Weekend Special - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av54zq84

Exact2Pass Menu

Question # 4

An e-learning platform needs to run an application for 2 months each year The application will be deployed on Amazon EC2 instances. Any application downtime during those 2 months must be avoided.

Which EC2 purchasing option will meet these requirements MOST cost-effectively?

A.

Reserved Instances

B.

Dedicated Hosts

C.

Spot Instances

D.

On-Demand instances

Full Access
Question # 5

Which of the following is an AWS best practice for managing an AWS account root user?

A.

Keep the root user password with the security team

B.

Enable multi-factor authentication (MFA) for the root user

C.

Create an access key for the root user

D.

Keep the root user password consistent for compliance purposes

Full Access
Question # 6

A bank needs to store recordings of calls made to its contact center for 6 years. The recordings must be accessible within 48 hours from the time they are requested.

Which AWS service will provide a secure and cost-effective solution for retaining these files?

A.

Amazon DynamoDB

B.

Amazon S3 Glacier

C.

Amazon Connect

D.

Amazon ElastiCache

Full Access
Question # 7

Which AWS service or feature provides an online, managed software catalog that helps users purchase and deploy third-party software?

A.

AWS Support

B.

AWS Marketplace

C.

Amazon EC2 private Amazon Machine Images (AMIs)

D.

AWS reseller programs

Full Access
Question # 8

A company runs Amazon EC2 instances in a research lab The instances run for 3 hours each week and cannot be interrupted What is the MOST cost-effective instance purchasing option to meet these requirements?

A.

Compute Savings Plan

B.

On-Demand Instances

C.

Convertible Reserved Instances

D.

Spot Instances

Full Access
Question # 9

Which AWS Weil-Architected Framework design principles support disaster recovery planning? (Select TWO.)

A.

Use Amazon S3 Glacier instead of Amazon S3 Standard

B.

Use multiple AWS Regions

C.

Use memory-optimized Amazon EC2 instances

D.

Use Multi-AZ deployments.

E.

Use virtual local area networks (VLANs)

Full Access
Question # 10

Which documentation does AWS Artifact provide?

A.

Amazon EC2 terms and conditions

B.

AWS ISO certifications

C.

A history of a company's AWS spending

D.

A list of previous-generation Amazon EC2 instance types

Full Access
Question # 11

A company chooses an Amazon EC2 instance type that fits its usage requirements Which principle of the AWS Well-Architected Framework is the company following?

A.

Proactively monitor costs

B.

Rightsize the infrastructure

C.

Supply resources dynamically.

D.

Decommission unused resources

Full Access
Question # 12

Which task is a customer's responsibility, according to the AWS shared responsibility model?

A.

Management of the guest operating systems

B.

Maintenance of the configuration of infrastructure devices

C.

Management of the host operating systems and virtualization

D.

Maintenance of the software that powers Availability Zones

Full Access
Question # 13

A company has set up its first VPC in the AWS Cloud the VPC includes two public subnets. The company needs to block access to all network traffic that destined for one of the two public subnets if the traffic is from a specific IP address that has identified as malicious.

Which AWS service or tool can the company use to meet this requirement?

A.

Network ACL

B.

AWS WAF

C.

VPC route table entry

D.

Security group

Full Access
Question # 14

A company wants to integrate its online shopping website with social media login credentials Which AWS service can the company use to make this integration?

A.

AWS Directory Service

B.

AWS Identity and Access Management (IAM)

C.

Amazon Cognito

D.

AWS Single Sign-On

Full Access
Question # 15

A company is using on-premises Microsoft Active Directory federation to manage user identities and groups.

What AWS Identity and Access Management (IAM) setting maps the permissions for AWS services to the Active Directory user attributes?

A.

IAM users

B.

IAM access keys

C.

IAM roles

D.

IAM groups

Full Access
Question # 16

Which guidelines are best practices for using AWS Identity and Access Management (IAM)? (Select TWO.)

A.

Share access keys

B.

Create individual IAM users

C.

Use inline policies instead of customer managed policies

D.

