A. AWS Basic Support
B. AWS Enterprise Support
C. AWS Business Support
D. AWS Developer Support
E. AWS Concierge Support
Correct Answer:BC
A. AWS AppSync
B. Amazon Elastic Container Registry (Amazon ECR)
C. An open-source Docker orchestrator on Amazon EC2 instances
D. Amazon Elastic Container Service (Amazon ECS)
Correct Answer: C
A. AWS Auto Scaling
B. Amazon CloudFront
C. AWS AppSync
D. Amazon Route 53
Correct Answer:B
A. Reserved Instances
B. Spot Instances
C. On-Demand Instances
D. Dedicated Hosts
Correct Answer:C
A. Network ACLs
B. Amazon Inspector
C. AWS Shield
D. VPC Flow Logs
Correct Answer: A
A. Economies of scale
B. Security
C. Global reach
D. Elasticity
Correct Answer: C
A. Amazon EC2
B. AWS Lambda
C. Amazon Elastic Container Registry (Amazon ECR)
D. AWS Elastic Beanstalk
Correct Answer:B
A. AWS Certificate Manager (ACM)
B. VPC Flow Logs
C. Internet gateway
D. AWS CloudHSM
Correct Answer:B
A. Application deployment and management are not required
B. Application security will be fully managed by AWS
C. Management of infrastructure is offloaded to AWS
D. Monitoring and logging are not needed
Correct Answer:C
A. Amazon Transcribe
B. Amazon Comprehend
C. Amazon Polly
D. Amazon Lex
Correct Answer:C
A. Economies of scale
B. Agility
C. Reliability
D. Scalability
E. Elasticity
Correct Answer:DE
A. AWS App Mesh
B. AWS Transit Gateway
C. AWS Cloud Map
D. AWS Site-to-Site VPN
Correct Answer:B
A. Consolidated billing
B. AWS Budgets
C. Cost Explorer
D. AWS Cost and Usage Report
Correct Answer:C
A. AWS Enterprise Support
B. AWS Business Support
C. AWS Basic Support
D. AWS Developer Support
Correct Answer:B
A. AWS Global Accelerator
B. S3 Transfer Accelerator
C. Amazon CloudFront
D. AWS Direct Connect
Correct Answer:C
A. AWS Developer Support
B. AWS Business Support
C. AWS Enterprise Support
D. AWS Basic Support
Correct Answer: B
A. Amazon Athena
B. AWS Data Exchange
C. S3 Select
D. AWS Data Pipeline
E. S3 Transfer Acceleration
Correct Answer: AE
A. Amazon Connect
B. Amazon Lightsail
C. AWS Storage Gateway
D. AWS Global Accelerator
Correct Answer: D
A. AWS Trusted Advisor
B. AWS Personal Health Dashboard
C. Billing Dashboard
D. AWS Config
Correct Answer:B
A. IAM users
B. IAM groups
C. Multi-factor authentication (MFA)
D. IAM roles
Correct Answer: C
A. Amazon Elastic Block Store (Amazon EBS)
B. Amazon Elastic File System (Amazon EFS)
C. Amazon S3 Glacier
D. Amazon S3 Standard
Correct Answer:C
A. Client-side data encryption
B. AWS awareness and training
C. Physical and environmental controls of AWS data centres
D. Server-side data encryption
Correct Answer:B
A. Capacity Reservations
B. Amazon Lightsail
C. Dedicated Hosts
D. Spot Instances
Correct Answer: D
A. Trusted Advisor checks
B. Penetration testing
C. Service intrusion metrics
D. Educational webinars
E. Peer-to-peer file-sharing detection
Correct Answer: AB
A. Implement elasticity
B. Decoupled architecture components
C. Thing parallel
D. Design for high availability
Correct Answer:D
A. AWS Pricing Calculator
B. AWS Cost and Usage Reports
C. Cost Explorer
D. AWS Budgets
Correct Answer:B
A. AWS Directory Service
B. AWS VPN
C. AWS CloudHSM
D. AWS Data Pipeline
E. AWS Direct Connect
Correct Answer:BC
A. Amazon S3
B. AWS Shield
C. Amazon Route 53
D. AWS Identity and Access Management (IAM)
Correct Answer: A
A. AWS Identity and Access Management (IAM)
B. Cost Explorer
C. AWS Organizations
D. AWS Budgets
Correct Answer: C
