in a VPC for the web application, and an Amazon RDS for MySQL database.
A. Amazon ECS for the web application, and an Amazon RDS for MySQL for the database.C. AWS Elastic Beanstalk Docker Single Container for the web application, and an Amazon RDS for MySQL for the database.
A Solutions Architect has designed a VPC that meets all necessary security requirements for their organization. Any applications deployed in the organization must use this VPC design.How can project teams deploy, manage, and delete VPCs that meet this design with the LEAST administrative effort?A. Deploy an AWS CloudFormation template that defines components of the VPC.B. Run a script that uses the AWS Command Line Interface to deploy the VPC.C. Clone the existing authorized VPC for each new project.D. Use AWS Elastic Beanstalk to deploy both the VPC and the application.
A. Deploy an AWS CloudFormation template that defines components of the VPC.
What conditions could cause a Multi-AZ Amazon RDS failover to occur? (Choose two.)A. The RDS instance is stopped manuallyB. A replica of the RDS instance is created in a different regionC. An Availability Zone becomes unavailableD. Another master user is createdE. A failure of the primary database instance
C. An Availability Zone becomes unavailableE. A failure of the primary database instance
A Solutions Architect has five web servers serving requests for a domain.Which of the following Amazon Route 53 routing policies can distribute traffic randomly among all healthy web servers?A. SimpleB. FailoverC. WeightedD. Multivalue Answer
D. Multivalue AnswerTrying to trick you by picking simple, but "healthy hosts"
A web server will be provisioned on two Amazon EC2 instances with an Application Load Balancer.Which of the following configurations will allow traffic on HTTP and HTTPS when configuring a security group to apply to each of these servers?A. Allow all inbound traffic, with explicit denies on non-HTTP and non-HTTPS ports.B. Allow incoming traffic to HTTP and HTTPS ports.C. Allow incoming traffic to HTTP and HTTPS ports, with explicit denies to all other ports.D. Deny all traffic to non-HTTP and non-HTTPS ports
B. Allow incoming traffic to HTTP and HTTPS ports.You don't need to mention deny all.
A company wants to run a static website served through Amazon CloudFront.What is an advantage of storing the website content in an S3 bucket instead of an EBS volume?A. S3 buckets are replicated globally, allowing for large scalability. EBS volumes are replicated only within a region.B. S3 is an origin for CloudFront. EBS volumes would need EC2 instances behind an Elastic Load Balancing load balancer to be an origin.C. S3 buckets can be encrypted, allowing for secure storage of the web files. EBS volumes cannot be encrypted.D. S3 buckets support object-level read throttling, preventing abuse. EBS volumes do not provide object-level throttling.
B. S3 is an origin for CloudFront. EBS volumes would need EC2 instances behind an Elastic Load Balancing load balancer to be an origin.
A company is moving to AWS. Management has identified a set of approved AWS services that meet all deployment requirements. The company would like to restrict access to all other unapproved services to which employees would have access.Which solution meets these requirements with the LEAST amount of operational overhead?A. Configure the AWS Trusted Advisor service utilization compliance report. Subscribe to Amazon SNS notifications from Trusted Advisor. Create a custom AWS Lambda function that can automatically remediate the use of unauthorized services.B. Use AWS Config to evaluate the configuration settings of AWS resources. Subscribe to Amazon SNS notifications from AWS Config. Create a custom AWS Lambda function that can automatically remediate the use of unauthorized services.C. Configure AWS Organizations. Create an organizational unit (OU) and place all AWS accounts into the OU. Apply a service control policy (SCP) to the OU that denies the use of certain services.D. Create a custom AWS IAM policy. Deploy the policy to each account using AWS CloudFormation StackSets. Include deny statements in the policy to restrict the use of certain services. Attach the policies to all IAM users in each account.
C. Configure AWS Organizations. Create an organizational unit (OU) and place all AWS accounts into the OU. Apply a service control policy (SCP) to the OU that denies the use of certain services.
A customer is running a critical payroll system in a production environment in one data center and a disaster recovery (DR) environment in another. The application includes load-balanced web servers and failover for the MySQL database. The customer"â¢s DR process is manual and error-phone. For this reason, management has asked IT to migrate the application to AWS and make it highly available so that IT no longer has to manually fail over the environment.How should a Solutions Architect migrate the system to AWS?A. Migrate the production and DR environments to different Availability Zones within the same region. Let AWS manage failover between the environments.B. Migrate the production and DR environments to different regions. Let AWS manage failover between the environments.C. Migrate the production environment to a single Availability Zone, and set up instance recovery for Amazon EC2. Decommission the DR environment because it is no longer needed.D. Migrate the production environment to span multiple Availability Zones, using Elastic Load Balancing and Multi-AZ Amazon RDS. Decommission the DR environment because it is no longer needed.
D. Migrate the production environment to span multiple Availability Zones, using Elastic Load Balancing and Multi-AZ Amazon RDS. Decommission the DR environment because it is no longer needed.
A company is creating a web application that will run on an Amazon EC2 instance. The application on the instance needs access to an Amazon DynamoDB table for storage.What should be done to meet these requirements?A. Create another AWS account root user with permissions to the DynamoDB table.B. Create an IAM role and assign the role to the EC2 instance with permissions to the DynamoDB table.C. Create an identity provider and assign the identity provider to the EC2 instance with permissions to the DynamoDB table.D. Create identity federation with permissions to the DynamoDB table.
B. Create an IAM role and assign the role to the EC2 instance with permissions to the DynamoDB table.
A company is creating a web application that allows customers to view photos in their web browsers. The website is hosted in us-east-1 on Amazon EC2 instances behind an Application Load Balancer. Users will be located in many places around the world.Which solution should provide all users with the fastest photo viewing experience?A. Implement an AWS Auto Scaling group for the web server instances behind the Application Load Balancer.B. Enable Amazon CloudFront for the website and specify the Application Load Balancer as the origin.C. Move the photos into an Amazon S3 bucket and enable static website hosting.D. Enable Amazon ElastiCache in the web server subnet.
B. Enable Amazon CloudFront for the website and specify the Application Load Balancer as the origin.
A Solutions Architect is designing a highly available web application on AWS. The data served on the website is dynamic and is pulled from Amazon DynamoDB.All users are geographically close to one another.How can the Solutions Architect make the application highly available?A. Host the website data on Amazon S3 and set permissions to enable public read-only access for users.B. Host the web server data on Amazon CloudFront and update the objects in the Cloudfront distribution when they change.C. Host the application on EC2 instances across multiple Availability Zones. Use an Auto Scaling group coupled with an Application Load Balancer.D. Host the application on EC2 instances in a single Availability Zone. Replicate the EC2 instances to a separate region, and use an Application Load Balancer for high availability.
C. Host the application on EC2 instances across multiple Availability Zones. Use an Auto Scaling group coupled with an Application Load Balancer.
An application stores data in an Amazon RDS PostgreSQL Multi-AZ database instance. The ratio of read requests to write requests is about 2 to 1. Recent increases in traffic are causing very high latency.How can this problem be corrected?A. Create a similar RDS PostgreSQL instance and direct all traffic to it.B. Use the secondary instance of the Multiple Availability Zone for read traffic only.C. Create a read replica and send half of all traffic to it.D. Create a read replica and send all read traffic to it.
