ITExambyte

AWS SysOps Administrator Exam Questions Free

AWS SysOps Administrator - Associate Exam Dumps

Domain% of Exam
Monitoring, Logging, and Remediation20%
Reliability and Business Continuity16%
Deployment, Provisioning, and Automation18%
Security and Compliance16%
Networking and Content Delivery18%
Cost and Performance Optimization12%

1 / 65

1. A company runs a large number of Amazon EC2 instances for internal departments. The company needs to track the costs of its existing AWS resources by department. What should a SysOps administrator do to meet this requirement?

2 / 65

2. A company runs several production workloads on Amazon EC2 instances. A SysOps administrator discovered that a production EC2 instance failed a system health check. The SysOps administrator recovered the instance manually. The SysOps administrator wants to automate the recovery task of EC2 instances and receive notifications whenever a system health check fails. Detailed monitoring is activated for all of the company's production EC2 instances. Which of the following is the MOST operationally efficient solution that meets these requirements?

3 / 65

3. A SysOps administrator sets up Traffic Mirroring on an Amazon EC2 instance. The SysOps administrator examines the logs from the traffic mirror and discovers that a number of packets have been truncated.

What should the SysOps administrator do to resolve this problem?

4 / 65

4. A SysOps administrator must ensure that AWS CloudFormation deployment changes are properly tracked for governance.

Which AWS service should the SysOps administrator use to meet this requirement?

5 / 65

5. A company using AWS Organizations requires that no Amazon S3 buckets in its production accounts should ever be deleted. What is the SIMPLEST approach the SysOps Administrator can take to ensure S3 buckets in those accounts can never be deleted?

6 / 65

6.

A company is preparing to launch a new website. The website runs on Amazon EC2 instances behind an Application Load Balancer (ALB). The company launched the instances by using a custom Amazon Machine Image (AMI) from an EC2 instance that runs without problems in a different VPC in the same AWS Region.

After deployment of the new EC2 instances, external testing failed to connect to the instances by using HTTPS. The instances are reachable by using SSH through a bastion host instance that runs in the same VPC.

Which steps should a SysOps administrator take to find the problem? (Select TWO.)

7 / 65

7. You receive an urgent call from a new DBA who accidentally dropped a table containing all your customers. Which Amazon RDS feature will allow you to reliably restore your database to within 5 minutes of when the mistake was made?

8 / 65

8. A company is using AWS CloudTrail and wants to ensure that SysOps administrators can easily verify that the log files have not been deleted or changed. Which action should a SysOps administrator take to meet this requirement?

9 / 65

9. A company has adopted a security policy that requires all customer data to be encrypted at rest. Currently, customer data is stored on a central Amazon EFS file system and accessed by a number of different applications from Amazon EC2 instances. How can the SysOps Administrator ensure that all customer data stored on the EFS file system meets the new requirement?

10 / 65

10. An IT director needs a monthly breakdown of cloud computing expenditures for each department in a company. The company uses AWS Organizations to manage the AWS accounts and has multiple AWS accounts in each organization.

Which combination of steps will provide this information? (Select TWO.)

11 / 65

11.

A company has deployed a new application that runs on Amazon EC2 instances. The company’s security team wants the application team to verify that all common vulnerabilities and exposures are addressed regularly throughout the application's life span.

How can the application team meet this requirement?

12 / 65

12. An admin is planning to monitor the ELB. Which of the below mentioned services does NOT help the admin capture the monitoring information about the ELB activity?

13 / 65

13. Your organization's security policy requires that all privileged users either use frequently rotated passwords or one-time access credentials in addition to username/password.Which of the two following options would allow an organization to enforce this policy for AWS users? (Select all that apply)

14 / 65

14. What would happen to an RDS (Relational Database Service) multi-Availability Zone deployment if the primary DB instance fails?