A. Amazon Cognito
B. AWS Identity and Access Management (IAM)
C. AWS Resource Access Manager
D. AWS Key Management Service (AWS KMS)
Correct Answer:B
A. Use serverless EC2 instances
B. Scale the size of EC2 instances up or down automatically, based on demand
C. Scale the number of EC2 instances in or out automatically, based on demand
D. Transfer unused CPU resources between EC2 instances
Correct Answer:C
A. It supports the simple coding of cloud-native applications
B. It monitors the cloud environment
C. It provides the ability to model and provision the resources needed for applications
D. It automates the responses to threats, reducing remediation and recovery time
Correct Answer:C
A. Amazon Connect
B. Amazon Pinpoint
C. Amazon Athena
D. AWS Enterprise Support
Correct Answer:A
A. AWS Abuse team
B. AWS infrastructure event management
C. The designated AWS technical account manager (TAM)
D. AWS Professional Services
Correct Answer: B
A. AWS Systems Manager
B. Cost Explorer
C. Amazon CloudWatch
D. AWS Config2
Correct Answer:C
A. AWS CodeBuild
B. AWS CodeStar
C. AWS CodeDeploy
D. Amazon CodeGuru
Correct Answer:D
A. Move the DB instance to a second VPC
B. Perform frequent snapshots
C. Create a read replica
D. Use multiple Availability Zones
Correct Answer:C
A. Amazon CloudWatch
B. AWS CloudTrail
C. Amazon Inspector
D. AWS X-Ray
Correct Answer:B
A. AWS Trusted Advisor
B. AWS Firewall Manager
C. AWS Shield
D. Amazon EC2 dashboard
Correct Answer:A
A. The date and time when an IAM user’s password was last used to sign in to the AWS Management Console.
B. The User-Agent browser identifier for each IAM user currently logged in.
C. The type of multi-factor authentication (MFA) device assigned to an IAM user.
D. Whether multi-factor authentication (MFA) has been enabled for an IAM user.
E. The number of incorrect login attempts by each IAM user in the previous 30 days.
Correct Answer: AB
A. AWS CLI
B. AWS Developer Center
C. AWS CodeStar
D. AWS Cloud Development Kit (AWS CDK)
Correct Answer:D
A. Deploy the website on Amazon EC2.
B. Host the website on AWS Elastic Beanstalk.
C. Host the website on Amazon S3.
D. Deploy the website with Amazon Lightsail.
Correct Answer:C
A. AWS Snowcone
B. AWS Backup
C. Amazon Connect
D. AWS Transit Gateway
E. AWS DataSync
Correct Answer: DE
A. On-Demand Instances
B. Compute Savings Plan
C. Convertible Reserved Instances
D. Spot Instances
Correct Answer: B
A. On-Demand Instances
B. Spot Instances
C. Reserved Instances
D. Dedicated Instances
Correct Answer:B
A. AWS Direct Connect
B. Amazon Route 53
C. AWS Snowball
D. AWS Site-to-Site VPN
Correct Answer:D
A. Users can deploy all over the world in minutes.
B. Users can trade fixed expenses for variable expenses.
C. AWS offers increased speed and agility.
D. Users benefit from economies of scale.
E. AWS is responsible for patching the infrastructure.
Correct Answer:AE
A. Service control policies (SCPs)
B. AWS IAM Access Analyzer
C. Access control lists (ACLs)
D. IAM roles
Correct Answer: B
A. Amazon Route 53
B. AWS Direct Connect
C. Amazon CloudFront
D. Amazon API Gateway
Correct Answer:A
A. AWS technical account manager (TAM)
B. AWS Concierge Support
C. AWS Abuse team
D. AWS Support team
Correct Answer:C
A. Amazon S3
B. Amazon Elasticsearch Service (Amazon ES)
C. Amazon Elastic File System (Amazon EFS)
D. Amazon Aurora
E. Amazon EC2
Correct Answer:DE
A. AWS ISO certifications
B. Amazon EC2 terms and conditions
