Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Amazon Web Services SOA-C03 AWS Certified CloudOps Engineer - Associate Exam Practice Test

Page: 1 / 15
Total 151 questions

AWS Certified CloudOps Engineer - Associate Questions and Answers

Question 1

A SysOps administrator creates a custom Amazon Machine Image (AMI) in the eu-west-2 Region and uses the AMI to launch Amazon EC2 instances. The SysOps administrator needs to use the same AMI to launch EC2 instances in two other Regions: us-east-1 and us-east-2.

What must the SysOps administrator do to use the custom AMI in the additional Regions?

Options:

A.

Copy the AMI to the additional Regions

B.

Make the AMI public in the Community AMIs section of the AWS Management Console

C.

Share the AMI to the additional Regions. Assign the required access permissions.

D.

Copy the AMI to a new Amazon S3 bucket. Assign access permissions to the AMI for the additional Regions

Question 2

A company has created a new video-on-demand (VOD) application. The application runs on a fleet of Amazon EC2 instances behind an Application Load Balancer (ALB). The company configured an Amazon CloudFront distribution and set the ALB as the origin. Because of increasing application demand, the company wants to move all video files to a central Amazon S3 bucket.

A SysOps administrator needs to ensure that video files can be cached at edge locations after the company migrates the files to Amazon S3.

Which solution will meet this requirement?

Options:

A.

Configure CloudFront to send the X-Forwarded-For header to the origin and to redirect video requests to Amazon S3 instead of the ALB.

B.

Configure a new CloudFront cache behavior to route to Amazon S3 as a new origin, based on matching a URL path pattern.

C.

Configure URL signing in the CloudFront distribution by using a custom policy. Ensure that video files are accessed through signed URLs only.

D.

Configure a CloudFront origin group. Specify the required HTTP status codes to direct connection attempts to a secondary origin.

Question 3

A SysOps administrator monitors and maintains the availability of resources in an AWS environment. The SysOps administrator notices that the CPU utilization of an Amazon EC2 instance that runs web server software peaks above 80% at various times during each day. The CPU spikes correlate with peak daily loads. The high CPU load has resulted in performance issues for customers.

The SysOps administrator needs to resolve the system performance issue without causing any service disruptions. Which solution will meet these requirements?

Options:

A.

Configure an Amazon CloudWatch alarm that invokes an AWS Systems Manager Automation runbook to vertically scale the EC2 instance when the CPU utilization exceeds 80%.

B.

Configure an AWS Systems Manager Automation runbook to run a script that automatically restarts the application when CPU utilization exceeds 80%.

C.

Configure an Amazon EventBridge rule that invokes an AWS Systems Manager Automation document. Configure the document to increase the EC2 instance size when CPU utilization exceeds 80%.

D.

Set up an Auto Scaling group with an Amazon CloudWatch alarm that triggers a scaling policy to launch additional EC2 instances when the CPU utilization exceeds 80%.

Question 4

A CloudOps engineer has created an AWS Service Catalog portfolio and shared it with a second AWS account in the company, managed by a different CloudOps engineer.

Which action can the CloudOps engineer in the second account perform?

Options:

A.

Add a product from the imported portfolio to a local portfolio.

B.

Add new products to the imported portfolio.

C.

Change the launch role for the products contained in the imported portfolio.

D.

Customize the products in the imported portfolio.

Question 5

A company runs a website on Amazon EC2 instances. Users can upload images to an Amazon S3 bucket and publish the images to the website. The company wants to deploy a serverless image-processing application that uses an AWS Lambda function to resize the uploaded images.

The company's development team has created the Lambda function. A CloudOps engineer must implement a solution to invoke the Lambda function when users upload new images to the S3 bucket.

Which solution will meet this requirement?

Options:

A.

Configure an Amazon Simple Notification Service (Amazon SNS) topic to invoke the Lambda function when a user uploads a new image to the S3 bucket.

B.

Configure an Amazon CloudWatch alarm to invoke the Lambda function when a user uploads a new image to the S3 bucket.

C.

Configure S3 Event Notifications to invoke the Lambda function when a user uploads a new image to the S3 bucket.

D.

Configure an Amazon Simple Queue Service (Amazon SQS) queue to invoke the Lambda function when a user uploads a new image to the S3 bucket.

Question 6

A company has a microservice that runs on a set of Amazon EC2 instances. The EC2 instances run behind an Application Load Balancer (ALB).

