getcertified4sure.com

The only aws sysops dumps resources for you




Ucertify offers free demo for aws certified sysops administrator associate exam. "AWS Certified SysOps Administrator Associate", also known as aws sysops exam questions exam, is a Amazon Certification. This set of posts, Passing the Amazon aws sysops exam exam, will help you answer those questions. The sysops aws Questions & Answers covers all the knowledge points of the real exam. 100% real Amazon aws certified sysops administrator associate level dumps exams and revised by experts!

Q1. - (Topic 3) 

Which of the following statements about this S3 bucket policy is true? 

A. Denies the server with the IP address 192.166 100.0 full access to the "mybucket" bucket 

B. Denies the server with the IP address 192.166 100.188 full access to the "mybucket bucket 

C. Grants all the servers within the 192 168 100 0/24 subnet full access to the "mybucket" bucket 

D. Grants all the servers within the 192 168 100 188/32 subnet full access to the "mybucket" bucket 

Answer:


Q2. - (Topic 3) 

A user has configured ELB with SSL using a security policy for secure negotiation between the client and load balancer. Which of the below mentioned SSL protocols is not supported by the security policy? 

A. TLS 1.3 

B. TLS 1.2 

C. SSL 2.0 

D. SSL 3.0 

Answer:

Explanation: 

Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. Elastic Load Balancing supports the following versions of the SSL protocol: TLS 1.2 TLS 1.1 TLS 1.0 SSL 3.0 SSL 2.0 


Q3. - (Topic 2) 

An organization has created 50 IAM users. The organization wants that each user can change their password but cannot change their access keys. How can the organization achieve this? 

A. The organization has to create a special password policy and attach it to each user 

B. The root account owner has to use CLI which forces each IAM user to change their password on first login 

C. By default each IAM user can modify their passwords 

D. The root account owner can set the policy from the IAM console under the password policy screen 

Answer:

Explanation: 

With AWS IAM, organizations can use the AWS Management Console to display, create, change or delete a password policy. As a part of managing the password policy, the user can enable all users to manage their own passwords. If the user has selected the option which allows the IAM users to modify their password, he does not need to set a separate policy for the users. This option in the AWS console allows changing only the password. 


Q4. - (Topic 2) 

A user has setup a billing alarm using CloudWatch for $200. The usage of AWS exceeded $200 after some days. The user wants to increase the limit from $200 to $400? What should the user do? 

A. Create a new alarm of $400 and link it with the first alarm 

B. It is not possible to modify the alarm once it has crossed the usage limit 

C. Update the alarm to set the limit at $400 instead of $200 

D. Create a new alarm for the additional $200 amount 

Answer:

Explanation: 

AWS CloudWatch supports enabling the billing alarm on the total AWS charges. The estimated charges are calculated and sent several times daily to CloudWatch in the form of metric data. This data will be stored for 14 days. This data also includes the estimated charges for every service in AWS used by the user, as well as the estimated overall AWS charges. If the user wants to increase the limit, the user can modify the alarm and specify a new threshold. 


Q5. - (Topic 2) 

A user has configured ELB with two EBS backed EC2 instances. The user is trying to understand the DNS access and IP support for ELB. Which of the below mentioned statements may not help the user understand the IP mechanism supported by ELB? 

A. The client can connect over IPV4 or IPV6 using Dualstack 

B. ELB DNS supports both IPV4 and IPV6 

C. Communication between the load balancer and back-end instances is always through IPV4 

D. The ELB supports either IPV4 or IPV6 but not both 

Answer:

Explanation: 

Elastic Load Balancing supports both Internet Protocol version 6 (IPv6. and Internet Protocol version 4 (IPv4.. Clients can connect to the user’s load balancer using either IPv4 or IPv6 (in EC2-Classic. DNS. However, communication between the load balancer and its back-end instances uses only IPv4. The user can use the Dualstack-prefixed DNS name to enable IPv6 support for communications between the client and the load balancers. Thus, the clients are able to access the load balancer using either IPv4 or IPv6 as their individual connectivity needs dictate. 


Q6. - (Topic 3) 

A user has enabled versioning on an S3 bucket. The user is using server side encryption for data at rest. If the user is supplying his own keys for encryption (SSE-C., what is recommended to the user for the purpose of security? 

