AWS-SysOps Exam - AWS Certified SysOps Administrator Associate

certleader.com

Q1. - (Topic 3) 

A user has created a VPC with public and private subnets using the VPC wizard. The VPC has CIDR 

20.0.0.0/16. The private subnet uses CIDR 20.0.0.0/24 . The NAT instance ID is i-a12345. Which of the below mentioned entries are required in the main route table attached with the private subnet to allow instances to connect with the internet? 

A. Destination: 0.0.0.0/0 and Target: i-a12345 

B. Destination: 20.0.0.0/0 and Target: 80 

C. Destination: 20.0.0.0/0 and Target: i-a12345 

D. Destination: 20.0.0.0/24 and Target: i-a12345 

Answer:

Explanation: 

A user can create a subnet with VPC and launch instances inside that subnet. If the user has created a public private subnet, the instances in the public subnet can receive inbound traffic directly from the Internet, whereas the instances in the private subnet cannot. If these subnets are created with Wizard, AWS will create two route tables and attach to the subnets. The main route table will have the entry “Destination: 0.0.0.0/0 and Target: ia12345”, which allows all the instances in the private subnet to connect to the internet using NAT. 

Q2. - (Topic 2) 

A user is publishing custom metrics to CloudWatch. Which of the below mentioned statements will help the user understand the functionality better? 

A. The user can use the CloudWatch Import tool 

B. The user should be able to see the data in the console after around 15 minutes 

C. If the user is uploading the custom data, the user must supply the namespace, timezone, and metric name as part of the command 

D. The user can view as well as upload data using the console, CLI and APIs 

Answer:

Explanation: 

AWS CloudWatch supports the custom metrics. The user can always capture the custom data and upload the data to CloudWatch using CLI or APIs. The user has to always include the namespace as a part of the request. However, the other parameters are optional. If the user has uploaded data using CLI, he can view it as a graph inside the console. The data will take around 2 minutes to upload but can be viewed only after around 15 minutes. 

Q3. - (Topic 2) 

A user has configured Elastic Load Balancing by enabling a Secure Socket Layer (SSL. negotiation 

configuration known as a Security Policy. Which of the below mentioned options is not part of this secure policy while negotiating the SSL connection between the user and the client? 

A. SSL Protocols 

B. Client Order Preference 

C. SSL Ciphers 

D. Server Order Preference 

Answer:

Explanation: 

Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. A security policy is a combination of SSL Protocols, SSL Ciphers, and the Server Order Preference option. 

Q4. - (Topic 3) 

A user has created a Cloudformation stack. The stack creates AWS services, such as EC2 instances, ELB, AutoScaling, and RDS. While creating the stack it created EC2, ELB and AutoScaling but failed to create RDS. What will Cloudformation do in this scenario? 

A. Cloudformation can never throw an error after launching a few services since it verifies all the steps before launching 

B. It will warn the user about the error and ask the user to manually create RDS 

C. Rollback all the changes and terminate all the created services 

D. It will wait for the user’s input about the error and correct the mistake after the input 

Answer:

Explanation: 

AWS Cloudformation is an application management tool which provides application modelling, deployment, configuration, management and related activities. The AWS Cloudformation stack is a collection of AWS resources which are created and managed as a single unit when AWS CloudFormation instantiates a template. If any of the services fails Amazon AWS-SysOps : Practice Test 

to launch, Cloudformation will rollback all the changes and terminate or delete all the created services. 

Q5. - (Topic 3) 

Which of the following statements about this S3 bucket policy is true? 

A. Denies the server with the IP address 192.166 100.0 full access to the "mybucket" bucket 

B. Denies the server with the IP address 192.166 100.188 full access to the "mybucket bucket 

C. Grants all the servers within the 192 168 100 0/24 subnet full access to the "mybucket" bucket 

D. Grants all the servers within the 192 168 100 188/32 subnet full access to the "mybucket" bucket 

Answer:

Q6. - (Topic 3) 

An organization has setup Auto Scaling with ELB. Due to some manual error, one of the instances got 

rebooted. Thus, it failed the Auto Scaling health check. Auto Scaling has marked it for replacement. How can the system admin ensure that the instance does not get terminated? 