A CloudOps engineer must use Amazon Route 53 to create a record that maps the ALB URL to example.com.

Which type of record will meet this requirement?

Options:

A.

An A record

B.

An AAAA record

C.

An alias record

D.

A CNAME record

Question 7

A company is running an application on premises and wants to use AWS for data backup. All of the data must be available locally. The backup application can write only to block-based storage that is compatible with the Portable Operating System Interface (POSIX).

Which backup solution will meet these requirements?

Options:

A.

Configure the backup software to use Amazon S3 as the target for the data backups.

B.

Configure the backup software to use Amazon S3 Glacier Flexible Retrieval as the target for the data backups.

C.

Use AWS Storage Gateway, and configure it to use gateway-cached volumes.

D.

Use AWS Storage Gateway, and configure it to use gateway-stored volumes.

Question 8

A CloudOps engineer needs to control access to groups of Amazon EC2 instances using AWS Systems Manager Session Manager. Specific tags on the EC2 instances have already been added.

Which additional actions should the CloudOps engineer take to control access? (Select TWO.)

Options:

A.

Attach an IAM policy to the users or groups that require access to the EC2 instances.

B.

Attach an IAM role to control access to the EC2 instances.

C.

Create a placement group for the EC2 instances and add a specific tag.

D.

Create a service account and attach it to the EC2 instances that need to be controlled.

E.

Create an IAM policy that grants access to any EC2 instances with a tag specified in the Condition element.

Question 9

A company maintains a list of 75 approved Amazon Machine Images (AMIs) that can be used across an organization in AWS Organizations. The company's development team has been launching Amazon EC2 instances from unapproved AMIs.

A SysOps administrator must prevent users from launching EC2 instances from unapproved AMIs.

Which solution will meet this requirement?

Options:

A.

Add a tag to the approved AMIs. Create an IAM policy that includes a tag condition that allows users to launch EC2 instances from only the tagged AMIs.

B.

Create a service-linked role. Attach a policy that denies the ability to launch EC2 instances from a list of unapproved AMIs. Assign the role to users.

C.

Use AWS Config with an AWS Lambda function to check for EC2 instances that are launched from unapproved AMIs. Program the Lambda function to send an Amazon Simple Notification Service (Amazon SNS) message to the SysOps administrator to terminate those EC2 instances.

D.

Use AWS Trusted Advisor to check for EC2 instances that are launched from unapproved AMIs. Configure Trusted Advisor to invoke an AWS Lambda function to terminate those EC2 instances.

Question 10

A SysOps administrator must load test a new Amazon CloudFront distribution to assess data transfer and latency performance. Which solution will meet this requirement?

Options:

A.

Send client requests from a single geographic region. Configure the load test so that each client makes an identical DNS request. Focus the client requests on the IP address that the DNS returns.

B.

Send client requests from a single geographic region. Configure the load test so that each client makes an independent DNS request. Spread the client requests across the set of IP addresses that the DNS returns.

C.

Send client requests from multiple geographic regions. Configure the load test so that each client makes an identical DNS request. Focus the client requests on the IP address that the DNS returns.

D.

Send client requests from multiple geographic regions. Configure the load test so that each client makes an independent DNS request. Spread the client requests across the set of IP addresses that the DNS returns.

Question 11

A company runs thousands of Amazon EC2 instances that are based on the Amazon Linux 2 Amazon Machine Image (AMI). A SysOps administrator must implement a solution to record commands and output from any user that needs an interactive session on one of the EC2 instances. The solution must log the data to a durable storage location. The solution also must provide automated notifications and alarms that are based on the log data.

Which solution will meet these requirements with the MOST operational efficiency?

Options:

A.

Configure command session logging on each EC2 instance. Configure the unified Amazon CloudWatch agent to send session logs to Amazon CloudWatch Logs. Set up query filters and alerts by using Amazon Athena.

B.

Require all users to use a central bastion host when they need command line access to an EC2 instance. Configure the unified Amazon CloudWatch agent on the bastion host to send session logs to Amazon CloudWatch Logs. Set up a metric filter and a metric alarm for relevant security findings in CloudWatch Logs.

C.

Require all users to use AWS Systems Manager Session Manager when they need command line access to an EC2 instance. Configure Session Manager to stream session logs to Amazon CloudWatch Logs. Set up a metric filter and a metric alarm for relevant security findings in CloudWatch Logs.

D.