Grant maximum privileges to IAM users

E.

Use groups to assign permissions to IAM users

Full Access
Question # 17

Which AWS services can use AWS WAF to protect against common web exploitations? (Select TWO.)

A.

Amazon Route 53

B.

Amazon CloudFront

C.

AWS Transfer Family

D.

AWS Site-to-Site VPN

E.

Amazon API Gateway

Full Access
Question # 18

Which AWS service can identify underutilized Amazon EC2 instances and idle Amazon RDS DB instances in an AWS account?

A.

Amazon Inspector

B.

AWS Trusted Advisor

C.

Amazon Detective

D.

AWS Data Exchange

Full Access
Question # 19

A social media company allows its public users to upload video content to an Amazon S3 bucket. Some videos are popular and are accessed often. some videos are popular and are accessed often. some videos are accessed infrequently. The company wants to reduce its total storage cost.

Which actions will provide the MOST cost savings? (Select TWO.)

A.

Run S3 Transfer Acceleration for the S3 bucket.

B.

Ensure that the S3 bucket is in the most cost-effective AWS Region.

C.

Deactivate the default encryption for the S3 bucket.

D.

Use the S3 Intelligent-Tiering storage class.

E.

Use AWS DataSync to transfer files to the S3 bucket.

Full Access
Question # 20

A company sets up its AWS environment and creates eight IAM users for the development team.

Which of the following is a best practice for the company to follow to grant permissions to these IAM users?

A.

Apply the principle of least privilege. Create one password, and set the password for each user.

B.

Provide the development team members with AWS account root user access.

C.

Apply the principle of least privilege. Attach a separate IAM policy for each individual user.

D.

Apply the principle of least privilege. Grant access to an IAM group, and add the eight users to that group.

Full Access
Question # 21

A company needs to process data from satellite communications without managing any infrastructure.

Which AWS service should the company use to meet these requirements?

A.

Amazon CloudWatch

B.

Amazon Aurora

C.

Amazon Athena

D.

AWS Ground Station

Full Access
Question # 22

Which of the following are characteristics of AWS WAF? (Select TWO.)

A.

Acts as a firewall that controls inbound and outbound traffic between Amazon EC2 instances

B.

Acts as a firewall that controls inbound and outbound traffic between subnets

C.

Gives users the ability to block traffic that has specific HTTP headers

D.

Protects websites that are not hosted on AWS

E.

Scans Amazon EC2 instances for common vulnerabilities

Full Access
Question # 23

Which approach will enhance a user’s security on AWS?

A.

Use Multi-AZ deployments with Amazon RDS.

B.

Create a hybrid architecture by using AWS Direct Connect.

C.

Monitor application-specific information with AWS X-Ray.

D.

Encrypt data by using AWS Key Management Service (AWS KMS).

Full Access
Question # 24

Who can create and manage access keys for an AWS account root user?

A.

The AWS account owner

B.

An IAM user that has administrator permissions

C.

IAM users within a designated group

D.

An IAM user that has the required role

Full Access
Question # 25

A company is using AWS Lambda. Which task is the company’s responsibility, according to the AWS shared responsibility model?

A.

Update the Lambda runtime language.

B.

Maintain the runtime environment.

C.

Maintain the networking infrastructure.

D.

Configure the resource.

Full Access
Question # 26

Which AWS service can help a company detect an outage of its website servers and redirect users to alternate servers?

A.

Amazon CloudFront

B.

Amazon GuardDuty

C.

Amazon Route 53

D.

AWS Trusted Advisor

Full Access
Question # 27

A company plans to create a data lake that uses Amazon S3. Which factor will have the MOST effect on cost?

A.

The selection of S3 storage tiers

B.

Charges to transfer existing data into Amazon S3

C.

The addition of S3 bucket policies

D.

S3 ingest fees for each request

Full Access
Question # 28

Which AWS service provides an isolated virtual network to connect AWS services and resources?

A.

Amazon EC2

B.

Amazon DynamoDB

C.

