Your organization intends to use AWS VPN managed connections to create a hybrid connection between its on-premises infrastructure and an AWS VPC. Which of the following must be in place for the connection to be made as an architect? Select two answers.
Correct
Incorrect
Question 2 of 50
2. Question
1 point(s)
Two EC2 instances are used to host a website protected by an Elastic Load Balancer. The website’s response time has slowed noticeably, and customers are placing fewer orders due to the long wait. During troubleshooting, it was discovered that one of the EC2 instances had failed, leaving only one instance functioning. What is the best course of action to ensure that this does not happen again?
Correct
Incorrect
Question 3 of 50
3. Question
1 point(s)
For their application, your organization has built up EC2 Instances in a VPC. All traffic to the EC2 Instances should be monitored, according to the IT Security department. Which of the following capabilities can capture network interfaces in a VPC for outgoing and incoming IP traffic?
Correct
Incorrect
Question 4 of 50
4. Question
1 point(s)
A business intends to move its virtual servers from its on-premises infrastructure to the AWS Cloud. They must move their existing virtual machines to the cloud. Which of the following would be most beneficial to them throughout their migration?
Correct
Incorrect
Question 5 of 50
5. Question
1 point(s)
A business intends to migrate its apps to the AWS Cloud. They have several large SQL data sets that need to be stored on the cloud. The data store must support client connections with various applications, such as business intelligence (BI), reporting, data, and analytics tools. For this demand, which of the following services should be considered?
Correct
Incorrect
Question 6 of 50
6. Question
1 point(s)
A corporation has been using Amazon Web Services (AWS) cloud services for six months and has recently completed a security audit. Which of the following findings is regarded as a best practice in the well-architected framework’s security pillar?
Correct
Incorrect
Question 7 of 50
7. Question
1 point(s)
A business offers its clients short-term contests in which they must submit files to win prizes. With unknown uploads, these contests can go up to two weeks. The file analysis that follows can take up to three months.
To store the files of its clients, the organization need a cost-effective, scalable object storage solution. The files will be examined once and then erased; therefore, rapid access is required. For this company, the ideal solution is:
Correct
Incorrect
Question 8 of 50
8. Question
1 point(s)
A company recently decided to manage its APIs using the AWS API Gateway (API Cache) service. Which of the following services can be linked with the API gateway service in the background to improve the API Gateway’s response time?
Correct
Incorrect
Question 9 of 50
9. Question
1 point(s)
Your organization intends to build and launch an application on Amazon Web Services (AWS). The application will be built on a microservices design, which will involve several Docker containers. Which of the following services would be most appropriate in this situation?
Correct
Incorrect
Question 10 of 50
10. Question
1 point(s)
You are developing a Lambda function that runs recurrently and processes the data stored in a DynamoDB table. As the data in the DynamoDB increases fast, you require to estimate the cost of the Lambda function. Which of the following factors directly determine the monthly cost of Lambda? (Select Two.)
Correct
Incorrect
Question 11 of 50
11. Question
1 point(s)
You utilize a Lambda function to link to an Oracle RDS instance and run few long SQL queries. The timeout of the Lambda function is fixed to 15 minutes, and the function consistently reaches a timeout. You propose to expand the allocated memory of the Lambda function. However, your manager is concerned about the cost. How would you answer this question?
Correct
Incorrect
Question 12 of 50
12. Question
1 point(s)
You have built three Application Load Balancers to transmit the traffic in your AWS account, and each ALB has its individual target group. As the traffic keeps rising, the cost of the Elastic Load Balancers grows as well. Which method would you take to minimize the load balancer cost?
Correct
Incorrect
Question 13 of 50
13. Question
1 point(s)
Your team develops an Application Load Balancer for an advanced application and registers a Lambda function as its target. Three availability zones are enabled for the ALB. You need to take few actions to minimize the cost. Which of the below options is the most appropriate?
Correct
Incorrect
Question 14 of 50
14. Question
1 point(s)
An application is hosted in an AWS EC2 instance in a VPC private subnet. The application regularly downloads a huge amount of files stored in an S3 bucket. A NAT Gateway is built in the public subnet for the EC2 instance to link with the S3 bucket. Now you want to take few actions to minimize the cost of AWS infrastructure. Which method is the most appropriate?
Correct
Incorrect
Question 15 of 50
15. Question
1 point(s)
You are working in a start-up company, and you require to minimize the cost of Amazon EC2, AWS Fargate, and AWS Lambda. You are reviewing for a flexible pricing model. For example, you will incur a minimum rate if you commit to $10/hour of compute usage. Which AWS service can achieve this requirement?
Correct
Incorrect
Question 16 of 50
16. Question
1 point(s)
You build a new EC2 Instance Saving Plan in the Asia Pacific region (Sydney). You have committed to 20$/hour of utilizing for one year, and the instance family is chosen as C5. For which of the following EC2 AMIs can you get a discount?
