1. You have an ELB on AWS(Amazon Web Service) which has a set of web servers behind them. There is a requirement that the SSL key used to encrypt data is always kept secure. Secondly the logs of ELB should only be decrypted by a subset of users. Which of these architectures meets all of the requirements?
A) Use Elastic Load Balancing to distribute traffic to a set of web servers, configure the load balancer to perform TCP load balancing, use an AWS(Amazon Web Service) Cloud HSM to perform the SSL transactions, and write your web server logs to a private Amazon S3 bucket using Amazon S3 server-side encryption.
B) Use Elastic Load Balancing to distribute traffic to a set of web servers. Configure the load balancer to perform TCP load balancing, use an AWS(Amazon Web Service) Cloud HSM to perform the SSL transactions, and write your web server logs to an ephemeral volume that has been encrypted using a randomly generated AES key.
C) Use Elastic Load Balancing to distribute traffic to a set of web servers. Use TCP load balancing on the load balancer and configure your web servers to retrieve the private key from a private Amazon 53 bucket on boot. Write your web server logs to a private Amazon 53 bucket using Amazon 53 server-side encryption.
D) Use Elastic Load Balancing to distribute traffic to a set of web servers. To protect the SSL private key. upload the key to the load balancer and configure the load balancer to offload the SSL traffic. Write your web server logs to an ephemeral volume that has been encrypted using a randomly generated AES key.
2. When you implement a lifecycle hook in Auto scaling, by default what is the time limit in which the instance will be a pending state?
A) 5 minutes
B) 2ominutes
C) 60 seconds
D) 60 minutes
3. Which of the below is not a lifecycle event in Ops work?
A) Configure
B) Setup
C) Shut down
D) Uninstall
4. When deploying applications to Elastic Beanstalk, which of the following statements is false with regards to application deployment ?
A) Can include parent directories
B) which can be deployed to the application server
C) Should not exceed 512 MB in size
D) The application can be bundled in a zip file
5. You have implemented a system to automate deployments of your configuration and application dynamically after an Amazon EC2 instance in an Auto Scaling group is launched. Your system uses a configuration management tool that works in a standalone configuration, where there is no master node. Due to the volatility of application load, new instances must be brought into service within three minutes of the launch of the instance operating system. The deployment stages take the following times to complete: 1) Installing configuration management agent: 2mins 2) Configuring instance using artifacts: 4mins 3) Installing application framework: 1 5mins 4) Deploying application code: 1 mm What process should you use to automate the deployment using this type of standalone agent configuration?
A) Build a custom Amazon Machine Image that includes the configuration management agent and appli framework pre-Installed. Configure your Auto Scaling launch configuration with an Amazon EC2 UserData script tc pull configuration artifacts and application code from an Amazon S3 bucket, and then execute the agent to configure the system.
B) Create a web service that polls the Amazon EC2 API to check for new instances that are launched in an Auto Scaling group. When it recognizes a new Instance, execute a remote script via SSH to install the agent. SCP the configuration artifacts and application code, and finally execute the agent to configure the system
C) Build a custom Amazon Machine Image that includes all components pre-installed, including an agent. configuration artifacts, application frameworks, and code. Create a startup script that executes the agent to configure the system on startup.
D) Configure your Auto Scaling launch configuration with an Amazon EC2 User Data script to install the agent.. pull configuration artifacts and application code from an Amazon S3 bucket, and then execute the agent to configure the infrastructure and application.
Leave a comment