Amazon Lightsail

D.

Amazon VPC

Full Access
Question # 29

Which AWS service decouples application components so that the components run independently?

A.

Amazon Simple Notification Service (Amazon SNS)

B.

Amazon Simple Workflow Service (Amazon SWF)

C.

AWS Glue

D.

Amazon Simple Queue Service (Amazon SQS)

Full Access
Question # 30

A system automatically recovers from failure when a company launches its workload on the AWS Cloud services platform. Which pillar of the AWS Well-Architected Framework does this situation demonstrate?

A.

Reliability

B.

Cost optimization

C.

Performance efficiency

D.

Operational excellence.

Full Access
Question # 31

What is an AWS Region?

A.

A broad set of global, cloud-based products that include compute, storage, and databases

B.

A physical location around the world where data centers are clustered

C.

One or more discrete data centers with redundant power, networking, and connectivity

D.

A service that developers use to build applications that deliver latencies of single-digit milliseconds to users

Full Access
Question # 32

Which of the following describes AWS Local Zones?

A.

A cluster of data centers in one geographic location

B.

A site used by Amazon CloudFront to cache frequently accessed content

C.

An extension of an AWS Region to more granular locations

D.

One or more data centers with redundant power and networking

Full Access
Question # 33

A company runs applications that process credit card information. Auditors have asked if the AWS environment has changed since the previous audit. If the AWS environment has changed, the auditors want to know how it has changed. Which AWS services can provide this information? (Select TWO.)

A.

AWS Artifact

B.

AWS Trusted Advisor

C.

AWS Config

D.

AWS Cloud Trail

E.

AWS Identity and Access Management (IAM)

Full Access
Question # 34

A company wants to secure its consumer web application by using SSL/TLS to encrypt traffic.

Which AWS service can the company use to meet this goal?

A.

AWS WAF

B.

AWS Shield

C.

Amazon VPC

D.

AWS Certificate Manager (ACM)

Full Access
Question # 35

Which of the following is an AWS key-value database offering consistent single-digit millisecond performance at any scale?

A.

Amazon RDS

B.

Amazon Aurora

C.

Amazon DynamoDB

D.

Amazon Redshift

Full Access
Question # 36

Which of the following is an AWS Well-Architected Framework design principle for operational excellence in the AWS Cloud?

A.

Go global in minutes.

B.

Make frequent, small, reversible changes.

C.

Implement a strong foundation of identity and access management.

D.

Stop spending money on hardware infrastructure for data center operations.

Full Access
Question # 37

Which cloud computing benefit does AWS demonstrate with its ability to offer lower variable costs as a result of high purchase volumes?

A.

Pay-as-you-go pricing

B.

High availability

C.

Global reach

D.

Economies of scale

Full Access
Question # 38

A company wants a cost-effective option when running its applications in an Amazon EC2 instance for short time periods. The applications can be interrupted. Which EC2 instance type will meet these requirements?

A.

Spot Instances

B.

On-Demand Instances

C.

Reserved Instances

D.

Dedicated Instances

Full Access
Question # 39

A company discovered unauthorized access to resources in its on-premises data center. Upon investigation, the company found that the requests originated from a resource hosted on AWS. Which AWS team should the company contact to report this issue?

A.

AWS Customer Service team

B.

AWS Sales team

C.

AWS Abuse team

D.

AWS Technical Support team

Full Access
Question # 40

A cloud practitioner needs to obtain AWS compliance reports before migrating an environment to the AWS Cloud. How can these reports be generated?

A.

Contact the AWS Compliance team.

B.

Download the reports from AWS Artifact.

C.

Open a case with AWS Support.

D.

Generate the reports with Amazon Made.

Full Access
Question # 41

How does consolidated billing help reduce costs for a company that has multiple AWS accounts?

A.

It aggregates usage across accounts so that the company can reach volume discount thresholds sooner.

B.

It offers an additional 5% discount on purchases of All Upfront Reserved Instances.

C.

It provides a simplified billing invoice that the company can process more quickly than a standard invoice.

