In AWS you need to create a subnet along with CIDR block. The CIDR block for
subnet may be same as CIDR block for VPC that has a single subnet or a subset that is
used to enable multiple subnets. The block size which is allowed is between a /26
netmask and /8 netmask. What is the maximum and a minimum number of IP
addresses as per AWS and if you created a VPC with CIDR block of 121.0.0.0/24 then
how many IP address is supported by this VPC to allocate resources in it?
Correct
Incorrect
Question 2 of 50
2. Question
1 point(s)
A government needs to develop an application that is highly available because the
purpose of the application is to manage unexpected load but a maximum number of
request is 10,000 request that needs to be handled. Do they want to give access to read
data from Dynamo table that contain the result of an online polling system? How you
as a solution architect develop this application?
Correct
Incorrect
Question 3 of 50
3. Question
1 point(s)
A company has an application in AWS running on EC2 instance. In the instance,
critical data is stored, and in case of failure of EBS volume, the RTO and RPO is less
than 1 min then how you as solution architect design this application?
Correct
Incorrect
Question 4 of 50
4. Question
1 point(s)
An organization hires an auditor for viewing logs of all API events on AWS by its all
AWS accounts. For that auditor, they only want read access to logs only not to all
accounts. Then how they will give access to the auditor for that purpose?
Correct
Incorrect
Question 5 of 50
5. Question
1 point(s)
There are two institutes that have its own AWS accounts. Now they want to connect
to central VPC for identity validation then how they connect to it in the best way?
Correct
Incorrect
Question 6 of 50
6. Question
1 point(s)
A company needs to create a huge scale of the confidential data web server in AWS.
The data will be stored in S3. Now they want that data is not accessible publicly from
S3 and for that accessing data they use CloudFront, then how they do this?
Correct
Incorrect
Question 7 of 50
7. Question
1 point(s)
An organization has legacy software that is hosted on EC2 instance with license tied
to MAC address. As a solution architect, you know that when the instance is restarted
the MAC address that is tied to it, will lose then what the solution you give to overcome
this issue was?
Correct
Incorrect
Question 8 of 50
8. Question
1 point(s)
A company has a variety of DHCP option, but at a time only one set of DHCP is
associated with a VPC. DHCP is a standard that provides a way to pass configuration
information to host in the TCP/IP model. Now after creating the first set of DHCP, they
want to change the option of DHCP because of finding some error in the first set. How
as a solution architect you give the solution to achieve this?
Correct
Incorrect
Question 9 of 50
9. Question
1 point(s)
An organization has different departments for analyzing petabyte data from data
warehouse using Redshift. The single query issued by the first department took 1-2
hours for analysing while the query by the second department took 5-10 minutes for
analysing. Now the issue was that once the first department queries finished then
second department queries are starting analysing. The organization wants that second
queries do not wait for completion then how they resolve this issue in cost effective
way?
Correct
Incorrect
Question 10 of 50
10. Question
1 point(s)
You deployed a 3-tier application in on-premises and now you want to shift is to AWS
cloud with larger scalability and elasticity. In this database tier used to share storage
clustering to provide database failover capability and use multiple read slaves for
scaling. The web tier share read-only data using network distributing file system. The
app tier uses a clustering mechanism for discovery and shared session state that
depends on IP multicast. the distributed file system directory and Data on all servers
are backed up weekly to off sites-tape. For this application which database and AWS
storage are used?
Correct
Incorrect
Question 11 of 50
11. Question
1 point(s)
You have multi-tier application running on a VPC which is not connected to corporate
network. Now for managing all EC2 instances running in public and private subnets,
they are connecting to VPC over the internet. The bastion security group with Microsoft
RDP has only authorized for accessing to application instance security groups now they
want some more administrative access to instances in VPC for further use. How they
deploy bastion to fulfill this requirement?
