Exams > Amazon > AWS Certified SysOps Administrator - Associate: AWS Certified SysOps Administrator - Associate (SOA-C02)
AWS Certified SysOps Administrator - Associate: AWS Certified SysOps Administrator - Associate (SOA-C02)
Page 2 out of 22 pages Questions 11-20 out of 214 questions
Question#11

A SysOps administrator is examining the following AWS CloudFormation template:

Why will the stack creation fail?

  • A. The Outputs section of the CloudFormation template was omitted.
  • B. The Parameters section of the CloudFormation template was omitted.
  • C. The PrivateDnsName cannot be set from a CloudFormation template.
  • D. The VPC was not specified in the CloudFormation template.
Discover Answer Hide Answer

C

Question#12

A new application runs on Amazon EC2 instances and accesses data in an Amazon RDS database instance. When fully deployed in production, the application fails. The database can be queried from a console on a bastion host. When looking at the web server logs, the following error is repeated multiple times:
*** Error Establishing a Database Connection
Which of the following may be causes of the connectivity problems? (Choose two.)

  • A. The security group for the database does not have the appropriate egress rule from the database to the web server.
  • B. The certificate used by the web server is not trusted by the RDS instance.
  • C. The security group for the database does not have the appropriate ingress rule from the web server to the database.
  • D. The port used by the application developer does not match the port specified in the RDS configuration.
  • E. The database is still being created and is not available for connectivity.
Discover Answer Hide Answer

CE

Question#13

A compliance team requires all administrator passwords for Amazon RDS DB instances to be changed at least annually.
Which solution meets this requirement in the MOST operationally efficient manner?

  • A. Store the database credentials in AWS Secrets Manager. Configure automatic rotation for the secret every 365 days.
  • B. Store the database credentials as a parameter in the RDS parameter group. Create a database trigger to rotate the password every 365 days.
  • C. Store the database credentials in a private Amazon S3 bucket. Schedule an AWS Lambda function to generate a new set of credentials every 365 days.
  • D. Store the database credentials in AWS Systems Manager Parameter Store as a secure string parameter. Configure automatic rotation for the parameter every 365 days.
Discover Answer Hide Answer

A

Question#14

A SysOps administrator is responsible for managing a fleet of Amazon EC2 instances. These EC2 instances upload build artifacts to a third-party service. The third-party service recently implemented a strict IP allow list that requires all build uploads to come from a single IP address.
What change should the systems administrator make to the existing build fleet to comply with this new requirement?

  • A. Move all of the EC2 instances behind a NAT gateway and provide the gateway IP address to the service.
  • B. Move all of the EC2 instances behind an internet gateway and provide the gateway IP address to the service.
  • C. Move all of the EC2 instances into a single Availability Zone and provide the Availability Zone IP address to the service.
  • D. Move all of the EC2 instances to a peered VPC and provide the VPC IP address to the service.
Discover Answer Hide Answer

A

Question#15

A company uses an Amazon CloudFront distribution to deliver its website. Traffic logs for the website must be centrally stored, and all data must be encrypted at rest.
Which solution will meet these requirements?

  • A. Create an Amazon OpenSearch Service (Amazon Elasticsearch Service) domain with internet access and server-side encryption that uses the default AWS managed customer master key (CMK). Configure CloudFront to use the Amazon OpenSearch Service (Amazon Elasticsearch Service) domain as a log destination.
  • B. Create an Amazon OpenSearch Service (Amazon Elasticsearch Service) domain with VPC access and server-side encryption that uses AES-256. Configure CloudFront to use the Amazon OpenSearch Service (Amazon Elasticsearch Service) domain as a log destination.
  • C. Create an Amazon S3 bucket that is configured with default server-side encryption that uses AES-256. Configure CloudFront to use the S3 bucket as a log destination.
  • D. Create an Amazon S3 bucket that is configured with no default encryption. Enable encryption in the CloudFront distribution, and use the S3 bucket as a log destination.
Discover Answer Hide Answer

C

Question#16

An organization created an Amazon Elastic File System (Amazon EFS) volume with a file system ID of fs-85ba41fc, and it is actively used by 10 Amazon EC2 hosts. The organization has become concerned that the file system is not encrypted.
How can this be resolved?