D.

It gives AWS resellers the ability to bill their customers for usage.

Full Access
Question # 42

Which service is an AWS-managed Hadoop framework that makes it easy, fast, and cost-effective to process large amounts of data across dynamically scalable Amazon EC2 instances?

A.

Amazon EMR

B.

Amazon EC2

C.

AWS Elastic Beanstalk

D.

Amazon Redshift

Full Access
Question # 43

Which design principles are enabled by the AWS cloud to improve the operation of workloads?

A.

Minimize upfront design

B.

Loose coupling

C.

Disposable resources

D.

Server design and concurrency

E.

Minimal viable product

Full Access
Question # 44

A user needs to quickly deploy a nonrelational database on AWS. The user does not want to manage the underlying hardware or the database software. Which AWS service cart be used to accomplish this?

A.

Amazon RDS

B.

Amazon DynamoDB

C.

Amazon Aurora

D.

Amazon Redshift

Full Access
Question # 45

A company uses AWS Direct Conned and wants to establish connectivity that spans VPCs across multiple AWS Regions.

Which AWS service or feature should the company use to meet these requirements?

A.

AWS Transit Gateway

B.

AWS PrivateLink

C.

Amazon Connect

D.

Amazon Route 53

Full Access
Question # 46

Which task requires the use of AWS account root account user credentials?

A.

Closing an AWS account

B.

Creating a log file

C.

Modifying IAM user permissions

D.

Deleting IAM users

Full Access
Question # 47

AWS trusted advisor can monitor and provide advice on what characteristics of an AWS account?

A.

Compliance with security best practices

B.

Application performance

C.

Network utilization

D.

Cost optimization

E.

Compliance status

Full Access
Question # 48

When comparing AWS cloud with premises total cost of ownership which expenses must be considered?

A.

Physical storage hardware

B.

Operating system administration

C.

Network infrastructure of data center

D.

Project management

E.

Database schema development

Full Access
Question # 49

A company needs 24/7 phone email and chat access with a response time of less than 1 hour if a production system has a service interruption.

Which AWS Support plan meets these requirements at the LOWEST cost?

A.

Basic

B.

Developer

C.

Business

D.

Enterprise

Full Access
Question # 50

The continual reduction of AWS Cloud pricing is due to:

A.

pay-as-you go pricing.

B.

the AWS global infrastructure.

C.

economies of scale.

D.

reserved storage pricing.

Full Access
Question # 51

A company is building a business intelligence solution and wants to use dashboards for reporting purposes.

Which AWS service can be used?

A.

Amazon Redshift

B.

Amazon Elasticsearch Service (Amazon ES)

C.

Amazon QuicKSight

D.

Amazon Althena

Full Access
Question # 52

Which aspect of AWS infrastructure enables global deployment of compute and storage?

A.

Availability Zones

B.

Regions

C.

Tags

D.

Resource groups

Full Access
Question # 53

A user an optimize Amazon EC2 costs by performing which of the following tasks? (Select TWO )

A.

Implementing Auto Scaling group-, to add and remove instances based on demand

B.

Creating a policy to restrict IAM users from creating new instances

C.

Setting a budget to limit spending on EC2 instances using AWS Budgets

D.

Purchasing Reserved Instances

E.

Adding EC2 instances to a second AWS Region that is geographically close to the end users

Full Access
Question # 54

What credential components are required to gain programmatic access to an AWS account? (Select TWO.)

A.

An access key ID

B.

A primary key

C.

A secret access key

D.

A user ID

E.

A secondary key

Full Access
Question # 55

Which duty is a responsibility of AWS under the AWS shared responsibility model?

A.

Identity and access management

B.

Server-side encryption (SSE)

C.

Firewall configuration

D.

Maintaining physical hardware

Full Access
Question # 56

A company would like to host its MySQL databases on AWS and maintain full control over the operating system, database installation, and configuration. Which AWS service should the company use to host the databases?

A.

Amazon RDS

B.

Amazon EC2

C.

Amazon DynamoDB

D.

