AWS-SysOps Exam - AWS Certified SysOps Administrator Associate

certleader.com

Q1. - (Topic 3) 

A user is trying to launch an EBS backed EC2 instance under free usage. The user wants to achieve 

encryption of the EBS volume. How can the user encrypt the data at rest? 

A. Use AWS EBS encryption to encrypt the data at rest 

B. The user cannot use EBS encryption and has to encrypt the data manually or using a third party tool 

C. The user has to select the encryption enabled flag while launching the EC2 instance 

D. Encryption of volume is not available as a part of the free usage tier 

Answer:

Explanation: 

AWS EBS supports encryption of the volume while creating new volumes. It supports encryption of the data at rest, the I/O as well as all the snapshots of the EBS volume. The EBS supports encryption for the selected instance type and the newer generation instances, such as m3, c3, cr1, r3, g2. It is not supported with a micro instance. 

Q2. - (Topic 3) 

A user has enabled termination protection on an EC2 instance. The user has also set Instance initiated 

shutdown behaviour to terminate. When the user shuts down the instance from the OS, what will happen? 

A. The OS will shutdown but the instance will not be terminated due to protection 

B. It will terminate the instance 

C. It will not allow the user to shutdown the instance from the OS D. It is not possible to set the termination protection when an Instance initiated shutdown is set to Terminate 

Answer:

Explanation: 

It is always possible that someone can terminate an EC2 instance using the Amazon EC2 console, command line interface or API by mistake. If the admin wants to prevent the instance from being accidentally terminated, he can enable termination protection for that instance. The user can also setup shutdown behaviour for an EBS backed instance to guide the instance on what should be done when he initiates shutdown from the OS using Instance initiated shutdown behaviour. If the instance initiated behaviour is set to terminate and the user shuts off the OS even though termination protection is enabled, it will still terminate the instance. 

Q3. - (Topic 3) 

A user has configured ELB with Auto Scaling. The user suspended the Auto Scaling AddToLoadBalancer 

(which adds instances to the load balancer. process for a while. What will happen to the instances launched during the suspension period? 

A. The instances will not be registered with ELB and the user has to manually register when the process is resumed 

B. The instances will be registered with ELB only once the process has resumed 

C. Auto Scaling will not launch the instance during this period due to process suspension 

D. It is not possible to suspend only the AddToLoadBalancer process 

Answer:

Explanation: 

Auto Scaling performs various processes, such as Launch, Terminate, add to Load Balancer etc. The user can also suspend the individual process. The AddToLoadBalancer process type adds instances to the load balancer when the instances are launched. If this process is suspended, Auto Scaling will launch the instances but will not add them to the load balancer. When the user resumes this process, Auto Scaling will resume adding new instances launched after resumption to the load balancer. However, it will not add running instances that were launched while the process was suspended; those instances must be added manually. 

Q4. - (Topic 3) 

An organization has configured Auto Scaling for hosting their application. The system admin wants to 

understand the Auto Scaling health check process. If the instance is unhealthy, Auto Scaling launches an 

instance and terminates the unhealthy instance. What is the order execution? 

A. Auto Scaling launches a new instance first and then terminates the unhealthy instance 

B. Auto Scaling performs the launch and terminate processes in a random order 

C. Auto Scaling launches and terminates the instances simultaneously 

D. Auto Scaling terminates the instance first and then launches a new instance 

Answer:

Explanation: 

Auto Scaling keeps checking the health of the instances at regular intervals and marks the instance for replacement when it is unhealthy. The ReplaceUnhealthy process terminates instances which are marked as unhealthy and subsequently creates new instances to replace them. This process first terminates the instance and then launches a new instance. 

Q5. - (Topic 3) 

A user is collecting 1000 records per second. The user wants to send the data to CloudWatch using the custom namespace. Which of the below mentioned options is recommended for this activity? 

A. Aggregate the data with statistics, such as Min, max, Average, Sum and Sample data and send the data to CloudWatch 

B. Send all the data values to CloudWatch in a single command by separating them with a comma. CloudWatch will parse automatically 

C. Create one csv file of all the data and send a single file to CloudWatch 

D. It is not possible to send all the data in one call. Thus, it should be sent one by one. CloudWatch will aggregate the data automatically 

Answer:

Explanation: 

AWS CloudWatch supports the custom metrics. The user can always capture the custom data and upload the data to CloudWatch using CLI or APIs. The user can publish data to CloudWatch as single data points or as an aggregated set of data points called a statistic set using the command put-metric-data. It is recommended that when the user is having multiple data points per minute, he should aggregate the data so that it will minimize the number of calls to put-metric-data. In this case it will be single call to CloudWatch instead of 1000 calls if the data is aggregated. 

