AWS-SysOps Exam - AWS Certified SysOps Administrator Associate

certleader.com

Q1. - (Topic 3) 

A user is trying to create a PIOPS EBS volume with 4000 IOPS and 100 GB size. AWS does not allow the user to create this volume. What is the possible root cause for this? 

A. The ratio between IOPS and the EBS volume is higher than 30 

B. The maximum IOPS supported by EBS is 3000 

C. The ratio between IOPS and the EBS volume is lower than 50 

D. PIOPS is supported for EBS higher than 500 GB size 

Answer:

Explanation: 

A provisioned IOPS EBS volume can range in size from 10 GB to 1 TB and the user can provision up to 4000 IOPS per volume. The ratio of IOPS provisioned to the volume size requested should be a maximum of 30; for example, a volume with 3000 IOPS must be at least 100 GB. 

Q2. - (Topic 3) 

A user has configured ELB with Auto Scaling. The user suspended the Auto Scaling AlarmNotification (which notifies Auto Scaling for CloudWatch alarms. process for a while. What will Auto Scaling do during this period? 

A. AWS will not receive the alarms from CloudWatch 

B. AWS will receive the alarms but will not execute the Auto Scaling policy 

C. Auto Scaling will execute the policy but it will not launch the instances until the process is resumed 

D. It is not possible to suspend the AlarmNotification process 

Answer:

Explanation: 

Auto Scaling performs various processes, such as Launch, Terminate Alarm Notification etc. The user can also suspend individual process. The AlarmNotification process type accepts notifications from the Amazon CloudWatch alarms that are associated with the Auto Scaling group. If the user suspends this process type, Auto Scaling will not automatically execute the scaling policies that would be triggered by the alarms. 

Q3. - (Topic 3) 

A user has created a VPC with public and private subnets using the VPC Wizard. The VPC has CIDR 20.0.0.0/16. The private subnet uses CIDR 20.0.0.0/24. Which of the below mentioned entries are required in the main route table to allow the instances in VPC to communicate with each other? 

A. Destination : 20.0.0.0/24 and Target : VPC 

B. Destination : 20.0.0.0/16 and Target : ALL 

C. Destination : 20.0.0.0/0 and Target : ALL 

D. Destination : 20.0.0.0/24 and Target : Local 

Answer:

Q4. - (Topic 3) 

A user has setup a CloudWatch alarm on the EC2 instance for CPU utilization. The user has setup to receive a notification on email when the CPU utilization is higher than 60%. The user is running a virus scan on the same instance at a particular time. The user wants to avoid receiving an email at this time. What should the user do? 

A. Remove the alarm 

B. Disable the alarm for a while using CLI 

C. Modify the CPU utilization by removing the email alert 

D. Disable the alarm for a while using the console 

Answer:

Explanation: 

Amazon CloudWatch alarm watches a single metric over a time period that the user specifies and performs one or more actions based on the value of the metric relative to a given threshold over a number of time periods. When the user has setup an alarm and it is know that for some unavoidable event the status may change to Alarm, the user can disable the alarm using the DisableAlarmActions API or from the command line mon-disable-alarm-actions. 

Q5. - (Topic 3) 

A user has configured ELB with SSL using a security policy for secure negotiation between the client and load balancer. The ELB security policy supports various ciphers. Which of the below mentioned options helps identify the matching cipher at the client side to the ELB cipher list when client is requesting ELB DNS over SSL? 

A. Cipher Protocol 

B. Client Configuration Preference 

C. Server Order Preference 

D. Load Balancer Preference 

Answer:

Explanation: 

Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. When client is requesting ELB DNS over SSL and if the load balancer is configured to support the Server Order Preference, then the load balancer gets to select the first cipher in its list that matches any one of the ciphers in the client's list. Server Order Preference ensures that the load balancer determines which cipher is used for the SSL connection. 

Q6. - (Topic 3) 

A user has created an Auto Scaling group using CLI. The user wants to enable CloudWatch detailed monitoring for that group. How can the user configure this? 

A. When the user sets an alarm on the Auto Scaling group, it automatically enables detail monitoring 

B. By default detailed monitoring is enabled for Auto Scaling 

C. Auto Scaling does not support detailed monitoring 

D. Enable detail monitoring from the AWS console 

Answer:

Explanation: 

CloudWatch is used to monitor AWS as well as the custom services. It provides either basic or detailed monitoring for the supported AWS products. In basic monitoring, a service sends data points to CloudWatch every five minutes, while in detailed monitoring a service sends data points to CloudWatch every minute. To enable detailed instance monitoring for a new Auto Scaling group, the user does not need to take any extra steps. When the user creates an Auto Scaling launch config as the first step for creating an Auto Scaling group, each launch configuration contains a flag named InstanceMonitoring.Enabled. The default value of this flag is true. Thus, the user does not need to set this flag if he wants detailed monitoring. 

Q7. - (Topic 2) 

A user is planning to setup notifications on the RDS DB for a snapshot. Which of the below mentioned event categories is not supported by RDS for this snapshot source type? 

A. Backup 

B. Creation 

C. Deletion 

D. Restoration 

Answer:

Explanation: 

Amazon RDS uses the Amazon Simple Notification Service to provide a notification when an Amazon RDS event occurs. Event categories for a snapshot source type include: Creation, Deletion, and Restoration. The Backup is a part of DB instance source type. 

Q8. - (Topic 2) 

You are building an online store on AWS that uses SQS to process your customer orders. Your backend system needs those messages in the same sequence the customer orders have been put in. How can you achieve that? 

A. It is not possible to do this with SQS 

B. You can use sequencing information on each message 

C. You can do this with SQS but you also need to use SWF 

D. Messages will arrive in the same order by default 

Answer:

Explanation: 

Amazon SQS is engineered to always be available and deliver messages. One of the resulting tradeoffs is that SQSdoes not guarantee first in, first out delivery of messages. For many distributed applications, each message can stand on its own, and as long as all messages are delivered, the order is not important. If your system requires that order be preserved, you can place sequencing information in each message, so that you can reorder the messages when the queue returns them. 

Q9. - (Topic 1) 

How can the domain's zone apex for example "myzoneapexdomain com" be pointed towards an Elastic Load Balancer? 

A. By using an AAAA record 

B. By using an A record 

C. By using an Amazon Route 53 CNAME record 

D. By using an Amazon Route 53 Alias record 

Answer:

Explanation: Reference: 

http://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resource-record-sets-choosing-alias-non-alias.html 

Q10. - (Topic 2) 

A user is trying to understand the ACL and policy for an S3 bucket. Which of the below mentioned policy 

permissions is equivalent to the WRITE ACL on a bucket? 

A. s3:GetObjectAcl 

B. s3:GetObjectVersion 

C. s3:ListBucketVersions 

D. s3:DeleteObject 

Answer:

Explanation: 

Amazon S3 provides a set of operations to work with the Amazon S3 resources. Each AWS S3 bucket can have an ACL (Access Control List. or bucket policy associated with it. The WRITE ACL list allows the other AWS accounts to write/modify to that bucket. The equivalent S3 bucket policy permission for it is s3:DeleteObject.