Amazon Aurora

Full Access
Question # 57

Using AWS Identity and Access Management (IAM) what can be attached to an Amazon EC2 instance to make service requests?

A.

Group

B.

Role

C.

Policy

D.

Access key

Full Access
Question # 58

Which AWS service allows customers to purchase unused Amazon EC2 capacity at an often discounted rate?

A.

Reserved Instances

B.

On-Demand Instances

C.

Dedicated Instances

D.

Spot Instances

Full Access
Question # 59

Which AWS service does AWS Snowball Edge natively support?

A.

AWS Server Migration Service (AWS SMS)

B.

Amazon Aurora

C.

AWS Trusted Advisor

D.

Amazon EC2

Full Access
Question # 60

What are the benefits of developing and running a new application in the AWS Cloud compared to on-premises? (Select TWO.)

A.

AWS automatically distributes the data globally for higher durability

B.

AWS will take care of operating the application

C.

AWS makes it easy to architect for high availability

D.

AWS can easily accommodate application demand changes

E.

AWS takes care of application security patching

Full Access
Question # 61

Which AWS service should a company use to continuously monitor the compliance of AWS resource configurations?

A.

AWS Organizations

B.

AWS Config

C.

AWS Artifact

D.

AWS Service Catalog

Full Access
Question # 62

Which of the following is an AWS value proportion that describes a user's ability to scale infrastructure based on demand?

A.

Speed of innovation

B.

Resource elasticity

C.

Decoupled architecture

D.

Global deployment

Full Access
Question # 63

Which AWS service or tool provides a visualization of historical AWS spending patterns and projections of future AWS costs?

A.

AWS Cost and Usage Report

B.

AWS Budgets

C.

Cost Explorer

D.

Amazon CloudWatch

Full Access
Question # 64

A company is undergoing a security audit. The audit includes security validation and compliance validation of the AWS infrastructure and services that the company uses. The auditor needs to locate compliance-related information and must download AWS security and compliance documents. These documents include the System and Organization Control (SOC) reports.

Which AWS service or group can provide these documents?

A.

AWS Abuse team

B.

AWS Artifact

C.

AWS Support

D.

AWS Config

Full Access
Question # 65

A developer is testing a Docker-based application that uses the AWS SDK to interact with Amazon DynamoDB. In the local development environment the application has used 1AM access keys. The application is now ready for deployment onto an ECS cluster

How should the application authenticate with AWS services in production?

A.

Configure an ECS task 1AM role for the application to use

B.

Refactor the application to call AWS STS AssumeRole based on an instance role

C.

Configure AWS access key/secret access key environment variables with new credentials

D.

Configure the credentials file with a new access key/secret access key

Full Access
Question # 66

A company deployed an Amazon EC2 instance last week. A developer realizes that the EC2 instance is no longer running. The developer reviews a list of provisioned EC2 instances, and the EC2 instance is no longer on the list.

What can the developer do to generate a recent history of the EC2 instance?

A.

Run Cost Explorer to identify the start time and end time of the EC2 instance.

B.

Use Amazon Inspector to find out when the EC2 instance was stopped.

C.

Perform a search in AWS CloudTrail to find all EC2 instance-related events.

D.

Use AWS Secrets Manager to display hidden termination logs of the EC2 instance.

Full Access
Question # 67

A developer is writing an application in Python. The application runs on AWS Lambda. The application generates a file and needs to upload this file to Amazon S3.

The developer must implement this upload functionality with the least possible change to the application code

Which solution meets these requirements?

A.

Make an HTTP request directly to the S3 API to upload the file

B.

Include the AWS SDK for Python in the Lambda function Use the SDK to upload the file

C.

Use the AWS SDK for Python that is installed in the Lambda environment to upload the file

D.

Use the AWS CLI that is installed in the Lambda environment to upload the file

Full Access
Question # 68

A company wants an in-memory data store that is compatible with open source in the cloud. Which AWS service should the company use?

A.

Amazon DynamoDB

B.

Amazon ElastlCache

C.