A. The user should not use his own security key as it is not secure 

B. Configure S3 to rotate the user’s encryption key at regular intervals 

C. Configure S3 to store the user’s keys securely with SSL 

D. Keep rotating the encryption key manually at the client side 

Answer:

Explanation: 

AWS S3 supports client side or server side encryption to encrypt all data at Rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key (SSE-C.. Since S3 does not store the encryption keys in SSE-C, it is recommended that the user should manage keys securely and keep rotating them regularly at the client side version. 


Q7. - (Topic 3) 

A user has created a VPC with CIDR 20.0.0.0/16 using the wizard. The user has created a public subnet CIDR (20.0.0.0/24. and VPN only subnets CIDR (20.0.1.0/24. along with the 

VPN gateway (vgw-12345. to connect to the user’s data centre. The user’s data centre has CIDR 172.28.0.0/12. The user has also setup a NAT instance (i-123456. to allow traffic to the internet from the VPN subnet. Which of the below mentioned options is not a valid entry for the main route table in this scenario? 

A. Destination: 20.0.1.0/24 and Target: i-12345 

B. Destination: 0.0.0.0/0 and Target: i-12345 

C. Destination: 172.28.0.0/12 and Target: vgw-12345 

D. Destination: 20.0.0.0/16 and Target: local 

Answer:

Explanation: 

The user can create subnets as per the requirement within a VPC. If the user wants to connect VPC from his own data centre, he can setup a public and VPN only subnet which uses hardware VPN access to connect with his data centre. When the user has configured this setup with Wizard, it will create a virtual private gateway to route all traffic of the VPN subnet. If the user has setup a NAT instance to route all the internet requests then all requests to the internet should be routed to it. All requests to the organization’s DC will be routed to the VPN gateway. Here are the valid entries for the main route table in this scenario: Destination: 0.0.0.0/0 & Target: i-12345 (To route all internet traffic to the NAT Instance. Destination: 172.28.0.0/12 & Target: vgw-12345 (To route all the organization’s data centre traffic to the VPN gateway. Destination: 20.0.0.0/16 & Target: local (To allow local routing in VPC. 


Q8. - (Topic 1) 

You have two Elastic Compute Cloud (EC2) instances inside a Virtual Private Cloud (VPC) in the same Availability Zone (AZ) but in different subnets. One instance is running a database and the other instance an application that will interface with the database. You want to confirm that they can talk to each other for your application to work properly. 

Which two things do we need to confirm in the VPC settings so that these EC2 instances can communicate inside the VPC? Choose 2 answers 

A. A network ACL that allows communication between the two subnets. 

B. Both instances are the same instance class and using the same Key-pair. 

C. That the default route is set to a NAT instance or internet Gateway (IGW) for them to communicate. 

D. Security groups are set to allow the application host to talk to the database on the right port/protocol. 

Answer: A,D 


Q9. - (Topic 2) 

A user is planning to setup infrastructure on AWS for the Christmas sales. The user is planning to use Auto Scaling based on the schedule for proactive scaling. What advise would you give to the user? 

A. It is good to schedule now because if the user forgets later on it will not scale up 

B. The scaling should be setup only one week before Christmas 

C. Wait till end of November before scheduling the activity 

D. It is not advisable to use scheduled based scaling 

Answer:

Explanation: 

Auto Scaling based on a schedule allows the user to scale the application in response to predictable load changes. The user can specify any date in the future to scale up or down during that period. As per Auto Scaling the user can schedule an action for up to a month in the future. Thus, it is recommended to wait until end of November before scheduling for Christmas. 


Q10. - (Topic 2) 

A user has created a queue named “myqueue” with SQS. There are four messages published to queue which are not received by the consumer yet. If the user tries to delete the queue, what will happen? 

A. A user can never delete a queue manually. AWS deletes it after 30 days of inactivity on queue 

B. It will delete the queue 

C. It will initiate the delete but wait for four days before deleting until all messages are deleted automatically. 

D. I t will ask user to delete the messages first 

Answer:

Explanation: 

SQS allows the user to move data between distributed components of applications so they can perform different tasks without losing messages or requiring each component to be always available. The user can delete a queue at any time, whether it is empty or not. It is important to note that queues retain messages for a set period of time. By default, a queue retains messages for four days.