D. Create a read replica and send all read traffic to it.
A Solutions Architect is designing a system that will store Personally Identifiable Information (PII) in an Amazon S3 bucket. Due to compliance and regulatory requirements, both the master keys and unencrypted data should never be sent to AWS.What Amazon S3 encryption technique should the Architect choose?A. Amazon S3 client-side encryption with an AWS KMS-managed customer master key (CMK)B. Amazon S3 server-side encryption with an AWS KMS-managed keyC. Amazon S3 client-side encryption with a client-side master keyD. Amazon S3 server-side encryption with a customer-provided key
C. Amazon S3 client-side encryption with a client-side master key
A Solutions Architect is building a WordPress-based web application hosted on AWS using Amazon EC2. This application serves as a blog for an international internet security company. The application must be geographically redundant and scalable. It must separate the public Amazon EC2 web servers from the privateAmazon RDS database, it must be highly available, and it must support dynamic port routing.Which combination of AWS services or capabilities will meet these requirements?A. AWS Auto Scaling with a Classic Load Balancer, and AWS CloudTrailB. Amazon Route 53, Auto Scaling with an Application Load Balancer, and Amazon CloudFrontC. A VPC, a NAT gateway and Auto Scaling with a Network Load BalancerD. CloudFront, Route 53, and Auto Scaling with a Classic Load Balancer
B. Amazon Route 53, Auto Scaling with an Application Load Balancer, and Amazon CloudFront
An e-commerce application places orders in an Amazon SQS queue. When a message is received, Amazon EC2 worker instances process the request. The EC2 instances are in an Auto Scaling group.How should the architecture be designed to scale up and down with the LEAST amount of operational overhead?A. Use an Amazon CloudWatch alarm on the EC2 CPU to scale the Auto Scaling group up and down.B. Use an EC2 Auto Scaling health check for messages processed on the EC2 instances to scale up and down.C. Use an Amazon CloudWatch alarm based on the number of visible messages to scale the Auto Scaling group up or down.D. Use an Amazon CloudWatch alarm based on the CPU to scale the Auto Scaling group up or down.
C. Use an Amazon CloudWatch alarm based on the number of visible messages to scale the Auto Scaling group up or down.
A company has many applications on Amazon EC2 instances running in Auto Scaling groups. Company policies require that data on the attached Amazon EBS volume must be retained.Which actions will meet this requirement without impacting performance?A. Enable Termination Protection on the Amazon EC2 instances.B. Disable DeleteOnTermination for the Amazon EBS volumes.C. Use Amazon EC2 user data to set up a synchronization job for root volume data.D. Change the auto scaling Health Check to point to a source on the root volume.
B. Disable DeleteOnTermination for the Amazon EBS volumes.
A company wants to expand its web services from us-east-1 into ap-southeast-1. The company stores a large amount of static content on its website, and recently received complaints about slow loading speeds and the website timing out.What should be done to meet the expansion goal while also addressing the latency and timeout issues?A. Store the static content in Amazon S3 and enable S3 Transfer Acceleration.B. Store the static content in an Amazon EBS volume in the ap-southeast-1 region and provision larger Amazon EC2 instances for the website.C. Use an Amazon Route 53 simple routing policy to distribute cached content across three regions.D. Use Amazon S3 to store the static content and configure an Amazon CloudFront distribution.
D. Use Amazon S3 to store the static content and configure an Amazon CloudFront distribution.
An application is scanning an Amazon DynamoDB table that was created with default settings. The application occasionally reads stale data when it queries the table.How can this issue be corrected?A. Increase the provisioned read capacity of the table.B. Enable AutoScaling on the DynamoDB table.C. Update the application to use strongly consistent reads.D. Re-create the DynamoDB table with eventual consistency disabled.
C. Update the application to use strongly consistent reads.
A company is setting up a new website for online sales. The company will have a web tier and a database tier. The web tier consists of load-balanced, auto-scaledAmazon EC2 instances in multiple Availability Zones (AZs). The database tier is an Amazon RDS Multi-AZ deployment. The EC2 instances must connect securely to the database.How should the resources be launched?A. EC2 instances: public subnet RDS database instances: public subnet Load balancer: public subnetB. EC2 instances: public subnet RDS database instances: private subnet Load balancer: private subnetC. EC2 instances: private subnet RDS database instances: public subnet Load balancer: public subnetD. EC2 instances: private subnet RDS database instances: private subnet Load balancer: public subnet
D. EC2 instances: private subnet RDS database instances: private subnet Load balancer: public subnet
A Solutions Architect needs to design a solution that will allow Website Developers to deploy static web content without managing server infrastructure. All web content must be accessed over HTTPS with a custom domain name. The solution should be scalable as the company continues to grow.Which of the following will provide the MOST cost-effective solution?A. Amazon EC2 instance with Amazon EBSB. AWS Lambda function with Amazon API GatewayC. Amazon CloudFront with an Amazon S3 bucket originD. Amazon S3 with a static website
C. Amazon CloudFront with an Amazon S3 bucket originS3 with static doesn't do HTTPS
An insurance company stores all documents related to annual policies for the duration of the policies. The documents are created once and then stored until they are required, typically at the end of the policy. A document must be capable of being retrieved immediately. The company is now moving their document management to the AWS Cloud.Which service should a Solutions Architect recommend as a cost-effective solution that meets the company"â¢s requirements?A. Amazon RDS MySQLB. Amazon S3 Standard-Infrequent AccessC. Amazon GlacierD. Amazon S3 Standard
B. Amazon S3 Standard-Infrequent Access"Retrieved immediately"
How can a user track memory usage in an EC2 instance?A. Call Amazon CloudWatch to retrieve the memory usage metric data that exists for the EC2 instance.B. Assign an IAM role to the EC2 instance with an IAM policy granting access to the desired metric.C. Use an instance type that supports memory usage reporting to a metric by default.D. Place an agent on the EC2 instance to push memory usage to an Amazon CloudWatch custom metric.
D. Place an agent on the EC2 instance to push memory usage to an Amazon CloudWatch custom metric.
A Solutions Architect must design a storage solution for incoming billing reports in CSV format. The data does not need to be scanned frequently and is discarded after 30 days.Which service will be MOST cost-effective in meeting these requirements?A. Import the logs into an RDS MySQL instance.B. Use AWS Data Pipeline to import the logs into a DynamoDB table.C. Write the files to an S3 bucket and use Amazon Athena to query the data.D. Import the logs to an Amazon Redshift cluster
C. Write the files to an S3 bucket and use Amazon Athena to query the data.
A Solutions Architect needs to deploy an HTTP/HTTPS service on Amazon EC2 instances with support for WebSockets using load balancers.How can the Architect meet these requirements?A. Configure a Network Load Balancer.B. Configure an Application Load Balancer.C. Configure a Classic Load Balancer.D. Configure a Layer-4 Load Balancer.
B. Configure an Application Load Balancer.
A Solution Architect is designing a web application that runs on Amazon EC2 instances behind a load balancer. All data in transit must be encrypted.Which solutions will meet the encryption requirement? (Select TWO.)A. Use an Application Load Balancer (ALB) in passthrough mode, then terminate SSL on EC2 instances.B. Use an Application Load Balancer (ALB) with a TCP listener, then terminate SSL on EC2 instances.C. Use a Network Load Balancer (NLB) with a TCP listener, then terminate SSL on EC2 instances.D. Use an Application Load Balancer (ALB) with an HTTPS listener, then install SSL certificates on the ALB and EC2 instances.E. Use a Network Load Balancer (NLB) with an HTTPS listener, then install SSL certificates on the NLB and EC2 instances.
C. Use a Network Load Balancer (NLB) with a TCP listener, then terminate SSL on EC2 instances.D. Use an Application Load Balancer (ALB) with an HTTPS listener, then install SSL certificates on the ALB and EC2 instances.
