1. A solutions architect is designing the cloud architecture for a new application being deployed to AWS. The application allows users to interactively download and upload files. Files older that 2 years will be accessed less frequently. The solutions architect needs to ensure that the application can scale to any number of files while maintaining high availability and durability.Which scalable solutions should the solutions architect recommend ? Select two(Select 2answers)
A) Store the files in Amazon Elastic Block Store (Amazon EBS) volumes. Schedule snapshots of the volumes. Use the snapshots to archive data older than 2 years. B) Store the files an Amazon Elastic File System (Amazon EFS) with a lifecycle policy that moves objects older than 2 years to EFS Infrequent Access (EFS IA) C) Store the files on Amazon S3 with a lifecycle policy that moves objects older than 2 years to S3 Standard-Infrequent Access (S3 Standard-IA) D) Store the files in RAID-striped Amazon Elastic Block Store (Amazon EBS) volumes. Schedule snapshots of the volumes. Use the snapshots to archive data older than 2 years. E) Store the files on Amazon S3 with a lifecycle policy that moves objects older than 2 years to S3 Glacier.
2. A company has an application that calls AWS Lambda functions. A recent code review found database credentials stored in the source code. The database credentials need to be removed from the Lambda source code. The credentials must then be securely stored and rotated on an ongoing basis to meet security policy requirements.What should a solutions architect recommend to meet these requirements?
A) Store the password in AWS CloudHSM. Associate the Lambda function with a role that can retrieve the password from CloudHSM given its key ID. B) Move the database password to an environment variable associated with the Lambda function. Retrieve the password from the environment variable upon execution. C) Store the password in AWS Secrets Manager. Associate the Lambda function with a role that can retrieve the password from Secrets Manager given its secret ID. D) Store the password in AWS Key Management Service (AWS KMS). Associate the Lambda function with a role that can retrieve the password from AWS KMS given its key ID.
3. A company hosts a static website within an Amazon S3 bucket. A solutions architect needs to ensure that data can be recovered in case of accidental deletionWhich action will accomplish this?
A) Enable Amazon S3 versioning B) Enable an Amazon S3 lifecycle policy C) Enable Amazon S3 Intelligent-Tiering D) Enable Amazon S3 cross-Region replication
4. A solutions architect is optimizing a website for an upcoming musical event. Videos of the performances will be streamed in real time and then will be available on demand. The event is expected to attract a global online audience.Which service will improve the performance of both the real-time and on-demand streaming?
A) Amazon S3 Transfer Acceleration B) Amazon Route 53 C) Amazon CloudFront D) AWS Global Accelerator
5. An operations team has a standard that states IAM policies should not be applied directly to users. Some new team members have not been following this standard. The operations manager needs a way to easily identify the users with attached policies.What should a solutions architect do to accomplish this?
A) Monitor using AWS Cloud Trial B) Publish IAM user changes to Amazon SNS C) Create an AWS Config rule to run daily D) Run AWS Lambda when a user is modified.
Leave a comment