Exams > Amazon > AWS-SysOps: AWS Certified SysOps Administrator
AWS-SysOps: AWS Certified SysOps Administrator
Page 5 out of 91 pages Questions 41-50 out of 910 questions
Question#41

A user is running one instance for only 3 hours every day. The user wants to save some cost with the instance. Which of the below mentioned Reserved Instance categories is advised in this case?

  • A. The user should not use RI; instead only go with the on-demand pricing
  • B. The user should use the AWS high utilized RI
  • C. The user should use the AWS medium utilized RI
  • D. The user should use the AWS low utilized RI
Discover Answer Hide Answer

A
The AWS Reserved Instance provides the user with an option to save some money by paying a one-time fixed amount and then save on the hourly rate. It is advisable that if the user is having 30% or more usage of an instance per day, he should go for a RI. If the user is going to use an EC2 instance for more than
2200-2500 hours per year, RI will help the user save some cost. Here, the instance is not going to run for less than 1500 hours. Thus, it is advisable that the user should use the on-demand pricing.

Question#42

A user has setup an RDS DB with Oracle. The user wants to get notifications when someone modifies the security group of that DB. How can the user configure that?

  • A. It is not possible to get the notifications on a change in the security group
  • B. Configure SNS to monitor security group changes
  • C. Configure event notification on the DB security group
  • D. Configure the CloudWatch alarm on the DB for a change in the security group
Discover Answer Hide Answer

C
Amazon RDS uses the Amazon Simple Notification Service to provide a notification when an Amazon RDS event occurs. These events can be configured for source categories, such as DB instance, DB security group, DB snapshot and DB parameter group. If the user is subscribed to a Configuration Change category for a DB security group, he will be notified when the DB security group is changed.

Question#43

A user is trying to setup a recurring Auto Scaling process. The user has setup one process to scale up every day at 8 am and scale down at 7 PM. The user is trying to setup another recurring process which scales up on the 1st of every month at 8 AM and scales down the same day at 7 PM. What will Auto Scaling do in this scenario?

  • A. Auto Scaling will execute both processes but will add just one instance on the 1st
  • B. Auto Scaling will add two instances on the 1st of the month
  • C. Auto Scaling will schedule both the processes but execute only one process randomly
  • D. Auto Scaling will throw an error since there is a conflict in the schedule of two separate Auto Scaling Processes
Discover Answer Hide Answer

D
Auto Scaling based on a schedule allows the user to scale the application in response to predictable load changes. The user can also configure the recurring schedule action which will follow the Linux cron format. As per Auto Scaling, a scheduled action must have a unique time value. If the user attempts to schedule an activity at a time when another existing activity is already scheduled, the call will be rejected with an error message noting the conflict.

Question#44

A user is planning to setup infrastructure on AWS for the Christmas sales. The user is planning to use Auto Scaling based on the schedule for proactive scaling.
What advice would you give to the user?

  • A. It is good to schedule now because if the user forgets later on it will not scale up
  • B. The scaling should be setup only one week before Christmas
  • C. Wait till end of November before scheduling the activity
  • D. It is not advisable to use scheduled based scaling
Discover Answer Hide Answer

C
Auto Scaling based on a schedule allows the user to scale the application in response to predictable load changes. The user can specify any date in the future to scale up or down during that period. As per Auto Scaling the user can schedule an action for up to a month in the future. Thus, it is recommended to wait until end of November before scheduling for Christmas.

Question#45

A user is trying to understand the ACL and policy for an S3 bucket. Which of the below mentioned policy permissions is equivalent to the WRITE ACL on a bucket?

  • A. s3:GetObjectAcl
  • B. s3:GetObjectVersion
  • C. s3:ListBucketVersions
  • D. s3:DeleteObject
Discover Answer Hide Answer

D
Amazon S3 provides a set of operations to work with the Amazon S3 resources. Each AWS S3 bucket can have an ACL (Access Control List. or bucket policy associated with it. The WRITE ACL list allows the other AWS accounts to write/modify to that bucket. The equivalent S3 bucket policy permission for it is s3:DeleteObject.

