A firm has developed an AWS application interacting with DynamoDB. The associated application must be immediately entered if an item is updated in a DynamoDB table. How can this be done? (Select Two).
Correct
Incorrect
Question 2 of 48
2. Question
1 point(s)
A Solutions Architect builds an online shopping application operating behind a Load Balancer in a VPC on EC2 Instances. Instances run across several Availability areas in an Auto Scaling group. The application must read and write data to a database cluster that is customer-managed. The database via the Internet should not be accessed. But software fixes from the internet must be available to the group. Which VPC design complies with the above?
Correct
Incorrect
Question 3 of 48
3. Question
1 point(s)
You have several on-site virtual computers for serving web-based software. You must guarantee that the rotation removes a virtual machine if it is unhealthy. The following settings will be utilized for health checks and DNS failover functionality to enhance redundancy and availability.
Correct
Incorrect
Question 4 of 48
4. Question
1 point(s)
A company has a set of web servers. All logs of these web servers must be examined in real-time for any identification of threats. In this respect, what might be the appropriate choice?
Correct
Incorrect
Question 5 of 48
5. Question
1 point(s)
You have an EC2 Instance placed inside a public subnet. It is necessary to verify that the EC2 Instance has complete Internet connectivity. What would be helpful to accomplish this?
Correct
Incorrect
Question 6 of 48
6. Question
1 point(s)
A company’s on-premises infrastructure houses a large amount of data. The company runs out of storage and seeks a quick-win solution through AWS. The commonly requested data should have minimal latency. What of the following would make it easy for AWS to expand your data architecture?
Correct
Incorrect
Question 7 of 48
7. Question
1 point(s)
A company plans to deploy a batch processing application in AWS. Which would ideally contribute to hosting this request? (SelectTwo)
Correct
Incorrect
Question 8 of 48
8. Question
1 point(s)
A company is building a two-tier web application to serve dynamic transaction-based content. What services would you use to allow a scalable and elastic WEB TIER?
Correct
Incorrect
Question 9 of 48
9. Question
1 point(s)
As a DNS provider, your firm plans to use Route 53. The company’s domain name must be referred to an existing CloudFront distribution. How can we do that?
Correct
Incorrect
Question 10 of 48
10. Question
1 point(s)
Your company has a set of applications that make use of Docker containers. These containers must be moved to AWS. In a separate AWS environment, what is the best approach to install these Docker containers?
Correct
Incorrect
Question 11 of 48
11. Question
1 point(s)
A firm has a process that transmits AWS for transcoding video files from its on-site system. You may draw transcoding jobs from SQS using EC2 worker instances. Why is SQS a convenient scenario service?
Correct
Incorrect
Question 12 of 48
12. Question
1 point(s)
You have a mission-critical two-tier web application that employs Elastic Load Balancing and Auto Scaling and is currently deployed across two Availability Zones in a single region. The app relies on synchronous replication at the database layer. Even if AZ goes offline and Auto Scaling cannot deploy new instances in the remaining AZ, the application must remain fully operational. What improvements may be made to the present Elastic Load Balancing to achieve this?
Correct
Incorrect
Question 13 of 48
13. Question
1 point(s)
In the “us-east-1” region, a firm intends to use the AWS ECS service to deal with containers. When launching containers, the least amount of administrative overhead is required. What would be the most effective approach to do this?
Correct
Incorrect
Question 14 of 48
14. Question
1 point(s)
A firm uses the AWS RDS service to host a MySQL database. A Read Replica database has been built, and reports are run from it to offload the reads. However, the information may display outdated data. What might be the underlying cause of this?
Correct
Incorrect
Question 15 of 48
15. Question
1 point(s)
Your app authenticates with AWS Cognito Identity and maintains user profiles in a User Pool. Your team is asking for advice on enabling the usage of OpenID Connect (OIDC) identity providers as an alternative way of authenticating users and preserving user profile information to increase the app’s availability and convenience of use. What are your thoughts on OIDC identity providers?
Correct
Incorrect
Question 16 of 48
16. Question
1 point(s)
You have written an AWS Lambda function to write data to a DynamoDB table. Which of the following conditions must be met for the Lambda function to interact with the DynamoDB table?
Correct
Incorrect
Question 17 of 48
17. Question
1 point(s)
For petabyte-scale data warehousing, a firm has a Redshift cluster. The data in the group is simply replicated from data saved in an Amazon S3 bucket. The firm wishes to lower the total cost of running this Redshift cluster. Which option best meets the demands of the operating set while decreasing the group’s broad ownership?
Correct
Incorrect
Question 18 of 48
18. Question
1 point(s)
You are creating a system that will require at least eight m4. To service traffic, large instances are in operation. When developing a high availability strategy for the US-East-1 area, which has six Availability Zones, your firm must consider handling the death of an entire availability zone. How should the EC2 servers be distributed to save money?
