AWS-SysOps Exam - AWS Certified SysOps Administrator Associate

certleader.com

Q1. - (Topic 2) 

A user is checking the CloudWatch metrics from the AWS console. The user notices that the CloudWatch data is coming in UTC. The user wants to convert the data to a local time zone. How can the user perform this? 

A. In the CloudWatch dashboard the user should set the local timezone so that CloudWatch shows the data only in the local time zone 

B. In the CloudWatch console select the local timezone under the Time Range tab to view the data as per the local timezone 

C. The CloudWatch data is always in UTC; the user has to manually convert the data 

D. The user should have send the local timezone while uploading the data so that CloudWatch will show the data only in the local timezone 

Answer:

Explanation: 

If the user is viewing the data inside the CloudWatch console, the console provides options to filter values either using the relative period, such as days/hours or using the Absolute tab where the user can provide data with a specific date and time. The console also provides the option to search using the local timezone under the time range caption in the console because the time range tab allows the user to change the time zone. 

Q2. - (Topic 2) 

A user has created an ELB with Auto Scaling. Which of the below mentioned offerings from ELB helps the user to stop sending new requests traffic from the load balancer to the EC2 instance when the instance is being deregistered while continuing in-flight requests? 

A. ELB sticky session 

B. ELB deregistration check 

C. ELB connection draining 

D. ELB auto registration Off 

Answer:

Explanation: 

The Elastic Load Balancer connection draining feature causes the load balancer to stop sending new requests to the back-end instances when the instances are deregistering or become unhealthy, while ensuring that inflight requests continue to be served. 

Q3. - (Topic 1) 

An organization has configured a VPC with an Internet Gateway (IGW). pairs of public and 

private subnets (each with one subnet per Availability Zone), and an Elastic Load Balancer (ELB) configured to use the public subnets The application s web tier leverages the ELB. Auto Scaling and a mum-AZ RDS database instance The organization would like to eliminate any potential single points ft failure in this design. 

What step should you take to achieve this organization's objective? 

A. Nothing, there are no single points of failure in this architecture. 

B. Create and attach a second IGW to provide redundant internet connectivity. 

C. Create and configure a second Elastic Load Balancer to provide a redundant load balancer. 

D. Create a second multi-AZ RDS instance in another Availability Zone and configure replication to provide a redundant database. 

Answer:

Q4. - (Topic 3) 

Amazon EBS snapshots have which of the following two characteristics? (Choose 2.) Choose 2 answers 

A. EBS snapshots only save incremental changes from snapshot to snapshot 

B. EBS snapshots can be created in real-time without stopping an EC2 instance 

C. EBS snapshots can only be restored to an EBS volume of the same size or smaller 

D. EBS snapshots can only be restored and mounted to an instance in the same Availability Zone as the original EBS volume 

Answer: A,D 

Q5. - (Topic 2) 

A user has created an ELB with three instances. How many security groups will ELB create by default? 

A. 3 

B. 5 

C. 2 

D. 1 

Answer:

Explanation: 

Elastic Load Balancing provides a special Amazon EC2 source security group that the user can use to ensure that back-end EC2 instances receive traffic only from Elastic Load Balancing. This feature needs two security groups: the source security group and a security group that defines the ingress rules for the back-end instances. To ensure that traffic only flows between the load balancer and the back-end instances, the user can add or modify a rule to the back-end security group which can limit the ingress traffic. Thus, it can come only from the source security group provided by Elastic load Balancing. 

Q6. - (Topic 3) 

A user has setup an EBS backed instance and attached 2 EBS volumes to it. The user has setup a CloudWatch alarm on each volume for the disk data. The user has stopped the EC2 instance and detached the EBS volumes. What will be the status of the alarms on the EBS volume? 

A. OK 

B. Insufficient Data 

C. Alarm 

D. The EBS cannot be detached until all the alarms are removed 

Answer:

Explanation: 

Amazon CloudWatch alarm watches a single metric over a time period that the user specifies and performs one or more actions based on the value of the metric relative to a given threshold over a number of time periods. Alarms invoke actions only for sustained state changes. There are three states of the alarm: OK, Alarm and Insufficient data. In this case since the EBS is detached and inactive the state will be Insufficient. 

Q7. - (Topic 1) 

You use S3 to store critical data for your company Several users within your group currently have lull permissions to your S3 buckets You need to come up with a solution mat does not impact your users and also protect against the accidental deletion of objects. 

Which two options will address this issue? Choose 2 answers 

A. Enable versioning on your S3 Buckets 

B. Configure your S3 Buckets with MFA delete 

C. Create a Bucket policy and only allow read only permissions to all users at the bucket level 

D. Enable object life cycle policies and configure the data older than 3 months to be archived in Glacier 

Answer: A,B 

Q8. - (Topic 2) 

A user is launching an instance. He is on the “Tag the instance” screen. Which of the below mentioned 

information will not help the user understand the functionality of an AWS tag? 

A. Each tag will have a key and value 

B. The user can apply tags to the S3 bucket 

C. The maximum value of the tag key length is 64 unicode characters 

D. AWS tags are used to find the cost distribution of various resources 

Answer:

Explanation: 

AWS provides cost allocation tags to categorize and track the AWS costs. When the user applies tags to his AWS resources, AWS generates a cost allocation report as a comma-separated value (CSV file. with the usage and costs aggregated by those tags. Each tag will have a key-value and can be applied to services, such as EC2, S3, RDS, EMR, etc. The maximum size of a tag key is 128 unicode characters. 

Q9. - (Topic 3) 

An organization has launched 5 instances: 2 for production and 3 for testing. The organization wants that one particular group of IAM users should only access the test instances and not the production ones. How can the organization set that as a part of the policy? 

A. Launch the test and production instances in separate regions and allow region wise access to the group 

B. Define the IAM policy which allows access based on the instance ID 

C. Create an IAM policy with a condition which allows access to only small instances 

D. Define the tags on the test and production servers and add a condition to the IAM policy which allows access to specific tags 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. The user can add conditions as a part of the IAM policies. The condition can be set on AWS Tags, Time, and Client IP as well as on various parameters. If the organization wants the user to access only specific instances he should define proper tags and add to the IAM policy condition. 

The sample policy is shown below. 

"Statement": [ 

"Action": "ec2:*", 

"Effect": "Allow", 

"Resource": "*", 

"Condition": { 

"StringEquals": { 

"ec2:ResourceTag/InstanceType": "Production" 

Q10. - (Topic 2) 

A user has configured CloudWatch monitoring on an EBS backed EC2 instance. If the user has not attached any additional device, which of the below mentioned metrics will always show a 0 value? 

A. DiskReadBytes 

B. NetworkIn 

C. NetworkOut 

D. CPUUtilization 

Answer:

Explanation: 

CloudWatch is used to monitor AWS as the well custom services. For EC2 when the user is monitoring the EC2 instances, it will capture the 7 Instance level and 3 system check parameters for the EC2 instance. Since this is an EBS backed instance, it will not have ephermal storage attached to it. Out of the 7 EC2 metrics, the 4 metrics DiskReadOps, DiskWriteOps, DiskReadBytes and DiskWriteBytes are disk related data and available only when there is ephermal storage attached to an instance. For an EBS backed instance without any additional device, this data will be 0.