A company is writing a new service running on Amazon EC2 that must create thumbnail images of thousands of images in a large archive. The system will write scratch data to storage during the process.Which storage service is best suited for this scenario?A. EC2 instance storeB. Amazon EFSC. Amazon CloudSearchD. Amazon EBS Throughput Optimized HDD (st1)
D. Amazon EBS Throughput Optimized HDD (st1)
A retail company operates an e-commerce environment that runs on Amazon EC2 instances behind an Application Load Balancer. The instances run in anAmazon EC2 Auto Scaling group. Images are hosted in an Amazon S3 bucket using a custom domain name.During a flash sale with 10,000 simultaneous users, some images on the website are not loading.What should be done to resolve the performance issue?A. Move the images to the EC2 instances in the Auto Scaling group.B. Enable Transfer Acceleration for the S3 bucket.C. Configure an Amazon CloudFront distribution with the S3 bucket as the origin.D. Increase the number of minimum, desired, and maximum EC2 instances in the Auto Scaling group.
C. Configure an Amazon CloudFront distribution with the S3 bucket as the origin.
A solutions Architect is designing a new workload where an AWS Lambda function will access an Amazon DynamoDB table.What is the MOST secure means of granting the Lambda function access to the DynamoDB table?A. Create an identity and access management (IAM) role with the necessary permissions to access the DynamoDB table, and assign the role to the Lambda function.B. Create a DynamoDB user name and password and give them to the Developer to use in the Lambda function.C. Create an identity and access management (IAM) user, and create access and secret keys for the user. Give the user the necessary permissions to access the DynamoDB table. Have the Developer use these keys to access the resources.D. Create an identity and access management (IAM) role allowing access from AWS Lambda and assign the role to the DynamoDB table.
A. Create an identity and access management (IAM) role with the necessary permissions to access the DynamoDB table, and assign the role to the Lambda function.
A web application runs on Amazon EC2 instances behind an ELB Application Load Balancer. The instances run in an EC2 Auto Scaling group across multipleAvailability Zones. Every night, the Auto Scaling group doubles in size. Traffic analysis shows that users in a particular region are requesting the same static content stored locally on the EC2 instances.How can a Solutions Architect reduces the need to scale and improve application performance for the users?A. Re-deploy the application in a new VPC that is closer to the users making the requests.B. Create an Amazon CloudFront distribution for the site and redirect user traffic to the distribution.C. Store the contents on Amazon EFS instead of the EC2 root volume.D. Implement Amazon Redshift to create a repository of the content closer to the users.
B. Create an Amazon CloudFront distribution for the site and redirect user traffic to the distribution.
A Solutions Architect is designing an application that will run on Amazon ECS behind an Application Load Balancer (ALB). For security reasons, the Amazon EC2 host instances for the ECS cluster are in a private subnet.What should be done to ensure that the incoming traffic to the host instances is from the ALB only?A. Create network ACL rules for the private subnet to allow incoming traffic on ports 32768 through 61000 from the IP address of the ALB only.B. Update the EC2 cluster security group to allow incoming access from the IP address of the ALB only.C. Modify the security group used by the EC2 cluster to allow incoming traffic from the security group used by the ALB only.D. Enable AWS WAF on the ALB and enable the ECS rule.
C. Modify the security group used by the EC2 cluster to allow incoming traffic from the security group used by the ALB only.ALB has no IP address.
A company wants to improve latency by hosting images within a public Amazon S3 bucket fronted by an Amazon CloudFront distribution. The company wants to restrict access to the S3 bucket to include the CloudFront distribution only, while also allowing CloudFront to continue proper functionality.What should be done after making the bucket private to restrict access with the LEAST operational overhead?A. Create a CloudFront origin access identity and create a security group that allows access from CloudFront.B. Create a CloudFront origin access identity and update the bucket policy to grant access to it.C. Create a bucket policy restricting all access to the bucket to include CloudFront IPs only.D. Enable the CloudFront option to restrict viewer access and update the bucket policy to allow the distribution.
B. Create a CloudFront origin access identity and update the bucket policy to grant access to it.
A Solutions Architect is designing a new architecture that will use an Amazon EC2 Auto Scaling group.Which of the following factors determine the health check grace period? (Select TWO.)A. How frequently the Auto Scaling group scales up or down.B. How many Amazon CloudWatch alarms are configured for status checks.C. How much of the application code is embedded in the AMI.D. How long it takes for the Auto Scaling group to detect a failure.E. How long the bootstrap script takes to run.
C. How much of the application code is embedded in the AMI.E. How long the bootstrap script takes to run.
A company needs to store data for 5 years. The company will need to have immediate and highly available access to the data at any point in time, but will not require frequent access.What lifecycle action should be taked to meet the requirements while reducing costs?A. Transition objects from Amazon S3 Standard to Amazon S3 Standard-Infrequent Access (S3 Standard-IA)B. Transition objects to expire after 5 years.C. Transition objects from Amazon S3 Standard to Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA)D. Transition objects from Amazon S3 Standard to the GLACIER storage class.
A. Transition objects from Amazon S3 Standard to Amazon S3 Standard-Infrequent Access (S3 Standard-IA)
A company wants to create an application that will transmit protected health information (PHI) to thousands of service consumers in different AWS accounts. The application servers will sit in private VPC subnets. The routing for the application must be fault tolerant.What should be done to meet these requirements?A. Create a VPC endpoint service and grant permissions to specific service consumers to create a connection.B. Create a virtual private gateway connection between each pair of service provider VPCs and service consumer VPCs.C. Create an internal Application Load Balancer in the service provider VPC and put application servers behind it.D. Create a proxy server in the service provider VPC to route requests from service consumers to the application servers.
A. Create a VPC endpoint service and grant permissions to specific service consumers to create a connection.
A company hosts a website using Amazon API Gateway on the front end. Recently, there has been heavy traffic on the website and the company wants to control access by allowing authenticated traffic only.How should the company limit access to authenticated users only? (Select TWO.)A. Allow users that are authenticated through Amazon Cognito.B. Limit traffic through API Gateway.C. Allow X.509 certificates to authenticate traffic.D. Deploy AWS KMS to identify users.E. Assign permissions in AWS IAM to allow users.
A. Allow users that are authenticated through Amazon Cognito.E. Assign permissions in AWS IAM to allow users.
A company needs to use AWS resources to expand capacity for a website hosted in an on-premises data center. The AWS resources will include load balancers,Auto Scaling, and Amazon EC2 instances that will access an on-premises database. Network connectivity has been established, but no traffic is going to the AWS environment.How should Amazon Route 53 be configured to distribute load to the AWS environment? (Select TWO.)A. Set up a weighted routing policy, distributing the workload between the load balancer and the on-premises environment.B. Set up an A record to point the DNS name to the IP address of the load balancer.C. Create multiple A records for the EC2 instances.D. Set up a geolocation routing policy to distribute the workload between the load balancer and the on-premises environment.E. Set up a routing policy for failover using the on-premises environment as primary and the load balancer as secondary.
A. Set up a weighted routing policy, distributing the workload between the load balancer and the on-premises environment.D. Set up a geolocation routing policy to distribute the workload between the load balancer and the on-premises environment.