Configure command session logging on each EC2 instance. Require all users to use AWS Systems Manager Run Command documents when they need command line access to an EC2 instance. Configure the unified Amazon CloudWatch agent to send session logs to Amazon CloudWatch Logs. Set up CloudWatch alarms that are based on Amazon Athena query results.

Question 12

A company’s CloudOps engineer monitors multiple AWS accounts in an organization and checks each account’s AWS Health Dashboard. After adding 10 new accounts, the engineer wants to consolidate health alerts from all accounts.

Which solution meets this requirement with the least operational effort?

Options:

A.

Enable organizational view in AWS Health.

B.

Configure the Health Dashboard in each account to forward events to a central AWS CloudTrail log.

C.

Create an AWS Lambda function to query the AWS Health API and write all events to an Amazon DynamoDB table.

D.

Use the AWS Health API to write events to an Amazon DynamoDB table.

Question 13

A company uses AWS Organizations to manage its AWS environment. The company implements a process that uses prebuilt Amazon Machine Images (AMIs) to launch instances as a security measure. All AMIs are tagged automatically with a key named ApprovedAMI.

The company wants to ensure that employees can use only the approved prebuilt AMIs to launch new instances.

Which solution will meet this requirement?

Options:

A.

Implement a tag policy for the company's organization to require users to set the ApprovedAMI tag to launch new EC2 instances.

B.

Implement an IAM policy that includes an aws:ResourceTag/ApprovedAMI condition.

C.

Set up an AWS Config required-tags rule to prevent users from launching any nonapproved AMIs.

D.

Use Amazon GuardDuty to constantly monitor DefenseEvasion:EC2/UnusualDoHActivity findings.

Question 14

A company hosts a static website in Amazon S3 behind an Amazon CloudFront distribution. When new versions are deployed, users sometimes do not see updated content immediately.

Which solution will meet this requirement?

Options:

A.

Configure the CloudFront distribution to add a custom Cache-Control header to requests for content from the S3 bucket.

B.

Modify the distribution settings to specify the protocol as HTTPS only.

C.

Attach the CachingOptimized managed cache policy to the distribution.

D.

Create a CloudFront invalidation.

Question 15

A SysOps administrator needs to give an existing AWS Lambda function access to an existing Amazon S3 bucket. Traffic between the Lambda function and the S3 bucket must not use public IP addresses. The Lambda function has been configured to run in a VPC.

Which solution will meet these requirements?

Options:

A.

Configure VPC sharing between the Lambda VPC and the S3 bucket.

B.

Attach a transit gateway to the Lambda VPC to allow the Lambda function to connect to the S3 bucket.

C.

Create a NAT gateway. Associate the NAT gateway with the subnet where the Lambda function is configured to run.

D.

Create an S3 interface endpoint. Change the Lambda function to use the new S3 DNS name.

Question 16

A CloudOps engineer is configuring an Amazon CloudFront distribution to use an SSL/TLS certificate. The CloudOps engineer must ensure automatic certificate renewal.

Which combination of steps will meet this requirement? (Select TWO.)

Options:

A.

Use a certificate issued by AWS Certificate Manager (ACM).

B.

Use a certificate issued by a third-party certificate authority (CA).

C.

Configure CloudFront to automatically renew the certificate when the certificate expires.

D.

Configure email validation for the certificate.

E.

Configure DNS validation for the certificate.

Question 17

An Amazon EC2 instance is running an application that uses Amazon Simple Queue Service (Amazon SQS) queues. A CloudOps engineer must ensure that the application can read, write, and delete messages from the SQS queues.

Which solution will meet these requirements in the MOST secure manner?

Options:

A.

Create an IAM user with an IAM policy that allows the sqs:SendMessage permission, the sqs:ReceiveMessage permission, and the sqs:DeleteMessage permission to the appropriate queues. Embed the IAM user's credentials in the application's configuration.

B.

Create an IAM user with an IAM policy that allows the sqs:SendMessage permission, the sqs:ReceiveMessage permission, and the sqs:DeleteMessage permission to the appropriate queues. Export the IAM user's access key and secret access key as environment variables on the EC2 instance.

C.

Create and associate an IAM role that allows EC2 instances to call AWS services. Attach an IAM policy to the role that allows sqs:* permissions to the appropriate queues.

D.

Create and associate an IAM role that allows EC2 instances to call AWS services. Attach an IAM policy to the role that allows the sqs:SendMessage permission, the sqs:ReceiveMessage permission, and the sqs:DeleteMessage permission to the appropriate queues.