C. A history of a company’s AWS spending
D. A list of previous-generation Amazon EC2 instance types
Correct Answer:B
A. AWS WAF
B. VPC route table entry
C. Network ACL
D. Security group
Correct Answer: C
A. A dynamic IP address that is requested in excess of the Regional limit for each account
B. An Elastic IP address that is associated with an EC2 instance that is running
C. A bring your own IP address (BYOIP) that is assigned to an EC2 instance that is running
D. An Elastic IP address that is not associated with an EC2 instance that is running
Correct Answer: D
A. Edge locations contain multiple AWS Regions
B. Availability Zones contain multiple data centres
C. AWS Regions contain multiple Regional edge caches
D. Each data centre contains multiple edge locations
Correct Answer: B
A. AWS Batch
B. Network ACLs
C. AWS Identity and Access Management (IAM)
D. Security groups
E. AWS CloudHSM
Correct Answer: BD
A. Spot Instances
B. Savings Plans
C. Dedicated HostsD
D. Reserved Instances
E. AWS Marketplace subscriptions
Correct Answer:DE
A. AWS Snowball
B. AWS Direct Connect
C. VPN connection
D. Amazon S3
E. Amazon Connect
Correct Answer:BC
A. Rightsize the infrastructure
B. Proactively monitor costs
C. Supply resources dynamically.
D. Decommission unused resources
Correct Answer:A
A. AWS Firewall Manager
B. Amazon GuardDuty
C. AWS Shield
D. Amazon Inspector
Correct Answer:C
A. AWS WAF
B. AWS Shield
C. AWS Certificate Manager (ACM)
D. Amazon VPC
Correct Answer:C
A. AWS Directory Service
B. Amazon Cognito
C. AWS Identity and Access Management (IAM)
D. AWS Single Sign-On
Correct Answer:B
A. AWS Amplify
B. AWS AppSync
C. AWS Device Farm
D. Amazon Pinpoint
Correct Answer:C
A. IAM policy
B. IAM role
C. IAM access keys
D. Account password policy
Correct Answer:C
A. AWS Config
B. AWS OpsWorks
C. AWS Marketplace
D. AWS Systems Manager
Correct Answer: C
A. AWS Cost and Usage Report
B. Cost Explorer
C. AWS Budgets
D. AWS Trusted Advisor
Correct Answer:C
A. IAM users
B. IAM access keys
C. IAM groups
D. IAM roles
Correct Answer:D
A. AWS CodeBuild
B. AWS CodeCommit
C. AWS CodeDeploy
D. AWS CodeStar
Correct Answer:B
A. AWS Outposts
B. AWS Direct Connect
C. AWS Storage Gateway
D. AWS Snowball
Correct Answer:C
A. Amazon S3
B. AWS Snowball
C. Amazon FSx
D. Amazon Elastic Block Store (Amazon EBS)
E. Amazon Elastic File System (Amazon EFS)
Correct Answer:AB
A. AWS Enterprise Support
B. AWS Developer Support
C. AWS Business Support
D. AWS Basic Support
Correct Answer:A
A. Ensure that the S3 bucket is in the most cost-effective AWS Region.
B. Run S3 Transfer Acceleration for the S3 bucket.
C. Use the S3 Intelligent-Tiering storage class.
D. Deactivate the default encryption for the S3 bucket.
E. Use AWS DataSync to transfer files to the S3 bucket.
Correct Answer:AC
A. Amazon Cognito
B. AWS Shield
C. AWS Trusted Advisor
D. Amazon Macie
Correct Answer:C
A. Efficiency and redundancy
B. Operational excellence
C. High availability
D. Business optimization
Correct Answer:B
A. Change the S3 storage class to S3 Intelligent-Tiering.
B. Use Amazon API Gateway for the web service
C. Deploy an Amazon CloudFront distribution to cache web server content in edge locations.
D. Migrate the website ecommerce servers to Amazon EC2 with enhanced networking.
Correct Answer: C
A. AWS Trusted Advisor
B. Amazon QuickSight
C. AWS Organizations
D. AWS Budgets
Correct Answer:A
A. Service intrusion metrics
