You have 2 VPC’s , VPCA(10.0.0.0/16) and VPCB(220.127.116.11/16). You create a VPC peering connection which has an id of pcx-1a2b1a2b between the 2 VPC’s. Which of the following route entries need to be added to the route tables to ensure that traffic can flow across the VPC’s? Choose 2 answers from the options given below
You work as a Systems Administrator for a company. You have created an AWS RDS-MySQL Instance. Manual snapshots of the database are carried out from time to time for disaster recover drill scenarios. The company has a requirement to ensure there is no downtime when a snapshot is created for the database. How can you ensure this?
A company is hosting a social media application on AWS. The application makes use of DynamoDB as the backend. The read and write capacity has already been defined for the table. But it has been noticed that during high peak loads, the database begins throttling requests. Which of the following can be used to effectively manage the high number of requests during high peak loads?
Your company is planning on hosting a web application on a set of EC2 Instances. Based on the initial response, it has now been decided to add service which would help distribute the traffic across a set of EC2 Instances hosting the application. The main requirements are that the service should be able to scale to a million requests. Which of the following would you implement for this requirement?
A team has developed an application that works with a DynamoDB table. This application is now going to be hosted on an EC2 Instance. Which of the following would you do from an implementation purpose to ensure that the application has the relevant permissions to access the DynamoDB table?
- A. Create an IAM user with the required permissions and ensure the application runs on behalf of the user on the EC2 instance
- B. Create an IAM group with the required permissions and ensure the application runs on behalf of the group on the EC2 instance
- C. Create an IAM Role with the required permissions and ensure that the Role is assigned to the EC2 Instance
- D. Create Access keys with the required permissions and ensure that the Access keys are embedded in the application
You work as a Systems Administrator for a company. The company has a number of resources hosted in AWS. An external audit is going to be conducted on the AWS resources. As part of the audit, you are required to give log files for all activity carried out on the existing AWS resources. Which of the following service would be able to fulfil this requirement?
A company currently uses the Chef tool to manage the configuration on its underlying servers. They want to start provisioning servers on the AWS Cloud. They want to ensure that they can re-use their existing Chef recipes for configuration management. Which of the following service would be recommended to use in this regard?
Your company has a set of Instances in a subnet in a VPC. These set of Instances host a web-based application. There are a number of similar types of requests coming from an IP address of 18.104.22.168. Your IT Security department has requested that all subsequent traffic from this IP address is blocked. How can you achieve this?
- A. Create an Outbound rule for the Security Group for the EC2 Instances to ensure that no traffic goes to that IP
Your development team has currently made changes to an application which is hosted in AWS. Currently the application is in Production and Route 53 is being used as the DNS service. The new version of the application has undergone testing and now needs to be promoted to a separate environment. They need an initial set of traffic to be directed to the new version of the application for testing, before the final cutover can be made. Which of the following would you implement?
Your company needs to setup a hybrid connection between their on-premise infrastructure and their AWS VPC. They need to ensure to transfer large data sets from their on-premise environment onto AWS. Which of the following would you implement for this requirement?
You’re planning on allowing an Administrator to setup an EC2 Instance. This EC2 Instance will host an application that would need access to a DynamoDB table. Which of the following policy permissions are required to ensure that from a security perspective this implementation can be carried out? Choose 2 answers from the options given below.
You are the IT Operations Engineer for a company. The company is planning on starting to use AWS and use services such as EC2, RDS, ELB. For which of the following do you as the IT Operations Engineer have to ensure that scripts are available to manage the high availability of the service?
Your company has an account in AWS which is being actively used. There is an audit being conducted by an external auditor. They have requested for a list of users, their status, to see if MFA is being used etc. How would you achieve in getting this list for them?
Your company is planning on setting up multiple accounts in AWS. The IT Security department has a requirement to ensure that certain services and actions are not allowed across all accounts. How would you achieve this in the most EFFECTIVE way possible?
A company is planning on transferring a large amount of data onto S3. Since they want to start using the data storage on AWS , they are planning on transferring an initial amount of around 100TB of data onto S3. Which of the following would be the ideal way to transfer this amount of data?
You have identified network throughput as a bottleneck on your t2.small EC2 instance when uploading data into Amazon S3 in the same region. How would you remedy the situation?
A system admin is planning to setup event notifications on RDS. Which of the below mentioned services will help the admin setup notifications?
When attached to a VPC, which 2 components provide connectivity with external networks? Select 2 options.
About Individual Course:
|Learning Style||Self-Paced Learning|
|Course Duration||1 Hour|