Question 18

An application runs on Amazon EC2 instances that are in an Auto Scaling group. A CloudOps engineer needs to implement a solution that provides a central storage location for errors that the application logs to disk. The solution must also provide an alert when the application logs an error.

What should the CloudOps engineer do to meet these requirements?

Options:

A.

Deploy and configure the Amazon CloudWatch agent on the EC2 instances to log to a CloudWatch log group. Create a metric filter on the target CloudWatch log group. Create a CloudWatch alarm that publishes to an Amazon Simple Notification Service (Amazon SNS) topic that has an email subscription.

B.

Create a cron job on the EC2 instances to identify errors and push the errors to an Amazon CloudWatch metric filter. Configure the filter to publish to an Amazon Simple Notification Service (Amazon SNS) topic that has an SMS subscription.

C.

Deploy an AWS Lambda function that pushes the errors directly to Amazon CloudWatch Logs. Configure the Lambda function to run every time the log file is updated on disk.

D.

Create an Auto Scaling lifecycle hook that invokes an EC2-based script to identify errors. Configure the script to push the error messages to an Amazon CloudWatch log group when the EC2 instances scale in. Create a CloudWatch alarm that publishes to an Amazon Simple Notification Service (Amazon SNS) topic that has an email subscription when the number of error messages exceeds a threshold.

Question 19

A company uses Amazon ElastiCache (Redis OSS) to cache application data. A CloudOps engineer must implement a solution to increase the resilience of the cache. The solution also must minimize the recovery time objective (RTO).

Which solution will meet these requirements?

Options:

A.

Replace ElastiCache (Redis OSS) with ElastiCache (Memcached).

B.

Create an Amazon EventBridge rule to initiate a backup every hour. Restore the backup when necessary.

C.

Create a read replica in a second Availability Zone. Enable Multi-AZ for the ElastiCache (Redis OSS) replication group.

D.

Enable automatic backups. Restore the backups when necessary.

Question 20

A company’s application servers in AWS account 111122223333 use a security group sg-1234abcd. They need to access a database hosted in account 444455556666. The VPCs are connected using a VPC peering connection (pcx-b04deed9).

A CloudOps engineer must configure the database’s security group to allow new connections only from the application servers.

What should the engineer do?

Options:

A.

Add an inbound rule to the database's security group. Reference 111122223333/sg-1234abcd as the source.

B.

Add an inbound rule to the database's security group. Reference pcx-b04deed9/sg-1234abcd as the source.

C.

Add an inbound rule to the database's security group. Reference sg-1234abcd as the source.

D.

Add an inbound rule to the database's security group. Reference 444455556666/sg-1234abcd as the source.

Question 21

A company's developers manually install software modules on Amazon EC2 instances to deploy new versions of a service. A security audit finds that instances contain inconsistent and unapproved modules.

A CloudOps engineer must create a new instance image that contains only approved software.

Which solution will meet these requirements?

Options:

A.

Use Amazon Detective to continuously find and uninstall unauthorized modules from the instances.

B.

Use Amazon GuardDuty to create and deploy an Amazon Machine Image (AMI) that includes only the approved modules.

C.

Use AWS Systems Manager Run Command to install the approved modules on all running instances during an in-place update.

D.

Use EC2 Image Builder to create and test an Amazon Machine Image (AMI) that includes only the approved modules. Update the deployment workflow to use the new AMI.

Question 22

A financial services company stores customer images in an Amazon S3 bucket in the us-east-1 Region. To comply with regulations, the company must ensure that all existing objects are replicated to an S3 bucket in a second AWS Region. If an object replication fails, the company must be able to retry replication for the object.

What solution will meet these requirements?

Options:

A.

Configure Amazon S3 Cross-Region Replication (CRR). Use Amazon S3 live replication to replicate existing objects.

B.

Configure Amazon S3 Cross-Region Replication (CRR). Use S3 Batch Replication to replicate existing objects.

C.

Configure Amazon S3 Cross-Region Replication (CRR). Use S3 Replication Time Control (S3 RTC) to replicate existing objects.

D.

Use S3 Lifecycle rules to move objects to the destination bucket in a second Region.

Question 23

A company runs applications on Amazon EC2 instances. The company wants to ensure that SSH ports on the EC2 instances are never open. The company has enabled AWS Config and has set up the restricted-ssh AWS managed rule.