15 / 65

15. A user is accessing RDS from an application. The user has enabled the Multi AZ feature with the MS SQL RDS DB. During a planned outage how will AWS ensure that a switch from DB to a standby replica will not affect access to the application?

16 / 65

16. A media company produces new video files on premises every day with a total size of around 100GBs after compression. All files have a size of 1-2 GB and need to be uploaded to Amazon S3 every night in a fixed time window between 3am and 5am. Current upload takes almost 3 hours, although less than half of the available bandwidth is used. What step(s) would ensure that the file uploads are able to complete in the allotted time window?

17 / 65

17. A customer has a web application that uses cookie based sessions to track logged in users. It is deployed on AWS using ELB and Auto Scaling. The customer observes that when load increases, Auto Scaling launches new instances but the load on the existing instances does not decrease, causing all existing users to have a sluggish experience. Which two answer choices independently describe a behavior that could be the cause of the sluggish user experience? (Select Two)

18 / 65

18. A company's application stores documents within an Amazon S3 bucket. The application is running on Amazon EC2 in a VPC. A recent change in security requirements states that traffic between the company's application and the S3 bucket must never leave the Amazon network. What AWS feature can provide this functionality?

19 / 65

19. If you want to launch Amazon Elastic Compute Cloud (EC2) instances and assign each instance a predetermined private IP address you should:

20 / 65

20. An organization has created 5 IAM users. The organization wants to give them the same login ID but different passwords. How can the organization achieve this?

21 / 65

21. A company's customers report that they are receiving HTTP 404 errors on the company's website. The company's infrastructure includes several Amazon EC2 instances. The logs are sent from each instance to a consolidated log group in Amazon CloudWatch Logs. A SysOps administrator needs to create a notification to indicate when the HTTP 404 errors pass a certain threshold.

Which steps are required to meet this requirement? (Select TWO.)

22 / 65

22.

A SysOps administrator needs to deploy a duplicate AWS development environment into a new AWS Region. The environment will be periodically redeployed as part of the maintenance process. The SysOps administrator deploys the current working template into the new Region. The template's Amazon EC2 instances fail to deploy, and AWS CloudFormation automatically rolls back the deployment.After reviewing the logs, the SysOps administrator discovers that the EC2 instances are not deploying because of an Amazon Machine Image (AMI) ID value that is not valid in the new Region. The SysOps administrator must correct the CloudFormation template so that the instances deploy correctly.
What should the SysOps administrator do to meet this requirement with the LEAST operational overhead?

23 / 65

23. A SysOps administrator needs to block malicious traffic that is reaching a company's web servers. The malicious traffic is distributed over many IP addresses. The malicious traffic consists of a significantly higher number of connections than the company typically receives from legitimate users. The SysOps administrator needs to protect the web servers by using a solution that maximizes operational efficiency.

Which solution meets these requirements?

24 / 65

24. A photo sharing site delivers content worldwide from a library on Amazon S3 by using Amazon CloudFront. Some users try to access photos that do not exist. Other users try to access photos that the users are not authorized to view.

Which Amazon CloudWatch metric should a SysOps administrator monitor to better understand the extent of this issue?

25 / 65

25. A company has a key management service in its on-premises data center. The key management service uses an RSA asymmetric encryption algorithm. The company needs to integrate its system with a highly available, secure service in AWS to replace the on-premises service. The keys must be stored in dedicated hardware security modules that are validated by a third party. The company must control these hardware security modules.

Which solution will meet these requirements?

26 / 65

26. An organization is generating digital policy files which are required by the admins for verification. Once the files are verified they may not be required in the future unless there is some compliance issue. If the organization wants to save them in a cost effective way, which is the best possible solution?

27 / 65

27.

A company maintains its AWS accounts with AWS Organizations and uses AWS Firewall Manager. The company wants to change the administrator account of Firewall Manager to a different account within the organization.

What should a SysOps administrator do to accomplish this task?