Q6. - (Topic 3) 

A user is receiving a notification from the RDS DB whenever there is a change in the DB security group. The user does not want to receive these notifications for only a month. Thus, he does not want to delete the notification. How can the user configure this? 

A. Change the Disable button for notification to “Yes” in the RDS console 

B. Set the send mail flag to false in the DB event notification console 

C. The only option is to delete the notification from the console 

D. Change the Enable button for notification to “No” in the RDS console 

Answer:

Explanation: 

Amazon RDS uses the Amazon Simple Notification Service to provide a notification when an Amazon RDS event occurs. Event notifications are sent to the addresses that the user has provided while creating the subscription. The user can easily turn off the notification without deleting a subscription by setting the Enabled radio button to No in the Amazon RDS console or by setting the Enabled parameter to false using the CLI or Amazon RDS API. 

Q7. - (Topic 2) 

A user has created a VPC with CIDR 20.0.0.0/16. The user has created public and VPN only subnets along with hardware VPN access to connect to the user’s datacenter. The user wants to make so that all traffic coming to the public subnet follows the organization’s proxy policy. How can the user make this happen? 

A. Setting up a NAT with the proxy protocol and configure that the public subnet receives traffic from NAT 

B. Settin up a proxy policy in the internet gateway connected with the public subnet 

C. It is not possible to setup the proxy policy for a public subnet 

D. Setting the route table and security group of the public subnet which receives traffic from a virtual private gateway 

Answer:

Explanation: 

The user can create subnets within a VPC. If the user wants to connect to VPC from his own data centre, he can setup public and VPN only subnets which uses hardware VPN access to connect with his data centre. When the user has configured this setup, it will update the main route table used with the VPN-only subnet, create a custom route table and associate it with the public subnet. It also creates an internet gateway for the public subnet. By default the internet traffic of the VPN subnet is routed to a virtual private gateway while the internet traffic of the public subnet is routed through the internet gateway. The user can set up the route and security group rules. These rules enable the traffic to come from the organization’s network over the virtual private gateway to the public subnet to allow proxy settings on that public subnet. 

Q8. - (Topic 2) 

A user is launching an EC2 instance in the US East region. Which of the below mentioned options is 

recommended by AWS with respect to the selection of the availability zone? 

A. Always select the US-East-1-a zone for HA 

B. Do not select the AZ; instead let AWS select the AZ 

C. The user can never select the availability zone while launching an instance 

D. Always select the AZ while launching an instance 

Answer:

Explanation: 

When launching an instance with EC2, AWS recommends not to select the availability zone (AZ.. AWS 

specifies that the default Availability Zone should be accepted. This is because it enables AWS to select the best Availability Zone based on the system health and available capacity. If the user launches additional instances, only then an Availability Zone should be specified. This is to specify the same or different AZ from the running instances. 

Q9. - (Topic 1) 

You have a web application leveraging an Elastic Load Balancer (ELB) In front of the web servers deployed using an Auto Scaling Group Your database is running on Relational 

Database Service (RDS) The application serves out technical articles and responses to them in general there are more views of an article than there are responses to the article. On occasion, an article on the site becomes extremely popular resulting in significant traffic Increases that causes the site to go down. 

What could you do to help alleviate the pressure on the infrastructure while maintaining availability during these events? 

Choose 3 answers 

A. Leverage CloudFront for the delivery of the articles. 

B. Add RDS read-replicas for the read traffic going to your relational database 

C. Leverage ElastiCache for caching the most frequently used data. 

D. Use SOS to queue up the requests for the technical posts and deliver them out of the queue. 

E. Use Route53 health checks to fail over to an S3 bucket for an error page. 

Answer: A,C,E 

Q10. - (Topic 3) 

A user is trying to connect to a running EC2 instance using SSH. However, the user gets an Unprotected 

Private Key File error. Which of the below mentioned options can be a possible reason for rejection? 

A. The private key file has the wrong file permission 

B. The ppk file used for SSH is read only 

C. The public key file has the wrong permission 

D. The user has provided the wrong user name for the OS login 

Answer:

Explanation: 

While doing SSH to an EC2 instance, if you get an Unprotected Private Key File error it means that the private key file's permissions on your computer are too open. Ideally the private key should have the Unix permission of 0400. To fix that, run the command: chmod 0400 /path/to/private.key