Correct Answer: c
Correct Answer: B
A. Update the S3 bucket policy to allow public write access. Allow any user to upload videos by removing the need to handle user authentication within the client-side application
B. Configure the API layer of the application to have a new endpoint that creates signed URLs that allow an object to be put into the S3 bucket Generate a presigned URL through this API call in the client application. Upload the video by using the signed URL
C. Create a new IAM policy and a corresponding 1AM user with permissions to write to the S3 bucket Store the key and the secret for the user in the application code Use the key to authenticate the video uploads
D. Generate a new 1AM key and a corresponding secret by using the AWS account root user credentials Store the key and the secret for the user in the application code. Use the key to authenticate the video uploads
Correct Answer: C
A. Download the CloudWatch agent to the on-premises server Configure the agent to use I AM user credentials with permissions for CloudWatch
B. Install an AWS SDK on the on-premises server to automatically send logs to CloudWatch.
C. Upload log files from the on-premises server to Amazon S3 and have CloudWatch read the files.
D. Upload log files from the on-premises server to an Amazon EC2 instance and have the instance forward the logs to CloudWatch
Correct Answer: A
A. AWS CodeBuild
B. AWS CodeCommit
C. Amazon S3
D. AWS Cloud9
Correct Answer: B
A. 200 read capacity units
B. 50 read capacity units
C. 100 read capacity units
D. 500 read capacity units
Correct Answer: A
A. Configure security groups to allow access to Systems Manager
B. Create an interface VPC endpoint for Systems Manager
C. Create a gateway VPC endpoint for Systems Manager
D. Use an internet gateway from inside the VPC
Correct Answer: C
A. Create an IAM role that has permissions to access the database Attach the role to the EC2 instance
B. Store the credentials in an encrypted text file in an Amazon S3 bucket Configure the EC2 instance’s user data to download the credentials from Amazon S3 as the instance boots.
C. Store the username and password credentials directly in the source code No further action is needed because the source code is stored in a private repository
D. Use AWS Secrets Manager to store the credentials Retrieve the credentials from Secrets Manager as needed
Correct Answer: D
A. The Lambda function does not have any explicit log statements for the log data to send it CloudWatch Logs
B. The execution role for the Lambda function is missing permissions to write log data to the CloudWatch Logs
C. The Lambda function is missing CloudWatch Logs as a source trigger to send log data
D. The Lambda function is missing a target CloudWatch Log group
Correct Answer: B
A. Create an IAM permissions policy attached to the role that allows access to DynamoDB Add a trust policy to the role that allows Amazon EC2 to assume the role. Attach a permissions policy to the development group in AWS IAM that allows developers to use the i am PassRole permission for the role.
B. Create an i am permission policy attached to the role that allows access to DynamoDB Add a trust policy to the role that allows DynamoDB to assume the role Attach a permissions policy to the development group in AWS IAM that allows developers to use the lamGetRole and lamPassRole permissions for the role.
C. Create an IAM permission policy attached to the role that allows access to Amazon EC2. Add a trust policy to the role that allows DynamoDB to assume the role Attach a permissions policy to the development group in AWS IAM that allows developers to use the iam PassRole permission for the role.
D. Create an IAM permissions policy attached to the role that allows access to DynamoDB Add a trust policy to the role that allows Amazon EC2 to assume the role Attach a permissions policy to the development group in AWS IAM that allows developers to use the i am GetRole permission for the role.
Correct Answer: A
A. All at once
B. Rolling
C. Immutable
D. Snapshots
Correct Answer: C
A. Enable CloudWatch Lambda insigne Redeploy the Lambda function
B. Assign permissions to the Lambda function’s execution role to send logs to CloudWatch
C. Use AWS X-Ray Enable active tracing
D. Add CloudWatch as the trusted identity to the Lambda function’s execution role
Correct Answer: A
A. When the Lambda function starts, use the Git CLI to clone the repository Check the new file into the cloned repository and push the change.