28 / 65

28. A SysOps administrator attached the following IAM policy to a developer's IAM user account:

{

    "Version": "2012-10-17",

    "Statement": {

        "Effect": "Allow",

        "Action": "dynamodb:GetItem",

        "Resource": "*",

        "Condition": {

            "DateGreaterThan": {

                "aws:CurrentTime": "2020-07-01T00:00:00Z"

            },

            "DateLessThan": {

                "aws:CurrentTime": "2020-12-31T23:59:59Z"

            }

        },

        "StringEquals": {

            "aws:SourceVpc": "vpc-111bbb22"

        }

    }

}

Which permission will the developer have for using GetItem?

29 / 65

29. A SysOps Administrator has implemented an Auto Scaling group with a step scaling policy. The Administrator notices that the additional instances have not been included in the the aggregated metrics. Why are the additional instances missing from the aggregated metrics?

30 / 65

30. A SysOps Administrator is deploying a legacy web application on AWS. The application has four instance amazon EC2 instances behind Classic Load Balancer and stores data in an Amazon RDS instance. The legacy application has known vulnerabilities to SQL injection attacks, but the application the code is no longer available to update. What cost-effective configuration change should the Administrator make to migrate the risk of SQL injection attacks?

31 / 65

31. Which two AWS services provide out-of-the-box user configurable automatic backup-as-a-service and backup rotation options? (Select all that apply)

32 / 65

32. A large enterprise has numerous AWS accounts spread across different departments. They want to implement centralized governance, establish a baseline security posture, and ensure compliance across all accounts. Which AWS service provides a set of predefined guardrails to help achieve these objectives?

33 / 65

33. You are managing a legacy application inside of the VPC with hard-coded IP addresses in its configuration. Which two mechanisms will allow the application to failover to new instances without the need for reconfiguration? (Select Two)

34 / 65

34. A company has an application that uses Amazon ElastiCache for Memcached to cache query responses to improve latency. However, the application's users are reporting slow response times. A SysOps administrator notices that the Amazon CloudWatch metrics for Memcached evictions are high. Which actions should the SysOps administrator take to fix this issue? (Select TWO.)

35 / 65

35. A company's disaster recovery policy states that Amazon Elastic Block Store (Amazon EBS) snapshots must be created daily. The EBS snapshots must be retained for 6 months and then must be deleted. A SysOps administrator must automate this process.

Which solution will meet these requirements with the LEAST operational overhead?

36 / 65

36. A company runs an application on a large fleet of Amazon EC2 instances to process financial transactions. The EC2 instances share data by using an Amazon Elastic File System (Amazon EFS) file system. The company wants to deploy the application to a new Availability Zone and has created new subnets and a mount target in the new Availability Zone. When a SysOps administrator launches new EC2 instances in the new subnets, the EC2 instances are unable to mount the file system. What is a reason for this issue?

37 / 65

37. A company hosts an internal application on Amazon EC2 instances. The application is used only during work hours from 8:00 AM to 6:00 PM on Monday through Friday. The company wants to start and stop the EC2 instances on a schedule around these work hours to optimize cost.

Which solution to automate the process for starting and stopping the EC2 instances is the MOST operationally efficient?

38 / 65

38. A company hosts a web application on an Amazon EC2 instance. Users report that the web application is occasionally unresponsive. Amazon CloudWatch metrics indicate that the CPU utilization is 100% during these times. A SysOps administrator must implement a solution to monitor for this issue. Which solution will meet this requirement?

39 / 65

39. How can the domain's zone apex for example "myzoneapexdomain.com" be pointed towards an Elastic Load Balancer?

40 / 65

40. You have set up Individual AWS accounts for each project. You have been asked to make sure your AWS Infrastructure costs do not exceed the budget set per project for each month. Which of the following approaches can help ensure that you do not exceed the budget each month?

41 / 65

41. You are running a web-application on AWS consisting of the following components: an Elastic Load Balancer (ELB), an Auto-Scaling Group of EC2 instances running Linux/PHP/Apache, and Relational DataBase Service (RDS) MySQL. Which security measure falls into AWS's responsibility?