Correct
Incorrect
Question 12 of 50
12. Question
1 point(s)
An institution has its teaching staff of software department which want to run
applications — this application access resources of the institution in AWS. All staff has
its user credentials in the institute authentication system, and it is not supported SAML
2.0. Now the institution wants to use SSO (Single sign-on) rather than creating
individual IAM user for each staff member. How they achieve this? (Choose any 2)
Correct
Incorrect
Question 13 of 50
13. Question
1 point(s)
You are working as an employee in a company, and you are terminating EC2 instances
in a production environment. Now you want to ensure that this termination does not
happen and for that add an extra layer of defense. How you do this? (Choose any 2)
Correct
Incorrect
Question 14 of 50
14. Question
1 point(s)
A university HQ is in US and branch offices all over the world and is using a logistics
software with a multi-regional deployment on AWS in Asia, Europe and USA. The
logistics software has a 3-tier architecture and currently uses MySQL 5.6 for data
persistence. Each region has deployed its own database. In the HQ region, you run an
hourly batch process reading data from every region to compute cross-regional reports
that are sent by email to all offices. This batch process must be completed as fast as
possible, to optimize logistics quickly. How do you build the database architecture in
order to meet the requirements?
Correct
Incorrect
Question 15 of 50
15. Question
1 point(s)
A company wants to create a public website in AWS. For the website database and
application server must be running on VPC of AWS and database is able to connect over
the internet for upgradation. You also want that database does not get any incoming
requests from the internet. How you as a professional solution architect develop the
application?
Correct
Incorrect
Question 16 of 50
16. Question
1 point(s)
A company needs to cut costs and for that their accountant think to use consolidated
billing. The billing set up should be simple and understandable to know the usage of
resources. Which setup of consolidated billing is used for this purpose to save money?
(Choose any 2)
Correct
Incorrect
Question 17 of 50
17. Question
1 point(s)
You need to monitor changes in the environment that are created in AWS Cloud with
all incoming and outgoing traffic from the environment. How you do this in the best
possible way? (Choose any 2)
Correct
Incorrect
Question 18 of 50
18. Question
1 point(s)
You have a library of on-demand MP4 files need to be streamed in public on new
video webinar website. The files are archived and are expected to be streamed globally,
primarily on mobile devices. From the following option which is best? (Choose any 2)
Correct
Incorrect
Question 19 of 50
19. Question
1 point(s)
A company has a hybrid structure in AWS where it integrates its on-premises resources.
The main objective is to run customer data collection processes in AWS and then
transfer a large amount of data to its on-premises environment from EC2 instances
daily. But because of transferring huge amount of data, the cost is too high which cause
a crash of project. How you as a solution architect give a solution to overcome this
issue?
Correct
Incorrect
Question 20 of 50
20. Question
1 point(s)
An organization has an application that is used for social networking. The
application is deployed in the Asia Pacific region with 100 instances. For enhancing
availability, you want to deploy the application in multiple regions. But for that, he
wants to use the same key pairs used in the Asia Pacific region instead of multiple key
pairs. How they do this?
Correct
Incorrect
Question 21 of 50
21. Question
1 point(s)
A company uses 8 instances in a placement group. Launching of all these instances
are at the same time, and they are performing as per requirement. Now they need to
add more instances to the group, but when they do this, they will receive an error of
capacity. How they resolve this error?
Correct
Incorrect
Question 22 of 50
22. Question
1 point(s)
You and your 3 staff members want access to document server which is on VPC of
Organization. Staff members have their own VPC’s on AWS and via these VPC’s they
can access the document server, and they do not have the capability to access each other
VPCs. How an organization does this?
Correct
Incorrect
Question 23 of 50
23. Question
1 point(s)
A company has an application and want to shift it to AWS cloud. This application
only communicates to EC2 instances in VPC. The application currently relies on
hardcoded hostnames for intercommunication between the three tiers. You’ve
migrated the application and configured the multi-tiers using the internal Elastic Load
Balancer for serving the traffic. The load balancer hostname is demo-app.us-west1.elb.amazonaws.com. The current hard-coded hostname in your application used to
communicate between your multi-tier applications is demo.example.com. What is the
best method for architecting this setup to have as much high availability as possible?