B. After the new file is created in Lambda, use cURL to invoke the CodeCommit API Send the file to the repository.
C. Upload the new file to an Amazon S3 bucket Create an AWS Step Function to accept S3 events In the Step Function, add the new file to the repository
D. Use an AWS SDK to instantiate a CodeCommit client Invoke the put_file method to add the file to the repository
Correct Answer: D
A. Decrease the timeout of the Lambda function
B. Increase the number of shards of the Kinesis data stream.
C. Decrease the number of shards of the Kinesis data stream
D. Increase the memory that is allocated to the Lambda function
E. Increase the timeout of the Lambda function.
Correct Answer: BD
A. The resource based policy for the Lambda function does not have the required permissions to be invoked by Amazon S3
B. The S3 event notification does not activate for files that are larger than 1.000 MB
C. Lambda functions cannot be invoked directly from an S3 event.
D. The S3 bucket needs to be made public
Correct Answer: A
A. The security group that is specified in the CloudFormation template does not exist
B. CloudFormation does not recognize the template change as an update
C. CloudFormation does not have sufficient 1AM permissions to make the changes
D. The new AMIs do not fulfil the specified conditions in the CloudFormation template
E. The service quota for the number of EC2 vCPUs in the AWS Region has been exceeded.
Correct Answer: DE
A. Contact AWS Support for a limit increase.
B. Use the AWS CLI to get the metrics
C. Retry the call with exponential backoff
D. Analyze the applications and remove the API call
Correct Answer: C
A. Evaluate the GPU_AVA1LABLE environment variable
B. Call the DescribeElasticGpus API operation
C. Call the Describeinstances API operation and filter on the current instance ID Examine the Elastic Gpu Associations property
D. Retrieve the instance type from the instance metadata
Correct Answer: C
A. Use aws cloudformation compile to base64 encode and embed the source file into a modified CloudFormation template.
B. Use aws lambda zip to package the source file together with the CloudFormation template and deploy the resulting zip archive
C. Use aws cloudformation package to upload the source code to an Amazon S3 bucket and produce a modified CloudFormation template
D. Use aws serverless create-package to embed the source file directly into the existing CloudFormation template
Correct Answer: C
A. Deploy the code on Amazon HC? instances in an Auto Scaling group behind an Application Ipad Balancer
B. Create a new application in AWS Elastic Beanstalk that is preconfigured for a multi container Docker Environment Upload the code, and deploy it to a web server environment.
C. Construct an AWS Cloud Formation template that launches Amazon EC2 instances Install and configure the PHP code by using cfn helper scripts
D. Upload the code for the PHP website into an Amazon S3 bucket Host the website from the S3 bucket.
Correct Answer:B
A. Migrate the database to an Amazon Aurora single-instance cluster Deploy the application on Amazon EC2 instances that are in an Auto Scaling group behind an Application Load Balancer Set the Auto Scaling group’s minimum capacity to 1 Set up an Amazon ElastiCache for Memcached instance for sessions.
B. Redevelop the application to use serverless capabilities that include AWS Lambda. Aurora Serverless Run the application code by using the standard Lambda PHP runtime environment Migrate the database to Aurora Serverless
C. Migrate the application to an Amazon Aurora two-instance cluster. Deploy the application on Amazon EC2 instances that are in an Auto Scaling group behind an Application Load Balancer Set the Auto Scaling group’s minimum capacity to 2 Set up an Amazon ElastiCache for Memcached two-instance cluster.
D. Migrate the database to an Amazon Aurora single-instance cluster Deploy the application on Amazon EC2 instances that are in an Auto Scaling group behind an Application Load Balancer (ALB) Set the Auto Scaling group’s minimum capacity to 1 Enable session affinity (sticky sessions) on the ALB
Correct Answer: D
A. Increase the runtime engine version
B. Increase the memory.
C. Increase the timeout
D. Increase the number of Lambda layers
Correct Answer: B
A. Write data to Amazon Elastic Block Store
B. Write data to Amazon EC2 Instance Store
C. Write data to Amazon ElastiCache.
D. Write data to the root filesystem
Correct Answer: C
A. Add a request routing rule to the ALB to return a 401 status code if the authorization header is missing
B. Add a container to the ECS task definition to validate JWTs Set the new container as a dependency of the application container
C. Add a custom authorizer for AWS Lambda to the CloudFront distribution to validate the JWT
D. Create a CloudFront function for the distribution Use the crypto module in the function to validate the JWT
Correct Answer: C
A. Use server-side encryption with Amazon S3-managed keys
B. Use server-side encryption with customer-provided keys.
C. Use server-side encryption with AWS KMS-managed keys
D. Use client-side encryption with AWS KMS-managed keys
Correct Answer: B
A. Refactor the application to call AWS STS AssumeRole based on an instance role
B. Configure an ECS task 1AM role for the application to use
C. Configure AWS access key/secret access key environment variables with new credentials
D. Configure the credentials file with a new access key/secret access key
Correct Answer: B
A. Call the SetQueue Attributes API for the queue and set MaxNumberOfMessages to a value greater than the default of 1
B. Call the ChangeMessageVisibility API for the queue and set MaxNumberOfMessages to a value greater than the default of
C. Call the Add Permission API to set MaxNumberOfMessages for the ReceiveMessage action to a value greater than the default of 1
