A. AWS CloudFormation
B. AWS CLI
C. AWS SDKS
D. AWS CloudTrail
E. Amazon Cloud Directory
Correct Answer:BC
A. AWS Application Discovery Service
B. AWS Resource Groups
C. Elastic Load Balancing
D. AWS Auto Scaling
Correct Answer: C
A. Set up Amazon S3 cross-region replication to another AWS Region
B. Use an Amazon CloudFront Content Delivery Network (CDN) to cache data globally
C. Configure the AWS Backup service to back up the data to another AWS Region
D. Take Amazon S3 bucket snapshots and copy that data to another AWS Region
Correct Answer:A
A. AWS AppSync
B. AWSCodePipeline
C. AWS Batch
D. AWS DataSync
Correct Answer: B
A. High availability
B. Security
C. Loose coupling
D. Elasticity
Correct Answer:D
A. AWS Professional Services
B. AWS Technical Account Manager
C. AWS Support using a support case
D. AWS consulting partners
Correct Answer:C
A. Availability
B. Coupting
C. Security
D. Durability
Correct Answer:A
A. AWS CodeBuild
B. AWS Organizations
C. AWS CloudFormation
D. AWS CodeCommit
Correct Answer:C
A. Open an AWS Support case, provide the architecture proposal, and ask for a monthly cost estimation.
B. Use the AWS Simple Monthly Calculator to estimate the monthly cost.
C. Use the published prices of the AWS services and calculate the monthly estimate.
D. Use the AWS Total Cost of OwnerShip (TCO) Calculator to estimate the monthly cost.
Correct Answer:B
A. Cost Explorer
B. AWS trusted Advisor
C. AWS Organizations
D. Amazon Inspector
Correct Answer:A
A. The payer account must be used to remove the linked account from the organisation
B. The linked account must be activity compliant with AWS System and Organization Controls (SOC)
C. The payer and the linked account both create AWS Support cases to request that the member account
be unlinked from the organisation.
D. The monitor account must meet the requirements of a standalone account.
Correct Answer:A
A. Amazon Connect
B. AWS Direct Connect
C. AWS IAM
D. Amazon Recognition
Correct Answer:C
A. AWS Systems Manager
B. AWS Config
C. AWS Trusted Advisor
D. AWS Service Catalog
Correct Answer:C
A Limiting who can create resources
B. Tagging resources
C. Adding a secondary payment method
D. Running all operation on a single AWS account
Correct Answer:B
A. Amazon S3
B. Amazon EFS
C. Amazon S3 Glacier
D. AWS Storage Gateway
Correct Answer:C
A. Performance
B. Optimising for cost
C. Removing single points off failure
D. Loose coupling
Correct Answer:B
A. AWS Systems Manager
B. AWS Config
C. AWS trusted Advisor
D. AWS Service Catalog
Correct Answer:C
A. Partial Upfront Reserved Instances tor a 1 year term
B. All Upfront Reserved Instances for a 1 year term
C. No Upfront Reserved Instances for a 3-year term
D. All Upfront Reserved Instances tor a 3 year term
Correct Answer:D
A. RDS supports any relational database
B. RDS database compute capacity can be easily scaled.
C. RDS inbound traffic content (for example, security groups) is managed by AWS.
D. RDS backup are managed by AWS
E. RDs has no database engineer licensing costs.
Correct Answer:DE
A. AWS CloudFormation
B. AWS CLI
C. AWS CloudTrail
D. Amazon Cloud Directory
E. AWS SDKs
Correct Answer:BE
A. Amazon Simple Notification Service (Amazon SNS)
B. Amazon Simple Email Service (Amazon SES)
C. Amazon CloudWatch
D. AWS CloudTrail
Correct Answer:C
A. Enable access key sharing among users.
B. Enable AWS Multi-Factor Authentication (AWS MFA) for users.
C. Use the inline policies instead of user managed policies.
D. Avoid rotating credentials.
E. Configure strong password policies for users.
Correct Answer:BE
A. Ensure that backend components include multiple Availability Zone deployments.
B. Enforce higher security specifically in regard to design for failure.
C. Enable object versioning within Amazon S3 and replicating data to another AWS Region.
D. Avoid the use of automatic scaling to simplify the cloud architecture.
E. Include an Application Load Balancer to distribute traffic to multiple Amazon EC2 instance in separate Availability Zones