Users submit requests to a service that takes several minutes to process. A Solutions Architect needs to ensure that these requests are processed at least once, and that the service has the ability to handle large increases in the number of requests.How should these requirements be met?A. Put the requests into an Amazon SQS queue and configure Amazon EC2 instances to poll the queueB. Publish the message to an Amazon SNS topic that an Amazon EC2 subscriber can receive and processC. Save the requests to an Amazon DynamoDB table with a DynamoDB stream that triggers an Amazon EC2 Spot InstanceD. Use Amazon S3 to store the requests and configure an event notification to have Amazon EC2 instances process the new object
A. Put the requests into an Amazon SQS queue and configure Amazon EC2 instances to poll the queue
A Solutions Architect is designing an Amazon VPC that requires access to a remote API server using IPv6. Resources within the VPC should not be accessed directly from the Internet.How should this be achieved?A. Use a NAT gateway and deny public access using security groupsB. Attach an egress-only internet gateway and update the routing tablesC. Use a NAT gateway and update the routing tablesD. Attach an internet gateway and deny public access using security groups
B. Attach an egress-only internet gateway and update the routing tables
When designing an Amazon SQS message-processing solution, messages in the queue must be processed before the maximum retention time has elapsed.Which actions will meet this requirement? (Choose two.)A. Use AWS STS to process the messagesB. Use Amazon EBS-optimized Amazon EC2 instances to process the messagesC. Use Amazon EC2 instances in an Auto Scaling group with scaling triggered based on the queue lengthD. Increase the SQS queue attribute for the message retention periodE. Convert the SQS queue to a first-in first-out (FIFO) queue
C. Use Amazon EC2 instances in an Auto Scaling group with scaling triggered based on the queue lengthD. Increase the SQS queue attribute for the message retention period
A company deployed a three-tier web application on Amazon EBS backed Amazon EC2 instances for the web and application tiers, and Amazon RDS for the database tier. The company is concerned about loss of data in the web and application tiers.What is the MOST efficient way to prevent data loss?A. Create an Amazon EFS file system and run a shell script to copy the dataB. Create an Amazon EBS snapshot using an Amazon CloudWatch Events ruleC. Create an Amazon S3 snapshot policy to back up the Amazon EBS volumesD. Create a snapshot lifecycle policy that takes periodic snapshots of the Amazon EBS volumes
D. Create a snapshot lifecycle policy that takes periodic snapshots of the Amazon EBS volumes
A company is using Amazon S3 for backups from an on-premises environment. Regulatory requirements state that data must be retained for at least 7 years. The data is infrequently accessed for 35 days, but needs to be instantly available. After 35 days, the data is rarely accessed.Which combination of actions will provide the MOST cost-effective solution? (Choose two)A. Change the backup so the data goes to Amazon S3 Standard-Infrequent Access (S3 Standard-IA) directlyB. Create an S3 lifecycle policy that moves the data to the GLACIER storage class after 7 yearsC. Change the backup so the data goes to Amazon Glacier directlyD. Create an S3 lifecycle policy that moves the data to Amazon S3 Standard-Infrequent Access (S3 Standard-IA) after 35 daysE. Creates an S3 lifecycle policy that moves the data to the GLACIER storage class after 35 days
A. Change the backup so the data goes to Amazon S3 Standard-Infrequent Access (S3 Standard-IA) directlyE. Creates an S3 lifecycle policy that moves the data to the GLACIER storage class after 35 days
A Solutions Architect is building an online shopping application where users will be able to browse items, add items to a cart, and purchase the items. Images of items will be stored in Amazon S3 buckets organized by item category. When an item is no longer available for purchase, the item image will be deleted from theS3 bucket.Occasionally, during testing, item images deleted from the S3 bucket are still visible to some users.What is a flaw in this design approach?A. Defining S3 buckets by item may cause partition distribution errors, which will impact performance.B. Amazon S3 DELETE requests are eventually consistent, which may cause other users to view items that have already been purchasedC. Amazon S3 DELETE requests apply a lock to the S3 bucket during the operation, causing other users to be blockedD. Using Amazon S3 for persistence exposes the application to a single point of failure
B. Amazon S3 DELETE requests are eventually consistent, which may cause other users to view items that have already been purchased
An application running on AWS Lambda requires an API key to access a third-party service. The key must be stored securely with audited access to the Lambda function only.What is the MOST secure way to store the key?A. As an object in Amazon S3B. As a secure string in AWS Systems Manager Parameter StoreC. Inside a file on an Amazon EBS volume attached to the Lambda functionD. Inside a secrets file stored on Amazon EFS
B. As a secure string in AWS Systems Manager Parameter Store
An application produces monthly reports that must be immediately accessible for up to 7 days. After 7 days, the data can be archived. Compliance policies require that the archived data be retrievable within 24 hours of a request.What is the MOST cost-effective approach to satisfy the compliance requirement?A. Store the data in Amazon S3 Standard storage with a lifecycle rule to transition the data to Amazon S3 Standard-Infrequent Access (S3 Standard-IA) after 7 days, then transition to the GLACIER storage class after 30 daysB. Store the data in Amazon S3 Standard storage with a lifecycle rule to transition the data to Amazon S3 Standard-Infrequent Access (S3 Standard-IA) after 7 daysC. Store the data in Amazon S3 Standard storage with a lifecycle rule to transition the data to the GLACIER storage class after 30 daysD. Store the data in Amazon S3 Standard storage with a lifecycle rule to transition the data to the GLACIER storage class after 7 days
D. Store the data in Amazon S3 Standard storage with a lifecycle rule to transition the data to the GLACIER storage class after 7 days
A company is developing a new stateless web service with low memory requirements. The service needs to scale based on demand.What is the MOST cost-effective solution?A. Deploy the application onto AWS Elastic BeanstalkB. Deploy the application onto AWS Lambda with access through Amazon API GatewayC. Deploy the application onto an Amazon EC2 Spot FleetD. Deploy the application onto a container with an Amazon ECS EC2 launch type
B. Deploy the application onto AWS Lambda with access through Amazon API Gateway
A company has an application that generates invoices and makes the invoices available online. Invoices are stored as PDFs in an Amazon S3 bucket. Customers typically only view each invoice during the month it is issued. However, past invoices need to be immediately available. There are concerns over rising storage costs as the company gains more customers.What is the MOST cost-effective method to store the data?A. Use Amazon S3 for current invoices. Set up lifecycle rules to migrate invoices to the GLACIER storage class after 30 days.B. Store the invoices as text files. Use Amazon CloudFront to convert the invoices from text to PDF when customers download invoices.C. Store the invoices as binaries in an Amazon RDS database instance. Retrieve them from the database when customers request invoices.D. Use Amazon S3 for current invoices. Set up lifecycle rules to migrate invoices to Amazon S3 Standard-Infrequent Access (S3 Standard-IA) after 30 days.
D. Use Amazon S3 for current invoices. Set up lifecycle rules to migrate invoices to Amazon S3 Standard-Infrequent Access (S3 Standard-IA) after 30 days.
A company is running its application in a single region on Amazon EC2 with Amazon EBS and Amazon S3 part of the storage design.What should be done to reduce data transfer costs?A. Create a copy of the compute environment in another regionB. Convert the application to run on Lambda@EdgeC. Create an Amazon CloudFront distribution with Amazon S3 as the originD. Replicate Amazon S3 data to buckets in regions closer to the requester
C. Create an Amazon CloudFront distribution with Amazon S3 as the origin
A Solutions Architect must design a web application that will be hosted on AWS, allowing users to purchase access to premium, shared content that is stored in anS3 bucket. Upon payment, content will be available for download for 14 days before the user is denied access.Which of the following would be the LEAST complicated implementation?A. Use an Amazon CloudFront distribution with an origin access identity (OAI). Configure the distribution with an Amazon S3 origin to provide access to the file through signed URLs. Design a Lambda function to remove data that is older than 14 days.B. Use an S3 bucket and provide direct access to the file. Design the application to track purchases in a DynamoDB table. Configure a Lambda function to remove data that is older than 14 days based on a query to Amazon DynamoDB.C. Use an Amazon CloudFront distribution with an OAI. Configure the distribution with an Amazon S3 origin to provide access to the file through signed URLs. Design the application to set an expiration of 14 days for the URI.D. Use an Amazon CloudFront distribution with an OAI. Configure the distribution with an Amazon S3 origin to provide access to the file through signed URLs. Design the application to set an expiration of 60 minutes for the URL, and recreate the URL as necessary.