D. Call the ReceiveMessage API to set MaxNumberOfM ess ages to a value greater than the default of 1.
Correct Answer: A
A. Encrypt individual messages by using client-side encryption with customer managed keys, then write to the SQS queue
B. Create an SQS queue and encrypt the queue by using server-side encryption with AWS KMS
C. Encrypt individual messages by using SQS Extended Client and the Amazon S3 encryption client
D. Create an SQS queue, and encrypt the queue by using client-record encryption
Correct Answer: B
A. Store session state data m an Amazon DynamoDB table.
B. Use an ELB with an Auto Scaling group
C. Use pessimistic concurrency on Amazon DynamoDB
D. Use Amazon CloudFront with an Auto Scaling group.
E. Use Amazon CloudFront with an AWS Web Application Firewall
Correct Answer: AB
A. The X-Forwarded-Proto header
B. The X Forwarded For header
C. The X-Forwarded-Host header
D. The X-Forwarded-Port header
Correct Answer: B
A. Add a Deny statement to the Lambda execution role Specify the SNS topic ARN as the resource Specify “aws.SecureTransport” “true” as the condition.
B. Enable server-side encryption on the SNS topic
C. Create a VPC endpoint for Amazon SNS
D. Add a Deny statement to the Lambda execution role Specify the SNS topic ARN as the resource Specify “aws.SecureTransport” “false” as the condition.
E. Add a StringEquals condition of “sns Protocol” “https” to the Lambda execution role
Correct Answer: BD
A. Package the application code into a tar file Use the AWS Management Console to create a new application version from the tar file. Update the environment by using the AWS CLI.
B. Package the application code into a zip file. Use the AWS Management Console to upload the .zip file and deploy the packaged application.
C. Package the application code into a tar file Use the AWS Management Console to upload the tar file and deploy the packaged application
D. Package the application code into a zip file Use the AWS CLI to create a new application version from the zip file and to update the environment
E. Package the application code into a zip file. Use the AWS Management Console to create a new application version from the .zip file. Rebuild the environment by using the AWS CLI.
Correct Answer: BD
A. Pass the data to the KMS ReEncrypt API for encryption
B. Use the KMS GeneraceDaraHeywithoutPlainTexr API to get an encryption key
C. Use the KMS GenerateDataKeyAPi to get an encryption key
D. Pass the data to KMS as part of the Encrypt API for encryption.
Correct Answer: C
A. Keep the existing database connectivity API code unchanged Change the database connection string URL to the endpoint of the RDS for MySQL DB instance
B. Use the RDS software development kit (SDK) to construct a database client.
C. Use AWS Secrets Manager to store the database’s username and password pair Use the
GetSecretValue API operation to retrieve the username and password pair when the application makes MySQL DB API calls
D. Store the database’s username and password pair in the configuration files
E. Use the environment variables of the container definition to pass the database’s username and password pair to the application code
Correct Answer: AC
A. Caching will increase the load on the database instance because the cache is updated for every database update.
B. The cache will become large and expensive because the infrequently requested data is also written to the cache
C. Caching will slow performance of the read queries because the cache is updated when the cache cannot find the requested data
D. Overhead will be added to the initial response time because the cache is updated only after a cache miss
Correct Answer: B
A. Use a rolling deployment to deploy the new version
B. Use a rolling deployment with additional batches to deploy the new version
C. Deploy the new version to a new environment Use a blue/green deployment
D. Use an all-at-once deployment to deploy the new version
Correct Answer: C
A. Move the documents to an Amazon WorkDocs folder. Share the links of the WorkDocs folder with the external users.
B. Use S3 presigned URLs to share the documents with the external users Set an expiration time of 7 days
C. Create temporary 1AM users that have read only access to the S3 bucket Share the access keys with the external users Expire the credentials alter 7 days
D. Create a role that has read-only access to the S3 bucket Share the Amazon Resource Name (ARN) of this role with the external users
Correct Answer: B
A. Create an Elastic Beanstalk configuration file to download and install the AWS X-Ray daemon on the underlying Amazon FC2 instances
B. Instrument the code by using the AWS X-Ray software development kit (SDK) for Java
C. Enable Elastic Beanstalk enhanced health reporting
D. Enable the AWS X-Ray daemon in the Elastic Beanstalk console
E. Configure AWS CloudTrail to visualise the services map
Correct Answer: AD
A. Make an HTTP request directly to the S3 API to upload the file
B. Include the AWS SDK for Python in the Lambda function Use the SDK to upload the file
C. Use the AWS CLI that is installed in the Lambda environment to upload the file
D. Use the AWS SDK for Python that is installed in the Lambda environment to upload the file
Correct Answer: D
A. Change the AWS CloudFormation templates for us-east-1 and us-west-1 to use an AWS AMI Relaunch the stack for both Regions
B. Build the custom AMI in us-west-1 Create a new AWS CloudFormation template to launch the stack in us-west-1 with the new AMI ID
C. Copy the custom AMI from us-east-1 to us-west-1 Update the AWS CloudFormation template for us-west-1 to refer to AMI ID for the copied AMI. Relaunch the stack.