Choose the correct answer from the options below
Correct
Incorrect
Question 24 of 50
24. Question
1 point(s)
You are assigned duty by an organization to access resources of AWS; events occur
in AWS and logs of VPC records that will occur in AWS for read-only then how an
organization gives access to you with any compromise on the security of environment?
Correct
Incorrect
Question 25 of 50
25. Question
1 point(s)
An organization has multiple mobile users, and for them, they build a mobile
application. The main purpose of this application is to communicate with DynamDB
tables and store data in the table. Now the organization wants when the user installs
application they are capable of storing data in DynamoDB. How they do this?
Correct
Incorrect
Question 26 of 50
26. Question
1 point(s)
An institution has three consolidated billing accounts: Admin, teaching staff and IT.
Admin staff has purchased 3RI’s with instance type of m4.xlarge in AZ us-west-1a. In
teaching staff, no instance is running while IT has five m4.xlarge instances running in
same AZ 1a. From all of this department which department get benefits of reserved
instance pricing?
Correct
Incorrect
Question 27 of 50
27. Question
1 point(s)
You have MySQL RDS instance running inside AWS, and now you need disaster
recovery, and for that, you need to read replica of production RDS instance in the onpremises data center. How you perform this replication?
Correct
Incorrect
Question 28 of 50
28. Question
1 point(s)
A company has an application, and now they want to design a hybrid structure to
manage part of application infrastructure in on-premises and Cloud. In infrastructure,
a huge amount of data is consistently transferred. They need low latency and a high
transfer rate. In case of primary failure, they will accept slow traffic at minimal cost.
How you as a solution architect design this hybrid architecture?
Correct
Incorrect
Question 29 of 50
29. Question
1 point(s)
An organization has an application which has a high amount of traffic, and for that,
they enabled auto-scaling in Multi-AZ in order to fulfill the need of the application. But
they observed that few AZ is not receiving any traffic. What was the reason behind this?
Correct
Incorrect
Question 30 of 50
30. Question
1 point(s)
Which origin protocol policy in CloudFront is used to give assurance of
communication with origin is done via HTTP or HTTPS?
Correct
Incorrect
Question 31 of 50
31. Question
1 point(s)
A company has an application which has 4 AZ with multiple EC2 instances along
configured Load Balancer. Now they observe that only one AZ receives traffic how you
as solution architect professional you ensure that all AZ’s will get traffic? (Choose any
2)
Correct
Incorrect
Question 32 of 50
32. Question
1 point(s)
An organization has a three-tier application. In this architecture, the application
layer sends approx. 20 Gbps of data during its peak hours to and from S3. To transfer
data from the private application layer to S3 it uses two NAT gateways in two subnets.
Now they need to ensure that instances will get software patches to form a third-party
repository. How they do this?
Correct
Incorrect
Question 33 of 50
33. Question
1 point(s)
A gaming company has an online gaming server which has requirement of 100,000
IOPS for write performance on EBS volume, while EBS volume can only provide
maximum 20,000 IOPS then which solution from following is best to choose for
reasonable solution regardless of Bandwidth issue?
Correct
Incorrect
Question 34 of 50
34. Question
1 point(s)
You have a Redshift petabyte-scale data warehousing. The data in the Cluster is
easily reproduced from additional data stored in S3. Now you need to reduce the overall
cost of the cluster with it requirements then how you achieve this?
Correct
Incorrect
Question 35 of 50
35. Question
1 point(s)
An organization has an on-premises application, and they expect a big boost in
traffic. Now they need to identify the way to reduce the load to handle scale. They can’t
migrate their application to AWS Cloud in a given period. How they offload traffic from
on-premises application and scale to meet the expected demand cost effectively within
24 hours?