Amazon Elastic Block Store (Amazon EBS)

D.

Amazon Redshift

Full Access
Question # 69

A company has a global website with static content.

Which AWS service will deliver the static content with low latency?

A.

AWS Lambda

B.

Amazon CloudFront

C.

Amazon EC2 Auto Scaling

D.

AWS Compute Optimizer

Full Access
Question # 70

A company's ecommerce website is experiencing sudden and significant traffic changes that are causing performance problems in the company database. Users report that attempts to access the website are taking too long.

A developer needs to implement a caching layer by using Amazon ElastiCache. The website must be responsive, no matter which product a user views Updates to product information and prices must be strongly consistent.

Which cache-writing strategy will meet these requirements?

A.

Write to the cache directly Synchronize the backend later

B.

Write to the backend first Wait for the cache to expire

C.

Write to the cache and the backend at the same time

D.

Write to the backend first. Then update the TTL of the item in the cache=

Full Access
Question # 71

A developer manages an application that interacts with Amazon RDS. Alter observing slow performance with read queries, the developer Implements Amazon ElastiCache to update the cache immediately following the primary database update.

What will be the result of this approach to caching?

A.

Caching will increase the load on the database instance because the cache is updated for every database update.

B.

Caching will slow performance of the read queries because the cache is updated when the cache cannot find the requested data

C.

The cache will become large and expensive because the infrequently requested data is also written to the cache

D.

Overhead will be added to the initial response time because the cache is updated only after a cache miss

Full Access
Question # 72

How does AWS Cloud computing help businesses reduce costs? (Select TWO.)

A.

AWS charges the same prices for services in every AWS Region.

B.

AWS enables capacity to be adjusted on demand.

C.

AWS offers discounts for Amazon EC2 instances that remain idle for more than 1 week.

D.

AWS does not charge for data sent from the AWS Cloud to the internet.

E.

AWS eliminates many of the costs of building and maintaining on-premises data centers.

Full Access
Question # 73

Which of the following is a fully managed graph database service on AWS?

A.

Amazon Aurora

B.

Amazon FSx

C.

Amazon DynamoDB

D.

Amazon Neptune

Full Access
Question # 74

An IT manager needs to monitor company AWS resources and collect utilization metrics from Amazon EC2 instances and Amazon DynamoDB. Which AWS service can the IT manager use to meet these requirements?

A.

AWS CloudTrall

B.

AWS Config

C.

Amazon CloudWatch

D.

AWS Trusted Advisor

Full Access
Question # 75

A company plans to move its on-premises servers to Amazon EC2 instances. The company has 50 different business units and wants to separate each billing for each unit.

What should a cloud practitioner recommend?

A.

Use separate AWS accounts for each business unit, then filter by unit using the coverage report.

B.

Place each business unit in a different AWS Region, then filter by unit in Cost Explorer.

C.

Tag each business unit's resources, then filter by unit in Cost Explorer.

D.

Use a different VPC for each business unit, then filter by unit using an AWS Cost and Usage Report.

Full Access
Question # 76

A developer is adding a feature to a client-side application so that users can upload videos to an Amazon S3 bucket.

What is the MOST secure way to give the application the ability to write files to the S3 bucket?

A.

Update the S3 bucket policy to allow public write access. Allow any user to upload videos by removing the need to handle

user authentication within the client-side application

B.

Create a new IAM policy and a corresponding 1AM user with permissions to write to the S3 bucket Store the key and the

secret for the user in the application code Use the key to authenticate the video uploads

C.

Configure the API layer of the application to have a new endpoint that creates signed URLs that allow an object to be put

into the S3 bucket Generate a presigned URL through this API call in the client application. Upload the video by using the signed URL

D.

Generate a new 1AM key and a corresponding secret by using the AWS account root user credentials Store the key and the

secret for the user in the application code. Use the key to authenticate the video uploads

Full Access
Question # 77

Which AWS service is a relational database compatible with MySQL and PostgreSOL?

A.

Amazon Redshift

B.