D. Manually deploy the application outside AWS CloudFormation in us-west-1
Correct Answer: C
A. Use server-side encryption with Amazon S3 managed encryption keys (SSE-S3).
B. Use server-side encryption with customer-provided encryption keys (SSE-C)
C. Use server-side encryption with AWS KMS managed encryption keys (SSE-KMS)
D. Use client-side encryption before sending the data to Amazon S3
Correct Answer: B
A. Associate different AWS Lambda functions to an API Gateway target endpoint
B. Create aliases and versions in AWS Lambda
C. Create different stages in API Gateway then associate API Gateway with AWSLambda.
D. Tag the AWS Lambda functions with different names
Correct Answer: B
A. Change the buildspec by adding a post_build phase that uses the finally block to push the Docker image
B. Specify the Docker image in the buildspec’s artefacts sequence with an action lo push the image
C. Use a batch build to define a build matrix Use the batch build to push the Docker image
D. Change the buildspec by adding a post_build phase that uses the commands block to push the Docker image
Correct Answer: D
A. Short message service (SMS) text message MFA
B. Advanced security metrics
C. Adaptive authentication
D. Time-based one-time password (TOTP) software token MFA
Correct Answer: C
A. Amazon CloudFront
B. Amazon ElastiCache for Redis in cluster mode
C. Amazon ElastiCache for Memcached
D. Amazon DynamoDB Accelerator (DAX)
Correct Answer: B
A. sam build
B. sam deploy
C. sam mit
D. sam validate
E. sam publish
Correct Answer: AB
A. Increase the backend T2 EC2 instance sizes to xi to handle the largest possible load throughout the year
B. Implement an Amazon SQS queue to decouple the front-end and backend servers.
C. Modify the backend servers to pull from an Amazon SQS queue.
D. Use an Amazon SNS queue to the couple the front-end and backend servers
E. Migrate the backend servers to on-premises and pull from an Amazon SNS queue
Correct Answer: BC
A. Cache the translated newsletters in the Lambda /tmp directory
B. Change to asynchronous Lambda function invocation
C. Enable TranslateText API caching.
D. Change the Lambda function to use parallel processing
Correct Answer: A
A. The referenced Amazon S3 bucket is in another region
B. The images must be stored in the same Amazon S3 bucket
C. Cross Origin Resource Sharing must be enabled on the Amazon S3 bucket
B. Port 80 must be opened on the security group in which the Amazon S3 bucket is located
Correct Answer: C
A. GraphQI. API on AWS AppSync
B. GraphGL API on an Amazon EC2 instance
C. REST API on Amazon API Gateway
D. REST API on AWS Elastic Beanstalk
Correct Answer: C
A. Add a Host header to the HTTP server log configuration file.
B. Install the Amazon CloudWatch Logs agent on each EC2 instance Configure the agent to write to the log file
C. Add an X-Forwarded-For header to the HTTP server log configuration file
D. Install the AWS X-Ray daemon on each EC2 instance. Configure the daemon to write to the log file
Correct Answer: C
A. Use InputPath in a Catch statement and set the value to null.
D. Use ErrorEquals in a Retry statement to include the error with the original input
C. Use ResultPath in a Catch statement to include the error with the original input
D. Use OutputPath in a Retry statement and set the value to $.
Correct Answer: C
A. Contact AWS Support to report an Issue with the Auto Scaling Groups (ASG) service
B. Modify the CloudFormation template to retain the ASGInstanceRole12345678 resource Then manually delete the resource after deployment
C. Add a DependsOn attribute to the ASGInstanceRole12345678 resource in the Cloud Formation template Then delete the stack
D. Add a force parameter when calling CloudFormation with the role-am of ASGInstanceRoiei2345678
Correct Answer: C
A. Takes advantage of runtime environment reuse
B. Improves legibility and stylistic convention
C. Provides better error handling
D. Creates a new SDK instance for each invocation
Correct Answer: A
A. Write to the cache directly Synchronise the backend later
B. Write to the cache and the backend at the same time
C. Write to the backend first Wait for the cache to expire
D. Write to the backend first. Then update the TTL of the item in the cache=
Correct Answer: B
A. Create a new SQS queue. Set the new queue as a dead-letter queue for the application queue
B. Configure Amazon CloudWatch Logs to save the error messages to a separate log stream
Configure the Maximum Receives setting.