Correct
Incorrect
Question 17 of 50
17. Question
1 point(s)
A web-based app is hosted in AWS EC2 and servers global customers. As the application is gaining more and more famous, the data transfer cost keeps growing. You plan to use AWS CloudFront to improve the latency and minimize the cost. Which of the following services is free for CloudFront?
Correct
Incorrect
Question 18 of 50
18. Question
1 point(s)
Your application is deployed in EC2 instances and uses CloudFront to distribute the content. In order to minimize the cost of requests to the origin, your plan to maximize the cache duration in CloudFront for certain changing contents. Which of the following options is the better applicable to achieve the requirement?
Correct
Incorrect
Question 19 of 50
19. Question
1 point(s)
You use CloudFormation to build an Auto Scaling group for a web-based application. The application requires to be deployed in both non-production AWS accounts. You want to use Spot Instances in the non-production environment to save cost. Which of the following technique would you select?
Correct
Incorrect
Question 20 of 50
20. Question
1 point(s)
Which of the following default environments are INCORRECT for a newly launched S3 bucket? (choose two options)
Correct
Incorrect
Question 21 of 50
21. Question
1 point(s)
Which of the following can you construct in the AWS S3 console? (Choose two options)
Correct
Incorrect
Question 22 of 50
22. Question
1 point(s)
You have to build an S3 bucket in the us-east-1 region with the default configuration. Versioning is not enabled. You are placed in Asia and removed an object in the bucket using AWS CLI. What may happen when you try to list the objects in the bucket?
Correct
Incorrect
Question 23 of 50
23. Question
1 point(s)
Your company is planning to upload a vast number of files to the AWS cloud. These files must be directly available for download across distinct geographical regions right after the upload is complete. They argued you to analyze if S3 is a suitable remedy for the use case. What do you suggest?
Correct
Incorrect
Question 24 of 50
24. Question
1 point(s)
You are a solutions architect. Your company is creating an application on-premise. But would like to manage the storage on AWS. Objects/files must only be approached via the application. There is relational and access related logic built into the application. But, as an exception, Administrators should access the objects/files directly from AWS S3 console/API, bypassing the application. What solution would you provide?
Correct
Incorrect
Question 25 of 50
25. Question
1 point(s)
You have built a private S3 bucket in the us-east-1 region with default configurations. You have uploaded some documents required to be shared with a group within your company, granting them limited period access. Which of the following is the suggested approach?
Correct
Incorrect
Question 26 of 50
26. Question
1 point(s)
Which of the following are accurate remarks about Amazon S3? (Select three).
Correct
Incorrect
Question 27 of 50
27. Question
1 point(s)
You are developing a web-based application that stores static assets in an Amazon S3 bucket. You anticipate this bucket to instantly receive over 400 requests with a mix of GET/PUT/DELETE per second. What should you do to give optimal performance?
Correct
Incorrect
Question 28 of 50
28. Question
1 point(s)
You have an application running on EC2. When the application is attempting to upload a 7 GB file to S3, the operation fails. What could be the cause for failure, and what would be the solution?
Correct
Incorrect
Question 29 of 50
29. Question
1 point(s)
You have an application on the AWS EC2 which stores the files in an S3 bucket. AWS EC2 is being built using a role with GetObject permissions on the S3 bucket defined in its policy. The users who authenticate this app will get a pre-signed URL for the files in an S3 bucket using EC2 role limited credentials. However, users are informing that they get an error when accessing pre-signed URLs. What could be the reason? (Select Two)
Correct
Incorrect
Question 30 of 50
30. Question
1 point(s)
Your company has an S3 bucket that stores private information. Access is granted to specific programmatic IAM users and restricted to these IAM users’ requests to be originated from within your company’s IP address range. However, your company assumes there might be requests from other IP addresses to S3 buckets to download special objects. How would you troubleshoot to find out the requester IP address? (choose two options)
Correct
Incorrect
Question 31 of 50
31. Question
1 point(s)
A firm plans to build web and mobile apps that can upload 100,000 images every Day into AWS S3. The applications anticipate an abrupt gain in volume. They are, however, on a tight budget and are seeking for a cost-effective solution. As an architect, you are method if S3 suits their requirements. What data will you collect to create a decision? (Choose two options)
Correct
Incorrect
Question 32 of 50
32. Question
1 point(s)
Which of the following are system metadata for objects in AWS Simple Storage S3? (choose three options)
Correct
Incorrect
Question 33 of 50
33. Question
1 point(s)
Your company needs to meet audit compliance and log all the requests sent to 10 buckets containing confidential information. These will also be periodically used to determine if any requests are being made outside the company’s IP address range. Your AWS app team had enabled S3 server access logging through AWS Console for all the buckets into a simple logging bucket named s3-server-logging. But after some hours, they noticed no logs were being written into the logging bucket. What could be the reason?
Correct
Incorrect
Question 34 of 50
34. Question
1 point(s)
You are building a web-based application that will allow authenticated users to upload videos to the AWS S3 bucket across multiple domains. However, while experimenting the application, you spotted that the upload requests to S3 are being restricted. What should you do to create the upload task?