C. Use an Amazon CloudFront distribution with an OAI. Configure the distribution with an Amazon S3 origin to provide access to the file through signed URLs. Design the application to set an expiration of 14 days for the URI.
An application stores data in an Amazon RDS MySQL DB instance. The database traffic primarily consists of read queries, which are overwhelming the current database. A Solutions Architect wants to scale the database.What combination of steps will achieve the goal? (Choose two.)A. Add the MySQL database instances to an Auto Scaling groupB. Migrate the MySQL database to Amazon AuroraC. Migrate the MySQL database to a PostgreSQL databaseD. Create read replicas in different Availability ZonesE. Create an ELB Application Load Balancer
D. Create read replicas in different Availability ZonesE. Create an ELB Application Load Balancer
A company is launching a dynamic website, and the Operations team expects up to 10 times the traffic on the launch date. This website is hosted on Amazon EC2 instances and traffic is distributed by Amazon Route 53. A Solutions Architect must ensure that there is enough backend capacity to meet user demands. TheOperations team wants to scale down as quickly as possible after the launch.What is the MOST cost-effective and fault-tolerant solution that will meet the company"â¢s customer demands? (Choose two.)A. Set up an Application Load Balancer to distribute traffic to multiple EC2 instancesB. Set up an Auto Scaling group across multiple Availability Zones for the website, and create scale-out and scale-in policiesC. Create an Amazon CloudWatch alarm to send an email through Amazon SNS when EC2 instances experience higher loadsD. Create an AWS Lambda function to monitor website load time, run it every 5 minutes, and use the AWS SDK to create a new instance if website load time is longer than 2 secondsE. Use Amazon CloudFront to cache the website content during launch and set a TTL for cache content to expire after the launch date
A. Set up an Application Load Balancer to distribute traffic to multiple EC2 instancesB. Set up an Auto Scaling group across multiple Availability Zones for the website, and create scale-out and scale-in policies
A customer has an application that is used by enterprise customers outside of AWS. Some of these customers use legacy firewalls that cannot whitelist by DNS name, but whitelist based only on IP address. The application is currently deployed in two Availability Zones, with one EC2 instance in each that has Elastic IP addresses. The customer wants to whitelist only two IP addresses, but the two existing EC2 instances cannot sustain the amount of traffic.What can a Solutions Architect do to support the customer and allow for more capacity? (Choose two.)A. Create a Network Load Balancer with an interface in each subnet, and assign a static IP address to each subnet.B. Create additional EC2 instances and put them on standby. Remap an Elastic IP address to a standby instance in the event of a failure.C. Use Amazon Route 53 with a weighted, round-robin routing policy across the Elastic IP addresses to resolve one at a time.D. Add additional EC2 instances with Elastic IP addresses, and register them with Amazon Route 53E. Switch the two existing EC2 instances for an Auto Scaling group, and register them with the Network Load Balancer.
A. Create a Network Load Balancer with an interface in each subnet, and assign a static IP address to each subnet.E. Switch the two existing EC2 instances for an Auto Scaling group, and register them with the Network Load Balancer.
A company is storing application data in Amazon S3 buckets across multiple AWS regions. Company policy requires that encryption keys be generated at the company headquarters, but the encryption keys may be stored in AWS after generation. The Solutions Architect plans to configure cross-region replication.Which solution will encrypt the data whole requiring the LEAST amount of operational overhead?A. Configure the applications to write to an S3 bucket using client-side encryptionB. Configure S3 buckets to encrypt using AES-256C. Configure S3 object encryption using AWS CLI with Server-Side Encryption with AWS KMS-Managed Keys (SSE-KMS)D. Configure S3 buckets to use Server-Side Encryption with AWS KMS-Managed Keys (SSE-KMS) with imported key material in both regions
D. Configure S3 buckets to use Server-Side Encryption with AWS KMS-Managed Keys (SSE-KMS) with imported key material in both regions
A Solutions Architect must design a solution that encrypts data in Amazon S3. Corporate policy mandates encryption keys be generated and managed on premises.Which solution should the Architect use to meet the security requirements?A. AWS CloudHSMB. SSE-KMS: Server-side encryption with AWS KMS managed keysC. SSE-S3: Server-side encryption with Amazon-managed master keyD. SSE-C: Server-side encryption with customer-provided encryption keys
D. SSE-C: Server-side encryption with customer-provided encryption keys
A Solutions Architect designed a system based on Amazon Kinesis Data Streams. After the workflow was put into production, the company noticed it performed slowly and identified Kinesis Data Streams as the problem. One of the streams has a total of 10 Mb/s throughput.What should the Solutions Architect recommend to improve performance?A. Use AWS Lambda to preprocess the data and transform the records into a simpler format, such as CSV.B. Run the MergeShard command to reduce the number of shards that the consumer can more easily process.C. Change the workflow to use Amazon Kinesis Data Firehose to gain a higher throughput.D. Run the UpdateShardCount command to increase the number of shards in the stream
D. Run the UpdateShardCount command to increase the number of shards in the stream
A Solutions Architect is designing an application that requires having six Amazon EC2 instances running at all times. The application will be deployed in the sa- east-1 region, which has three Availability Zones: sa-east-1a, sa-east-1b, and sa-east-1c.Which action will provide 100 percent fault tolerance and the LOWEST cost in the event that one Availability Zone in the region becomes unavailable?A. Deploy six Amazon EC2 instances in sa-east-1a, six Amazon EC2 instances in sa-east-1b, and six Amazon EC2 instances in sa-east-1cB. Deploy six Amazon EC2 instances in sa-east-1a, four Amazon EC2 instances in sa-east-1b, and two Amazon EC2 instances in sa-east-1cC. Deploy three Amazon EC2 instances in sa-east-1a, three Amazon EC2 instances in sa-east-1b, and three Amazon EC2 instances in sa-east-1cD. Deploy two Amazon EC2 instances in sa-east-1a, two Amazon EC2 instances in sa-east-1b, and two Amazon EC2 instances in sa-east-1c
C. Deploy three Amazon EC2 instances in sa-east-1a, three Amazon EC2 instances in sa-east-1b, and three Amazon EC2 instances in sa-east-1c
A Solutions Architect is designing an application in AWS. The Architect must not expose the application or database tier over the Internet for security reasons. The application must be low-cost and have a scalable front end. The databases and application tier must have only one-way Internet access to download software and patch updates.Which solution helps to meet these requirements?A. Use a NAT Gateway as the front end for the application tier and to enable the private resources to have Internet access.B. Use an Amazon EC2-based proxy server as the front end for the application tier, and a NAT Gateway to allow Internet access for private resources.C. Use an ELB Classic Load Balancer as the front end for the application tier, and an Amazon EC2 proxy server to allow Internet access for private resources.D. Use an ELB Classic Load Balancer as the front end for the application tier, and a NAT Gateway to allow Internet access for private resources.
D. Use an ELB Classic Load Balancer as the front end for the application tier, and a NAT Gateway to allow Internet access for private resources.
A Solutions Architect is designing a multi-tier application consisting of an Application Load Balancer, an Amazon RDS database instance, and an Auto Scaling group on Amazon EC2 instances. Each tier is in a separate subnet. There are some EC2 instances in the subnet that belong to another application. The RDS database instance should accept traffic only from the EC2 instances in the Auto Scaling group.What should be done to meet these requirements?A. Configure the inbound network ACLs on the database subnet to accept traffic from the IP addresses of the EC2 instances only.B. Configure the inbound rules on the security group associated with the RDS database instance. Set the source to the security group associated with instances in the Auto Scaling group.C. Configure the outbound rules on the security group associated with the Auto Scaling group. Set the destination to the security group associated with the RDS database instance.D. Configure the inbound network ACLs on the database subnet to accept traffic only from the CIDR range of the subnet used by the Auto Scaling group.
