Exams > Amazon > AWS-SysOps: AWS Certified SysOps Administrator
AWS-SysOps: AWS Certified SysOps Administrator
Page 13 out of 91 pages Questions 121-130 out of 910 questions
Question#121

A user has setup a custom application which generates a number in decimals. The user wants to track that number and setup the alarm whenever the number is above a certain limit. The application is sending the data to CloudWatch at regular intervals for this purpose. Which of the below mentioned statements is not true with respect to the above scenario?

  • A. The user can get the aggregate data of the numbers generated over a minute and send it to CloudWatch
  • B. The user has to supply the time zone with each data point
  • C. CloudWatch will not truncate the number until it has an exponent larger than 126 (i.e. (1 x 10^126))
  • D. The user can create a file in the JSON format with the metric name and value and supply it to CloudWatch
Discover Answer Hide Answer

B

Question#122

A user has launched an EC2 Windows instance from an instance store backed AMI. The user has also set the Instance initiated shutdown behavior to stop. What will happen when the user shuts down the OS?

  • A. It will not allow the user to shutdown the OS when the shutdown behavior is set to Stop
  • B. It is not possible to set the termination behavior to Stop for an Instance store backed AMI instance
  • C. The instance will stay running but the OS will be shutdown
  • D. The instance will be terminated
Discover Answer Hide Answer

B
When the EC2 instance is launched from an instance store backed AMI, it will not allow the user to configure the shutdown behavior to ג€Stopג€. It gives a warning that the instance does not have the EBS root volume.

Question#123

A user has enabled versioning on an S3 bucket. The user is using server side encryption for data at Rest. If the user is supplying his own keys for encryption
(SSE-C., which of the below mentioned statements is true?

  • A. The user should use the same encryption key for all versions of the same object
  • B. It is possible to have different encryption keys for different versions of the same object
  • C. AWS S3 does not allow the user to upload his own keys for server side encryption
  • D. The SSE-C does not work when versioning is enabled
Discover Answer Hide Answer

B
AWS S3 supports client side or server side encryption to encrypt all data at rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key (SSE-C). If the bucket is versioning-enabled, each object version uploaded by the user using the SSE-C feature can have its own encryption key. The user is responsible for tracking which encryption key was used for which object's version

Question#124

A user has created a VPC with CIDR 20.0.0.0/16. The user has created one subnet with CIDR 20.0.0.0/16 in this VPC. The user is trying to create another subnet with the same VPC for CIDR 20.0.0.1/24. What will happen in this scenario?

  • A. The VPC will modify the first subnet CIDR automatically to allow the second subnet IP range
  • B. It is not possible to create a subnet with the same CIDR as VPC
  • C. The second subnet will be created
  • D. It will throw a CIDR overlaps error
Discover Answer Hide Answer

D
A Virtual Private Cloud (VPC) is a virtual network dedicated to the user's AWS account. A user can create a subnet with VPC and launch instances inside that subnet. The user can create a subnet with the same size of VPC. However, he cannot create any other subnet since the CIDR of the second subnet will conflict with the first subnet.

Question#125

A user has launched an RDS MySQL DB with the Multi AZ feature. The user has scheduled the scaling of instance storage during maintenance window. What is the correct order of events during maintenance window?
1. Perform maintenance on standby
2. Promote standby to primary
3. Perform maintenance on original primary
4. Promote original master back as primary

  • A. 1, 2, 3, 4
  • B. 1, 2, 3
  • C. 2, 3, 1, 4
Discover Answer Hide Answer

B
Running MySQL on the RDS DB instance as a Multi-AZ deployment can help the user reduce the impact of a maintenance event, as the Amazon will conduct maintenance by following the steps in the below mentioned order:

Perform maintenance on standby -

Promote standby to primary -
Perform maintenance on original primary, which becomes the new standby.

Question#126

A sys admin is using server side encryption with AWS S3. Which of the below mentioned statements helps the user understand the S3 encryption functionality?

  • A. The server side encryption with the user supplied key works when versioning is enabled
  • B. The user can use the AWS console, SDK and APIs to encrypt or decrypt the content for server side encryption with the user supplied key
  • C. The user must send an AES-128 encrypted key
  • D. The user can upload his own encryption key to the S3 console
Discover Answer Hide Answer

A
AWS S3 supports client side or server side encryption to encrypt all data at rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key. The encryption with the user supplied key (SSE-C. does not work with the AWS console. The S3 does not store the keys and the user has to send a key with each request. The SSE-C works when the user has enabled versioning.