Correct Answer:AC
A. Amazon Inspector
B. Amazon GuardDuty
C. Amazon Macie
D. AWS Secrets Manager
Correct Answer:C
A. Amazon Route 53
B. Amazon Connect
C. Amazon CloudFront
D. AWS Global Accelerator
Correct Answer:B
A. two or more data centres in multiple locations.
B. one or more data centres in a single location.
C. one or more physical hosts in a single data centre.
D. two or more physical hosts in multiple data centres.
Correct Answer:B
A. Download the reports from AWS Artefact.
B. Contact the AWS Compliance team.
C. Open a case with AWS Support.
D. Generate the reports with Amazon Made.
Correct Answer:A
A. AWS security solutions in the AWS Marketplace.
B. AWS whitepapers related to security best practices.
C. Real-time vulnerability scans from Amazon Kinesis.
D. Open-source penetration testing results available in Amazon Cognito.
E. Security analyses of README.md files within application repositories stored in AWS CodeCommit.
Correct Answer:AB
A. AWS Personal Health Dashboard
B. AWS Secrets Manager
C. Amazon Inspector
D. AWS Security Bulletins
Correct Answer:D
A. By replacing large variable costs with lower capital investments
B. By allowing the provisioning of compute and storage at a fixed level to meet peak demand
C. By replacing large capital investments with lower variable costs
D. By replacing the repeated scaling of virtual servers with a simpler fixed-scale model
Correct Answer:C
A. Spot Instances
B. Dedicated Hosts
C. Reserved Instances
D. On-Demand Instances
Correct Answer:D
A. Reducing the operational costs of the application
B. Preventing a single point of failure
C. Increasing the availability of the application
D. Allowing the application to serve cross-region users with low latency
E. Increasing the load of the application
Correct Answer:BC
A. Encrypting customer data.
B. The physical security of AWS facilities.
C. Patching operating systems on Amazon EC2.
D. Patching and updating the hypervisor.
E. Defining network firewalls inside the VPC.
Correct Answer:BD
A. High availability
B. Global reach
C. Elasticity
D. Agility
Correct Answer:A
A. Setting up and managing network controls
B. Operating system patching
C. Managing platform-level identity and access management (1AM)
D. Environmental controls
E. Physical security of the data centre
Correct Answer:AD
A. In-memory
B. Relational
C. Graph
D. Key-value
Correct Answer:C
A. AWS Certificate Manager
B. AWS Artefact
C. Amazon Inspector
D. AWS Systems Manager
Correct Answer:D
A. Amazon EC2
B. AWS Elastic Beanstalk
C. Amazon EMR
D. Amazon Redshift
Correct Answer:C
A. Customer gateway
B. Transit gateway
C. Internet gateway
D. NAT gateway
E. Virtual private gateway
Correct Answer:AB
A. Physical access control
B. Software licences
C. Staff to manage the hardware assets
D. Power and cooling
Correct Answer:C
A. Amazon S3
B. Amazon EC2 instance store
C. Amazon ElastiCache
D. Amazon Elastic Block Store (Amazon EBS)
Correct Answer:D
A. Use resource tagging
B. Use multiple AWS accounts.
C. Use multiple VPCs.
D. Use Cost Explorer
Correct Answer:A
A. Amazon Lex
B. Amazon Textract
C. Amazon Polly
D. Amazon Comprehend
Correct Answer:B
A. Amazon Cognito
B. AWS Shield
C. AWS IAM user access key
D. AWS IAM role
Correct Answer: D
A. Spot Instances
B. On-Demand Instances
C. Reserved Instances
D. Dedicated Host
Correct Answer:C
A. AWS Artefact
B. Amazon GuardDuty
C. AWS Security Hub
D. AWS Shield
Correct Answer:A
A. Access AWS Trusted Advisor
B. Sign up for AWS Enterprise Support
C. Contact the AWS Partner Network (APN).
D. Contact AWS Professional Services
Correct Answer:B
A. Launch the resources using the AWS Management Console
B. Use AWS OpsWorks to provision the workloads.
C. Use AWS CloudFormation to launch a stack.
D Execute a custom PowerShell script to launch the workloads.
