Exams > Amazon > AWS Certified Solutions Architect - Professional
AWS Certified Solutions Architect - Professional
Page 16 out of 101 pages Questions 151-160 out of 1009 questions
Question#151

In a VPC, can you modify a set of DHCP options after you create them?

  • A. Yes, you can modify a set of DHCP options within 48 hours after creation and there are no VPCs associated with them.
  • B. Yes, you can modify a set of DHCP options any time after you create them.
  • C. No, you can't modify a set of DHCP options after you create them.
  • D. Yes, you can modify a set of DHCP options within 24 hours after creation.
Discover Answer Hide Answer

C
After you create a set of DHCP options, you can't modify them. If you want your VPC to use a different set of DHCP options, you must create a new set and associate them with your VPC. You can also set up your VPC to use no DHCP options at all.
Reference:
http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_DHCP_Options.html

Question#152

A bucket owner has allowed another account's IAM users to upload or access objects in his bucket. The IAM user of Account A is trying to access an object created by the IAM user of account B. What will happen in this scenario?

  • A. It is not possible to give permission to multiple IAM users
  • B. AWS S3 will verify proper rights given by the owner of Account A, the bucket owner as well as by the IAM user B to the object
  • C. The bucket policy may not be created as S3 will give error due to conflict of Access Rights
  • D. It is not possible that the IAM user of one account accesses objects of the other IAM user
Discover Answer Hide Answer

B
If a IAM user is trying to perform some action on an object belonging to another AWS user's bucket, S3 will verify whether the owner of the IAM user has given sufficient permission to him. It also verifies the policy for the bucket as well as the policy defined by the object owner.
Reference:
http://docs.aws.amazon.com/AmazonS3/latest/dev/access-control-auth-workflow-object-operation.html

Question#153

Which statement is NOT true about a stack which has been created in a Virtual Private Cloud (VPC) in AWS OpsWorks?

  • A. Subnets whose instances cannot communicate with the Internet are referred to as public subnets.
  • B. Subnets whose instances can communicate only with other instances in the VPC and cannot communicate directly with the Internet are referred to as private subnets.
  • C. All instances in the stack should have access to any package repositories that your operating system depends on, such as the Amazon Linux or Ubuntu Linux repositories.
  • D. Your app and custom cookbook repositories should be accessible for all instances in the stack.
Discover Answer Hide Answer

A
In AWS OpsWorks, you can control user access to a stack's instances by creating it in a virtual private cloud (VPC). For example, you might not want users to have direct access to your stack's app servers or databases and instead require that all public traffic be channeled through an Elastic Load Balancer. A VPC consists of one or more subnets, each of which contains one or more instances. Each subnet has an associated routing table that directs outbound traffic based on its destination IP address. Instances within a VPC can generally communicate with each other, regardless of their subnet. Subnets whose instances can communicate with the Internet are referred to as public subnets. Subnets whose instances can communicate only with other instances in the VPC and cannot communicate directly with the Internet are referred to as private subnets. AWS OpsWorks requires the VPC to be configured so that every instance in the stack, including instances in private subnets, has access to the following endpoints:
The AWS OpsWorks service,
https://opsworks-instance-service.us-east-1.amazonaws.com
.

Amazon S3 -
The package repositories for Amazon Linux or Ubuntu 12.04 LTS, depending on which operating system you specify.
Your app and custom cookbook repositories.
Reference:
http://docs.aws.amazon.com/opsworks/latest/userguide/workingstacks-vpc.html#workingstacks-vpc-basics

Question#154

An organization has hosted an application on the EC2 instances. There will be multiple users connecting to the instance for setup and configuration of application.
The organization is planning to implement certain security best practices.
Which of the below mentioned pointers will not help the organization achieve better security arrangement?

  • A. Allow only IAM users to connect with the EC2 instances with their own secret access key.
  • B. Create a procedure to revoke the access rights of the individual user when they are not required to connect to EC2 instance anymore for the purpose of application configuration.
  • C. Apply the latest patch of OS and always keep it updated.
  • D. Disable the password based login for all the users. All the users should use their own keys to connect with the instance securely.
Discover Answer Hide Answer

A
Since AWS is a public cloud any application hosted on EC2 is prone to hacker attacks. It becomes extremely important for a user to setup a proper security mechanism on the EC2 instances. A few of the security measures are listed below:
Always keep the OS updated with the latest patch
Always create separate users with in OS if they need to connect with the EC2 instances, create their keys and disable their password
Create a procedure using which the admin can revoke the access of the user when the business work on the EC2 instance is completed. Lock down unnecessary ports.
Audit any proprietary applications that the user may be running on the EC2 instance Provide temporary escalated privileges, such as sudo for users who need to perform occasional privileged tasks
The IAM is useful when users are required to work with AWS resources and actions, such as launching an instance. It is not useful to connect (RDP / SSH) with an instance.
Reference:
http://aws.amazon.com/articles/1233/

Question#155

By default, temporary security credentials for an IAM user are valid for a maximum of 12 hours, but you can request a duration as long as _________ hours.

  • A. 24
  • B. 36
  • C. 10
  • D. 48
Discover Answer Hide Answer

B
By default, temporary security credentials for an IAM user are valid for a maximum of 12 hours, but you can request a duration as short as 15 minutes or as long as 36 hours.
Reference:
http://docs.aws.amazon.com/STS/latest/UsingSTS/CreatingSessionTokens.html

Question#156

What RAID method is used on the Cloud Block Storage back-end to implement a very high level of reliability and performance?