C. Change the SQS queue to a FIFO queue Configure the message retention penod to 0 seconds
D. Configure an Amazon CloudWatch alarm for Lambda function errors Publish messages to an Amazon
Simple Notification Service (Amazon SNS) topic to notify administrator users
Correct Answer: A
A. Amazon Cognito identity pools
B. AWS AppSync
C. Amazon Cognito user pools
D. Amazon Lambda@Edge
Correct Answer: A
A. Provide a different access key and secret access key in the application code for registered users and guest users to provide read access to the objects.
B. Use Amazon Cognito to provide access using authenticated and unauthenticated roles
C. Use S3 bucket policies to restrict read access to specific IAM users
D. Create a new 1AM user for each user and grant read access
E. Use the AWS 1AM service and let the application assume the different roles using the AWS Security Token Service (AWS STS) AssumeRole action depending on the type of user and provide read access to Amazon S3 using the assumed role.
Correct Answer: BE
A. Run the aws configure CLI command Provide the developer’s IAM access key ID and secret access key
B. Specify the developer’s IAM access key ID and secret access key as parameters for each CLI command
C. Specify the developer’s IAM profile as a parameter for each CLI command
D. Run the get-session-token CLI command with the developer’s IAM user. Use the returned credentials to call the CLI
Correct Answer: A
A. Use the CloudFront geographic restriction feature to block access to users in South Africa
B. Create a Lambda@Edge function. Associate the Lambda@Edge function as a viewer response trigger
with the CloudFront distribution to change the S3 origin Region
C. Include af-south-1 in the alternate domain name (CNAME) of the CloudFront distribution
D. Create a Lambda@Edge function Associate the Lambda@Edge function as an origin request trigger with the CloudFront distribution to change the S3 origin Region