42 / 65

42. A user has developed an application which is required to send the data to a NoSQL database. The user wants to decouple the data sending such that the application keeps processing and sending data but does not wait for an acknowledgement of DB. Which of the below mentioned applications helps in this scenario?

43 / 65

43. A company needs to ensure that an AWS Lambda function can access resources in a VPC in the company's account. The Lambda function requires access to third-party APIs that can be accessed only over the internet. Which action should a SysOps administrator take to meet these requirements?

44 / 65

44. A company is running a website that stores data in an Amazon RDS for MySQL DB instance. The company expects the data that is stored in the database to grow significantly during the next 6 months.

A SysOps administrator can see that the DB instance will run out of storage space in that time period. The current DB instance uses General Purpose SSD (gp2) volumes for storage.

Which action can the SysOps administrator take to scale the storage for the DB instance?

45 / 65

45. You're currently using AWS Auto Scaling for your application. Your app is running a fleet of VMs behind the Elastic Load Balancer that scales out and in, in accordance with the current amount of received traffic. You are preparing for an advertising campaign which will attract more visitors than you currently have, and increase your traffic 10 times. Your calculations show that at the peak time of traffic, you will need up to 120 EC2 instances. What preparations must be done to get your infrastructure ready for the traffic spikes? (Select all that apply)

46 / 65

46. A SysOps administrator is responsible for an Amazon RDS Single-AZ DB instance that stores customer and sales information. An Amazon CloudWatch dashboard shows increased consumption of CPU and memory for the DB instance in the last week of each month. The increased consumption is caused by extensive reads to the sales data by users that run reports. The SysOps administrator needs a solution that runs the reports without affecting the ability of users to send data to the database.

Which solution will meet this requirement with the LEAST amount of effort?

47 / 65

47. An application that you are managing has EC2 instances & Dynamo OB tables deployed to several AWS Regions In order to monitor the performance of the application globally, you would like to see two graphs 1) Avg CPU Utilization across all EC2 instances and 2) Number of Throttled Requests for all DynamoDB tables. How can you accomplish this?

48 / 65

48. A company is running a custom database on an Amazon EC2 instance. The database stores its data on an Amazon Elastic Block Store (Amazon EBS) volume. A SysOps administrator must set up a backup strategy for the EBS volume. What should the SysOps administrator do to meet this requirement?

49 / 65

49. A company created a new application that uses a Spot Fleet for a variety of instance families across multiple Availability Zones.

What should a SysOps administrator do to ensure that the Spot Fleet is configured for cost optimization?

50 / 65

50. The company uses AWS Organizations to manage its accounts. For the production account, a SysOps administrator must ensure that all data is backed up daily for all current and future Amazon EC2 instances and Amazon Elastic File System (Amazon EFS) file systems. Backups must be retained for 30 days. Which solution will meet these requirements with the LEAST amount of effort?

51 / 65

51. You have a stateless web-style application with a CPU and memory-intensive web tier running on a c3.8xlarge EC2 instance inside of a VPC. The instance when under load faces problems returning requests within the SLA, as defined by your business. The application maintains its state in a DynamoDB table, but the data tier is properly provisioned and responses are consistently fast. How can you best resolve the issue of the application responses not meeting your SLA?

52 / 65

52. A company uses an AWS CloudFormation stack to create an Auto Scaling group of Amazon EC2 instances. The company needs to address a security vulnerability in the Amazon Machine Image (AMI) that the EC2 instances use. The company needs to update to the latest operating system to address the security concerns. The company's application runs on the EC2 instances and must stay online at all times. At least one EC2 instance must stay operational during the change operation.

A SysOps administrator is updating the AMI ID in the CloudFormation template.

How can the SysOps administrator apply the AMI update to meet these requirements?