Amazon DynamoDB

C.

Amazon Aurora

D.

Amazon Neptune

Full Access
Question # 78

An ecommerce company has Amazon EC2 instances running as web servers. There is a predictable pattern of peak traffic load that occurs two times each day, always at the same time. The EC2 instances are idle for the remainder of the day.

What is the MOST cost-effective way to manage these resources while maintaining fault tolerance?

A.

Use an Auto Scaling group to scale resources in and out based on demand.

B.

Purchase Reserved Instances to ensure peak capacity at all times.

C.

Write a cron job to stop the EC2 instances when the traffic demand is low.

D.

Write a script to vertically scale the EC2 instances during peak traffic demand.

Full Access
Question # 79

A developer needs to build and deploy a serverless application that has an API that mobile clients will use. The API will use Amazon DynamoDB and Amazon OpenSearch Service (Amazon Elasticsearch Service) as data sources Responses that are sent to the clients will contain aggregated data from both data sources

The developer must minimize the number of API endpoints and must minimize the number of API calls that are required to retrieve the necessary data

Which solution should the developer use to meet these requirements?

A.

GraphQI. API on AWS AppSync

B.

REST API on Amazon API Gateway

C.

GraphGL API on an Amazon EC2 instance

D.

REST API on AWS Elastic Beanstalk

Full Access
Question # 80

A developer has a stateful web server on-premises that is being migrated to AWS. The developer must have greater elasticity in the new design

How should the developer re-factor the application to make it more elastic? (Select TWO.)

A.

Use pessimistic concurrency on Amazon DynamoDB

B.

Use Amazon CloudFront with an Auto Scaling group.

C.

Use Amazon CloudFront with an AWS Web Application Firewall

D.

Store session state data m an Amazon DynamoDB table.

E.

Use an ELB with an Auto Scaling group

Full Access
Question # 81

Which AWS compute service automatically scales resources up or down to meet application workload demands?

A.

Amazon Simple Queue Service (Amazon SOS)

B.

Amazon EC2

C.

Amazon Aurora

D.

AWS Lambda

Full Access
Question # 82

When designing AWS workloads to be operational even when there are component failures, what is an AWS best practice?

A.

Perform quarterly disaster recovery tests.

B.

Place the main component on the us-east-1 Region.

C.

Design for automatic failover to healthy resources.

D.

Design workloads to fit on a single Amazon EC2 instance.

Full Access
Question # 83

Which terms describe the on-demand AWS pricing model? (Select TWO.)

A.

Fixed term

B.

Pay-as-you-go

C.

Collocation

D.

Planned

E.

Variable expense

Full Access
Question # 84

Which AWS service can be used to run Amazon EC2 instances on-premises at a user site?

A.

AWS Snowball Edge

B.

Amazon CloudFront

C.

Lambda@Edge

D.

AWS Lambda

Full Access
Question # 85

Which AWS benefit enables users to deploy cloud infrastructure that consists of multiple geographic regions connected by a network with low latency high throughput, and redundancy?

A.

Economies of scale

B.

Security

C.

Elasticity

D.

Global reach

Full Access
Question # 86

Which of the following are general AWS Cloud design principles described in the AWS Well-Architected Framework? (Select TWO.)

A.

Consolidate key components into monolithic architectures.

B.

Test systems at production scale.

C.

Provision more capacity than a workload is expected to need.

D.

Drive architecture design based on data collected about the workload behavior and requirements.

E.

Make AWS Cloud architectural decisions static, one-time events.

Full Access
Question # 87

A company has a business-critical Amazon RDS for MySQL DB instance that resides in a single Availability Zone. Which solution will improve the availability of the DB instance?

A.

Convert the DB instance into a multi-Region deployment.

B.

Create an Amazon Simple Queue Service (Amazon SQS) queue in the same AWS Region to manage writes to the DB instance.

C.

Convert the DB instance into a Multi-AZ deployment.

D.

