Exam 13: AWS Certified SysOps Administrator (SOA-C01)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A user has setup an EBS backed instance and a CloudWatch alarm when the CPU utilization is more than 65%. The user has setup the alarm to watch it for 5 periods of 5 minutes each. The CPU utilization is 60% between 9 AM to 6 PM. The user has stopped the EC2 instance for 15 minutes between 11 AM to 11:15 AM. What will be the status of the alarm at 11:30 AM?

(Multiple Choice)
4.8/5
(27)

What is the minimum duration when setting an alarm on a detailed monitoring metric in Cloud-Watch?

(Multiple Choice)
4.8/5
(25)

An application is currently deployed on several Amazon EC2 instances that reside within a VPC. Due to compliance requirements, the EC2 instances cannot have access to the public internet. SysOps Administrators require SSH access to EC2 instances from their corporate office to perform maintenance and other administrative tasks. Which combination of actions should be taken to permit SSH access to the EC2 instances while meeting the compliance requirements? (Choose two.)

(Multiple Choice)
4.9/5
(35)

An Amazon EC2 instance has a secondary Amazon Elastic Block Store (EBS) volume attached that contains sensitive data. A new company policy requires the secondary volume to be encrypted at rest. Which solution will meet this requirement?

(Multiple Choice)
4.8/5
(34)

A database is running on an Amazon RDS Multi-AZ DB instance. A recent security audit found the database to be cut of compliance because it was not encrypted. Which approach will resolve the encryption requirement?

(Multiple Choice)
4.9/5
(40)

Which of the below mentioned options is not a best practice to securely manage the AWS access credentials?

(Multiple Choice)
4.8/5
(43)

A corporate policy requires all new infrastructure deployments to use scalable and reusable resources to improve resources delivery times. The policy also restricts resource configuration management to the systems operations team. The development team requests the ability to deploy resources on demand in an effort to streamline their software development lifecycle. What can the systems operations team do to ensure company policy is followed while also meeting the development team's requests?

(Multiple Choice)
4.8/5
(36)

A company's website went down for several hours. The root cause was a full disk on one of the company's Amazon EC2 instances. Which steps should the SysOps Administrator take to prevent this from happening in the future?

(Multiple Choice)
5.0/5
(42)

A user is trying to delete an Auto Scaling group from CLI. Which of the below mentioned steps are to be performed by the user?

(Multiple Choice)
4.9/5
(43)

The Security team at AnyCompany discovers that some employees have been using individual AWS accounts that are not under the control of AnyCompany. The team has requested that those individual accounts be linked to the central organization using AWS Organizations. Which action should a SysOps Administrator take to accomplish this?

(Multiple Choice)
4.7/5
(30)

A company creates custom AMI images by launching new Amazon EC2 instances from an AWS CloudFormation template. It installs and configures necessary software through AWS OpsWorks, and takes images of each EC2 instance. The process of installing and configuring software can take between 2 to 3 hours, but at times, the process stalls due to installation errors. The SysOps Administrator must modify the CloudFormation template so if the process stalls, the entire stack will fail and roll back. Based on these requirements, what should be added to the template?

(Multiple Choice)
4.9/5
(25)

A user is trying to connect to a running EC2 instance using SSH. However, the user gets a Host key not found error. Which of the below mentioned options is a possible reason for rejection?

(Multiple Choice)
4.7/5
(35)

A SysOps administrator is re-architecting an application. The SysOps administrator has moved the database from a public subnet, where the database used a public endpoint, into a private subnet to restrict access from the public network. After this change, an AWS Lambda function that requires read access to the database cannot connect to the database. The SysOps administrator must resolve this issue without compromising security. Which solution meets these requirements?

(Multiple Choice)
4.8/5
(26)

Do Amazon EBS volumes persist independently from the running life of an Amazon EC2 instance?

(Multiple Choice)
5.0/5
(37)

A company wants to review the security requirements of Glacier. Which of the below mentioned statements is true with respect to the AWS Glacier data security?

(Multiple Choice)
4.8/5
(38)

A user has created a VPC with CIDR 20.0.0.0/16 using VPC Wizard. The user has created a public CIDR (20.0.0.0/24) and a VPN only subnet CIDR (20.0.1.0/24) along with the hardware VPN access to connect to the user's data center. Which of the below mentioned components is not present when the VPC is setup with the wizard?

(Multiple Choice)
4.8/5
(38)

What is a security group in Amazon AWS?

(Multiple Choice)
4.8/5
(42)

A user is using Cloudformation to launch an EC2 instance and then configure an application after the instance is launched. The user wants the stack creation of ELB and AutoScaling to wait until the EC2 instance is launched and configured properly. How can the user configure this?

(Multiple Choice)
4.8/5
(30)

An IAM group is a:

(Multiple Choice)
4.8/5
(36)

A SysOps Administrator has been asked to configure user-defined cost allocation tags for a new AWS account. The company is using AWS Organizations for account management. What should the Administrator do to enable user-defined cost allocation tags?

(Multiple Choice)
4.8/5
(41)
Showing 401 - 420 of 976
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)