Correct Answer: D
A. Add database retries to effectively use RDS with vertical scaling
B. Add a connection string to use an RDS read replica for read queries.
C. Use RDS with multi-AZ deployment
D. Add a connection string to use a read replica on an EC2 instance
Correct Answer: B
A. Define an array that includes the environment variables under the environment parameter within the service definition
B. Define an array that includes the environment variables under the entryPoint parameter within the task definition
C. Define an array that includes the environment variables under the environment parameter within the task definition
D. Define an array that includes the environment variables under the entryPoint parameter within the service definition.
Correct Answer: D
A. Route table
B. AWS Global Accelerator
C. AWS Transit Gateway
D. Amazon VPC
Correct Answer: B
A. Amazon Elastic Block Store (Amazon EBS)
B. Amazon EC2 instance store
C. Amazon S3
D. Amazon Simple Queue Service (Amazon SQS)
Correct Answer: B
A. Amazon Connect
B. Security groups
C. AWS Transit Gateway
D. VPC peering
Correct Answer: C
A. AWS Solutions Library
B. AWS Artefact
C. AWS Well-Architected Tool
D. AWS Trusted Advisor
E. AWS Personal Health Dashboard
Correct Answer: AC
A. Physical and environmental controls
B. Server hardware management and encryption
C. Patch management and configuration management
D. Application security
Correct Answer: C
B. A webpage that is hosted on Amazon S3 and uses AWS Lambda to update an Amazon DynamoDB database
C. A legacy database server that is running on the maximum instance size supported by its licence
D. An Application Load Balancer, web server, and database server that support a monolithic application
Correct Answer: D
A. AWS Key Management Service (AWS KMS)
B. AWS Secrets Manager
C. AWS Config
D. Amazon GuardDuty
Correct Answer: B
A. Across multiple edge locations
B. Across multiple Availability Zones
C. Across multiple VPCs
D. Across multiple AWS accounts
Correct Answer: B
A. Compute capacity that is adjusted on demand
B. A 100% service level agreement (SLA) for all AWS services
C. Enhanced security
D. Availability of AWS Support for code development
E. Increases in cost and complexity
Correct Answer: AC
A. Increased speed for trying out new projects
B. A large, upfront capital expense and low variable expenses
C. Flexibility to scale up in minutes as the application becomes popular
D. Complete control over the physical security of the infrastructure
E. Ability to pick the specific data centres that will host the application servers
Correct Answer: BC
A. Users receive a discount on hardware that they purchase for their data centres.
B. Users can reserve excess capacity to ensure that resources are always available.
C. Users can increase speed and agility by deploying services with just one click.
D. Users benefit from massive economies of scale.
E. Users trade variable expenses for capital expenses.
Correct Answer: CD
A. Network Load Balancer
B. Amazon Route 53
C. AWS Global Accelerator
D. Amazon S3 Transfer Acceleration
E. Application Load Balancer
Correct Answer: BC
Correct Answer: B
A. Amazon CloudFront
B. Amazon API Gateway
C. Amazon Route 53
D. AWS Transfer Family
E. AWS Site-to-Site VPN
Correct Answer:Â AB
A. Restrict who is allowed physical access to the hosts that run the company’s Amazon EC2 instances.
B. Choose to encrypt data at rest that is stored on Amazon S3.
C. Install security patches on Amazon EC2 Linux instances.
D. Conduct database patching for Amazon RDS instances.
E. Wipe Amazon Elastic Block Store (Amazon EBS) volumes clean before they are decommissioned.
Correct Answer: BD
A. Amazon CloudFront
B. AWS CloudTrail
C. Amazon CloudWatch
D. AWS Application Migration Service (CloudEndure Migration)
Correct Answer: B
A. It is the sole responsibility of the customer.
B. It is a shared responsibility between AWS and the customer.
C. It is the sole responsibility of AWS.
D. The customer’s AWS Support plan tier determines who manages the configuration.
Correct Answer: B
A. Amazon RDS
B. AWS Lambda
C. Amazon VPC
D. Amazon EC2
E. Amazon DynamoDB
Correct Answer: AD
A. Attach the IAM policy to each IAM user.
B. Attach the IAM policy to the IAM role containing all the IAM users.
C. Attach the IAM policy to the IAM group containing all the IAM users.
D. Apply the IAM policy to the entire AWS account.
Correct Answer: B
A. Amazon DynamoDB global tables
B. Amazon CloudFront
C. AWS Direct Connect
D. AWS Outposts
Correct Answer: B
A. Amazon Aurora
B. Amazon RDS
C. Amazon ElastiCache
D. Amazon DynamoDB
Correct Answer: C
A. AWS Organizations
B. AWS Billing and Cost Management
C. AWS Identity and Access Management (IAM)
D. AWS Resource Access Manager
Correct Answer: A
A. A location where users can deploy compute, storage, database, and other select AWS services where no AWS Region currently exists.
B. One or more clusters of servers where new workloads can be deployed
C. One or more discrete data centres with redundant power, networking, and connectivity
D. A fast content delivery network (CDN) service that securely delivers data, videos, applications, and APIs to users globally
Correct Answer: C
A. AWS CodePipeline
B. AWS AppSync
C. AWS Cloud9
D. AWS CodeCommit
Correct Answer: A
A. Reliability
B. Performance efficiency
C. Operational excellence
D. Cost optimization
Correct Answer: C
A. Inbound data transfers without acceleration
B. Outbound data transfers without acceleration
C. The number of unused AWS Lambda functions
D. The number of configured Amazon S3 buckets
E. Compute resources that are currently in use
Correct Answer: AB
A. AWS Certificate Manager (ACM)
B. AWS Security Hub
C. Amazon GuardDuty
D. IAM roles
Correct Answer: D
A. Convert the DB instance into a multi-Region deployment.
B. Convert the DB instance into a Multi-AZ deployment.
C. Create an Amazon Simple Queue Service (Amazon SQS) queue in the same AWS Region to manage writes to the DB instance.
D. Create an Amazon Simple Queue Service (Amazon SQS) queue in a different AWS Region to manage writes to the DB instance.
