Exams > Amazon > AWS Certified Solutions Architect - Associate SAA-C02
AWS Certified Solutions Architect - Associate SAA-C02
Page 37 out of 83 pages Questions 361-370 out of 822 questions
Question#361

A company has an application workflow that uses an AWS Lambda function to download and decrypt files from Amazon S3. These files are encrypted using AWS
Key Management Service (AWS KMS) keys. A solutions architect needs to design a solution that will ensure the required permissions are set correctly.
Which combination of actions accomplish this? (Choose two.)

  • A. Attach the kms:decrypt permission to the Lambda function's resource policy.
  • B. Grant the decrypt permission for the Lambda IAM role in the KMS key's policy.
  • C. Grant the decrypt permission for the Lambda resource policy in the KMS key's policy.
  • D. Create a new IAM policy with the kms:decrypt permission and attach the policy to the Lambda function.
  • E. Create a new IAM role with the kms:decrypt permission and attach the execution role to the Lambda function.
Discover Answer Hide Answer

BE

Question#362

A company is migrating a Linux-based web server group to AWS. The web servers must access files in a shared file store for some content. To meet the migration date, minimal changes can be made.
What should a solutions architect do to meet these requirements?

  • A. Create an Amazon S3 Standard bucket with access to the web server.
  • B. Configure an Amazon CloudFront distribution with an Amazon S3 bucket as the origin.
  • C. Create an Amazon Elastic File System (Amazon EFS) volume and mount it on all web servers.
  • D. Configure Amazon Elastic Block Store (Amazon EBS) Provisioned IOPS SSD (io1) volumes and mount them on all web servers.
Discover Answer Hide Answer

C

Question#363

A company that operates a web application on premises is preparing to launch a newer version of the application on AWS. The company needs to route requests to either the AWS-hosted or the on-premises-hosted application based on the URL query string. The on-premises application is not available from the internet, and a VPN connection is established between Amazon VPC and the company's data center. The company wants to use an Application Load Balancer (ALB) for this launch.
Which solution meets these requirements?

  • A. Use two ALBs: one for on-premises and one for the AWS resource. Add hosts to each target group of each ALB. Route with Amazon Route 53 based on the URL query string.
  • B. Use two ALBs: one for on-premises and one for the AWS resource. Add hosts to the target group of each ALB. Create a software router on an EC2 instance based on the URL query string.
  • C. Use one ALB with two target groups: one for the AWS resource and one for on premises. Add hosts to each target group of the ALB. Configure listener rules based on the URL query string.
  • D. Use one ALB with two AWS Auto Scaling groups: one for the AWS resource and one for on premises. Add hosts to each Auto Scaling group. Route with Amazon Route 53 based on the URL query string.
Discover Answer Hide Answer

A

Question#364

A solutions architect is developing a multiple-subnet VPC architecture. The solution will consist of six subnets in two Availability Zones. The subnets are defined as public, private and dedicated for databases. Only the Amazon EC2 instances running in the private subnets should be able to access a database.
Which solution meets these requirements?

  • A. Create a now route table that excludes the route to the public subnets' CIDR blocks. Associate the route table to the database subnets.
  • B. Create a security group that denies ingress from the security group used by instances in the public subnets. Attach the security group to an Amazon RDS DB instance.
  • C. Create a security group that allows ingress from the security group used by instances in the private subnets. Attach the security group to an Amazon RDS DB instance.
  • D. Create a new peering connection between the public subnets and the private subnets. Create a different peering connection between the private subnets and the database subnets.
Discover Answer Hide Answer

B

Question#365

A disaster response team is using drones to collect images of recent storm damage. The response team's laptops lack the storage and compute capacity to transfer the images and process the data. While the team has Amazon EC2 instances for processing and Amazon S3 buckets for storage, network connectivity is intermittent and unreliable. The images need to be processed to evaluate the damage.
What should a solutions architect recommend?