B. Configure the inbound rules on the security group associated with the RDS database instance. Set the source to the security group associated with instances in the Auto Scaling group.Need a corresponding outbound rule.
An organization uses Amazon S3 to store video content served via its website. It only has rights to deliver this content to users within its own country and needs to restrict access.How can the organization ensure that these files are only accessible from within its country?A. Use a custom Amazon S3 bucket policy to allow access only to users inside the organization"â¢s countryB. Use Amazon CloudFront and Geo Restriction to allow access only to users inside the organization"â¢s countryC. Use an Amazon S3 bucket ACL to allow access only to users inside the organization"â¢s countryD. Use file-based ACL permissions on each video file to allow access only to users inside the organization"â¢s country
B. Use Amazon CloudFront and Geo Restriction to allow access only to users inside the organization"â¢s country
A company is storing data in an Amazon DynamoDB table and needs to take daily backups and retain them for 6 months.How should the Solutions Architect meet these requirements without impacting the production workload?A. Use DynamoDB replication and restore the table from the replicaB. Use AWS Data Pipeline and create a scheduled job to back up the DynamoDB table dailyC. Use Amazon CloudWatch Events to trigger an AWS Lambda function that makes an on-demand backup of the tableD. Use AWS Batch to create a scheduled backup with the default template, then back up to Amazon S3 daily.
C. Use Amazon CloudWatch Events to trigger an AWS Lambda function that makes an on-demand backup of the table
A client reports that they want see an audit log of any changes made to AWS resources in their account.What can the client do to achieve this?A. Set up Amazon CloudWatch monitors on services they ownB. Enable AWS CloudTrail logs to be delivered to an Amazon S3 bucketC. Use Amazon CloudWatch Events to parse logsD. Use AWS OpsWorks to manage their resources
B. Enable AWS CloudTrail logs to be delivered to an Amazon S3 bucket
An application running in a private subnet accesses an Amazon DynamoDB table. There is a security requirement that the data never leave the AWS network.How should this requirement be met?A. Configure a network ACL on DynamoDB to limit traffic to the private subnetB. Enable DynamoDB encryption at rest using an AWS KMS keyC. Add a NAT gateway and configure the route table on the private subnetD. Create a VPC endpoint for DynamoDB and configure the endpoint policy
D. Create a VPC endpoint for DynamoDB and configure the endpoint policy
A three-tier application is being created to host small news articles. The application is expected to serve millions of users. When breaking news occurs, the site must handle very large spikes in traffic without significantly impacting database performance.Which design meets these requirements while minimizing costs?A. Use Auto Scaling groups to increase the number of Amazon EC2 instances delivering the web applicationB. Use Auto Scaling groups to increase the size of the Amazon RDS instances delivering the databaseC. Use Amazon DynamoDB strongly consistent reads to adjust for the increase in trafficD. Use Amazon DynamoDB Accelerator (DAX) to cache read operations to the database
D. Use Amazon DynamoDB Accelerator (DAX) to cache read operations to the database
During a review of business applications, a Solutions Architect identifies a critical application with a relational database that was built by a business user and is running on the user"â¢s desktop. To reduce the risk of a business interruption, the Solutions Architect wants to migrate the application to a highly available, multi- tiered solution in AWS.What should the Solutions Architect do to accomplish this with the LEAST amount of disruption to the business?A. Create an import package of the application code for upload to AWS Lambda, and include a function to create another Lambda function to migrate data into an Amazon RDS databaseB. Create an image of the user"â¢s desktop, migrate it to Amazon EC2 using VM Import, and place the EC2 instance in an Auto Scaling groupC. Pre-stage new Amazon EC2 instances running the application code on AWS behind an Application Load Balancer and an Amazon RDS Multi-AZ DB instanceD. Use AWS DMS to migrate the backend database to an Amazon RDS Multi-AZ DB instance. Migrate the application code to AWS Elastic Beanstalk
D. Use AWS DMS to migrate the backend database to an Amazon RDS Multi-AZ DB instance. Migrate the application code to AWS Elastic Beanstalk
A company has thousands of files stored in an Amazon S3 bucket that has a well-defined access pattern. The files are accessed by an application multiple times a day for the first 30 days. Files are rarely accessed within the next 90 days. After that, the files are never accessed again. During the first 120 days, accessing these files should never take more than a few seconds.Which lifecycle policy should be used for the S3 objects to minimize costs based on the access pattern?A. Use Amazon S3 Standard-Infrequent Access (S3 Standard-IA) storage for the first 30 days. Then move the files to the GLACIER storage class for the next 90 days. Allow the data to expire after that.B. Use Amazon S3 Standard storage for the first 30 days. Then move the files to Amazon S3 Standard-Infrequent Access (S3 Standard-IA) for the next 90 days. Allow the data to expire after that.C. Use Amazon S3 Standard storage for first 30 days. Then move the files to the GLACIER storage class for the next 90 days. Allow the data to expire after that.D. Use Amazon S3 Standard-Infrequent Access (S3 Standard-IA) for the first 30 days. After that, move the data to the GLACIER storage class, where is will be deleted automatically.
B. Use Amazon S3 Standard storage for the first 30 days. Then move the files to Amazon S3 Standard-Infrequent Access (S3 Standard-IA) for the next 90 days. Allow the data to expire after that.
An application generates audit logs of operational activities. Compliance requirements mandate that the application retain the logs for 5 years.How can these requirements be met?A. Save the logs in an Amazon S3 bucket and enable Multi-Factor Authentication Delete (MFA Delete) on the bucket.B. Save the logs in an Amazon EFS volume and use Network File System version 4 (NFSv4) locking with the volume.C. Save the logs in an Amazon Glacier vault and use the Vault Lock feature.D. Save the logs in an Amazon EBS volume and take monthly snapshots.
C. Save the logs in an Amazon Glacier vault and use the Vault Lock feature.
A company is implementing a data lake solution on Amazon S3. Its security policy mandates that the data stored in Amazon S3 should be encrypted at rest.Which options can achieve this? (Select TWO.)A. Use S3 server-side encryption with an Amazon EC2 key pair.B. Use S3 server-side encryption with customer-provided keys (SSE-C).C. Use S3 bucket policies to restrict access to the data at rest.D. Use client-side encryption before ingesting the data to Amazon S3 using encryption keys.E. Use SSL to encrypt the data while in transit to Amazon S3.
B. Use S3 server-side encryption with customer-provided keys (SSE-C).D. Use client-side encryption before ingesting the data to Amazon S3 using encryption keys.
A Solutions Architect is designing the architecture for a web application that will be hosted on AWS. Internet users will access the application using HTTP andHTTPS.How should the Architect design the traffic control requirements?A. Use a network ACL to allow outbound ports for HTTP and HTTPS. Deny other traffic for inbound and outbound.B. Use a network ACL to allow inbound ports for HTTP and HTTPS. Deny other traffic for inbound and outbound.C. Allow inbound ports for HTTP and HTTPS in the security group used by the web servers.D. Allow outbound ports for HTTP and HTTPS in the security group used by the web servers.