Correct
Incorrect
Question 19 of 48
19. Question
1 point(s)
A company wants to achieve redundancy for its EBS volumes hosted in AWS most cost-effectively. How could this be achieved?
Correct
Incorrect
Question 20 of 48
20. Question
1 point(s)
A firm requires the storage of 10TB of scanned material across different availability zones. It intends to use a search application to go through the scanned documents. Which of the following is the best choice for implementing the search feature?
Correct
Incorrect
Question 21 of 48
21. Question
1 point(s)
Your manager has a concern that developers could potentially delete production-based EC2 resources. As a Cloud Admin, what would you do to help alleviate this concern? (Select Two)
Correct
Incorrect
Question 22 of 48
22. Question
1 point(s)
A significant number of records are now written in a DynamoDB database in one area. A secondary application must fetch new entries written every 2 hours on the DynamoDB table and handle the modifications accordingly. What is an excellent approach to ensure relevant updates from the DynamoDB table are made in the secondary application?
Correct
Incorrect
Question 23 of 48
23. Question
1 point(s)
You are planning to host a web application consisting of a web server and a database server. These servers are going to be hosted on different EC2 Instances in other subnets in a VPC. What should be used to ensure that the database server only allows traffic from the webserver?
Correct
Incorrect
Question 24 of 48
24. Question
1 point(s)
You need to ensure that data stored in S3 is encrypted, but you don’t want to manage the encryption keys. Which of the following encryption mechanisms should be used in this case?
Correct
Incorrect
Question 25 of 48
25. Question
1 point(s)
You are building a large-scale confidential documentation web server on AWS such that all of its documentation will be stored on S3. One of the requirements is that it should not be publicly accessible from S3 directly. CloudFront would be needed to accomplish this. Which method would satisfy the outlined requirements?
Correct
Incorrect
Question 26 of 48
26. Question
1 point(s)
You work as an architect for a company. An application will be deployed on a set of EC2 instances in a private subnet of VPC. You need to ensure that IT administrators can securely administer the instances in the private subnet. How can you do that?
Correct
Incorrect
Question 27 of 48
27. Question
1 point(s)
You are an architect for your company. Your IT admin staff needs access to newly created EC2 Instances for administrative purposes. Which of the following needs to be done to ensure that the IT admin staff can connect via port 22 to the EC2 Instances?
Correct
Incorrect
Question 28 of 48
28. Question
1 point(s)
Your company is planning on the following architecture for their application.
โข A collection of EC2 Instances that host the application’s web component.
โข A relativistic backend database.
โข A traffic distribution load balancer.
โข A NAT traffic routing gateway from the Internet database server.
Which architecture assures that all components are fully available?
Correct
Incorrect
Question 29 of 48
29. Question
1 point(s)
A fleet of EC2 instances is involved in an application. These instances are initiated in the region of Oregon (us-west-2). Which is composed of three zones of availability. 6 instances operating at all times are required for this application. As an architect, if any availability area decreases, you must disperse the instances to preserve their capacity. You must also make sure that the costs are maintained to a minimum? What would you think of the following configurations?
Correct
Incorrect
Question 30 of 48
30. Question
1 point(s)
A company has an application-defined with the following architecture.
โข A fleet of EC2 Instances which are used to accept video uploads from users.
โข A fleet of EC2 Instances which are used to process the video uploads.
Which of the following would help architect an operationally excellent architecture?
Correct
Incorrect
Question 31 of 48
31. Question
1 point(s)
A company has an Amazon Aurora cluster setup, and it needs to invoke a Lambda function, which must be installed for this arrangement to function. From the options listed below, select two responses.
Correct
Incorrect
Question 32 of 48
32. Question
1 point(s)
Your team has been instructed to develop an application that will make use of a DynamoDB table. During the design stage, you have to provide inputs to ensure that an optimal strategy is employed for a high read and write expectancy on the underlying DynamoDB table. Which of the following would you consider?
Correct
Incorrect
Question 33 of 48
33. Question
1 point(s)
A company is planning to store sensitive documents in an S3 bucket. They want to ensure that records are encrypted at rest. They want to ensure they manage the underlying keys used for encryption but not the encryption/decryption process. For this reason, which of the following can be used?
Correct
Incorrect
Question 34 of 48
34. Question
1 point(s)
You are working as an architect in your company. You have peered VPC A as requester and VPC B as accepted, and both VPCs can communicate with each other. Now you want resources in the private subnets of both the VPCs to reach out to the internet. But anyone on the internet should not be able to reach resources within both the VPCs. Which of the following results will be achieved?