  • A. Enable encryption on each host's connection to the Amazon EFS volume. Each connection must be recreated for encryption to take effect.
  • B. Enable encryption on the existing EFS volume by using the AWS Command Line Interface.
  • C. Enable encryption on each host's local drive. Restart each host to encrypt the drive.
  • D. Enable encryption on a newly created volume and copy all data from the original volume. Reconnect each host to the new volume.
Discover Answer Hide Answer

D

Question#17

A company uses an AWS Service Catalog portfolio to create and manage resources. A SysOps administrator must create a replica of the company's existing AWS infrastructure in a new AWS account.
What is the MOST operationally efficient way to meet this requirement?

  • A. Create an AWS CloudFormation template to use the AWS Service Catalog portfolio in the new AWS account.
  • B. In the new AWS account, manually create an AWS Service Catalog portfolio that duplicates the original portfolio.
  • C. Run an AWS Lambda function to create a new AWS Service Catalog portfolio based on the output of the DescribePortfolio API operation.
  • D. Share the AWS Service Catalog portfolio with the new AWS account. Import the portfolio into the new AWS account.
Discover Answer Hide Answer

D

Question#18

A SysOps administrator must manage the security of an AWS account. Recently, an IAM user's access key was mistakenly uploaded to a public code repository.
The SysOps administrator must identify anything that was changed by using this access key.
How should the SysOps administrator meet these requirements?

  • A. Create an Amazon EventBridge (Amazon CloudWatch Events) rule to send all IAM events to an AWS Lambda function for analysis.
  • B. Query Amazon EC2 logs by using Amazon CloudWatch Logs Insights for all events initiated with the compromised access key within the suspected timeframe.
  • C. Search AWS CloudTrail event history for all events initiated with the compromised access key within the suspected timeframe.
  • D. Search VPC Flow Logs for all events initiated with the compromised access key within the suspected timeframe.
Discover Answer Hide Answer

C

Question#19

A company runs a retail website on multiple Amazon EC2 instances behind an Application Load Balancer (ALB). The company must secure traffic to the website over an HTTPS connection.
Which combination of actions should a SysOps administrator take to meet these requirements? (Choose two.)

  • A. Attach the certificate to each EC2 instance.
  • B. Attach the certificate to the ALB.
  • C. Create a private certificate in AWS Certificate Manager (ACM).
  • D. Create a public certificate in AWS Certificate Manager (ACM).
  • E. Export the certificate, and attach it to the website.
Discover Answer Hide Answer

BD

Question#20

SIMULATION -

Instructions -
If the copy-paste functionality is not working in your environment, refer to the instructions file on the VM desktop and use Ctrl+C, Ctrl+V or Command-C,
Command-V.
Configure Amazon EventBridge to meet the following requirements.
1. Use the us-east-2 Region for all resources.
2. Unless specified below, use the default configuration settings.
3. Use your own resource naming unless a resource name is specified below.
4. Ensure all Amazon EC2 events in the default event bus are replayable for the past 45 days.
5. Create a rule named RunFunction to send the exact message {"name":"example") every 15 minutes to an existing AWS Lambda function named LogEventFunction
6. Create a rule named SpotWarning to send a notification to a new standard Amazon SNS topic named TopicEvents whenever an Amazon EC2 Spot Instance is interrupted. Do NOT create any topic subscriptions. The notification must match the following structure:
Input path:
{`instance`:`detail.instance-id}
Input template:
`The EC2 Spot Instance <instance> has been interrupted.`
Important: Click the Next button to complete this lab and continue to the next lab. Once you click the Next button, you will NOT be able to return to this lab.

Discover Answer Hide Answer

See explanation below.






























chevron rightPrevious Nextchevron right