B. Trusted Advisor checks
C. Educational webinars
D. Penetration testing
E. Peer-to-peer file-sharing detection
Correct Answer:BD
A. Secret access keys
B. Multi-factor authentication (MFA)
C. AWS Security Token Service (AWS STS)
D. IAM password policies
Correct Answer:B
A. Use a Remote Desktop Protocol (RDP) connection.
B. Use Amazon EC2 Instance Connect.
C. Use AWS Systems Manager Session Manager.
D. Use AWS Batch.
E. Use Amazon Connect.
Correct Answer:BC
A. Solving problems detected by Amazon EC2 health checks
B. Answering “how to” questions on AWS services and features
C. Tuning database queries
D. Troubleshooting AWS APIs
Correct Answer:C
A. S3 Standard
B. S3 Intelligent-Tiering
C. S3 Lifecycle policies
D. S3 Versioning
Correct Answer: A
A. AWS Transit Gateway
B. AWS Direct Connect
C. Amazon Connect
D. Amazon Route 53
Correct Answer: A
A. AWS Direct Connect
B. AWS Service Catalog
C. Amazon EventBridge (Amazon CloudWatch Events)
D. Amazon CloudWatch Logs
Correct Answer:B
A. Security
B. Fault tolerance
C. Service quotas
D. Performance
Correct Answer:C
A. AWS WAF
B. Network ACL
C. Route table
D. Security group
Correct Answer:B
A. Infrastructure event management
B. AWS Personal Health Dashboard
C. Management business reviews
D. AWS Developer Support
Correct Answer:B
A. Detecting underutilised resources to save costs
B. Improving security by proactively monitoring the AWS environment
C. Providing high-performance container orchestration
D. Creating and rotating encryption keys
E. Implementing enforced tagging across AWS resources
Correct Answer: AB
A. Operating system licensing
B. Database administration
C. Facility operations
D. Application licensing
E. Hardware procurement
Correct Answer: AB
A. Amazon S3
B. Amazon Cognito
C. Amazon Elastic File System (Amazon EFS)
D. Amazon EC2
E. Amazon DynamoDB
Correct Answer:CD
A. AWS Trusted Advisor
B. Cost Explorer
C. AWS CloudWatch
D. AWS Budgets
Correct Answer:B
A. AWS partner-led support
B. AWS technical account manager (TAM)
C. Support of third-party software integration to AWS
D. AWS Professional Services
E. 5-minute response time for critical issues
Correct Answer: BD
A. AWS WAF
B. AWS Identity and Access Management (IAM)
C. Amazon CloudFront
D. Amazon S3
E. Amazon EC2
Correct Answer:DE
A. Use multiple Availability Zones in multiple AWS Regions
B. Use a single Availability Zone in multiple edge locations
C. Use multiple Availability Zones in a single AWS Region
D. Use multiple Availability Zones in multiple edge locations
Correct Answer:A
A. Allow only the manager to use the account root user credentials for normal activities
B. Use the account root user credentials only when they alone must be used to perform a required function
C. Use the account root user credentials only for Amazon EC2 instances from the AWS Free Tier
D. Use the account root user credentials only for the creation of private VPC subnets
Correct Answer:B
A. Consolidate multiple AWS accounts into a single account.
B. Design elasticity into the AWS Cloud design
C. Buy and host hardware in the AWS Cloud
D. Decouple the AWS Cloud architecture to break up monolithic deployments
E. Move on-premises network hardware to VPCs
Correct Answer: AB
A. Amazon Kinesis
B. Amazon Simple Queue Service (Amazon SQS)
C. Amazon Athena
D. Amazon S3
Correct Answer: A
A. Users can stop spending money on the maintenance of data centres
B. Users can stop guessing about resource capacity