Correct
Incorrect
Question 35 of 50
35. Question
1 point(s)
You have uploaded a file to the AWS S3 bucket with content ‘foo’. You have overwritten the File with the content ‘bar’. When you made a GetObject request instantly after overwrite, what output can you anticipate?
Correct
Incorrect
Question 36 of 50
36. Question
1 point(s)
You created a bucket named “myfirstipsbucket” in the US West region. What are authentic URLs for approaching the bucket? (Choose two options)
Correct
Incorrect
Question 37 of 50
37. Question
1 point(s)
What are the lowest and highest file sizes that can be stored in S3, respectively?
Correct
Incorrect
Question 38 of 50
38. Question
1 point(s)
Your company creates many application logs routinely to the AWS s3 bucket and are the only copies accessible, not stored in any place else. These files scope between 10MB-500MB in size and are not approached repeatedly. They are needed once in a while to troubleshoot application problems. The application team requires the last 60 days of log files to be instantly available when required. Logs older than 60 days require not be approach instantly but require to keep a copy for reference. What access would you recommend to keep the billing cost to a minimum?
Correct
Incorrect
Question 39 of 50
39. Question
1 point(s)
With S3 Versioning enabled on the bucket, how will billing be enforced using the same key for upload for the following scenario?
• Total days bucket in utilize: 25 days.
• 1st File uploaded on 1st Day of utilize – 1 GB.
• 2nd File uploaded within the same bucket on the 15th Day of utilize – 5 GB.
Correct
Incorrect
Question 40 of 50
40. Question
1 point(s)
You have a version enabled S3 bucket. You have accidentally removed an object which contains three versions. You would need to restore the drawn object. What can be done?
Correct
Incorrect
Question 41 of 50
41. Question
1 point(s)
You have an application that notes application logs to version enabled S3 bucket. Each object has numerous versions attached to it. After 60 days, the application removes the objects in S3 through DELETE API on the object. However, in next month’s bill, you see payment for S3 utilization on the bucket. What could have caused this?
Correct
Incorrect
Question 42 of 50
42. Question
1 point(s)
Your company created a video-sharing website on EC2 within the US. The S3 bucket in us- east-1 is used to store the video files. The website has been receiving excellent feedback, and your company decided to grow the website all over the world. However, customers in Europe and Asia launched into complaining that website access, upload, and download of video files are slow. How can you resolve the issue? (choose two options)
Correct
Incorrect
Question 43 of 50
43. Question
1 point(s)
What does cross-region replication require Versioning to be enabled on?
Correct
Incorrect
Question 44 of 50
44. Question
1 point(s)
A company that has an existing VPC in us-east-1 has two subnets in us-east-1b. They are running on some EC2 instances, each in both subnets. They need a small latency standard file system for all instances to contribute files for heavy workloads. They have built the AWS EFS mounted for all the AWS EC2 instances and helped files across all the AWS EC2 instances. Your task is to increase the number of instances because of an increase in workloads. You created a new subnet in us-east-1c and spotted few instances. When you attempted to mount the previously created EFS on new EC2 instances, the operation is unsuccessful. What could be the reason?
Correct
Incorrect
Question 45 of 50
45. Question
1 point(s)
You have an AWS setup that has running VPC in us-east-1. You have a bunch of 20 Ec2 instances connected to the AWS EFS with mount spots on all running VPCs availability zones. If your company appealed you to copy the same scenario in another VPC within us-east-1, retain the same EFS volume. How will you achieve this?
Correct
Incorrect
Question 46 of 50
46. Question
1 point(s)
Which of the following statements is true regarding the recently created security group that permits Secure Shell (SSH) to link the instances and communicate between EC2 instances and EFS?
Correct
Incorrect
Question 47 of 50
47. Question
1 point(s)
Two VPCs in separate regions (VPC A and VPC B) peered with each other. You have launched an EFS for VPC A. When you attempt to mount the EFS on EC2 instances on VPC B, you receive a connection timed out error. What can cause this? ( choose two options )
Correct
Incorrect
Question 48 of 50
48. Question
1 point(s)
You have launched AWS EFS with default settings and mounted it on an EC2 instance. Because of regulatory policies, your company requests you to encrypt data stored on EFS. What would you do to enable encryption?
Correct
Incorrect
Question 49 of 50
49. Question
1 point(s)
You have launched AWS EFS with default settings and mounted it on an EC2 instance. Because of regulatory policies, your company requests you to encrypt data during traverse to EFS. What would you do to enable encryption during traverse?
Correct
Incorrect
Question 50 of 50
50. Question
1 point(s)
You are developing a content-serving web-based application using 20 Ec2 instances. The EC2 instances are all load-balanced, and content storage for the instances will continue the same. You select AWS EFS to act as a simple storage archive. Your web-based application requires to have as low latency as desirable when delivering content to web users. Which of the following options is the finest choice for this scenario?
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.