53 / 65

53. You have an Auto Scaling group running behind Elastic Load Balancer (ELB) and associated with that ELB. You have noticed that some of the instances in the Auto Scaling Group were marked as unhealthy by the ELB, but were not terminated. What setting do you need to change so that the instances marked as unhealthy by the ELB would be terminated correctly by the Auto Scaling during its normal Self-healing procedure?

54 / 65

54. Which of the following are the characteristics of Amazon S3? (Select two)

55 / 65

55. An organization is using cost allocation tags to find the cost distribution of different departments and projects. One of the instances has two separate tags with the key/ value as “InstanceName/HR”, “CostCenter/HR”. What will AWS do in this case?

56 / 65

56. A company has an application that runs on a fleet of Amazon EC2 instances that run Microsoft Windows. The company needs to apply patches to the operating system each month. The company uses AWS Systems Manager Patch Manager to apply the patches on a schedule. When the fleet is being patched, users of the application report delayed service responses.

What should the company do to MINIMIZE the impact on users during patch deployment?

57 / 65

57. You have a proprietary data store on-premises that must be backed up daily by dumping the data store contents to a single compressed 50GB file and sending the file to AWS. Your SLAs state that any dump file backed up within the past 7 days can be retrieved within 2 hours. Your compliance department has stated that all data must be held indefinitely. The time required to restore the data store from a backup is approximately 1 hour. Your on-premise network connection is capable of sustaining 1gbps to AWS. Which backup methods to AWS would be most cost-effective while still meeting all of your requirements?

58 / 65

58. A SysOps Administrator observes a large number of rogue HTTP requests on an Application Load Balancer (ALB). The requests originate from various IP addresses. Which action should be taken to block this traffic?

59 / 65

59. A company is hosting a service-oriented architecture across multiple Amazon EC2 instances. Each instance hosts a different application. The services read and write messages to Amazon Simple Queue Service (Amazon SQS) queues for cross-service communication. The company uses Amazon CloudWatch for monitoring.

The company has configured a CloudWatch alarm to alert system operators when the value of the ApproximateNumberOfMessagesVisible metric is more than 50. A system operator just received an alert that the alarm has entered the ALARM state.

What could be the cause of the alarm?

60 / 65

60. You use S3 to store critical data for your company. Several users within your group currently have full permissions to your S3 buckets. You need to come up with a solution that does not impact your users and also protect against the accidental deletion of objects. Which two options will address this issue? (Select Two)

61 / 65

61. Your entire AWS infrastructure lives inside of one Amazon VPC You have an Infrastructure monitoring application running on an Amazon instance in Availability Zone (AZ) A of the region, and another application instance running in AZ B. The monitoring application needs to make use of ICMP ping to confirm network reachability of the instance hosting the application. Can you configure the security groups for these instances to only allow the ICMP ping to pass from the monitoring instance to the application instance and nothing else'' If so how?

62 / 65

62. Your company Is moving towards tracking web page users with a small tracking Image loaded on each page Currently you are serving this image out of US-East, but are starting to get concerned about the time It takes to load the image for users on the west coast. What are the two best ways to speed up serving this image? Choose 2 answers

63 / 65

63. A company uses AWS Organizations to create and manage many AWS accounts. The company wants to deploy new IAM roles in each account. Which action should the SysOps administrator take to deploy the new roles in each of the organization’s accounts?

Which action should the SysOps administrator take to deploy the new roles in each of the organization’s accounts?

64 / 65

64. Your organization is preparing to leverage AWS Cloudformation. Which of the below statements will NOT help you to correctly describe Cloudformation?

65 / 65

65. Your company is moving towards tracking web page users with a small tracking image loaded on each page. Currently you are serving this image out of US-East, but are starting to get concerned about the time it takes to load the image for users on the west coast. What are the two best ways to speed up serving this image? (Select Two)

Your score is

The average score is 10%

0%

Exit

Scroll to Top