Question#46

A user has created an ELB with Auto Scaling. Which of the below mentioned offerings from ELB helps the user to stop sending new requests traffic from the load balancer to the EC2 instance when the instance is being deregistered while continuing in-flight requests?

  • A. ELB sticky session
  • B. ELB deregistration check
  • C. ELB connection draining
  • D. ELB auto registration Off
Discover Answer Hide Answer

C
The Elastic Load Balancer connection draining feature causes the load balancer to stop sending new requests to the back-end instances when the instances are deregistering or become unhealthy, while ensuring that inflight requests continue to be served.

Question#47

A user has launched an EC2 instance from an instance store backed AMI. The infrastructure team wants to create an AMI from the running instance. Which of the below mentioned steps will not be performed while creating the AMI?

  • A. Define the AMI launch permissions
  • B. Upload the bundled volume
  • C. Register the AMI
  • D. Bundle the volume
Discover Answer Hide Answer

A
When the user has launched an EC2 instance from an instance store backed AMI, it will need to follow certain steps, such as ג€Bundling the root volumeג€,
ג€Uploading the bundled volumeג€ and ג€Register the AMIג€. Once the AMI is created the user can setup the launch permission. However, it is not required to setup during the launch.

Question#48

You are managing the AWS account of a big organization. The organization has more than 1000+ employees and they want to provide access to the various services to most of the employees. Which of the below mentioned options is the best possible solution in this case?

  • A. The user should create a separate IAM user for each employee and provide access to them as per the policy
  • B. The user should create an IAM role and attach STS with the role. The user should attach that role to the EC2 instance and setup AWS authentication on that server
  • C. The user should create IAM groups as per the organization's departments and add each user to the group for better access control
  • D. Attach an IAM role with the organization's authentication service to authorize each user for various AWS services
Discover Answer Hide Answer

D
AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. The user is managing an AWS account for an organization that already has an identity system, such as the login system for the corporate network (SSO). In this case, instead of creating individual IAM users or groups for each user who need AWS access, it may be more practical to use a proxy server to translate the user identities from the organization network into the temporary AWS security credentials. This proxy server will attach an IAM role to the user after authentication.

Question#49

A user has configured a VPC with a new subnet. The user has created a security group. The user wants to configure that instances of the same subnet communicate with each other. How can the user configure this with the security group?

  • A. There is no need for a security group modification as all the instances can communicate with each other inside the same subnet
  • B. Configure the subnet as the source in the security group and allow traffic on all the protocols and ports
  • C. Configure the security group itself as the source and allow traffic on all the protocols and ports
  • D. The user has to use VPC peering to configure this
Discover Answer Hide Answer

C
A Virtual Private Cloud (VPC. is a virtual network dedicated to the user's AWS account. AWS provides two features that the user can use to increase security in
VPC: security groups and network ACLs. Security groups work at the instance level. If the user is using the default security group, it will have a rule which allows the instances to communicate with other. For a new security group, the user has to specify the rule, add it to define the source as the security group itself, and select all the protocols and ports for that source.

Question#50

A user is launching an instance. He is on the `Tag the instance` screen. Which of the below mentioned information will not help the user understand the functionality of an AWS tag?

  • A. Each tag will have a key and value
  • B. The user can apply tags to the S3 bucket
  • C. The maximum value of the tag key length is 64 unicode characters
  • D. AWS tags are used to find the cost distribution of various resources
Discover Answer Hide Answer

C
AWS provides cost allocation tags to categorize and track the AWS costs. When the user applies tags to his AWS resources, AWS generates a cost allocation report as a comma-separated value (CSV file. with the usage and costs aggregated by those tags. Each tag will have a key-value and can be applied to services, such as EC2, S3, RDS, EMR, etc. The maximum size of a tag key is 128 unicode characters.

chevron rightPrevious Nextchevron right