1. One of the instances in your Auto Scaling group health check returns the status of Impaired to Auto Scaling. What will Auto Scaling do in this case?
A) Send an SNS notification B) Perform a health check until cool down before declaring that the instance has failed C) Terminate the instance and launch a new instance D) Wait for the instance to become healthy before sending traffic
2. You have just recently deployed an application on EC2 instances behind an ELB. After a couple of weeks, customers are complaining on receiving errors from the application. You want to diagnose the errors and are trying to get errors from the ELB access logs. But the ELB access logs are empty. What Is the reason for this. Please select:
A) You do not have the appropriate permissions to access the logs B) ELB Access logs are only available for a maximum of one week. C) Access logging is an optional feature of Elastic Load Balancing that is disabled by default Your answer is incorrect. D) You do not have your Cloud Watch metrics correctly configured
3. You are using a configuration management system to manage your Amazon EC2 instances. On your Amazon EC2 Instances, you want to store credentials for connecting to an Amazon RDS DB instance. How should you securely store these credentials?
A) Assign an lAM role to your Amazon EC2 instance, and use this lAM role to access the Amazon RDS DB from your Amazon EC2 instances. B) Launch an Amazon EC2 instance and use the configuration management system to bootstrap the instanc with the Amazon RDS DB credentials. Create an AMP from this instance. C) Store the Amazon RDS DB credentials in Amazon EC2 user data. Import the credentials Into the Instance on boot. D) Give the Amazon EC2 instances an PAM role that allows read access to a private Amazon S3 bucket. Store a file with database credentials In the Amazon 53 bucket. Have your configuration management system pull the file from the bucket when it is needed.
4. You have the following application to be setup in AWS(Amazon Web Service) 1) A web tier hosted on EC2 Instances 2) Session data to be written to Dynamo DB 3) Log files to be written to Microsoft SQL Server How can you allow an application to write data to a Dynamo DB table?
A) Create an lAM role that allows read access to the Dynamo DB table. B) Create an lAM role that allows write access to the Dynamo DB table. C) Add an lAM user to a running EC2 instance. D) Add an AM user that allows write access to the Dynamo DB table.
5. Your mobile application includes a photo-sharing service that is expecting tens of thousands of users at launch. You will leverage Amazon Simple Storage Service (S3) for storage of the user Images, and you must decide how to authenticate and authorize your users for access to these images. You also need to manage the storage of these images. Which two of the following approaches should you use? Choose two answers from the options below
A) Use AWS(Amazon Web Service) Identity and ACCeSS Management (lAM) user accounts as your applicationlevel user database, and offload the burden of authentication from your application code. B) Authenticate your users at the application level, and use AWS(Amazon Web Service) Security Token Service (5Th) to grant token- based authorization to S3 objects. C) Use a key-based naming scheme comprised from the user IDs for all user objects in a single Amazon S3 bucket. D) Authenticate your users at the application level, and send an SMS token message to the user. Create an Amazon S3 bucket with the same name as the SMS message token, and move the users objects to that bucket. E) Create an Amazon S3 bucket per user, and use your application to generate the S3 URI for the appropriate content.
Leave a comment