Correct Answer:B
A. Spot Instances
B. Reserved Instances
C. On-Demand Instances
D. Dedicated Hosts
Correct Answer: C
A. AWS IAM password
B. U2F security key token
C. AWS Certificate Manager certificate
D. Access key or secret key
Correct Answer: B
A. Amazon S3
B. AWS Snowball
C. AWS Direct Connect
D. AWS VPN
Correct Answer:A
A. Automatic cost savings by moving objects between tiers based on access pattern changes
B. Payment flexibility by reserving storage capacity
C. Long-term retention of data by copying the data to an encrypted Amazon Elastic Block Store (Amazon EBS) volume
D. Secure, durable, and lowest cost storage for data archival
Correct Answer:A
A. Amazon AppStream 2.0
B. Elastic Load Balancer
C. Amazon Route 53
D. Amazon VPC
Correct Answer: D
A. Detecting underutilised resources to save costs
B. Improving security by proactively monitoring the AWS environment
C. Providing high-performance container orchestration
D. Creating and rotating encryption keys
E. Implementing enforced tagging across AWS resources
Correct Answer:AB
A. To assign permissions to a role, group, or user
B. To define the run schedule of an Amazon EC2 instance
C. To manage ports within a VPN
D. To manage the access keys for an IAM user
Correct Answer: A
A. AWS Senior Support Engineers
B. AWS Trusted Advisor
C. AWS Technical Account Managers
D. AWS Discussion Forums
Correct Answer:B
A. AWS Professional Services
B. AWS Support using a support case
C. AWS Technical Account Manager AWS consulting partners
Correct Answer:B
A. Basic
B. Developer
C. Enterprise
D. Business
Correct Answer:D
A. Launch the instances as EC2 Reserved Instances in the same AWS Region and the same Availability Zone
B. Launch the instances across multiple Availability Zones in a single AWS Region
C. Launch the instances in multiple AWS Regions but in the same Availability Zone
D. Launch the instances as EC2 Spot Instances in the same AWS Region but in different Availability Zones
Correct Answer:B
A. AWS Config
B. AWS Shield
C. AWS 1AM
D. Amazon Inspector
Correct Answer:A
A. Elastic Load Balancer
B. Amazon Route 53
C. Amazon CloudFront
D. Amazon EC2 Auto Scaling
Correct Answer:D
A. AWS Snowball
B. AWS Storage Gateway
C. Amazon S3 Transfer Accelerator
D. AWS DataSync
Correct Answer:C
A. Support from a dedicated AWS Technical Account Manager
B. 24/7 assistance by way of live chat or a telephone call
C. 15-minute response time for production system interruption cases
D. An unlimited number of cases and contacts
E. Annual operational reviews with AWS Solutions Architects
Correct Answer:BD
A. AWS Server Migration Service (AWS SMS)
B. Amazon EC2
C. Amazon Aurora
D. AWS Trusted Advisor
Correct Answer:B
A. For stateful workloads
B. For non-production applications
C. For fault-tolerant flexible applications
D. For applications that cannot have interruptions
E. For sensitive database applications
Correct Answer:BC
A. Amazon CloudWatch
B. AWS CloudTrail
C. VPC Flow Logs
D. AWSConfig
Correct Answer:A
A. Resource groups
B. Security groups
C. Availability Zones
D. Amazon Machine Images (AMIS)
E. Regions
Correct Answer:CD
A. Patching the infrastructure components
B. Maintaining physical and environmental controls
C. Maintaining the underlying infrastructure components
D. Implementing controls to route application traffic
Correct Answer:C
A. Amazon Route S3
B. Amazon CloudFront
C. Amazon EC2
D. Amazon Connect
Correct Answer:D
A. Amazon DynamoDB
B. Amazon RDS
C. Amazon Athena
D. Amazon EMR
Correct Answer:B
A. Enterprise Support
B. Business Support
C. Basic Support
D. Developer Support
Correct Answer: A
A. Managing physical access to AWS data centres
B. Maintaining the hardware that constitutes the cloud
C. Configuring network ACLS
D. Setting and maintaining Amazon S3 access permissions.
E. Updating Amazon EC2 security groups
Correct Answer:AB