A CloudOps engineer must implement a solution to remediate SSH port access for noncompliant security groups.

What should the engineer do to meet this requirement with the MOST operational efficiency?

Options:

A.

Configure the AWS Config rule to identify noncompliant security groups. Configure the rule to use the AWS-PublishSNSNotification AWS Systems Manager Automation runbook to send notifications about noncompliant resources.

B.

Configure the AWS Config rule to identify noncompliant security groups. Configure the rule to use the AWS-DisableIncomingSSHOnPort22 AWS Systems Manager Automation runbook to remediate noncompliant resources.

C.

Make an AWS Config API call to search for noncompliant security groups. Disable SSH access for noncompliant security groups by using a Deny rule.

D.

Configure the AWS Config rule to identify noncompliant security groups. Manually update each noncompliant security group to remove the Allow rule.

Question 24

A SysOps administrator needs to encrypt an existing Amazon Elastic File System (Amazon EFS) file system by using an existing AWS KMS customer managed key.

Which solution will meet these requirements?

Options:

A.

Use Amazon EFS replication to create a new file system. Copy the data and metadata from the existing file system to the new file system. Specify the KMS customer managed key in the replication configuration. When the replication process finishes, fail over to the new encrypted file system.

B.

Directly modify the file system to use encryption. Specify the KMS customer managed key.

C.

Use Amazon EFS replication to create a new file system. Copy the data and metadata from the existing file system to the new file system. Generate a new TLS certificate. Specify the TLS certificate in the replication configuration. When the replication process finishes, fail over to the new encrypted file system.

D.

Create a new EFS file system that is encrypted with the KMS customer managed key. Create an Amazon EC2 instance to copy the files. Mount the encrypted file system and unencrypted file system on the instance. Copy all data from the unencrypted file system to the encrypted file system. Unmount the unencrypted file system and remove the temporary instance.

Question 25

A company hosts a static website in an Amazon S3 bucket, accessed globally via Amazon CloudFront. The Cache-Control max-age header is set to 1 hour, and Maximum TTL is set to 5 minutes. The CloudOps engineer observes that CloudFront is not caching objects for the expected duration.

What is the reason for this issue?

Options:

A.

The Expires header has been set to 3 hours.

B.

Cached assets are not expiring in the edge location.

C.

Cache invalidation is missing in the CloudFront configuration.

D.

Cache-duration settings conflict with each other.

Question 26

A CloudOps engineer is using AWS Compute Optimizer to generate recommendations for a fleet of Amazon EC2 instances. Some of the instances use newly released instance types, while other instances use older instance types.

After the analysis is complete, the CloudOps engineer notices that some of the EC2 instances are missing from the Compute Optimizer dashboard.

What is the likely cause of this issue?

Options:

A.

The missing instances have insufficient historical Amazon CloudWatch metric data for analysis.

B.

Compute Optimizer does not support the instance types of the missing instances.

C.

Compute Optimizer already considers the missing instances to be optimized.

D.

The missing instances are running a Windows operating system.

Question 27

A company hosts a critical legacy application on two Amazon EC2 instances that are in one Availability Zone. The instances run behind an Application Load Balancer (ALB). The company uses Amazon CloudWatch alarms to send Amazon Simple Notification Service (Amazon SNS) notifications when the ALB health checks detect an unhealthy instance. After a notification, the company's engineers manually restart the unhealthy instance. A CloudOps engineer must configure the application to be highly available and more resilient to failures. Which solution will meet these requirements?

Options:

A.

Create an Amazon Machine Image (AMI) from a healthy instance. Launch additional instances from the AMI in the same Availability Zone. Add the new instances to the ALB target group.

B.

Increase the size of each instance. Create an Amazon EventBridge rule. Configure the EventBridge rule to restart the instances if they enter a failed state.

C.

Create an Amazon Machine Image (AMI) from a healthy instance. Launch an additional instance from the AMI in the same Availability Zone. Add the new instance to the ALB target group. Create an AWS Lambda function that runs when an instance is unhealthy. Configure the Lambda function to stop and restart the unhealthy instance.

D.

Create an Amazon Machine Image (AMI) from a healthy instance. Create a launch template that uses the AMI. Create an Amazon EC2 Auto Scaling group that is deployed across multiple Availability Zones. Configure the Auto Scaling group to add instances to the ALB target group.

Page: 1 / 15
Total 151 questions