Exams > Amazon > AWS Certified Solutions Architect - Professional
AWS Certified Solutions Architect - Professional
Page 28 out of 101 pages Questions 271-280 out of 1009 questions
Question#271

In CloudFormation, if you want to map an Amazon Elastic Block Store to an Amazon EC2 instance, _________.

  • A. you reference the logical IDs to associate the block stores with the instance
  • B. you reference the physical IDs of the instance along with the resource type
  • C. you reference the instance IDs of the block store along with the resource properties
  • D. you reference the physical IDs of both the block stores and the instance
Discover Answer Hide Answer

A
In AWS CloudFormation, if you want to map an Amazon Elastic Block Store to an Amazon EC2 instance, you reference the logical IDs to associate the block stores with the instance.
Reference:
http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/concept-resources.html

Question#272

An organization hosts an app on EC2 instances which multiple developers need access to in order to perform updates.
The organization plans to implement some security best practices related to instance access.
Which one of the following recommendations will not help improve its security in this way?

  • A. Disable the password based login for all the users. All the users should use their own keys to connect with the instance securely.
  • B. Create an IAM policy allowing only IAM users to connect to the EC2 instances with their own SSH key.
  • C. Create a procedure to revoke the access rights of the individual user when they are not required to connect to EC2 instance anymore for the purpose of application configuration.
  • D. Apply the latest patch of OS and always keep it updated.
Discover Answer Hide Answer

B
Since AWS is a public cloud any application hosted on EC2 is prone to hacker attacks. It becomes extremely important for a user to setup a proper security mechanism on the EC2 instances. A few of the security measures are listed below:
✑ Always keep the OS updated with the latest patch
✑ Always create separate users with in OS if they need to connect with the EC2 instances, create their keys and disable their password
✑ Create a procedure using which the admin can revoke the access of the user when the business work on the EC2 instance is completed. . Lock down unnecessary ports
✑ Audit any proprietary applications that the user may be running on the EC2 instance. Provide temporary escalated privileges, such as sudo for users who need to perform occasional privileged tasks
IAM is useful when users are required to work with AWS resources and actions, such as launching an instance. It is not useful in this case because it does not manage who can connect via RDP or SSH with an instance.
Reference:
http://aws.amazon.com/articles/1233/

Question#273

A user has configured two security groups which allow traffic as given below: 1: SecGrp1:
Inbound on port 80 for 0.0.0.0/0 Inbound on port 22 for 0.0.0.0/0 2: SecGrp2:
Inbound on port 22 for 10.10.10.1/32
If both the security groups are associated with the same instance, which of the below mentioned statements is true?

  • A. It is not possible to have more than one security group assigned to a single instance
  • B. It is not possible to create the security group with conflicting rules. AWS will reject the request
  • C. It allows inbound traffic for everyone on both ports 22 and 80
  • D. It allows inbound traffic on port 22 for IP 10.10.10.1 and for everyone else on port 80
Discover Answer Hide Answer

C
A user can attach more than one security group to a single EC2 instance. In this case, the rules from each security group are effectively aggregated to create one set of rules. AWS uses this set of rules to determine whether to allow access or not. Thus, here the rule for port 22 with IP 10.10.10.1/32 will merge with IP
0.0.0.0/0 and open ports 22 and 80 for all.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html

Question#274

You have a website which requires international presence and consequently you have set it up as follows.
It is hosted on 30 EC2 instances.
It is on in 15 regions around the globe. Each region has 2 instances.
All the instances are a public hosted zone.
Which of the following is the best way to configure your site to maintain availability with minimum downtime if one of the 15 regions was to lose network connectivity for an extended period? (Choose two.)

  • A. Create a Route 53 Latency Based Routing Record set that resolves to an Elastic Load Balancer in each region and has the Evaluate Target Health flag set to true.
  • B. Create a Route 53 failover routing policy and configure an active-passive failover.
  • C. Create a Route 53 Failover Routing Policy and assign each resource record set a unique identifier and a relative weight.
  • D. Create a Route 53 Geolocation Routing Policy that resolves to an Elastic Load Balancer in each region and has the Evaluate Target Health flag set to false.
Discover Answer Hide Answer

AB
It is best to use the latency routing policy when you have resources in multiple Amazon EC2 data centers that perform the same function and you want Amazon
Route 53 to respond to DNS queries with the resources that provide the best latency. You could also use the failover routing policy (for public hosted zones only) when you want to configure an active-passive failover, in which one resource takes all traffic when it's available and the other resource takes all traffic when the first resource isn't available.
Reference:
http://docs.aws.amazon.com/Route53/latest/DeveloperGuide/routing-policy.html#routing-policy-latency

Question#275

A user is accessing an EC2 instance on the SSH port for IP 10.20.30.40/32.
Which one is a secure way to configure that the instance can be accessed only from this IP?