Correct Answer: B
A. Amazon QuickSight
B. Amazon Redshift
C. AWS Data Pipeline
D. Amazon Kinesis Data Analytics
Correct Answer: D
A. Amazon RDS
B. Amazon DynamoDB
C. Amazon ElastiCache
D. Amazon Redshift
Correct Answer: B
A. Firmware updates on hardware
B. Data encryption in transit
C. Operating system patching on Amazon EC2 instances
D. Data encryption at rest
Correct Answer: A
A. Virtual private gateway
B. Internet gateway
C. AWS Client VPN
D. AWS PrivateLink
Correct Answer: C
A. Cost Explorer
B. AWS Purchase Order Management
C. AWS Budgets
D. AWS Pricing Calculator
Correct Answer: B
A. Make large-scale changes
B. Anticipate failure
C. Perform manual operations
D. Create static operational procedures
Correct Answer: B
A. AWS VPN
B. AWS PrivateLink
C. AWS Direct Connect
D. Amazon Connect
Correct Answer: C
A. Amazon Inspector
B. Amazon CloudWatch
C. AWS Trusted Advisor
D. AWS CloudTrail
Correct Answer: B
A. Cost Explorer
B. AWS Cost and Usage Report
C. AWS Budgets
D. AWS Pricing Calculator
Correct Answer: D
A. Amazon Route 53
B. VPC endpoints
C. AWS Direct Connect
D. VPC peering
E. AWS Transit Gateway
Correct Answer: BD
A. Amazon CloudFront
B. AWS Shield
C. Amazon Inspector
D. Amazon GuardDuty
E. AWS Identity and Access Management (IAM)
Correct Answer: AB
A. On-Demand Instances
B. Reserved Instances
C. Spot Instances
D. Dedicated Instances
Correct Answer: C
A. AWS CodeStar
B. AWS CodeCommit
C. Amazon CodeGuru
D. AWS CodePipeline
Correct Answer: B
A. Amazon Kinesis
B. Amazon MQ
C. Amazon Simple Notification Service (Amazon SNS)
D. Amazon Simple Queue Service (Amazon SQS)
Correct Answer: C
A. Reduce downtime by making infrastructure changes infrequently and in large increments.
B. Learn to improve from operational failures.
C. Invest the time to configure infrastructure manually.
D. Use monolithic application design for centralization.
Correct Answer: B
A. AWS Marketplace
B. AWS CloudFormation
C. Amazon Machine Image (AMI)
D. AWS OpsWorks
Correct Answer: B
A. AWS Pricing Calculator
B. AWS Cost and Usage Report
C. Cost Explorer
D. AWS Budgets
Correct Answer: B
A. Cost of application licensing
B. Cost of data centre operations
C. Cost of physical server hardware
D. Cost of marketing campaigns
E. Cost of network management
Correct Answer: BC
A. Use the AWS account root user for daily access.
B. Rotate credentials on a regular basis.
C. Use access keys and secret access keys on Amazon EC2.
D. Configure multi-factor authentication (MFA).
E. Create a shared set of access keys for system administrators.
Correct Answer: BD
A. Acts as a firewall that controls inbound and outbound traffic between Amazon EC2 instances
B. Protects websites that are not hosted on AWS
C. Scans Amazon EC2 instances for common vulnerabilities
D. Acts as a firewall that controls inbound and outbound traffic between subnets
E. Gives users the ability to block traffic that has specific HTTP headers
Correct Answer: DE
A. Spot Instances
B. On-Demand Instances
C. Dedicated Hosts
D. Reserved Instances
Correct Answer: B
A. Track application deployment statuses globally.
B. Activate DDoS protection across all accounts.
C. Remove unused and underutilised AWS resources across all accounts.
D. Share pre-purchased Amazon EC2 resources across accounts.
Correct Answer: C
A. Update the Lambda runtime language.
B. Maintain the networking infrastructure.
C. Maintain the runtime environment.
D. Configure the resource.
Correct Answer: B
A. Reliability
B. Operational excellence.
C. Cost optimization
D. Performance efficiency
Correct Answer: B
A. Amazon CloudWatch
B. Amazon Aurora
C. AWS Ground Station
D. Amazon Athena
Correct Answer: C
A. Amazon RDS
B. Amazon DynamoDB
C. Amazon Aurora
D. Amazon Redshift
Correct Answer: B
A. Contact AWS Support to initiate MFA activation.
B. Activate the MFA device by using Amazon GuardDuty.
C. Activate the MFA device in the IAM console or by using the AWS CLI.
D. Activate AWS Shield on an MFA-compatible device.
E. Acquire an MFA-compatible device.
Correct Answer: DE
A. Manage customer data.
B. Encrypt client-side data and authenticate data integrity.
C. Provide physical security for Availability Zones.
D. Perform identity and access management.
E. Patch the operating system of Amazon S3
Correct Answer: BC
A. Amazon Inspector
B. AWS Trusted Advisor
C. AWS Personal Health Dashboard
D. AWS Cloud Trail logs
Correct Answer: C
A. Cost Explorer
B. AWS Trusted Advisor
C. AWS Budgets
D. AWS Pricing Calculator
Correct Answer: B
A. AWS Config
B. AWS Cloud Trail