Correct
Incorrect
Question 35 of 48
35. Question
1 point(s)
Your company already had a VPC (10.10.0.0/16) setup with one public (10.10.1.0/24) and two private subnets โ private subnet 1 (10.10.2.0/24) and private subnet 2 (10.10.3.0/24). The public subnet has the main route table, and two private subnets have two different route tables, respectively. AWS sysops team reports a problem starting the EC2 instance in private subnet one cannot communicate to the RDS MySQL database on private subnet 2. What are the possible reasons? (choose two options)
Correct
Incorrect
Question 36 of 48
36. Question
1 point(s)
You build a fleet of EC2 Linux Instances in the AWS environment to manage heavy workloads and write data into AWS Redshift. The developers and administrators need to log in to these EC2 machines to develop, fix, deploy, and manage workloads within your organizational network ONLY. Which of the following would allow only the personnel within the company to access the resources most securely?
Correct
Incorrect
Question 37 of 48
37. Question
1 point(s)
Your company is planning on setting up an application that will consist of a presentation layer and a data store in DynamoDB. The data in DynamoDB will only be used frequently within the week in which the data is inserted. After a week, the data would tend to become stale. But the stale data would need to be available on durable storage for future analysis of historical data. Also, management overhead should not be there. Which of the following would be the ideal implementation steps for this sort of architecture?
Correct
Incorrect
Question 38 of 48
38. Question
1 point(s)
You have created an S3 bucket in the us-east-1 region with the default configuration. Versioning is not enabled. You are located in Asia and deleted an object in the bucket using AWS CLI. What may happen when you try to list the things in the bucket?
Correct
Incorrect
Question 39 of 48
39. Question
1 point(s)
You are designing a web application that stores static assets in an Amazon S3 bucket. You anticipate getting more than 400 GET/PUT/DELETE applications per second right away. What are you to do to guarantee the best performance?
Correct
Incorrect
Question 40 of 48
40. Question
1 point(s)
You have an application on EC2 which stores the files in an S3 bucket. EC2 is being launched using a role with GetObject permissions on the S3 bucket defined in its policy. The users who authenticate this application will get a pre-signed URL for the files in an S3 bucket using EC2 role temporary credentials. However, users are reporting that they get an error when accessing pre-signed URLs. What could be the reason? (Select Two)
Correct
Incorrect
Question 41 of 48
41. Question
1 point(s)
You created a bucket named โmyfirstipsbucketโ in the US West region. What are valid URLs for accessing the bucket? (Choose two options)
Correct
Incorrect
Question 42 of 48
42. Question
1 point(s)
You have an AWS setup with an existing VPC in us-east-1. You have a fleet of 20 EC2 instances attached to EFS with mount targets on all current VPCโs availability zones. Your company had requested you to replicate the same setup in another VPC within us-east-1, keeping the same EFS volume. How will you achieve this?
Correct
Incorrect
Question 43 of 48
43. Question
1 point(s)
Your company is using Amazon SQS as an enterprise message queuing platform. 100s of applications read the queues every few seconds to process the news and delete them as soon as they are written into the queues. Looking at the number of requests being sent to Amazon SQS APIs, your management is concerned about the pricing that will be incurred. As an architect, how would you reduce pricing without compromising on time in this scenario? Please select two correct answers.
Correct
Incorrect
Question 44 of 48
44. Question
1 point(s)
You are performing a Load Testing exercise on your application that is hosted on AWS. While testing your Amazon RDS MySQL DB Instance, you notice that your application becomes non-responsive when you reach 100% CPU utilization. Your application is read-heavy. Which methods would help scale your data tier to meet the applicationโs needs? (Select Three)
Correct
Incorrect
Question 45 of 48
45. Question
1 point(s)
Your Operations department is using an incident-based application hosted on a set of EC2 Instances. These instances are placed behind an Auto Scaling Group to ensure that the correct number of instances are in place to support the application. The Operations department has expressed dissatisfaction concerning poor application performance every day at 9:00 AM. However, it is also noted that the system performance returns to optimal at 9:45 AM.
Correct
Incorrect
Question 46 of 48
46. Question
1 point(s)
Your company had built a video sharing website on EC2 within the US for which the S3 bucket in us- east-1 is used to store the video files. The website has been receiving excellent feedback, and your company decided to expand the website all over the world. However, customers in Europe and Asia started to complain that website access, upload, and video files download are slow. How can you resolve the issue? (choose two options)
Correct
Incorrect
Question 47 of 48
47. Question
1 point(s)
You are building a content-serving web application with 20 EC2 instances. The EC2 servers are all load-balanced, and content storage for the instances will remain the same. You have chosen AWS EFS to act as a standard storage repository. Your application needs to have as low of latency as possible when serving content to web users. Which of the following choices is the best choice?
Correct
Incorrect
Question 48 of 48
48. Question
1 point(s)
You are building a content serving web application (size not exceeding 25 GB) on 5 EC2 load-balanced instances. You have chosen EFS for content storage. The content is accessed frequently by a large number of users. Which of the following throughput mode would you prefer to ensure that application on EC2 instances transfers the data to EFS without any performance bottleneck?
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.