Exams > Amazon > AWS-SysOps: AWS Certified SysOps Administrator
AWS-SysOps: AWS Certified SysOps Administrator
Page 12 out of 91 pages Questions 111-120 out of 910 questions
Question#111

A user has created a VPC with a subnet and a security group. The user has launched an instance in that subnet and attached a public IP. The user is still unable to connect to the instance. The Internet gateway has also been created. What can be the reason for the error?

  • A. The internet gateway is not configured with the route table
  • B. The private IP is not present
  • C. The outbound traffic on the security group is disabled
  • D. The internet gateway is not configured with the security group
Discover Answer Hide Answer

A
A Virtual Private Cloud (VPC) is a virtual network dedicated to the user's AWS account. AWS provides two features the user can use to increase security in VPC: security groups and network ACLs. Security groups work at the instance level. When a user launches an instance and wants to connect to an instance, he needs an internet gateway. The Internet gateway should be configured with the route table to allow traffic from the Internet.

Question#112

A user is trying to setup a security policy for ELB. The user wants ELB to meet the cipher supported by the client by configuring the server order preference in ELB security policy. Which of the below mentioned preconfigured policies supports this feature?

  • A. ELBSecurity Policy-2014-01
  • B. ELBSecurity Policy-2011-08
  • C. ELBDefault Negotiation Policy
  • D. ELBSample- OpenSSLDefault Cipher Policy
Discover Answer Hide Answer

A
Elastic Load Balancing uses a Secure Socket Layer (SSL) negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. If the load balancer is configured to support the Server Order Preference, then the load balancer gets to select the first cipher in its list that matches any one of the ciphers in the client's list. When the user verifies the preconfigured policies supported by ELB, the policy
ג€ELBSecurity Policy-2014-01ג€ supports server order preference.

Question#113

A user has configured ELB with Auto Scaling. The user suspended the Auto Scaling AlarmNotification which notifies Auto Scaling for CloudWatch alarms. process for a while. What will Auto Scaling do during this period?

  • A. AWS will not receive the alarms from CloudWatch
  • B. AWS will receive the alarms but will not execute the Auto Scaling policy
  • C. Auto Scaling will execute the policy but it will not launch the instances until the process is resumed
  • D. It is not possible to suspend the AlarmNotification process
Discover Answer Hide Answer

B
Auto Scaling performs various processes, such as Launch, Terminate Alarm Notification etc. The user can also suspend individual process. The AlarmNotification process type accepts notifications from the Amazon CloudWatch alarms that are associated with the Auto Scaling group. If the user suspends this process type,
Auto Scaling will not automatically execute the scaling policies that would be triggered by the alarms.

Question#114

George has launched three EC2 instances inside the US-East-1a zone with his AWS account. Ray has launched two EC2 instances in the US-East-1a zone with his AWS account. Which of the below mentioned statements will help George and Ray understand the availability zone (AZ) concept better?

  • A. The instances of George and Ray will be running in the same data center
  • B. All the instances of George and Ray can communicate over a private IP with a minimal cost
  • C. All the instances of George and Ray can communicate over a private IP without any cost
  • D. The US-East-1a region of George and Ray can be different availability zones
Discover Answer Hide Answer

D
Each AWS region has multiple, isolated locations known as Availability Zones. To ensure that the AWS resources are distributed across the Availability Zones for a region, AWS independently maps the Availability Zones to identifiers for each account. In this case the Availability Zone US-East-1a where George's EC2 instances are running might not be the same location as the US-East-1a zone of Ray's EC2 instances. There is no way for the user to coordinate the Availability
Zones between accounts.

Question#115

A user had aggregated the CloudWatch metric data on the AMI ID. The user observed some abnormal behavior of the CPU utilization metric while viewing the last
2 weeks of data. The user wants to share that data with his manager. How can the user achieve this easily with the AWS console?

  • A. The user can use the copy URL functionality of CloudWatch to share the exact details
  • B. The user can use the export data option from the CloudWatch console to export the current data point
  • C. The user has to find the period and data and provide all the aggregation information to the manager
  • D. The user can use the CloudWatch data copy functionality to copy the current data points
Discover Answer Hide Answer

A
Amazon CloudWatch provides the functionality to graph the metric data generated either by the AWS services or the custom metric to make it easier for the user to analyze. The console provides the option to save the URL or bookmark it so that it can be used in the future by typing the same URL. The Copy URL functionality is available under the console when the user selects any metric to view.