C. AWS manages all the security within the cloud
D. Expenses never change from month to month
E. Users do not need to deploy applications globally
Correct Answer: AB
A. AWS Direct Connect
B. NAT gateway
C. Amazon S3 Transfer Acceleration
D. AWS WAF
Correct Answer: B
A. AWS Elastic Beanstalk
B. Amazon Lightsail
C. AWS Amplify
D. AWS CodePipeline
Correct Answer:C
A. AWS Artefact
B. AWS Organizations
C. AWS Budgets
D. AWS Trusted Advisor
Correct Answer: B
A. Provide security for the physical infrastructure
B. Activate encryption at rest for the data
C. Train the company’s employees about cloud security
D. Remove personally identifiable information (PII) from the data
Correct Answer: A
A. On-Demand Instances
B. Convertible Reserved Instances
C. Compute Savings Plan
D. Spot Instances
Correct Answer: C
A. Debugging custom software
B. Investigating issues detected by health checks
C. Developing application code
D. Troubleshooting operational problems with AWS resources
E. Performing system administration tasks
Correct Answer:DE
A. Use inline policies instead of customer managed policies
B. Use groups to assign permissions to IAM users
C. Share access keys
D. Create individual IAM users
E. Grant maximum privileges to IAM users
Correct Answer:AB
A. Reserved Instances
B. Spot Instances
C. On-Demand Instances
D. Dedicated Hosts
Correct Answer: C
A. AWS Developer Forums
B. AWS Developer Support
C. Programmatic case management
D. AWS technical account manager (TAM)
Correct Answer: A
A. For Amazon S3, AWS operates the infrastructure layer, the operating systems, and the platforms
B. AWS is responsible for training the customer’s employees on AWS product and services
C. For Amazon EC2, AWS is responsible for maintaining the guest operating system
D. Configuration management of infrastructure devices is the customer’s responsibility
E. AWS is responsible for protecting the physical cloud infrastructure
Correct Answer:DE
A. Object storage
B. File storage
C. Block storage
D. instance store
Correct Answer: B
A. Amazon SageMaker
B. Amazon Augmented Al (Amazon A2I)
C. Amazon Kendra
D. Amazon Polly
Correct Answer:C
A. Maintenance of the configuration of infrastructure devices
B. Management of the guest operating systems
C. Management of the host operating systems and virtualization
D. Maintenance of the software that powers Availability Zones
Correct Answer:B
A. Review the AWS Marketplace and buy Partial Upfront Reserved Instances to cover the predicted and seasonal load
B. Buy Reserved Instances for the predicted amount of usage throughout the year Allow any seasonal usage to run on Spot Instances.
C. Buy Reserved Instances to cover all potential usage that results from the seasonal usage
D. Buy Reserved Instances for the predicted amount of usage throughout the year Allow any seasonal usage to run at an On-Demand rate.
Correct Answer: D
A. Use Amazon Detective to identify any PII that is stored in the S3 buckets
B. Use Amazon Macie to identify and provide alerts about PII
C. Use AWS Trusted Advisor to generate PII notifications
D. Use AWS Lambda functions to review each file in the S3 buckets to identify PII
Correct Answer: B
A. AWS is responsible for installing the database application, updating the operating system, and performing maintenance
B. AWS is responsible for the physical infrastructure on which the company’s data resides.The company is responsible for everything else.