A. Update the Auto Scaling group to ignore the instance reboot event 

B. It is not possible to change the status once it is marked for replacement 

C. Manually add that instance to the Auto Scaling group after reboot to avoid replacement 

D. Change the health of the instance to healthy using the Auto Scaling commands 

Answer:

Explanation: 

After an instance has been marked unhealthy by Auto Scaling, as a result of an Amazon EC2 or ELB health check, it is almost immediately scheduled for replacement as it will never automatically recover its health. If the user knows that the instance is healthy then he can manually call the SetInstanceHealth action (or the as-setinstance- health command from CLI. to set the instance's health status back to healthy. Auto Scaling will throw an error if the instance is already terminating or else it will mark it healthy. 

Q7. - (Topic 3) 

A user is displaying the CPU utilization, and Network in and Network out CloudWatch metrics data of a single instance on the same graph. The graph uses one Y-axis for CPU utilization and Network in and another Y-axis for Network out. Since Network in is too high, the CPU utilization data is not visible clearly on graph to the user. How can the data be viewed better on the same graph? 

A. It is not possible to show multiple metrics with the different units on the same graph 

B. Add a third Y-axis with the console to show all the data in proportion 

C. Change the axis of Network by using the Switch command from the graph 

D. Change the units of CPU utilization so it can be shown in proportion with Network 

Answer:

Explanation: 

Amazon CloudWatch provides the functionality to graph the metric data generated either by the AWS services or the custom metric to make it easier for the user to analyse. It is possible to show the multiple metrics with different units on the same graph. If the graph is not plotted properly due to a difference in the unit data over two metrics, the user can change the Y-axis of one of the graph by selecting that graph and clicking on the Switch option. 

Q8. - (Topic 3) 

A user has launched an EC2 Windows instance from an instance store backed AMI. The user has also set the Instance initiated shutdown behavior to stop. What will happen when the user shuts down the OS? 

A. It will not allow the user to shutdown the OS when the shutdown behaviour is set to Stop 

B. It is not possible to set the termination behaviour to Stop for an Instance store backed AMI instance 

C. The instance will stay running but the OS will be shutdown 

D. The instance will be terminated 

Answer:

Explanation: 

When the EC2 instance is launched from an instance store backed AMI, it will not allow the user to configure the shutdown behaviour to “Stop”. It gives a warning that the instance does not have the EBS root volume. 

Q9. - (Topic 3) 

An organization has created one IAM user and applied the below mentioned policy to the user. What entitlements do the IAM users avail with this policy? 

"Version": "2012-10-17", 

"Statement": [ 

"Effect": "Allow", 

"Action": "ec2:Describe*", 

"Resource": "*" 

}, 

"Effect": "Allow" 

"Action": [ 

"cloudwatch:ListMetrics", 

"cloudwatch:GetMetricStatistics", 

"cloudwatch:Describe*" 

], 

"Resource": "*" 

}, 

"Effect": "Allow", 

"Action": "autoscaling:Describe*", 

"Resource": "*" 

A. The policy will allow the user to perform all read only activities on the EC2 services 

B. The policy will allow the user to list all the EC2 resources except EBS 

C. The policy will allow the user to perform all read and write activities on the EC2 services 

D. The policy will allow the user to perform all read only activities on the EC2 services except load Balancing 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. If an organization wants to setup read only access to EC2 for a particular user, they should mention the action in the IAM policy which entitles the user for Describe rights for EC2, CloudWatch, Auto Scaling and ELB. In the policy shown below, the user will have read only access for EC2 and EBS, CloudWatch and Auto Scaling. Since ELB is not mentioned as a part of the list, the user will not have access to ELB. 

"Version": "2012-10-17", 

"Statement": [ 

"Effect": "Allow", 

"Action": "ec2:Describe*", 

"Resource": "*" 

}, 

"Effect": "Allow", 

"Action": [ 

"cloudwatch:ListMetrics", 

"cloudwatch:GetMetricStatistics", 

"cloudwatch:Describe*" 

], 

"Resource": "*" 

}, 

"Effect": "Allow", 

"Action": "autoscaling:Describe*", 

"Resource": "*" 

Q10. - (Topic 3) 

A user has enabled versioning on an S3 bucket. The user is using server side encryption for data at Rest. If the user is supplying his own keys for encryption (SSE-C., which of the below mentioned statements is true? 

A. The user should use the same encryption key for all versions of the same object 

B. It is possible to have different encryption keys for different versions of the same object 

C. AWS S3 does not allow the user to upload his own keys for server side encryption 

D. The SSE-C does not work when versioning is enabled 

Answer:

Explanation: 

AWS S3 supports client side or server side encryption to encrypt all data at rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key (SSE-C.. If the bucket is versioning-enabled, each object version uploaded by the user using the SSE-C feature can have its own encryption key. The user is responsible for tracking which encryption key was used for which object's version