Exams > Amazon > AWS-SysOps: AWS Certified SysOps Administrator
AWS-SysOps: AWS Certified SysOps Administrator
Page 19 out of 91 pages Questions 181-190 out of 910 questions
Question#181

A user wants to upload a complete folder to AWS S3 using the S3 Management console. How can the user perform this activity?

  • A. Just drag and drop the folder using the flash tool provided by S3
  • B. Use the Enable Enhanced Folder option from the S3 console while uploading objects
  • C. The user cannot upload the whole folder in one go with the S3 management console
  • D. Use the Enable Enhanced Uploader option from the S3 console while uploading objects
Discover Answer Hide Answer

D
AWS S3 provides a console to upload objects to a bucket. The user can use the file upload screen to upload the whole folder in one go by clicking on the Enable
Enhanced Uploader option. When the user uploads a folder, Amazon S3 uploads all the files and subfolders from the specified folder to the user's bucket. It then assigns a key value that is a combination of the uploaded file name and the folder name.

Question#182

Which of the below mentioned AWS RDS logs cannot be viewed from the console for MySQL?

  • A. Error Log
  • B. Slow Query Log
  • C. Transaction Log
  • D. General Log
Discover Answer Hide Answer

C
The user can view, download, and watch the database logs using the Amazon RDS console, the Command Line Interface (CLI., or the Amazon RDS API. For the
MySQL RDS, the user can view the error log, slow query log, and general logs. RDS does not support viewing the transaction logs.

Question#183

A user has launched an EBS backed EC2 instance in the US-East-1a region. The user stopped the instance and started it back after 20 days. AWS throws up an
`˜InsufficientInstanceCapacity' error. What can be the possible reason for this?

  • A. AWS does not have sufficient capacity in that availability zone
  • B. AWS zone mapping is changed for that user account
  • C. There is some issue with the host capacity on which the instance is launched
  • D. The user account has reached the maximum EC2 instance limit
Discover Answer Hide Answer

A
When the user gets an 'InsufficientInstanceCapacity' error while launching or starting an EC2 instance, it means that AWS does not currently have enough available capacity to service the user request. If the user is requesting a large number of instances, there might not be enough server capacity to host them. The user can either try again later, by specifying a smaller number of instances or changing the availability zone if launching a fresh instance.

Question#184

A user has created a VPC with public and private subnets using the VPC wizard. Which of the below mentioned statements is true in this scenario?

  • A. The AWS VPC will automatically create a NAT instance with the micro size
  • B. VPC bounds the main route table with a private subnet and a custom route table with a public subnet
  • C. The user has to manually create a NAT instance
  • D. VPC bounds the main route table with a public subnet and a custom route table with a private subnet
Discover Answer Hide Answer

B
A Virtual Private Cloud (VPC) is a virtual network dedicated to the user's AWS account. A user can create a subnet with VPC and launch instances inside that subnet. If the user has created a public private subnet, the instances in the public subnet can receive inbound traffic directly from the internet, whereas the instances in the private subnet cannot. If these subnets are created with Wizard, AWS will create a NAT instance of a smaller or higher size, respectively. The
VPC has an implied router and the VPC wizard updates the main route table used with the private subnet, creates a custom route table and associates it with the public subnet.

Question#185

The CFO of a company wants to allow one of his employees to view only the AWS usage report page. Which of the below mentioned IAM policy statements allows the user to have access to the AWS usage report page?

  • A. "Effect": "Allow", "Action": [ג€Describeג€], "Resource": "Billing"
  • B. "Effect": "Allow", "Action": ["AccountUsage], "Resource": "*"
  • C. "Effect": "Allow", "Action": ["aws-portal:ViewUsage"], "Resource": "*"
  • D. "Effect": "Allow", "Action": ["aws-portal: ViewBilling"], "Resource": "*"
Discover Answer Hide Answer

C
AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. If the CFO wants to allow only AWS usage report page access, the policy for that IAM user will be as given below:

Question#186

An organization has created 10 IAM users. The organization wants each of the IAM users to have access to a separate DynamoDB table. All the users are added to the same group and the organization wants to setup a group level policy for this. How can the organization achieve this?