C. The company is responsible for updating the operating system and performing software maintenance
D. The company is responsible for the security of the hardware on which the database resides
Correct Answer: A
A. AWS Budgets
B. AWS Trusted Advisor
C. Cost Explorer
D. AWS CloudTrail
Correct Answer: C
A. S3 Glacier with expedited retrievals
B. S3 Standard
C. S3 Intelligent-Tiering
D. S3 Glacier Deep Archive
Correct Answer: A
A. AWS Basic Support
B. AWS Business Support
C. AWS Developer Support
D. AWS Enterprise Support
Correct Answer: B
A. Enable Alexa for Business for business applications
B. Separate Amazon EC2 instances into different Availability Zones.
C. Use Amazon Workspaces to reduce the need for operating system patching
D. Enable Amazon S3 Cross-Region Replication
E. Use AWS Glue to prepare and load failover data
Correct Answer: BD
A. AWS License Manager
B. AWS CloudHSM
C. AWS Certificate Manager (ACM)
D. AWS Directory Service
Correct Answer: B
A. Pay-as-you-go
B. Fixed term
C. Collocation
D. Variable expense
E. Planned
Correct Answer: AD
A. Amazon Elastic File System (Amazon EFS)
B. Amazon FSx for Lustre
C. Amazon S3
D. Amazon Elastic Block Store (Amazon EBS)
Correct Answer: C
A. AWS X-Ray
B. AWS CloudTrail
C. Amazon CloudWatch
D. Amazon Cognito
Correct Answer: A
A. Use Amazon S3 Glacier instead of Amazon S3 Standard
B. Use memory-optimised Amazon EC2 instances
C. Use multiple AWS Regions
D. Use virtual local area networks (VLANs)
E. Use Multi-AZ deployments
Correct Answer: CE
A. Analyze logs from an Amazon API Gateway call
B. Validate JSON syntax from an application configuration file
C. Filter traffic to or from an Amazon EC2 instance
D. Grant permissions to applications that run on Amazon EC2 instances
Correct Answer: B
A. Speed of innovation
B. Decoupled architecture
C. Resource elasticity
D. Global deployment
Correct Answer: C
A. Reserved Instances
B. Dedicated Hosts
C. On-Demand instances
D. Spot Instances
Correct Answer: C
A. Standard Reserved Instances
B. Convertible Reserved Instances
C. On-Demand Instances
D. On-Demand Capacity Reservations
Correct Answer: C
A. The application has built-in fault tolerance
B. The application can scale based on demand
C. Users must manually configure Amazon EC2 instances
D. Users have a choice of operating systems
E. Users can run Amazon EC2 Spot Instances
Correct Answer: AB
A. AWS Ground Station
B. AWS CloudFormation
C. AWS Shield
D. AWS loT Device Defender
Correct Answer: B
A. Using AWS Artefact
B. Running Amazon GuardDuty
C. Creating an AWS Support ticket
D. Evaluating AWS CloudTrail logs
Correct Answer: A
A. AWS CodePipeline
B. AWS CodeBuild
C. AWS CloudFormation
D. Amazon CloudWatch
Correct Answer: A
A. Operational excellence
B. Reliability
C. Security
D. Performance efficiency
Correct Answer: B
A. AWS Support
B. AWS Marketplace
C. AWS reseller programs
D. Amazon EC2 private Amazon Machine Images (AMIs)
Correct Answer: D
A. Security groups
B. AWS CloudTrail
C. Amazon CloudWatch
D. ACLs
Correct Answer: B
A. A steady-state workload that requires a particular EC2 instance configuration for a long period of time.
B. A workload that can be interrupted for a project that requires the lowest possible cost
C. A workload that is expected to run for longer than 1 year
D. An unpredictable workload that does not require a long-term commitment
Correct Answer: D
A. Apply the principle of least privilege. Create one password, and set the password for each user.
B. Apply the principle of least privilege. Attach a separate IAM policy for each individual user.
C. Provide the development team members with AWS account root user access.
D. Apply the principle of least privilege. Grant access to an IAM group, and add the eight users to that group.
Correct Answer: B