A. Use multiple Amazon Route 53 routes to the standby database instance endpoint hosted on AWS Storage Gateway
B. Add multiple Application Load Balancers and deploy the database instance with AWS Elastic Beanstalk.
C. Configure Amazon RDS Multi-Availability Zone deployments with automatic failover to the standby
D. Deploy a single Network Load Balancer to distribute incoming traffic across multiple Amazon CloudFront origins
Correct Answer:C
A. Patching the guest operating system
B. Protecting communications and maintaining zone security
C. Patching specific applications
D. Maintaining physical and environmental controls
Correct Answer:D
A. Amazon Cloud Directory
B. Authentication (AWS MEA)
C. AWS KMS AWS Multi-Factor
D. Amazon Cognito
Correct Answer:B
A. Amazon Connect
B. Cost Explorer
C. AWS Organizations
D. AWS Trusted Advisor
Correct Answer:C
A. Amazon CloudWatch
B. AWS CloudTrail
C. VPC Flow Logs
D. AWS Config
Correct Answer:A
A. Amazon S3
B. AWS Global Accelerator
C. Amazon Route 53
D. Amazon CloudFront
Correct Answer: D
A. 5 TB
B. 100 MB
C. 5 GB OC
D. Unlimited
Correct Answer:A
A. Loose coupling
B. Design for failure
C. Elasticity
D. Parallelism
Correct Answer:C
A. AWS Budgets
B. Cost Explorer
C. AWS Well-Architected Tool
D. AWS Total Cost of Ownership (TCO) Calculator
Correct Answer:D
A. To allow communication between the VPC and the Internet
B. To create a VPN connection to the VPC
C. To impose bandwidth constraints on internet traffic
D. To load balance traffic from the Internet across Amazon EC2 instances
Correct Answer:A
A. Auditing
B. Cost optimization
C. Performance
D. Serverless architecture
E. Scalability
Correct Answer:BC
A. Creating a new IAM policy
B. Closing an AWS account
C. Attaching a role to an Amazon EC2 instance
D. Generating access keys for IAM users
E. Changing AWS Support plans
Correct Answer:BE
A. the ability of an application to accommodate growth without changing design
B. how secure your application is
C. how well and how quickly an application’s environment can have lost data restored
D. the built-in redundancy of an application’s components
Correct Answer:C
A. Memory optimised instances for high-compute workloads
B. Spot Instances for stateless and flexible workloads
C. Reserved Instances for sustained workloads
D. On-Demand Instances for high-cost and sustained workloads
E. Spend limits set using AWS Budgets
Correct Answer:BC
A. AWS Artefact
B. AWS Certificate Manager
C. AWS Config
D. AWS CloudTrail
Correct Answer: A
A. Amazon AppStream 2.0
B. Amazon VPC
C. Amazon Route 53
D. Elastic Load Balancer
Correct Answer:C
A. AWS CloudTrail
B. AWS Config
C. AWS Trusted Advisor
D. Amazon Inspector
Correct Answer:A
A. AWS Trusted Advisor
B. AWS Resource Access Manager
C. AWS Config
D. AWS Systems Manager
Correct Answer:C
A. AWS Cost Explorer
B. AWS Budgets
C. AWS Cost Allocation Tags
D. AWS Organizations
Correct Answer: B
A. Open a support case
B. Request a penetration test from your technical account manager
C. Fill out the Penetration Testing Request Form
D. Contact your AWS sales representative
Correct Answer:C
A. Scalability
B. Loose coupling
C. Services, not servers
D. Removing single points of failure
Correct Answer:B
A. Amazon Elasticsearch Service
B. AWS Lambda
C. Amazon DynamoDB
D. AWS Elastic Beanstalk
E. Amazon Redshift
Correct Answer:BC
A. NAT gateway
B. Amazon Connect
C. Amazon Route 53
D. AWS VPN
E. AWS Direct Connect
Correct Answer:DE
A. Elasticity
B. Agility
C. Scalability
D. Security
Correct Answer:C
A. AWS Personal Health Dashboard
B. AWS Trusted Advisor
C. Amazon S3
D. AWS Artefact
Correct Answer:D
A. Run on two Availability Zones in one AWS Region, using another AWS Region for the disaster recovery site.
B. Run on two Availability Zones in one AWS Region, using the additional Availability Zones in the AWS Region for the disaster recovery site.
