AWS-SysOps Exam - AWS Certified SysOps Administrator Associate

certleader.com

Q1. - (Topic 1) 

When assessing an organization s use of AWS API access credentials which of the following three credentials should be evaluated? 

Choose 3 answers 

A. Key pairs 

B. Console passwords 

C. Access keys 

D. Signing certificates 

E. Security Group memberships 

Answer: A,C,D 

Explanation: Reference: 

http://media.amazonwebservices.com/AWS_Operational_Checklists.pdf 

Q2. - (Topic 3) 

An AWS account owner has setup multiple IAM users. One IAM user only has CloudWatch access. He has setup the alarm action which stops the EC2 instances when the CPU utilization is below the threshold limit. What will happen in this case? 

A. It is not possible to stop the instance using the CloudWatch alarm 

B. CloudWatch will stop the instance when the action is executed 

C. The user cannot set an alarm on EC2 since he does not have the permission 

D. The user can setup the action but it will not be executed if the user does not have EC2 rights 

Answer:

Explanation: 

Amazon CloudWatch alarms watch a single metric over a time period that the user specifies and performs one or more actions based on the value of the metric relative to a given threshold over a number of time periods. The user can setup an action which stops the instances when their CPU utilization is below a certain threshold for a certain period of time. The EC2 action can either terminate or stop the instance as part of the EC2 action. If the IAM user has read/write permissions for Amazon CloudWatch but not for Amazon EC2, he can still create an alarm. However, the stop or terminate actions will not be performed on the Amazon EC2 instance. 

Q3. - (Topic 3) 

A user is trying to setup a security policy for ELB. The user wants ELB to meet the cipher supported by the client by configuring the server order preference in ELB security policy. Which of the below mentioned 

preconfigured policies supports this feature? 

A. ELBSecurity Policy-2014-01 

B. ELBSecurity Policy-2011-08 

C. ELBDefault Negotiation Policy 

D. ELBSample- OpenSSLDefault Cipher Policy 

Answer:

Explanation: 

Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. If the load balancer is configured to support the Server Order Preference, then the load balancer gets to select the first cipher in its list that matches any one of the ciphers in the client's list. When the user verifies the preconfigured policies supported by ELB, the policy “ELBSecurity Policy-2014-01” supports server order preference. 

Q4. - (Topic 3) 

A user has launched multiple EC2 instances for the purpose of development and testing in the same region. The user wants to find the separate cost for the production and development instances. How can the user find the cost distribution? 

A. The user should download the activity report of the EC2 services as it has the instance ID wise data 

B. It is not possible to get the AWS cost usage data of single region instances separately 

C. The user should use Cost Distribution Metadata and AWS detailed billing 

D. The user should use Cost Allocation Tags and AWS billing reports 

Answer:

Explanation: 

AWS provides cost allocation tags to categorize and track the AWS costs. When the user applies tags to his AWS resources (such as Amazon EC2 instances or Amazon S3 buckets., AWS generates a cost allocation report as a comma-separated value (CSV file. with the usage and costs aggregated by those tags. The user can apply tags which represent business categories (such as cost centres, application names, or instance type – Production/Dev. to organize usage costs across multiple services. 

Q5. - (Topic 3) 

You have a business-to-business web application running in a VPC consisting of an Elastic Load Balancer (ELB), web servers, application servers and a database. Your web application should only accept traffic from pre-defined customer IP addresses. 

Which two options meet this security requirement? Choose 2 answers A. Configure web server VPC security groups to allow traffic from your customers' IPs 

B. Configure your web servers to filter traffic based on the ELB's "X-forwarded-for" header 

C. Configure ELB security groups to allow traffic from your customers' IPs and deny all outbound traffic 

D. Configure a VPC NACL to allow web traffic from your customers' IPs and deny all outbound traffic 

Answer: A,B 

Q6. - (Topic 3) 

An organization has applied the below mentioned policy on an IAM group which has selected the IAM users. What entitlements do the IAM users avail with this policy? 

"Version": "2012-10-17", 

"Statement": [ 

"Effect": "Allow", 

"Action": "*", 

"Resource": "*" 

A. The policy is not created correctly. It will throw an error for wrong resource name 

B. The policy is for the group. Thus, the IAM user cannot have any entitlement to this 

C. It allows full access to all AWS services for the IAM users who are a part of this group 

D. If this policy is applied to the EC2 resource, the users of the group will have full access to the EC2 Resources 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. The IAM group allows the organization to specify permissions for a collection of users. With the below mentioned policy, it will allow the group full access (Admin. to all AWS services. 

"Version": "2012-10-17", 

"Statement": [ 

"Effect": "Allow", 

"Action": "*", 

"Resource": "*" 

Q7. - (Topic 3) 

A user has configured ELB with Auto Scaling. The user suspended the Auto Scaling terminate process only for a while. What will happen to the availability zone rebalancing process (AZRebalance. during this period? 

A. Auto Scaling will not launch or terminate any instances 

B. Auto Scaling will allow the instances to grow more than the maximum size 

C. Auto Scaling will keep launching instances till the maximum instance size 

D. It is not possible to suspend the terminate process while keeping the launch active 

Answer:

Explanation: 

Auto Scaling performs various processes, such as Launch, Terminate, Availability Zone Rebalance (AZRebalance. etc. The AZRebalance process type seeks to maintain a balanced number of instances across Availability Zones within a region. If the user suspends the Terminate process, the AZRebalance process can cause the Auto Scaling group to grow up to ten percent larger than the maximum size. This is because Auto Scaling allows groups to temporarily grow larger than the maximum size during rebalancing activities. If Auto Scaling cannot terminate instances, the Auto Scaling group could remain up to ten percent larger than the maximum size until the user resumes the Terminate process type. 

Q8. - (Topic 3) 

An organization is trying to create various IAM users. Which of the below mentioned options is not a valid IAM username? 

A. John.cloud 

B. john@cloud 

C. John=cloud 

D. john#cloud 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. Whenever the organization is creating an IAM user, there should be a unique ID for each user. The names of users, groups, roles, instance profiles must be alphanumeric, including the following common characters: plus (+., equal (=., comma (,., period (.., at (@., and dash (-.. 

Q9. - (Topic 1) 

You are running a database on an EC2 instance, with the data stored on Elastic Block Store (EBS) for persistence At times throughout the day, you are seeing large variance in the response times of the database queries Looking into the instance with the isolate command you see a lot of wait time on the disk volume that the database's data is stored on. 

What two ways can you improve the performance of the database's storage while maintaining the current persistence of the data? 

Choose 2 answers 

A. Move to an SSD backed instance 

B. Move the database to an EBS-Optimized Instance 

C. T Use Provisioned IOPs EBS 

D. Use the ephemeral storage on an m2 4xiarge Instance Instead 

Answer: A,B 

Q10. - (Topic 2) 

A user is trying to aggregate all the CloudWatch metric data of the last 1 week. Which of the below mentioned statistics is not available for the user as a part of data aggregation? 

A. Aggregate 

B. Sum 

C. Sample data 

D. Average 

Answer:

Explanation: 

Amazon CloudWatch is basically a metrics repository. Either the user can send the custom data or an AWS product can put metrics into the repository, and the user can retrieve the statistics based on those metrics. The statistics are metric data aggregations over specified periods of time. Aggregations are made using the namespace, metric name, dimensions, and the data point unit of measure, within the time period that is specified by the user. CloudWatch supports Sum, Min, Max, Sample Data and Average statistics aggregation.