  • A. Use AWS Snowball Edge devices to process and store the images.
  • B. Upload the images to Amazon Simple Queue Service (Amazon SQS) during intermittent connectivity to EC2 instances.
  • C. Configure Amazon Kinesis Data Firehose to create multiple delivery streams aimed separately at the S3 buckets for storage and the EC2 instances for processing the images.
  • D. Use AWS Storage Gateway pre-installed on a hardware appliance to cache the images locally for Amazon S3 to process the images when connectivity becomes available.
Discover Answer Hide Answer

A

Question#366

A company has a multi-tier application deployed on several Amazon EC2 instances in an Auto Scaling group. An Amazon RDS for Oracle instance is the application's data layer that uses Oracle-specific PL/SQL functions. Traffic to the application has been steadily increasing. This is causing the EC2 instances to become overloaded and the RDS instance to run out of storage. The Auto Scaling group does not have any scaling metrics and defines the minimum healthy instance count only. The company predicts that traffic will continue to increase at a steady but unpredictable rate before leveling off.
What should a solutions architect do to ensure the system can automatically scale for the increased traffic? (Choose two.)

  • A. Configure storage Auto Scaling on the RDS for Oracle instance.
  • B. Migrate the database to Amazon Aurora to use Auto Scaling storage.
  • C. Configure an alarm on the RDS for Oracle instance for low free storage space.
  • D. Configure the Auto Scaling group to use the average CPU as the scaling metric.
  • E. Configure the Auto Scaling group to use the average free memory as the scaling metric.
Discover Answer Hide Answer

AC

Question#367

An engineering team is developing and deploying AWS Lambda functions. The team needs to create roles and manage policies in AWS IAM to configure the permissions of the Lambda functions.
How should the permissions for the team be configured so they also adhere to the concept of least privilege?

  • A. Create an IAM role with a managed policy attached. Allow the engineering team and the Lambda functions to assume this role.
  • B. Create an IAM group for the engineering team with an IAMFullAccess policy attached. Add all the users from the team to this IAM group.
  • C. Create an execution role for the Lambda functions. Attach a managed policy that has permission boundaries specific to these Lambda functions.
  • D. Create an IAM role with a managed policy attached that has permission boundaries specific to the Lambda functions. Allow the engineering team to assume this role.
Discover Answer Hide Answer

A

Question#368

A company maintains a searchable repository of items on its website. The data is stored in an Amazon RDS for MySQL database table that contains more than
10 million rows. The database has 2 TB of General Purpose SSD storage. There are millions of updates against this data every day through the company's website. The company has noticed that some insert operations are taking 10 seconds or longer. The company has determined that the database storage performance is the problem.
Which solution addresses the performance issue?

  • A. Change the storage type to Provisioned IOPS SSD.
  • B. Change the DB instance to a memory-optimized instance class.
  • C. Change the DB instance to a burstable performance instance class.
  • D. Enable Multi-AZ RDS read replicas with MySQL native asynchronous replication.
Discover Answer Hide Answer

A

Question#369

A company has an Amazon S3 bucket that contains mission-critical data. The company wants to ensure this data is protected from accidental deletion. The data should still be accessible, and a user should be able to delete the data intentionally.
Which combination of steps should a solutions architect take to accomplish this? (Choose two.)

  • A. Enable versioning on the S3 bucket.
  • B. Enable MFA Delete on the S3 bucket.
  • C. Create a bucket policy on the S3 bucket.
  • D. Enable default encryption on the S3 bucket.
  • E. Create a lifecycle policy for the objects in the S3 bucket.
Discover Answer Hide Answer

AB
Reference:
https://acloud.guru/forums/aws-certified-solutions-architect-associate/discussion/-LNMknp7BP01IYVSlee8/Final%20practice%20exam

Question#370

A company has an on-premises business application that generates hundreds of files each day. These files are stored on an SMB file share and require a low- latency connection to the application servers. A new company policy states all application-generated files must be copied to AWS. There is already a VPN connection to AWS.
The application development team does not have time to make the necessary code modifications to move the application to AWS.
Which service should a solutions architect recommend to allow the application to copy files to AWS?

  • A. Amazon Elastic File System (Amazon EFS)
  • B. Amazon FSx for Windows File Server
  • C. AWS Snowball
  • D. AWS Storage Gateway
Discover Answer Hide Answer

B
Reference:
https://aws.amazon.com/blogs/storage/accessing-smb-file-shares-remotely-with-amazon-fsx-for-windows-file-server/

chevron rightPrevious Nextchevron right