What tells you about aws sysops training

Proper study guides for Most up-to-date Amazon AWS Certified SysOps Administrator Associate certified begins with Amazon aws sysops exam questions preparation products which designed to deliver the Breathing aws sysops pdf questions by making you pass the aws sysops certification dumps test at your first time. Try the free aws sysops dumps demo right now.


Free VCE & PDF File for Amazon AWS-SysOps Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW AWS-SysOps Exam Dumps (PDF & VCE):
Available on:

Q151. – (Topic 3) 

A user has enabled versioning on an S3 bucket. The user is using server side encryption for data at Rest. If the user is supplying his own keys for encryption (SSE-C., which of the below mentioned statements is true? 

A. The user should use the same encryption key for all versions of the same object 

B. It is possible to have different encryption keys for different versions of the same object 

C. AWS S3 does not allow the user to upload his own keys for server side encryption 

D. The SSE-C does not work when versioning is enabled 



AWS S3 supports client side or server side encryption to encrypt all data at rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key (SSE-C.. If the bucket is versioning-enabled, each object version uploaded by the user using the SSE-C feature can have its own encryption key. The user is responsible for tracking which encryption key was used for which object's version 

Q152. – (Topic 3) 

A user has created an application which will be hosted on EC2. The application makes calls to DynamoDB to fetch certain data. The application is using the DynamoDB SDK to connect with from the EC2 instance. Which of the below mentioned statements is true with respect to the best practice for security in this scenario? 

A. The user should attach an IAM role with DynamoDB access to the EC2 instance 

B. The user should create an IAM user with DynamoDB access and use its credentials within the application to connect with DynamoDB 

C. The user should create an IAM role, which has EC2 access so that it will allow deploying the application 

D. The user should create an IAM user with DynamoDB and EC2 access. Attach the user with the application so that it does not use the root account credentials 



With AWS IAM a user is creating an application which runs on an EC2 instance and makes requests to AWS, such as DynamoDB or S3 calls. Here it is recommended that the user should not create an IAM user and pass the user's credentials to the application or embed those credentials inside the application. Instead, the user should use roles for EC2 and give that role access to DynamoDB /S3. When the roles are attached to EC2, it will give temporary security credentials to the application hosted on that EC2, to connect with DynamoDB / S3. 

Q153. – (Topic 3) 

A user has configured an EC2 instance in the US-East-1a zone. The user has enabled detailed monitoring of the instance. The user is trying to get the data from CloudWatch using a CLI. Which of the below mentioned CloudWatch endpoint URLs should the user use? 

A. monitoring.us-east-1.amazonaws.com 

B. monitoring.us-east-1-a.amazonaws.com 

C. monitoring.us-east-1a.amazonaws.com 

D. cloudwatch.us-east-1a.amazonaws.com 



The CloudWatch resources are always region specific and they will have the end point as region specific. If the user is trying to access the metric in the US-East-1 region, the endpoint URL will be: monitoring.us-east- 1.amazonaws.com 

Q154. – (Topic 2) 

A user has created an ELB with three instances. How many security groups will ELB create by default? 

A. 3 

B. 5 

C. 2 

D. 1 



Elastic Load Balancing provides a special Amazon EC2 source security group that the user can use to ensure that back-end EC2 instances receive traffic only from Elastic Load Balancing. This feature needs two security groups: the source security group and a security group that defines the ingress rules for the back-end instances. To ensure that traffic only flows between the load balancer and the back-end instances, the user can add or modify a rule to the back-end security group which can limit the ingress traffic. Thus, it can come only from the source security group provided by Elastic load Balancing. 

Q155. – (Topic 2) 

An organization is generating digital policy files which are required by the admins for verification. Once the files are verified they may not be required in the future unless there is some compliance issue. If the organization wants to save them in a cost effective way, which is the best possible solution? 


B. AWS S3 


D. AWS Glacier 



Amazon S3 stores objects according to their storage class. There are three major storage classes: Standard, Reduced Redundancy and Glacier. Standard is for AWS S3 and provides very high durability. However, the costs are a little higher. Reduced redundancy is for less critical files. Glacier is for archival and the files which are accessed infrequently. It is an extremely low-cost storage service that provides secure and durable storage for data archiving and backup. 

