Exams > Amazon > AWS Certified Solutions Architect - Professional
AWS Certified Solutions Architect - Professional
Page 21 out of 101 pages Questions 201-210 out of 1009 questions
Question#201

How does AWS Data Pipeline execute activities on on-premise resources or AWS resources that you manage?

  • A. By supplying a Task Runner package that can be installed on your on-premise hosts
  • B. None of these
  • C. By supplying a Task Runner file that the resources can access for execution
  • D. By supplying a Task Runner json script that can be installed on your on-premise hosts
Discover Answer Hide Answer

A
To enable running activities using on-premise resources, AWS Data Pipeline does the following: It supply a Task Runner package that can be installed on your on- premise hosts. This package continuously polls the AWS Data Pipeline service for work to perform. When it's time to run a particular activity on your on-premise resources, it will issue the appropriate command to the Task Runner.
Reference:
https://aws.amazon.com/datapipeline/faqs/

Question#202

Which of following IAM policy elements lets you specify an exception to a list of actions?

  • A. NotException
  • B. ExceptionAction
  • C. Exception
  • D. NotAction
Discover Answer Hide Answer

D
The NotAction element lets you specify an exception to a list of actions.
Reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/AccessPolicyLanguage_ElementDescriptions.html

Question#203

In AWS IAM, which of the following predefined policy condition keys checks how long ago (in seconds) the MFA-validated security credentials making the request were issued using multi- factor authentication (MFA)?

  • A. aws:MultiFactorAuthAge
  • B. aws:MultiFactorAuthLast
  • C. aws:MFAAge
  • D. aws:MultiFactorAuthPrevious
Discover Answer Hide Answer

A
aws:MultiFactorAuthAge is one of the predefined keys provided by AWS that can be included within a Condition element of an IAM policy. The key allows to check how long ago (in seconds) the MFA-validated security credentials making the request were issued using Multi-Factor Authentication (MFA).
Reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/AccessPolicyLanguage_ElementDescriptions.html

Question#204

A user is configuring MySQL RDS with PIOPS. What should be the minimum PIOPS that the user should provision?

  • A. 1000
  • B. 200
  • C. 2000
  • D. 500
Discover Answer Hide Answer

A
If a user is trying to enable PIOPS with MySQL RDS, the minimum size of storage should be 100 GB and the minimum PIOPS should be 1000.
Reference:
http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_PIOPS.html

Question#205

You are setting up some EBS volumes for a customer who has requested a setup which includes a RAID (redundant array of inexpensive disks). AWS has some recommendations for RAID setups.
Which RAID setup is not recommended for Amazon EBS?

  • A. RAID 1 only
  • B. RAID 5 only
  • C. RAID 5 and RAID 6
  • D. RAID 0 only
Discover Answer Hide Answer

C
With Amazon EBS, you can use any of the standard RAID configurations that you can use with a traditional bare metal server, as long as that particular RAID configuration is supported by the operating system for your instance. This is because all RAID is accomplished at the software level. For greater I/O performance than you can achieve with a single volume, RAID 0 can stripe multiple volumes together; for on-instance redundancy, RAID 1 can mirror two volumes together.
RAID 5 and RAID 6 are not recommended for Amazon EBS because the parity write operations of these RAID modes consume some of the IOPS available to your volumes.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/raid-config.html

Question#206

Once the user has set ElastiCache for an application and it is up and running, which services, does Amazon not provide for the user:

  • A. The ability for client programs to automatically identify all of the nodes in a cache cluster, and to initiate and maintain connections to all of these nodes
  • B. Automating common administrative tasks such as failure detection and recovery, and software patching.
  • C. Providing default Time to Live (TTL) in the AWS Elasticache Redis Implementation for different type of data.
  • D. Providing detailed monitoring metrics associated with your Cache Nodes, enabling you to diagnose and react to issues very quickly
Discover Answer Hide Answer

C
Amazon provides failure detection and recovery, and software patching and monitoring tools which is called CloudWatch. In addition it provides also Auto
Discovery to automatically identify and initialize all nodes of cache cluster for Amazon ElastiCache.
Reference:
http://docs.aws.amazon.com/AmazonElastiCache/latest/UserGuide/WhatIs.html

Question#207

In the context of AWS Cloud Hardware Security Module(HSM), does your application need to reside in the same VPC as the CloudHSM instance?

  • A. No, but the server or instance on which your application and the HSM client is running must have network (IP) reachability to the HSM.
  • B. Yes, always
  • C. No, but they must reside in the same Availability Zone.
  • D. No, but it should reside in same Availability Zone as the DB instance.
Discover Answer Hide Answer

A
Your application does not need to reside in the same VPC as the CloudHSM instance. However, the server or instance on which your application and the HSM client is running must have network (IP) reachability to the HSM. You can establish network connectivity in a variety of ways, including operating your application in the same VPC, with VPC peering, with a VPN connection, or with Direct Connect.
Reference:
https://aws.amazon.com/cloudhsm/faqs/

Question#208

True or False: In Amazon ElastiCache, you can use Cache Security Groups to configure the cache clusters that are part of a VPC.

  • A. FALSE
  • B. TRUE
  • C. True, this is applicable only to cache clusters that are running in an Amazon VPC environment.
  • D. True, but only when you configure the cache clusters using the Cache Security Groups from the console navigation pane.
Discover Answer Hide Answer

A
Amazon ElastiCache cache security groups are only applicable to cache clusters that are not running in an Amazon Virtual Private Cloud environment (VPC). If you are running in an Amazon Virtual Private Cloud, Cache Security Groups is not available in the console navigation pane.
Reference:
http://docs.aws.amazon.com/AmazonElastiCache/latest/UserGuide/CacheSecurityGroup.html

Question#209

What is the role of the PollForTask action when it is called by a task runner in AWS Data Pipeline?

  • A. It is used to retrieve the pipeline definition.
  • B. It is used to report the progress of the task runner to AWS Data Pipeline.
  • C. It is used to receive a task to perform from AWS Data Pipeline.
  • D. It is used to inform AWS Data Pipeline of the outcome when the task runner completes a task.
Discover Answer Hide Answer

C
Task runners call PollForTask to receive a task to perform from AWS Data Pipeline. If tasks are ready in the work queue, PollForTask returns a response immediately. If no tasks are available in the queue, PollForTask uses long-polling and holds on to a poll connection for up to 90 seconds, during which time any newly scheduled tasks are handed to the task agent. Your remote worker should not call PollForTask again on the same worker group until it receives a response, and this may take up to 90 seconds.
Reference:
http://docs.aws.amazon.com/datapipeline/latest/APIReference/API_PollForTask.html

Question#210

What is the average queue length recommended by AWS to achieve a lower latency for the 200 PIOPS EBS volume?

  • A. 5
  • B. 1
  • C. 2
  • D. 4
Discover Answer Hide Answer

B
The queue length is the number of pending I/O requests for a device. The optimal average queue length will vary for every customer workload, and this value depends on a particular application's sensitivity to IOPS and latency. If the workload is not delivering enough I/O requests to maintain the optimal average queue length, then the EBS volume might not consistently deliver the IOPS that have been provisioned. However, if the workload maintains an average queue length that is higher than the optimal value, then the per-request I/O latency will increase; in this case, the user should provision more IOPS for his volume. AWS recommends that the user should target an optimal average queue length of 1 for every 200 provisioned IOPS and tune that value based on his application requirements.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-workload-demand.html

chevron rightPrevious Nextchevron right