Exams > Amazon > AWS Certified SysOps Administrator - Associate: AWS Certified SysOps Administrator - Associate (SOA-C02)
AWS Certified SysOps Administrator - Associate: AWS Certified SysOps Administrator - Associate (SOA-C02)
Page 6 out of 22 pages Questions 51-60 out of 214 questions
Question#51

An application team is working with a SysOps administrator to define Amazon CloudWatch alarms for an application. The application team does not know the application's expected usage or expected growth.
Which solution should the SysOps administrator recommend?

  • A. Create CloudWatch alarms that are based on anomaly detection.
  • B. Create CloudWatch alarms by using a set of composite alarms.
  • C. Create CloudWatch alarms by using static thresholds.
  • D. Create CloudWatch alarms that treat missing data as breaching.
Discover Answer Hide Answer

A

Question#52

A company runs a stateless application that is hosted on an Amazon EC2 instance. Users are reporting performance issues. A SysOps administrator reviews the
Amazon CloudWatch metrics for the application and notices that the instance's CPU utilization frequently reaches 90% during business hours.
What is the MOST operationally efficient solution that will improve the application's responsiveness?

  • A. Configure CloudWatch logging on the EC2 instance. Configure a CloudWatch alarm for CPU utilization to alert the SysOps administrator when CPU utilization goes above 90%.
  • B. Configure an AWS Client VPN connection to allow the application users to connect directly to the EC2 instance private IP address to reduce latency.
  • C. Create an Auto Scaling group, and assign it to an Application Load Balancer. Configure a target tracking scaling policy that is based on the average CPU utilization of the Auto Scaling group.
  • D. Create a CloudWatch alarm that activates when the EC2 instance's CPU utilization goes above 80%. Configure the alarm to invoke an AWS Lambda function that vertically scales the instance.
Discover Answer Hide Answer

C

Question#53

An ecommerce company uses an Amazon ElastiCache for Memcached cluster for in-memory caching of popular product queries on the shopping site. When viewing recent Amazon CloudWatch metrics data for the ElastiCache cluster, the SysOps administrator notices a large number of evictions.
Which of the following actions will reduce these evictions? (Choose two.)

  • A. Add an additional node to the ElastiCache cluster.
  • B. Increase the ElastiCache time to live (TTL).
  • C. Increase the individual node size inside the ElastiCache cluster.
  • D. Put an Elastic Load Balancer in front of the ElastiCache cluster.
  • E. Use Amazon Simple Queue Service (Amazon SQS) to decouple the ElastiCache cluster.
Discover Answer Hide Answer

BC

Question#54

A SysOps administrator wants to provide access to AWS services by attaching an IAM policy to multiple IAM users. The SysOps administrator also wants to be able to change the policy and create new versions.
Which combination of actions will meet these requirements? (Choose two.)

  • A. Add the users to an IAM service-linked role. Attach the policy to the role.
  • B. Add the users to an IAM user group. Attach the policy to the group.
  • C. Create an AWS managed policy.
  • D. Create a customer managed policy.
  • E. Create an inline policy.
Discover Answer Hide Answer

BD

Question#55

A company stores critical data in Amazon S3 buckets. A SysOps administrator must build a solution to record all S3 API activity.
Which action will meet this requirement?

  • A. Configure S3 bucket metrics to record object access logs.
  • B. Create an AWS CloudTrail trail to log data events for all S3 objects.
  • C. Enable S3 server access logging for each S3 bucket.
  • D. Use AWS IAM Access Analyzer for Amazon S3 to store object access logs.
Discover Answer Hide Answer

B

Question#56

A company must ensure that any objects uploaded to an S3 bucket are encrypted.
Which of the following actions will meet this requirement? (Choose two.)

  • A. Implement AWS Shield to protect against unencrypted objects stored in S3 buckets.
  • B. Implement Object access control list (ACL) to deny unencrypted objects from being uploaded to the S3 bucket.
  • C. Implement Amazon S3 default encryption to make sure that any object being uploaded is encrypted before it is stored.
  • D. Implement Amazon Inspector to inspect objects uploaded to the S3 bucket to make sure that they are encrypted.
  • E. Implement S3 bucket policies to deny unencrypted objects from being uploaded to the buckets.
Discover Answer Hide Answer

CE
Reference:
https://docs.aws.amazon.com/AmazonS3/latest/userguide/acl-overview.html#sample-acl

Question#57

A company has a stateful web application that is hosted on Amazon EC2 instances in an Auto Scaling group. The instances run behind an Application Load
Balancer (ALB) that has a single target group. The ALB is configured as the origin in an Amazon CloudFront distribution. Users are reporting random logouts from the web application.
Which combination of actions should a SysOps administrator take to resolve this problem? (Choose two.)

  • A. Change to the least outstanding requests algorithm on the ALB target group.
  • B. Configure cookie forwarding in the CloudFront distribution cache behavior.
  • C. Configure header forwarding in the CloudFront distribution cache behavior.
  • D. Enable group-level stickiness on the ALB listener rule.
  • E. Enable sticky sessions on the ALB target group.
Discover Answer Hide Answer

CE

Question#58

A company is running a serverless application on AWS Lambda. The application stores data in an Amazon RDS for MySQL DB instance. Usage has steadily increased, and recently there have been numerous "too many connections" errors when the Lambda function attempts to connect to the database. The company already has configured the database to use the maximum max_connections value that is possible.
What should a SysOps administrator do to resolve these errors?

  • A. Create a read replica of the database. Use Amazon Route 53 to create a weighted DNS record that contains both databases.
  • B. Use Amazon RDS Proxy to create a proxy. Update the connection string in the Lambda function.
  • C. Increase the value in the max_connect_errors parameter in the parameter group that the database uses.
  • D. Update the Lambda function's reserved concurrency to a higher value.
Discover Answer Hide Answer

B

Question#59

A SysOps administrator is deploying an application on 10 Amazon EC2 instances. The application must be highly available. The instances must be placed on distinct underlying hardware.
What should the SysOps administrator do to meet these requirements?

  • A. Launch the instances into a cluster placement group in a single AWS Region.
  • B. Launch the instances into a partition placement group in multiple AWS Regions.
  • C. Launch the instances into a spread placement group in multiple AWS Regions.
  • D. Launch the instances into a spread placement group in a single AWS Region.
Discover Answer Hide Answer

B

Question#60

A SysOps administrator is troubleshooting an AWS CloudFormation template whereby multiple Amazon EC2 instances are being created. The template is working in us-east-1, but it is failing in us-west-2 with the error code:
AMI [ami-12345678] does not exist
How should the Administrator ensure that the AWS CloudFormation template is working in every region?

  • A. Copy the source region's Amazon Machine Image (AMI) to the destination region and assign it the same ID.
  • B. Edit the AWS CloudFormation template to specify the region code as part of the fully qualified AMI ID.
  • C. Edit the AWS CloudFormation template to offer a drop-down list of all AMIs to the user by using the AWS::EC2::AMI::ImageID control.
  • D. Modify the AWS CloudFormation template by including the AMI IDs in the ג€Mappingsג€ section. Refer to the proper mapping within the template for the proper AMI ID.
Discover Answer Hide Answer

D

chevron rightPrevious Nextchevron right