  • A. In the security group, open port 22 for IP 10.20.30.40
  • B. In the security group, open port 22 for IP 10.20.30.0
  • C. In the security group, open port 22 for IP 10.20.30.40/32
  • D. In the security group, open port 22 for IP 10.20.30.40/0
Discover Answer Hide Answer

C
In AWS EC2, while configuring a security group, the user needs to specify the IP address in CIDR notation. The CIDR IP range 10.20.30.40/32 says it is for a single IP 10.20.30.40. If the user specifies the IP as 10.20.30.40 only, the security group will not accept and ask for it in a CIDR format.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html

Question#276

While assigning a tag to an instance, which of the below mentioned options is not a valid tag key/value pair?

  • A. Key : "aws" Value:"aws"
  • B. Key: "aws:name" Value: "instanceAnswer: Aws"
  • C. Key: "Name :aws" Value: "instanceAnswer: Aws"
  • D. Key : "nameAnswer: Aws" Value:"aws:instance"
Discover Answer Hide Answer

B
In Amazon Web Services, to help manage EC2 instances as well their usage in a better way, the user can tag the instances. The tags are metadata assigned by the user which consists of a key and value. The tag key cannot have a prefix as "aws:", although it can have only "aws".
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Tags.html

Question#277

Will you be able to access EC2 snapshots using the regular Amazon S3 APIs?

  • A. Yes, you will be able to access using S3 APIs if you have chosen the snapshot to be stored in S3.
  • B. No, snapshots are only available through the Amazon EBS APIs.
  • C. Yes, you will be able to access them using S3 APIs as all snapshots are stored in S3.
  • D. No, snapshots are only available through the Amazon EC2 APIs.
Discover Answer Hide Answer

D
No, snapshots are only available through the Amazon EC2 APIs.
Reference:
https://aws.amazon.com/ec2/faqs/

Question#278

A user has created an AWS AMI. The user wants the AMI to be available only to his friend and not anyone else. How can the user manage this?

  • A. Share the AMI with the community and setup the approval workflow before anyone launches it.
  • B. It is not possible to share the AMI with the selected user.
  • C. Share the AMI with a friend's AWS account ID.
  • D. Share the AMI with a friend's AWS login ID.
Discover Answer Hide Answer

C
In Amazon Web Services, if a user has created an AMI and wants to share with his friends and colleagues he can share the AMI with their AWS account ID. Once the AMI is shared the other user can access it from the community AMIs under private AMIs options.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/sharingamis-explicit.html

Question#279

A user is planning to launch multiple EC2 instance same as current running instance.
Which of the below mentioned parameters is not copied by Amazon EC2 in the launch wizard when the user has selected the option "Launch more like this"?

  • A. Termination protection
  • B. Tenancy setting
  • C. Storage
  • D. Shutdown behavior
Discover Answer Hide Answer

C
The Amazon EC2 console provides a "Launch more like this" wizard option that enables the user to use a current instance as a template for launching other instances. This option automatically populates the Amazon EC2 launch wizard with certain configuration details from the selected instance.
The following configuration details are copied from the selected instance into the launch wizard: AMI ID

Instance type -
Availability Zone, or the VPC and subnet in which the selected instance is located Public IPv4 address. If the selected instance currently has a public IPv4 address, the new instance receives a public IPv4 address - regardless of the selected instance's default public IPv4 address setting.
For more information about public IPv4 addresses, see Public IPv4 Addresses and External DNS Hostnames.

Placement group, if applicable -
IAM role associated with the instance, if applicable Shutdown behavior setting (stop or terminate) Termination protection setting (true or false)
CloudWatch monitoring (enabled or disabled) Amazon EBS-optimization setting (true or false)
Tenancy setting, if launching into a VPC (shared or dedicated) Kernel ID and RAM disk ID, if applicable

User data, if specified -
Tags associated with the instance, if applicable Security groups associated with the instance
The following configuration details are not copied from your selected instance; instead, the wizard applies their default settings or behavior:
(VPC only) Number of network interfaces: The default is one network interface, which is the primary network interface (eth0).
Storage: The default storage configuration is determined by the AMI and the instance type.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/launching-instance.html

Question#280

A user has launched an EBS optimized instance with EC2. Which of the below mentioned options is the correct statement?

  • A. It provides additional dedicated capacity for EBS IO
  • B. The attached EBS will have greater storage capacity
  • C. The user will have a PIOPS based EBS volume
  • D. It will be launched on dedicated hardware in VPC
Discover Answer Hide Answer

A
An Amazon EBS-optimized instance uses an optimized configuration stack and provides additional, dedicated capacity for the Amazon EBS I/O. This optimization provides the best performance for the user's Amazon EBS volumes by minimizing contention between the Amazon EBS I/O and other traffic from the user's instance.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSOptimized.html

chevron rightPrevious Nextchevron right