Create an Amazon Simple Queue Service (Amazon SQS) queue in a different AWS Region to manage writes to the DB instance

Full Access
Question # 88

A company has performance and regulatory requirements that call for it to run its workload only in its on-premises data center.

Which AWS services or resources should the company use? (Select Two.)

A.

Amazon Pinpoint

B.

Amazon WorkLink

C.

AWS Outposts

D.

AWS Snowball Edge

E.

Aws AppSync

Full Access
Question # 89

Which cloud characteristics enable a company to provision or release computing capacity as required? (Select Two.)

A.

Scalability

B.

Economies of scale

C.

Elasticity

D.

Agility

E.

Reliability

Full Access
Question # 90

Which AWS service will track user activity on AWS?

A.

Amazon GuardDuty

B.

AWS Trusted Advisor

C.

AWS CloudTrail

D.

Amazon CloudWatch

Full Access
Question # 91

Which controls are shared under the AWS shared responsibility model? (Select TWO.)

A.

Awareness and training

B.

Patching of Amazon RDS

C.

Configuration management

D.

Physical and environmental controls

E.

Service and communications protection or security

Full Access
Question # 92

Which tool or feature provides a report to forecast AWS billing costs for the next 3 months?

A.

Consolidated billing

B.

AWS Budgets

C.

AWS Cost and Usage Report

D.

Cost Explorer

Full Access
Question # 93

Which AWS Cloud benefit is shown by an architecture’s ability to withstand failures with minimal downtime?

A.

Agility

B.

Elasticity

C.

Scalability

D.

High availability

Full Access
Question # 94

A company has a compliance requirement to encrypt data in transit and at rest The company is serving the content through Amazon EC2 instances behind an Elastic Load Balancer and is storing data in Amazon Elastic Block Store (Amazon EBS) volumes.

Which combination of AWS services should the company use to stay compliant with this requirement? (Select TWO.)

A.

Amazon GuardDuty

B.

AWS Shield

C.

AWS Certificate Manager (ACM)

D.

AWS Secrets Manager

E.

AWS Key Management Service (AWS KMS)

Full Access
Question # 95

Which AWS service should a cloud practitioner use to identify security vulnerabilities of an AWS account?

A.

AWS Secrets Manager

B.

Amazon Cognito

C.

Amazon Macie

D.

AWS Trusted Advisor

Full Access
Question # 96

Which AWS services can be used to gather information about AWS account activity? (Select TWO.)

A.

Amazon CloudFront

B.

AWS Cloud9

C.

AWS CloudTrail

D.

AWS CloudHSM

E.

Amazon CloudWatch

Full Access
Question # 97

Which AWS Support plan is recommended for business and mission-critical workloads in AWS environments?

A.

AWS Business Support

B.

AWS Enterprise Support

C.

AWS Basic Support

D.

AWS Developer Support

Full Access
Question # 98

AWS trusted advisor provides recommendations on which of the following?

A.

Cost optimization

B.

Auditing

C.

Serverless architecture

D.

Performance

E.

Scalability

Full Access
Question # 99

Which AWS service or tool simplifies the creation, maintenance, validation, sharing and deployment of Linux or Windows Server templates for use with Amazon EC2 and on premises VMs?

A.

AWS CodePipeline

B.

Amazon EC2 Image Builder

C.

AWS CloudFormation

D.

Amazon EC2 Amazon Machine Image (AMI)

Full Access
Question # 100

A company is required to store its data close to its primary users.

Which benefit of the AWS Cloud supports this requirement?

A.

Security

B.

High availability

C.

Elasticity

D.

Global footprint

Full Access
Question # 101

A company's security team requires that all Amazon EC2 workloads use approved Amazon Machine Images (AMIs). Which AWS service should the company use to verify that the EC2 instances are using approved AMIs?

A.

Amazon CloudWatch

B.

Amazon Inspector

C.

AWS Config

D.

AWS Trusted Advisor

Full Access
Question # 102

According to the AWS shared responsibility model what is the sole responsibility of AWS?

A.

Application security

B.

Edge location management

C.

Patch management

D.

Client-side data

Full Access