Q156. – (Topic 3) 

An AWS account owner has setup multiple IAM users. One IAM user only has CloudWatch access. He has setup the alarm action which stops the EC2 instances when the CPU utilization is below the threshold limit. What will happen in this case? 

A. It is not possible to stop the instance using the CloudWatch alarm 

B. CloudWatch will stop the instance when the action is executed 

C. The user cannot set an alarm on EC2 since he does not have the permission 

D. The user can setup the action but it will not be executed if the user does not have EC2 rights 



Amazon CloudWatch alarms watch a single metric over a time period that the user specifies and performs one or more actions based on the value of the metric relative to a given threshold over a number of time periods. The user can setup an action which stops the instances when their CPU utilization is below a certain threshold for a certain period of time. The EC2 action can either terminate or stop the instance as part of the EC2 action. If the IAM user has read/write permissions for Amazon CloudWatch but not for Amazon EC2, he can still create an alarm. However, the stop or terminate actions will not be performed on the Amazon EC2 instance. 

Q157. – (Topic 3) 

A user is planning to scale up an application by 8 AM and scale down by 7 PM daily using Auto Scaling. What should the user do in this case? 

A. Setup the scaling policy to scale up and down based on the CloudWatch alarms 

B. The user should increase the desired capacity at 8 AM and decrease it by 7 PM manually 

C. The user should setup a batch process which launches the EC2 instance at a specific time 

D. Setup scheduled actions to scale up or down at a specific time 



Auto Scaling based on a schedule allows the user to scale the application in response to predictable load changes. To configure the Auto Scaling group to scale based on a schedule, the user needs to create scheduled actions. A scheduled action tells Auto Scaling to perform a scaling action at a certain time in the future. 

Q158. – (Topic 3) 

What would happen to an RDS (Relational Database Service) multi-Availability Zone deployment if the primary DB instance fails? 

A. The IP of the primary DB Instance is switched to the standby DB Instance. 

B. A new DB instance is created in the standby availability zone. 

C. The canonical name record (CNAME) is changed from primary to standby. 

D. The RDS (Relational Database Service) DB instance reboots. 


Explanation: Reference: 


Q159. – (Topic 2) 

A user is trying to setup a recurring Auto Scaling process. The user has setup one process to scale up every day at 8 am and scale down at 7 PM. The user is trying to setup another recurring process which scales up on the 1st of every month at 8 AM and scales down the same day at 7 PM. What will Auto Scaling do in this scenario? 

A. Auto Scaling will execute both processes but will add just one instance on the 1st 

B. Auto Scaling will add two instances on the 1st of the month 

C. Auto Scaling will schedule both the processes but execute only one process randomly 

D. Auto Scaling will throw an error since there is a conflict in the schedule of two separate Auto Scaling Processes 



Auto Scaling based on a schedule allows the user to scale the application in response to predictable load changes. The user can also configure the recurring schedule action which will follow the Linux cron format. As per Auto Scaling, a scheduled action must have a unique time value. If the user attempts to schedule an activity at a time when another existing activity is already scheduled, the call will be rejected with an error message noting the conflict. 

Q160. – (Topic 2) 

A user is checking the CloudWatch metrics from the AWS console. The user notices that the CloudWatch data is coming in UTC. The user wants to convert the data to a local time zone. How can the user perform this? 

A. In the CloudWatch dashboard the user should set the local timezone so that CloudWatch shows the data only in the local time zone 

B. In the CloudWatch console select the local timezone under the Time Range tab to view the data as per the local timezone 

C. The CloudWatch data is always in UTC; the user has to manually convert the data 

D. The user should have send the local timezone while uploading the data so that CloudWatch will show the data only in the local timezone 



If the user is viewing the data inside the CloudWatch console, the console provides options to filter values either using the relative period, such as days/hours or using the Absolute tab where the user can provide data with a specific date and time. The console also provides the option to search using the local timezone under the time range caption in the console because the time range tab allows the user to change the time zone. 

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.