Correct
Incorrect
Question 36 of 50
36. Question
1 point(s)
A company needs a backup strategy for its on-premises storage with the caution of
must using AWS Storage Gateway. Then as a professional solution architect which AWS
Storage gateway is used for the backup purpose?
Correct
Incorrect
Question 37 of 50
37. Question
1 point(s)
An organization client uses organization infrastructure to migrate all of its existing
data center applications and infra to AWS. In its existing infra, there are some legacy
applications that will not work in AWS. Which strategy is used to handle the migration
of legacy applications?
Correct
Incorrect
Question 38 of 50
38. Question
1 point(s)
Convince the client to look for another solution by de-commissioning these
applications and seeking out new ones that will run on AWS.
Correct
Incorrect
Question 39 of 50
39. Question
1 point(s)
An IT department wants all of its organization employees to tighten up logging of
all events that occur on their AWS. Now he assigned a task to you as a solution architect
to make sure that only IT department staff has access to all events across all regions in
a quick, easy and secure way. How you achieve this task?
Correct
Incorrect
Question 40 of 50
40. Question
1 point(s)
An organization wants to perform encryption on data stored on Amazon RDS then
from the following option which describes the encryption in RDS?
Correct
Incorrect
Question 41 of 50
41. Question
1 point(s)
Ahmed uses S3 for static website hosting and its one of friend use website endpoint
to open the website. Now he needs to use CSS on web pages which are stored in another
bucket, and the bucket is public. But now its friend browser does not open the layout
properly. What was the reason behind this?
Correct
Incorrect
Question 42 of 50
42. Question
1 point(s)
A company is setting up a website. This website is very resource demanding and
allocates for images. Now they decided to deliver images via CloudFront along with
delivery of content using a custom domain and work with HTTPS. (Choose any 2)
Correct
Incorrect
Question 43 of 50
43. Question
1 point(s)
From the following given option which option is wrong to reduce attack surface area
as DDoS minimization strategy in AWS?
Correct
Incorrect
Question 44 of 50
44. Question
1 point(s)
An organization took direct connect link from AWS, and now anything on AWS
become faster and reliable. The organization is based in California. So the Direct
Connect Link will go into California. Now organization hired Solution architect to
create multi-region design among US West (N. California) and EU (Frankfurt) region.
When solution architect deploys the architect, he observes that the deployment in US
West (N. California) is very fast and reliable while deployment in EU (Frankfurt) region
is slow and unreliable. How he makes EU (Frankfurt) region more reliable connection?
Correct
Incorrect
Question 45 of 50
45. Question
1 point(s)
A company has Oracle DB workloads on AWS. On AWS public cloud they are using
Oracle RAC configuration. Now they need solution architect to do configuration of
backups for RAC cluster to setup durability. How he met the requirement of the
company?
Correct
Incorrect
Question 46 of 50
46. Question
1 point(s)
An organization has multiple resources and now they need to shift some of the
resources from one region to another. How a solution architect migrate the AMI’s from
one region to another region, but he is unsure that how to migrate PEM keys?
Correct
Incorrect
Question 47 of 50
47. Question
1 point(s)
You have a web application which contains a huge amount of dynamic content. Now
they need to decrease the load time via caching solution. Then how solution architect
provide a solution to reduce the load times when is your user is requesting an
application?
Correct
Incorrect
Question 48 of 50
48. Question
1 point(s)
How you as solution architect establish low latency dedicated connection to an S3
public endpoint over direct connect?
Correct
Incorrect
Question 49 of 50
49. Question
1 point(s)
You have a production load Redshift cluster. Now you have an RTO of one hour and
RPO of one day than how you do configuration of the cluster to meet the requirement?
Correct
Incorrect
Question 50 of 50
50. Question
1 point(s)
An organization has multiple EC2 instances in multiple regions, and they need to
monitor the performance of EC2 instances then how they do this via use CloudWatch?
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.