  • A. Define the group policy and add a condition which allows the access based on the IAM name
  • B. Create a DynamoDB table with the same name as the IAM user name and define the policy rule which grants access based on the DynamoDB ARN using a variable
  • C. Create a separate DynamoDB database for each user and configure a policy in the group based on the DB variable
  • D. It is not possible to have a group level policy which allows different IAM users to different DynamoDB Tables
Discover Answer Hide Answer

B
AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. AWS
DynamoDB has only tables and the organization cannot make separate databases. The organization should create a table with the same name as the IAM user name and use the ARN of DynamoDB as part of the group policy. The sample policy is shown below:

Question#187

A user has configured an HTTPS listener on an ELB. The user has not configured any security policy which can help to negotiate SSL between the client and ELB.
What will ELB do in this scenario?

  • A. By default, ELB will select the first version of the security policy
  • B. By default, ELB will select the latest version of the policy
  • C. ELB creation will fail without a security policy
  • D. It is not required to have a security policy since SSL is already installed
Discover Answer Hide Answer

B
Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. If the user has created an HTTPS/SSL listener without associating any security policy, Elastic Load Balancing will, by default, associate the latest version of the ELBSecurityPolicy-YYYY-MM with the load balancer.

Question#188

A user is creating a Cloudformation stack. Which of the below mentioned limitations does not hold true for Cloudformation?

  • A. One account by default is limited to 100 templates
  • B. The user can use 60 parameters and 60 outputs in a single template
  • C. The template, parameter, output, and resource description fields are limited to 4096 characters
  • D. One account by default is limited to 20 stacks
Discover Answer Hide Answer

A
AWS Cloudformation is an application management tool which provides application modelling, deployment, configuration, management and related activities. The limitations given below apply to the Cloudformation template and stack. There are no limits to the number of templates but each AWS CloudFormation account is limited to a maximum of 20 stacks by default. The Template, Parameter, Output, and Resource description fields are limited to 4096 characters. The user can include up to 60 parameters and 60 outputs in a template.

Question#189

A user has two EC2 instances running in two separate regions. The user is running an internal memory management tool, which captures the data and sends it to
CloudWatch in US East, using a CLI with the same namespace and metric. Which of the below mentioned options is true with respect to the above statement?

  • A. The setup will not work as CloudWatch cannot receive data across regions
  • B. CloudWatch will receive and aggregate the data based on the namespace and metric
  • C. CloudWatch will give an error since the data will conflict due to two sources
  • D. CloudWatch will take the data of the server, which sends the data first
Discover Answer Hide Answer

B
Amazon CloudWatch does not differentiate the source of a metric when receiving custom data. If the user is publishing a metric with the same namespace and dimensions from different sources, CloudWatch will treat them as a single metric. If the data is coming with the same timezone within a minute, CloudWatch will aggregate the data. It treats these as a single metric, allowing the user to get the statistics, such as minimum, maximum, average, and the sum of all across all servers.

Question#190

An organization has created a Queue named `modularqueue` with SQS. The organization is not performing any operations such as SendMessage,
ReceiveMessage, DeleteMessage, GetQueueAttributes, SetQueueAttributes, AddPermission, and RemovePermission on the queue. What can happen in this scenario?

  • A. AWS SQS sends notification after 15 days for inactivity on queue
  • B. AWS SQS can delete queue after 30 days without notification
  • C. AWS SQS marks queue inactive after 30 days
  • D. AWS SQS notifies the user after 2 weeks and deletes the queue after 3 weeks.
Discover Answer Hide Answer

B
Amazon SQS can delete a queue without notification if one of the following actions hasn't been performed on it for 30 consecutive days: SendMessage,
ReceiveMessage, DeleteMessage, GetQueueAttributes, SetQueueAttributes, AddPermission, and RemovePermission.

chevron rightPrevious Nextchevron right