C. Allow inbound ports for HTTP and HTTPS in the security group used by the web servers.
A company is launching a new static website on Amazon S3 and Amazon CloudFront. The company wants to ensure that all web requests go through onlyCloudFront.How can a Solutions Architect meet this requirement?A. Configure the S3 bucket policy to allow only CloudFront IP addresses to read objects.B. Create IAM users in a group that has read access to the S3 bucket. Configure CloudFront to pass credentials to the S3 bucket.C. Create a CloudFront origin access identity (OAI), then update the S3 bucket policy to allow the OAI read access.D. Convert the S3 bucket to an EC2 instance, then give CloudFront access to the instance by using security groups.
C. Create a CloudFront origin access identity (OAI), then update the S3 bucket policy to allow the OAI read access.
An application provides a feature that allows users to securely download private and personal files. The web server is currently overwhelmed with serving files for download. A Solutions Architect must find a more effective solution to reduce web server load and costs, and must allow users to download only their own files.Which solution meets all requirements?A. Store the files securely on Amazon S3 and have the application generate an Amazon S3 pre-signed URL for the user to download.B. Store the files in an encrypted Amazon EBS volume, and use a separate set of servers to serve the downloads.C. Have the application encrypt the files and store them in the local Amazon EC2 Instance Store prior to serving them up for download.D. Create an Amazon CloudFront distribution to distribute and cache the files.
A. Store the files securely on Amazon S3 and have the application generate an Amazon S3 pre-signed URL for the user to download.
An application calls a service run by a vendor. The vendor charges based on the number of calls. The finance department needs to know the number of calls that are made to the service to validate the billing statements.How can a Solutions Architect design a system to durably store the number of calls without requiring changes to the application?A. Call the service through an internet gateway.B. Decouple the application from the service with an Amazon SQS queue.C. Publish a custom Amazon CloudWatch metric that counts calls to the service.D. Call the service through a VPC peering connection.
C. Publish a custom Amazon CloudWatch metric that counts calls to the service.
An application runs in a VPC on Amazon EC2 instances behind an Application Load Balancer. Traffic to the Amazon EC2 instances must be limited to traffic from the Application Load Balancer.Based on these requirements, the security group configuration should only allow traffic from:A. the public IPs of the Application Load Balancer nodes.B. the IP range of the Application Load Balancer subnets.C. the security group attached to the Application Load Balancer.D. the VPC CIDR
C. the security group attached to the Application Load Balancer.
An environment has an Auto Scaling group across two Availability Zones referred to as AZ-a and AZ-b and a default termination policy. AZ-a has four AmazonEC2 instances, and AZ-b has three EC2 instances. None of the instances is protected from a scale-in.How will Auto Scaling proceed if there is a scale-in event?A. Auto Scaling selects an instance to terminate randomly.B. Auto Scaling terminates the instance with the oldest launch configuration of all instances.C. Auto Scaling selects the Availability Zone with four EC2 instances and then continues to evaluate.D. Auto Scaling terminates the instance with the closest next billing hour of all instances.
C. Auto Scaling selects the Availability Zone with four EC2 instances and then continues to evaluate.
A Solutions Architect is designing a new web application on Amazon EC2. The system must make application-specific metrics, such as application security events, available to the SysOps teams.How should the Solutions Architect enable this in the design?A. Install AWS SDK on the application instances. Design the application to use the AWS SDK to log events directly to an Amazon S3 bucket.B. Install the Amazon Inspector agent on the application instances. Design the application to store events in application log files.C. Install the Amazon CloudWatch Logs agent on the application instances. Design the application to store events in application log files.D. Install AWS SDK on the application instances. Design the application to use AWS SDK to log sensitive events directly to AWS CloudTrail.
C. Install the Amazon CloudWatch Logs agent on the application instances. Design the application to store events in application log files.
A Solutions Architect needs to convert potential single points of failure to a highly-available configuration. The current architecture contains Amazon EC2 instances with databases running in one Availability Zone. Web-tier resources have not been given public addresses, but still require Internet access.Which solution should the Architect use to maintain high availability?A. Use ELB Classic Load Balancer with the web tier. Deploy EC2 instances in two Availability Zones and enable Multi-AZ RDS. Deploy a NAT gateway in one Availability Zone.B. Use ELB Classic Load Balancer with the web tier. Deploy EC2 instances in two Availability Zones and enable Multi-AZ RDS. Deploy NAT gateways in both Availability Zones.C. Use ELB Classic Load Balancer with the database tier. Deploy Amazon EC2 instances in two Availability Zones and enable Multi-AZ RDS. Deploy NAT gateways in both Availability Zones.D. Use ELB Classic Load Balancer with the database tier. Deploy Amazon EC2 instances in two Availability Zones and enable Multi-AZ RDS. Deploy a NAT gateway in one Availability Zone.
B. Use ELB Classic Load Balancer with the web tier. Deploy EC2 instances in two Availability Zones and enable Multi-AZ RDS. Deploy NAT gateways in both Availability Zones.
An organization hosts 10 microservices, each in an Auto Scaling group behind individual Classic Load Balancers. Each EC2 instance is running at optimal load.Which of the following actions would allow the organization to reduce costs without impacting performance?A. Reduce the number of EC2 instances behind each Classic Load Balancer.B. Change instance types in the Auto Scaling group launch configuration.C. Change the maximum size but leave the desired capacity of the Auto Scaling groups.D. Replace the Classic Load Balancers with a single Application Load Balancer.
D. Replace the Classic Load Balancers with a single Application Load Balancer.
An application has components running in a public subnet and a private subnet. The components within the private subnet must connect to the internet to receive updates.How should this be accomplished without moving the components into a public subnet?A. Add an internet gateway to the private subnet and update the private subnet route table.B. Add a NAT gateway to the public subnet and update the public subnet route table.C. Add an internet gateway to the VPC and update the private subnet route table.D. Add a NAT gateway to the public subnet and update the private subnet route table.
D. Add a NAT gateway to the public subnet and update the private subnet route table.
A Solutions Architect is designing a multicontainer-based web application. Parts of the web application, /orders and /sale-event, must scale independently while maintaining a single Fully Qualified Domain Name.Which AWS services will help the Architect build this platform? (Select TWO.)A. Amazon ELB Application Load BalancerB. Amazon ELB Classic Load BalancerC. Amazon EC2 Container ServiceD. Amazon DynamoDBE. Amazon SQS
A. Amazon ELB Application Load BalancerC. Amazon EC2 Container Servicev
A company will host a static website within an Amazon S3 bucket. The website will serve millions of users globally, and the company wants to minimize data transfer costs.What should the Solutions Architect do to ensure costs are kept to a minimum?A. Implement an AWS Auto Scaling group for the website to ensure it grows with use.B. Use cross-region replication to copy the website to an additional S3 bucket in a different region.C. Create an Amazon CloudFront distribution, with the S3 bucket as the origin server.D. Move the website to large compute-optimized Amazon EC2 instances.
C. Create an Amazon CloudFront distribution, with the S3 bucket as the origin server.
A company has a web application that makes requests to a backend API service. The API service is behind an Elastic Load Balancer running on Amazon EC2 instances.Most backend API service endpoint calls finish very quickly, but one endpoint that makes calls to create objects in an external service takes a long time to complete. These long-running calls are causing client timeouts and increasing overall system latency.What should be done to minimize the system throughput impact of the slow-running endpoint?A. Change the EC2 instance size to increase memory and compute capacity.B. Use Amazon SQS to offload the long-running requests for asynchronous processing by seprate workers.C. Increase the load balancer idle timeount to allow the long-running requests to complete.D. Use Amazon ElastiCache for Redis to cache responses from the external service.