Question#127

A root account owner is trying to understand the S3 bucket ACL. Which of the below mentioned options cannot be used to grant ACL on the object using the authorized predefined group?

  • A. Authenticated user group
  • B. All users group
  • C. Log Delivery Group
  • D. Canonical user group
Discover Answer Hide Answer

D
An S3 bucket ACL grantee can be an AWS account or one of the predefined Amazon S3 groups. Amazon S3 has a set of predefined groups. When granting account access to a group, the user can specify one of the URLs of that group instead of a canonical user ID. AWS S3 has the following predefined groups:
Authenticated Users group: It represents all AWS accounts. All Users group: Access permission to this group allows anyone to access the resource. Log Delivery group: WRITE permission on a bucket enables this group to write server access logs to the bucket.

Question#128

A user has created a VPC with CIDR 20.0.0.0/16 using the wizard. The user has created a public subnet CIDR (20.0.0.0/24) and VPN only subnets CIDR
(20.0.1.0/24) along with the VPN gateway (vgw-12345) to connect to the user's data center. The user's data center has CIDR 172.28.0.0/12. The user has also setup a NAT instance (i-123456) to allow traffic to the internet from the VPN subnet. Which of the below mentioned options is not a valid entry for the main route table in this scenario?

  • A. Destination: 20.0.1.0/24 and Target: i-12345
  • B. Destination: 0.0.0.0/0 and Target: i-12345
  • C. Destination: 172.28.0.0/12 and Target: vgw-12345
  • D. Destination: 20.0.0.0/16 and Target: local
Discover Answer Hide Answer

A
The user can create subnets as per the requirement within a VPC. If the user wants to connect VPC from his own data center, he can setup a public and VPN only subnet which uses hardware VPN access to connect with his data center. When the user has configured this setup with Wizard, it will create a virtual private gateway to route all traffic of the VPN subnet. If the user has setup a NAT instance to route all the Internet requests, then all requests to the internet should be routed to it. All requests to the organization's DC will be routed to the VPN gateway.
Here are the valid entries for the main route table in this scenario:
Destination: 0.0.0.0/0 & Target: i-12345 (To route all internet traffic to the NAT Instance.
Destination: 172.28.0.0/12 & Target: vgw-12345 (To route all the organization's data center traffic to the VPN gateway).
Destination: 20.0.0.0/16 & Target: local (To allow local routing in VPC).

Question#129

A user has created a VPC with public and private subnets using the VPC wizard. The VPC has CIDR 20.0.0.0/16. The private subnet uses CIDR 20.0.0.0/24 . The
NAT instance ID is i-a12345. Which of the below mentioned entries are required in the main route table attached with the private subnet to allow instances to connect with the internet?

  • A. Destination: 0.0.0.0/0 and Target: i-a12345
  • B. Destination: 20.0.0.0/0 and Target: 80
  • C. Destination: 20.0.0.0/0 and Target: i-a12345
  • D. Destination: 20.0.0.0/24 and Target: i-a12345
Discover Answer Hide Answer

A
A user can create a subnet with VPC and launch instances inside that subnet. If the user has created a public private subnet, the instances in the public subnet can receive inbound traffic directly from the Internet, whereas the instances in the private subnet cannot. If these subnets are created with Wizard, AWS will create two route tables and attach to the subnets. The main route table will have the entry ג€Destination: 0.0.0.0/0 and Target: ia12345ג€, which allows all the instances in the private subnet to connect to the internet using NAT.

Question#130

A root account owner has given full access of his S3 bucket to one of the IAM users using the bucket ACL. When the IAM user logs in to the S3 console, which actions can he perform?

  • A. He can just view the content of the bucket
  • B. He can do all the operations on the bucket
  • C. It is not possible to give access to an IAM user using ACL
  • D. The IAM user can perform all operations on the bucket using only API/SDK
Discover Answer Hide Answer

C
Each AWS S3 bucket and object has an ACL (Access Control List) associated with it. An ACL is a list of grants identifying the grantee and the permission granted.
The user can use ACLs to grant basic read/write permissions to other AWS accounts. ACLs use an Amazon S3ג€"specific XML schema. The user cannot grant permissions to other users (IAM users) in his account.

chevron rightPrevious Nextchevron right