  • A. RAID 1 (Mirror)
  • B. RAID 5 (Blocks striped, distributed parity)
  • C. RAID 10 (Blocks mirrored and striped)
  • D. RAID 2 (Bit level striping)
Discover Answer Hide Answer

C
Cloud Block Storage back-end storage volumes employs the RAID 10 method to provide a very high level of reliability and performance.
Reference:
http://www.rackspace.com/knowledge_center/product-faq/cloud-block-storage

Question#157

One of the AWS account owners faced a major challenge in June as his account was hacked and the hacker deleted all the data from his AWS account. This resulted in a major blow to the business.
Which of the below mentioned steps would not have helped in preventing this action?

  • A. Setup an MFA for each user as well as for the root account user.
  • B. Take a backup of the critical data to offsite / on premise.
  • C. Create an AMI and a snapshot of the data at regular intervals as well as keep a copy to separate regions.
  • D. Do not share the AWS access and secret access keys with others as well do not store it inside programs, instead use IAM roles.
Discover Answer Hide Answer

C
AWS security follows the shared security model where the user is as much responsible as Amazon. If the user wants to have secure access to AWS while hosting applications on EC2, the first security rule to follow is to enable MFA for all users. This will add an added security layer. In the second step, the user should never give his access or secret access keys to anyone as well as store inside programs. The better solution is to use IAM roles. For critical data of the organization, the user should keep an offsite/ in premise backup which will help to recover critical data in case of security breach. It is recommended to have AWS AMIs and snapshots as well as keep them at other regions so that they will help in the DR scenario. However, in case of a data security breach of the account they may not be very helpful as hacker can delete that.
Therefore, creating an AMI and a snapshot of the data at regular intervals as well as keep a copy to separate regions, would not have helped in preventing this action.

Question#158

With Amazon Elastic MapReduce (Amazon EMR) you can analyze and process vast amounts of data. The cluster is managed using an open-source framework called Hadoop. You have set up an application to run Hadoop jobs. The application reads data from DynamoDB and generates a temporary file of 100 TBs.
The whole process runs for 30 minutes and the output of the job is stored to S3.
Which of the below mentioned options is the most cost effective solution in this case?

  • A. Use Spot Instances to run Hadoop jobs and configure them with EBS volumes for persistent data storage.
  • B. Use Spot Instances to run Hadoop jobs and configure them with ethereal storage for output file storage.
  • C. Use an on demand instance to run Hadoop jobs and configure them with EBS volumes for persistent storage.
  • D. Use an on demand instance to run Hadoop jobs and configure them with ephemeral storage for output file storage.
Discover Answer Hide Answer

B
AWS EC2 Spot Instances allow the user to quote his own price for the EC2 computing capacity. The user can simply bid on the spare Amazon EC2 instances and run them whenever his bid exceeds the current Spot Price. The Spot Instance pricing model complements the On-Demand and Reserved Instance pricing models, providing potentially the most cost-effective option for obtaining compute capacity, depending on the application. The only challenge with a Spot Instance is data persistence as the instance can be terminated whenever the spot price exceeds the bid price. In the current scenario a Hadoop job is a temporary job and does not run for a longer period. It fetches data from a persistent DynamoDB. Thus, even if the instance gets terminated there will be no data loss and the job can be re- run. As the output files are large temporary files, it will be useful to store data on ethereal storage for cost savings.
Reference:
http://aws.amazon.com/ec2/purchasing-options/spot-instances/

Question#159

In Amazon SNS, to send push notifications to mobile devices using Amazon SNS and ADM, you need to obtain the following, except:

  • A. Device token
  • B. Client ID
  • C. Registration ID
  • D. Client secret
Discover Answer Hide Answer

A
To send push notifications to mobile devices using Amazon SNS and ADM, you need to obtain the following: Registration ID and Client secret.
Reference:
http://docs.aws.amazon.com/sns/latest/dg/SNSMobilePushPrereq.html

Question#160

True or False: "In the context of Amazon ElastiCache, from the application's point of view, connecting to the cluster configuration endpoint is no different than connecting directly to an individual cache node."

  • A. True, from the application's point of view, connecting to the cluster configuration endpoint is no different than connecting directly to an individual cache node since, each has a unique node identifier.
  • B. True, from the application's point of view, connecting to the cluster configuration endpoint is no different than connecting directly to an individual cache node.
  • C. False, you can connect to a cache node, but not to a cluster configuration endpoint.
  • D. False, you can connect to a cluster configuration endpoint, but not to a cache node.
Discover Answer Hide Answer

B
This is true. From the application's point of view, connecting to the cluster configuration endpoint is no different than connecting directly to an individual cache node. In the process of connecting to cache nodes, the application resolves the configuration endpoint's DNS name. Because the configuration endpoint maintains
CNAME entries for all of the cache nodes, the DNS name resolves to one of the nodes; the client can then connect to that node.
Reference:
http://docs.aws.amazon.com/AmazonElastiCache/latest/UserGuide/AutoDiscovery.HowAutoDiscoveryWorks.html

chevron rightPrevious Nextchevron right