C. Run on two Availability Zones in one AWS Region, using a local AWS Region for the disaster recovery site.
D. Run across two AWS Regions, using a third AWS Region for the disaster recovery site.
Correct Answer:B
A. Using multiple AWS accounts
B. Using Consolidated Billing
C. Using tags on resources
D. Using an account manager
E. Using AWS Trusted Advisor
Correct Answer:AB
A. Principal
B. Action
C. Statement
D. Resource
Correct Answer:D
A. AWS Trusted Advisor
B. AWS Direct Connect
C. AWS Organizations
D. Amazon Connect
Correct Answer:C
A. On-Demand Instances
B. Reserved Instances
C. Spot Instances
D. Dedicated Hosts
Correct Answer:A
A. Enabling server-side encryption for objects stored in S3
B. Applying updates to the hypervisor
C. Applying AWS IAM security policies
D. Patching the operating system on an Amazon EC2 instance
Correct Answer:B
A. AWS Organizations
B. AWS Budgets.
C. Amazon Macie.
D. Amazon QuickSight.
Correct Answer:A
A. Operational excellence
B. Performance efficiency
C. Reliability
D. Security
Correct Answer: A
A. Vertical scaling
B. Testing recovery procedures
C. Manual failure recovery
D. Changing infrastructure manually
Correct Answer: B
A. Users can exchange Convertible RIs for other Convertible RIs in different AWS Regions.
B. Users can sell and buy Convertible RIs on the AWS Marketplace.
C. Users can shorten the term of their Convertible RIs by merging them with otherĀ
D. Users can exchange Convertible RIs for other Convertible RIs from a different instance family.Convertible RIs.
Correct Answer:D
A. Schema management
B. Automated backups
C. Software patching
D. Indexing of tables
E. Extract, transform, and load (ETL) management
Correct Answer:BC
A. Amazon DynamoDB
B. Amazon Athena
C. Amazon QuickSight
D. Amazon Redshift
Correct Answer: D
A AWS Config
B. Amazon CloudWatch
C. AWS CloudTrail
D. AWS Trusted Advisor
Correct Answer:A
A. Reserved Instances
B. On-Demand Instances
C. Dedicated Instances
D. Spot Instances
Correct Answer:B
A. On-Demand Instance
B. Reserved Instance
C. Spot Instance
D. Dedicated Host
Correct Answer:C
A. Grant the developer access to only the AWS resources needed to perform the job.
B. Ensure the account password policy requires a minimum length.
C. Share the AWS account root user credentials with the developer.
D. Add the developer to the administrator’s group in AWS IAM.
E. Configure a password policy that ensures the developer’s password cannot be changed.
Correct Answer: AB
A. AWS Storage Gateway
B. Amazon S3 Glacier Deep Archive
C. AWS Snowball
D. Amazon Lightsail
Correct Answer:C
A. Amazon EFS
B. Amazon RDS
C. Amazon VPC
D. Amazon Redshift
Correct Answer:D
A. Amazon S3
B. Amazon Elastic Block Store (Amazon EBS)
C. Amazon Elastic File System (Amazon EFS)
D. AWS Storage Gateway
Correct Answer:A
A. Secure their physical infrastructure to prevent malicious attacks.
B. Use AWS Auto Scaling to dynamically increase and decrease compute resources as needed.
C. Use AWS Budgets to ensure that spending on AWS resources does not exceed preset thresholds.
D. Eliminate the electricity costs that are associated with the hosting of physical servers.
Correct Answer:B
A. Amazon Route 53
B. AWS PrivateLink
C. AWS Direct Connect
D. AWS VPN
Correct Answer:C
A. AWS Support
B. Amazon EC2 private Amazon Machine Images (AMIs)
C. AWS Marketplace
D. AWS reseller programs
Correct Answer:C
A. AWS Elastic Beanstalk
B. AWS Auto Scaling
C. AWS Control Tower
D. Amazon EC2
Correct Answer: A
A. Running Amazon GuardDuty
B Creating an AWS Support ticket
C. Using AWS Artefact
D. Evaluating AWS CloudTrail logs
Correct Answer:C
A. Amazon EC2 Auto Scaling
B. AWS App2Container (A2C)
C. Elastic Load Balancing
D. AWS Systems Manager
Correct Answer:C
A. The requested EC2 instance types are not available in the second Region.
B. A new EC2 key pair has not been created for the EC2 instances.
C. The company cannot operate in a second Region until it updates its AWS contract.
D. The company has not configured AWS Budgets to monitor the budget for the EC2 instances.
Correct Answer:BĀ
A. AWS CLI
B. AWS Developer Center
C. AWS CodeStar
D. AWS Cloud Development Kit (AWS CDK)
Correct Answer:D
A. Use live chat functionality.
B. Call the customer service phone number.
C. Create an email case in the AWS Support Center.
D. Visit a local AWS Support Center.
E. Use the video conference functionality of the AWS Support console.
Correct Answer:AB
A. Use Amazon EC2 in multiple Regions to host separate databases.
B. Use Amazon DynamoDB global tables.
C. Use Amazon RDS cross-Region replication.
D. Use AWS Database Migration Service (AWS DMS).
Correct Answer:B
A. Provide security for the physical infrastructure.
B. Train the company’s employees about cloud security.
C. Activate encryption at rest for the data.
D. Remove personally identifiable information (PII) from the data.
Correct Answer:C
A. Security group
B. Network ACL
C. AWS WAF
D. Route table
Correct Answer:A
A. Operational excellence
B. Well-Architected Framework
C. Rightsizing
D. Cost optimization
E. Security
Correct Answer:DE
A. Patching of the guest operating system
B. Physical and environmental controls
C. Security awareness and training
D. Development of an IAM password policy
Correct Answer:B