B. Use Amazon SQS to offload the long-running requests for asynchronous processing by seprate workers.
A team has developed a new web application in an AWS Region that has three Availability Zones: AZ-a, AZ-b, and AZ-c. This application must be fault tolerant and needs at least six Amazon EC2 instances running at all times. The application must tolerate the loss of connectivity to any single Availability Zone so that the application can continue to run.Which configurations will meet these requirements? (Select TWO.)A. AZ-a with six EC2 instances, AZ-b with six EC2 instances, and AZ-c with no EC2 instances.B. AZ-a with four EC2 instances, AZ-b with two EC2 instances, and AZ-c with two EC2 instances.C. AZ-a with two EC2 instances, AZ-b with two EC2 instances, and AZ-c with two EC2 instances.D. AZ-a with three EC2 instances, AZ-b with three EC2 instances, and AZ-c with no EC2 instances.E. AZ-a with three EC2 instances, AZ-b with three EC2 instances, and AZ-c with three EC2 instances.
A. AZ-a with six EC2 instances, AZ-b with six EC2 instances, and AZ-c with no EC2 instances.E. AZ-a with three EC2 instances, AZ-b with three EC2 instances, and AZ-c with three EC2 instances.
A retail company runs hourly flash sales and has a performance issue on its Amazon RDS for PostgreSQL database. The Database Administrators have identified that the issue with performance happens when finance and marketing employees refresh sales dashboards that are used for reporting real-time sales data.What should be done to resolve the issue without impacting performance?A. Create a Read Replica of the RDS PostgreSQL database and point the dashboards at the Read Replica.B. Move data from the RDS PostgreSQL database to Amazon Redshift nightly and point the dashboards at Amazon Redshift.C. Monitor the database with Amazon CloudWatch and increase the instance size, as necessary. Make no changes to the dashboards.D. Take an hourly snapshot of the RDS PostgreSQL database, and load the hourly snapshots to another database to which the dashboards are pointed.
A. Create a Read Replica of the RDS PostgreSQL database and point the dashboards at the Read Replica.
An application runs on Amazon EC2 instances in multiple Availability Zones (AZs) behind an Application Load Balancer. The load balancer is in public subnets; the EC2 instances are in private subnets and must not be accessible from the internet. The EC2 instances must call external services on the internet. If one AZ becomes unavailable, the remaining EC2 instances must still be able to call the external services.How should these requirements be met?A. Create a NAT gateway attached to the VPC. Add a route to the gateway to each private subnet route tableB. Configure an internet gateway. Add a route to the gateway to each private subnet route table.C. Create a NAT instance in the private subnet of each AZ. Update the route tables for each private subnet to direct internet-bound traffic to the NAT instance.D. Create a NAT gateway in each AZ. Update the route tables for each private subnet to direct internet-bound traffic to the NAT gateway.
D. Create a NAT gateway in each AZ. Update the route tables for each private subnet to direct internet-bound traffic to the NAT gateway.
A Solutions Architect must create a solution whereby user access to multiple Amazon Aurora MySQL databases is securely managed with short-lived connection credentials.How can the Solutions Architect meet these requirements?A. Create a database user to run the GRANT statement with a short-lived token.B. Create the user account to use the AWS-provided AWSAuthenticationPlugin with IAM.C. Use AWS Systems Manager to securely save the connection secrets, and use the secrets while connecting.D. Use AWS KMS to securely save the connection secrets, and use the secrets while connecting.
B. Create the user account to use the AWS-provided AWSAuthenticationPlugin with IAM.
A customer has a legacy application with a large amount of data. The files accessed by the application are approximately 10 GB each, but are rarely accessed.However, when files are accessed, they are retrieved sequentially. The customer is migrating the application to AWS and would like to use Amazon EC2 andAmazon EBS.What is the Least expensive EBS volume type for this use case?A. Cold HDD (sc1)B. Provisioned IOPS SSD (io1)C. General Purpose SSD (gp2)D. Throughput Optimized HDD (st1)
A. Cold HDD (sc1)"rarely accessed" "least expensive" "10GB" "retrieved sequentially"
A customer is deploying a production portal application on AWS. The database tier has structured data. The company requires a solution that is easily manageable and highly available.How can these requirements be met?A. Deploy the database on multiple Amazon EC2 instances backed by Amazon EBS across multiple Availability Zones.B. Use Amazon RDS with a multiple Availability Zone option.C. Use RDS with a single Available Zone option and schedule periodic database snapshots.D. Use Amazon DynamoDB.
B. Use Amazon RDS with a multiple Availability Zone option."structured data" = RDS
A Solutions Architect is designing a disaster recovery (DR) environment in a separate AWS region from an application"â¢s primary workload. The application uses a multi-tier architecture, and only the RDS instance will have frequent changes. The application installation process takes 60 minutes on average. The disaster recovery plan must have an RPO of less than 90 minutes and an RTO of less than 30 minutes.Which of the following would enable the Solutions Architect to meet these requirements? (Choose two.)A. An Aurora instance as the primary database with a read replica in the DR region.B. Inter-region VPC peering between the primary workload VPC and the DR VPCC. A cross-region Amazon EC2 Amazon Machine Image (AMI) copyD. Amazon S3 cross-region replication of application-tier installersE. Amazon CloudWatch Events in the primary region that trigger the failover to the DR region
A. An Aurora instance as the primary database with a read replica in the DR region.C. A cross-region Amazon EC2 Amazon Machine Image (AMI) copy
A website keeps a record of user actions using a globally unique identifier (GIUD) retrieved from Amazon Aurora in place of the user name within the audit record.Security protocols state that the GUID content must not leave the company"â¢s Amazon VPC.As the web traffic has increased, the number of web servers and Aurora read replicas has also increased to keep up with the user record reads for the GUID.What should be done to reduce the number of read replicas required while improving performance?A. Keep the user name and GUID in memory on the web server instance so that the association can be remade on demand. Remove the record after 30 minutes.B. Deploy a Amazon ElastiCache for Redis server into the infrastructure and store the user name and GUID there. Retrieve GUID from ElastiCache when required.C. Encrypt the GUID using Base64 and store it in the user"â¢s session cookie. Decrypt the GUID when an audit record is needed.D. Change the GUID to an MD5 hash of the user name, so that the value can be calculated on demand without referring to the database.
B. Deploy a Amazon ElastiCache for Redis server into the infrastructure and store the user name and GUID there. Retrieve GUID from ElastiCache when required.
Application servers currently deployed in a private subnet require the ability to integrate with a third-party service accessible through the Internet.Which changes are required to provide outbound Internet connectivity in the VPC without providing inbound Internet connectivity to the application servers?A. Create a NAT Gateway without attaching an Internet Gateway to the VPC.B. Create a NAT Gateway and attach an Internet Gateway to the VPC.C. Attach an Internet Gateway to the VPC without creating a NAT Gateway.D. Attach an Internet Gateway to the VPC and create a NAT Gateway.
B. Create a NAT Gateway and attach an Internet Gateway to the VPC.
A Solutions Architect is creating a multi-tiered architecture for an application that includes a public-facing web tier. Security requirements state that the AmazonEC2 instances running in the application tier must not be accessible directly from the internet.What should be done to accomplish this?A. Create a multi-VPC peering mesh with network access rules limiting communications to specific ports. Implement an internet gateway on each VPC for external connectivity.B. Place all instances in a single Amazon VPC with AWS WAF as the web front-end communication conduit. Configure a NAT gateway for external communications.C. Use VPC peering to peer with on-premises hardware. Direct enterprise traffic through the VPC peer connection to the instances hosted in the private VPC.D. Deploy the web and application instances in a private subnet. Provision an Application Load Balancer in the public subnet. Install an internet gateway and use security groups to control communications between the layers.
D. Deploy the web and application instances in a private subnet. Provision an Application Load Balancer in the public subnet. Install an internet gateway and use security groups to control communications between the layers.