Question#116

A user has setup a CloudWatch alarm on the EC2 instance for CPU utilization. The user has setup to receive a notification on email when the CPU utilization is higher than 60%. The user is running a virus scan on the same instance at a particular time. The user wants to avoid receiving an email at this time. What should the user do?

  • A. Remove the alarm
  • B. Disable the alarm for a while using CLI
  • C. Modify the CPU utilization by removing the email alert
  • D. Disable the alarm for a while using the console
Discover Answer Hide Answer

B
Amazon CloudWatch alarm watches a single metric over a time period that the user specifies and performs one or more actions based on the value of the metric relative to a given threshold over a number of time periods. When the user has setup an alarm and it is known that for some unavoidable event the status may change to Alarm, the user can disable the alarm using the DisableAlarmActions API or from the command line mon-disable-alarm-actions.

Question#117

A user has configured ELB with SSL using a security policy for secure negotiation between the client and load balancer. Which of the below mentioned SSL protocols is not supported by the security policy?

  • A. TLS 1.3
  • B. TLS 1.2
  • C. SSL 2.0
  • D. SSL 3.0
Discover Answer Hide Answer

A
Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. Elastic Load Balancing supports the following versions of the SSL protocol:

TLS 1.2 -

TLS 1.1 -

TLS 1.0 -

SSL 3.0 -
SSL 2.0

Question#118

A user has created a VPC with the public and private subnets using the VPC wizard. The VPC has CIDR 20.0.0.0/16. The public subnet uses CIDR 20.0.1.0/24.
The user is planning to host a web server in the public subnet (port 80. and a DB server in the private subnet (port 3306). The user is configuring a security group for the public subnet (WebSecGrp. and the private subnet (DBSecGrp). Which of the below mentioned entries is required in the private subnet database security group (DBSecGrp)?

  • A. Allow Inbound on port 3306 for Source Web Server Security Group (WebSecGrp)
  • B. Allow Inbound on port 3306 from source 20.0.0.0/16
  • C. Allow Outbound on port 3306 for Destination Web Server Security Group (WebSecGrp)
  • D. Allow Outbound on port 80 for Destination NAT Instance IP
Discover Answer Hide Answer

A
A user can create a subnet with VPC and launch instances inside that subnet. If the user has created a public private subnet to host the web server and DB server respectively, the user should configure that the instances in the private subnet can receive inbound traffic from the public subnet on the DB port. Thus, configure port 3306 in Inbound with the source as the Web Server Security Group (WebSecGrp). The user should configure ports 80 and 443 for Destination 0.0.0.0/0 as the route table directs traffic to the NAT instance from the private subnet.

Question#119

A user has created a VPC with CIDR 20.0.0.0/16 using the wizard. The user has created public and VPN only subnets along with hardware VPN access to connect to the user's data center. The user has not yet launched any instance as well as modified or deleted any setup. He wants to delete this VPC from the console. Will the console allow the user to delete the VPC?

  • A. Yes, the console will delete all the setups and also delete the virtual private gateway
  • B. No, the console will ask the user to manually detach the virtual private gateway first and then allow deleting the VPC
  • C. Yes, the console will delete all the setups and detach the virtual private gateway
  • D. No, since the NAT instance is running
Discover Answer Hide Answer

C
The user can create subnets as per the requirement within a VPC. If the user wants to connect VPC from his own data center, he can setup a public and VPN only subnet which uses hardware VPN access to connect with his data center. When the user has configured this setup with Wizard, it will create a virtual private gateway to route all traffic of the VPN subnet. If the virtual private gateway is attached with VPC and the user deletes the VPC from the console it will first detach the gateway automatically and only then delete the VPC.

Question#120

A user is trying to create a PIOPS EBS volume with 4000 IOPS and 100 GB size. AWS does not allow the user to create this volume. What is the possible root cause for this?

  • A. The ratio between IOPS and the EBS volume is higher than 30
  • B. The maximum IOPS supported by EBS is 3000
  • C. The ratio between IOPS and the EBS volume is lower than 50
  • D. PIOPS is supported for EBS higher than 500 GB size
Discover Answer Hide Answer

A
A provisioned IOPS EBS volume can range in size from 10 GB to 1 TB and the user can provision up to 4000 IOPS per volume. The ratio of IOPS provisioned to the volume size requested should be a maximum of 30; for example, a volume with 3000 IOPS must be at least 100 GB.

chevron rightPrevious Nextchevron right