C. AWS Artefact
D. AWS Trusted Advisor
E. AWS Identity and Access Management (IAM)
Correct Answer: AB
A. A broad set of global, cloud-based products that include compute, storage, and databases
B. One or more discrete data centres with redundant power, networking, and connectivity
C. A physical location around the world where data centres are clustered
D. A service that developers use to build applications that deliver latencies of single-digit milliseconds to users
Correct Answer: C
A. Amazon Aurora
B. Amazon Redshift
C. Amazon DynamoDB
D. Amazon Neptune
Correct Answer: C
A. AWS Identity and Access Management (IAM)
B. AWS Managed Services (AMS)
C. AWS Secrets Manager
D. Amazon RDS
Correct Answer: C
A. AWS CodeCommit
B. AWS CodeStar
C. Amazon CodeGuru
D. AWS CodePipeline
Correct Answer: A
A. AWS Customer Service team
B. AWS Technical Support team
C. AWS Sales team
D. AWS Abuse team
Correct Answer: B
A. An IAM user that has administrator permissions
B. The AWS account owner
C. IAM users within a designated group
D. An IAM user that has the required role
Correct Answer: B
A. An IAM user that has administrator permissions
B. The AWS account owner
C. IAM users within a designated group
D. An IAM user that has the required role
Correct Answer: B
A. On-Demand Instances
B. Reserved Instances
C. Spot Instances
D. Dedicated Instances
Correct Answer: C
A. AWS Secrets Manager
B. AWS License Manager
C. AWS Key Management Service (AWS KMS)
D. AWS Systems Manager Parameter Store
Correct Answer: C
A. Amazon Elastic File System (Amazon EFS)
B. Amazon WorkSpaces
C. AWS Database Migration Service (AWS DMS)
D. AWS Snowball Edge
Correct Answer: A
A. Decreased deployment speed
B. Increased application security
C. Increased backup capabilities
D. Increased business agility
Correct Answer: D
A. AWS Trusted Advisor
B. Amazon GuardDuty
C. AWS Management Console
D. AWS Systems Manager
Correct Answer: A
A. Reserved Instances
B. Savings Plans
C. On-Demand Instances
D. Spot Instances.
E. Dedicated Hosts
Correct Answer: AB
A. Amazon CloudWatch
B. Application Load Balancer
C. Amazon EC2 Auto Scaling
D. AWS Batch
Correct Answer: C
A. Make frequent, small, reversible changes.
B. Go global in minutes.
C. Implement a strong foundation of identity and access management.
D. Stop spending money on hardware infrastructure for data centre operations.
Correct Answer: A
A. Amazon EC2
B. Amazon DynamoDB
C. Amazon VPC
D. Amazon Lightsail
Correct Answer: C
A. AWS Business Support
B. AWS Developer Support
C. AWS Enterprise Support
D. AWS Basic Support
Correct Answer: D
A. Amazon S3 is an object storage service that provides high-level performance, security, scalability, and data availability.
B. Amazon S3 is a high-performance block storage service that is designed for use with Amazon EC2
C. Amazon S3 is a fully managed, highly reliable, and scalable file storage system that is accessible over the industry-standard SMB protocol.
D. Amazon S3 is a scalable, fully managed elastic NFS for use with AWS Cloud services and on-premises resources.
Correct Answer: A
A. Use Multi-AZ deployments with Amazon RDS.
B. Encrypt data by using AWS Key Management Service (AWS KMS).
C. Create a hybrid architecture by using AWS Direct Connect.
D. Monitor application-specific information with AWS X-Ray.
Correct Answer: B
A. AWS Concierge Support team
B. Resource tagging
C. AWS Abuse team
D. AWS Support
Correct Answer: A
A. Amazon CloudFront
B. Amazon S3 Transfer Acceleration
C. AWS Global Accelerator
D. Amazon API Gateway
Correct Answer: C
A. Security patching of the guest operating system
B. EC2 hypervisor
C. Network connectivity of the host server
D. Uptime service level agreement (SLA) for the EC2 instances
Correct Answer: A
A. Users must manually configure Amazon EC2 instances.
B. The application has built-in fault tolerance.
C. Users have a choice of operating systems.
D. The application can scale based on demand.
E. Users can run Amazon EC2 Spot Instances.
Correct Answer: BD
A. Amazon Simple Notification Service (Amazon SNS)
B. Amazon Simple Workflow Service (Amazon SWF)
C. Amazon Simple Queue Service (Amazon SQS)
D. AWS Glue
Correct Answer: C
A. Amazon Macie
B. Amazon Inspector
C. Amazon GuardDuty
D. AWS Audit Manager
Correct Answer: A
A. Use the AWS account root user access keys.
B. Use an IAM role with the necessary permissions.
C. Use the AWS access key ID and the EC2 secret access key.
D. Activate multi-factor authentication (MFA) and versioning on the S3 bucket.
Correct Answer: B