Exams > Amazon > AWS-SysOps: AWS Certified SysOps Administrator
AWS-SysOps: AWS Certified SysOps Administrator
Page 40 out of 91 pages Questions 391-400 out of 910 questions
Question#391

What is Amazon CloudFront?

  • A. A global Content Delivery Network
  • B. An encrypted endpoint to upload files to the Cloud
  • C. A web service to schedule regular data movement
  • D. A development front-end to Amazon Web Services
Discover Answer Hide Answer

A
Amazon CloudFront is a global content delivery network (CDN) service that accelerates delivery of your websites, APIs, video content or other web assets through
CDN caching. It integrates with other Amazon Web Services products to give developers and businesses an easy way to accelerate content to end users with no minimum usage commitments.
Reference:
https://aws.amazon.com/cloudfront/

Question#392

You can create a CloudWatch alarm that watches a single metric. The alarm performs one or more actions based on the value of the metric relative to a threshold over a number of time periods. Which of the following states is possible for the CloudWatch alarm?

  • A. OK
  • B. ALERT
  • C. THRESHOLD
  • D. ERROR
Discover Answer Hide Answer

A
You can create a CloudWatch alarm that watches a single metric. The alarm performs one or more actions based on the value of the metric relative to a threshold over a number of time periods. The action can be an Amazon EC2 action, an Auto Scaling action, or a notification sent to an Amazon SNS topic.
An alarm has three possible states:
OK--The metric is within the defined threshold
ALARM--The metric is outside of the defined threshold
INSUFFICIENT_DATA--The alarm has just started, the metric is not available, or not enough data is available for the metric to determine the alarm state
Reference:
http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/AlarmThatSendsEmail.html

Question#393

A user has enabled instance protection for his Auto Scaling group that has spot instances. If Auto Scaling wants to terminate an instance in this Auto Scaling group due to a CloudWatch trigger unre-lated to bid price, what will happen?

  • A. Auto Scaling will notify the user for the next action
  • B. Auto Scaling will remove the instance from the Auto Scaling Group
  • C. Auto Scaling overwrites the instance termination attribute and terminates the instances
  • D. The EC2 instance will not be terminated since instance protection from scale-in is enabled.
Discover Answer Hide Answer

D
Auto Scaling protects instances from termination during scale-in events. This means that Auto Scal-ing instance protection will receive the CloudWatch trigger to delete instances, and delete instances in the Auto Scaling group that do not have instance protection enabled. However, instance protec-tion won't protect Spot instance termination triggered due to market price exceeding bid price.
Reference:
http://docs.aws.amazon.com/autoscaling/latest/userguide/as-instance-termination.html#instance-protection

Question#394

In a hardware security module (HSM), what is the function of a Transparent Data Encryption (TDE)?

  • A. To reduce the risk of confidential data theft
  • B. To decrease latency
  • C. To store SSL certificates
  • D. To provide backup
Discover Answer Hide Answer

A
In a hardware security module (HSM), Transparent Data Encryption (TDE) reduces the risk of con-fidential data theft by encrypting sensitive data.
Reference:
http://docs.aws.amazon.com/cloudhsm/latest/userguide/cloud-hsm-third-party-apps.html

Question#395

In IAM, a policy has to include the information about who (user) is allowed to access the resource, known as the _____.

  • A. permission
  • B. role
  • C. license
  • D. principal
Discover Answer Hide Answer

D
To specify resource-based permissions, you can attach a policy to the resource, such as an Amazon SNS topic, an Amazon S3 bucket, or an Amazon Glacier vault. In that case, the policy has to in-clude information about who is allowed to access the resource, known as the principal. (For user-based policies, the principal is the IAM user that the policy is attached to, or the user who gets the policy from a group.)
Reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html

Question#396

Amazon S3 provides a number of security features for protection of data at rest, which you can use or not, depending on your threat profile. What feature of S3 allows you to create and manage your own encryption keys for sending data?

  • A. Client-side Encryption
  • B. Network traffic protection
  • C. Data integrity compromise
  • D. Server-side Encryption
Discover Answer Hide Answer

A
With client-side encryption you create and manage your own encryption keys. Keys you create are not exported to AWS in clear text. Your applications encrypt data before submitting it to Amazon S3, and decrypt data after receiving it from Amazon S3. Data is stored in an encrypted form, with keys and algorithms only known to you. While you can use any encryption algorithm, and either symmetric or asymmetric keys to encrypt the data, the AWS-provided Java SDK offers
Amazon S3 client-side encryption features.
Reference:
https://d0.awsstatic.com/whitepapers/aws-security-best-practices.pdf

Question#397

In AWS KMS, which of the following is NOT a mode of server-side encryption that you can use to protect data at rest in Amazon S3?

  • A. SSE-S3
  • B. SSE-K
  • C. SSE-C
  • D. SSE-KMS
Discover Answer Hide Answer

B
You can protect data at rest in Amazon S3 by using three different modes of server-side encryption: SSE-S3, SSE-C, or SSE-KMS.
Reference:
http://docs.aws.amazon.com/kms/latest/developerguide/services-s3.html

Question#398

AWS Cloud Hardware Security Modules (HSMs) are designed to _____.

  • A. store your AWS keys safely
  • B. provide another level of login security specifically for LDAP
  • C. allow AWS to audit your infrastructure
  • D. securely store cryptographic key material and use the key material without exposing it outside the cryptographic boundary of the appliance
Discover Answer Hide Answer

D
A Hardware Security Module (HSM) is a hardware appliance that provides secure key storage and cryptographic operations within a tamper-resistant hardware device. They are designed to securely store cryptographic key material and also to be able to use this key material without exposing it out-side the cryptographic boundary of the appliance.
Reference:
https://aws.amazon.com/cloudhsm/faqs/

Question#399

Which of the following statements is true of IAM?

  • A. If you are configuring MFA for a user who will use a smartphone to generate an OTP, you must have the smartphone available in order to finish the wizard.
  • B. If you are configuring MFA for a user who will use a smartphone to generate an OTP, the smartphone is not required in order to finish the wizard.
  • C. If you are configuring MFA for a user who will use a smartphone to generate an OTP, you can finish the wizard on any device and later use the smartphone for authentication.
  • D. None of these are correct.
Discover Answer Hide Answer

A
MFA can be used either with a specific MFA-enabled device or by installing an application on a smartphone. If a user chooses to use her smartphone, physical access to the device is required in or-der to complete the configuration wizard.
Reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/GenerateMFAConfig.html

Question#400

Could you use IAM to grant access to Amazon DynamoDB resources and API actions?

  • A. In DynamoDB there is no need to grant access
  • B. Depended to the type of access
  • C. No
  • D. Yes
Discover Answer Hide Answer

D
Amazon DynamoDB integrates with AWS Identity and Access Management (IAM). You can use AWS IAM to grant access to Amazon DynamoDB resources and
API actions. To do this, you first write an AWS IAM policy, which is a document that explicitly lists the permissions you want to grant. You then attach that policy to an AWS IAM user or role.
Reference:
http://docs.aws.amazon.com/amazondynamodb/latest/developerguide/UsingIAMWithDDB.html

chevron rightPrevious Nextchevron right