Associate Practice Exam 5 UPDATED
ACTUAL Questions and CORRECT
Answers
A legacy application is using a Classic Load Balancer in AWS which routes each request
independently to the registered EC2 instance with the smallest load. You enabled the sticky
session feature to allow the load balancer to bind a user's session to a specific EC2 instance.
What is the name of the cookie that the load balancer creates, which is used to map the user's
session? - CORRECT ANSWER - AWSELB
A company has a fleet of On-Demand EC2 instances on their new VPC created using the AWS
CLI. You noticed that all recently launched EC2 instances do not have public DNS hostnames.
This prevents you from accessing the instances over the Internet.
Which of the following could be a possible reason for this issue? - CORRECT ANSWER -
By default, the [enableDnsHostNames] is set to false for VPCs create using the AWS CLI
A company has hundreds of Customer Master Keys (CMKs) which they are using with the
Amazon Key Management Service to secure their S3 buckets, RDS instances, and other AWS
resources. You were instructed to delete some CMKs to avoid management overhead and costs
associated with maintaining unused keys.
In this scenario, which of the following is true regarding the deletion of customer master keys?
(Select TWO.) - CORRECT ANSWER - -A CMK that is pending deletion cannot be used
in any cryptographic operation.
-AWS KMS does not rotate the backing keys of CMKs that are pending deletion.
A software development company has developed a web application based on Docker containers,
which they need to migrate over to their VPC. As the Senior Systems Administrator, you are
responsible in ensuring that there are no maintenance overheads incurred in the deployment.
Which of the following would you use for this purpose? - CORRECT ANSWER -
Amazon ECS
, A company has a newly launched e-commerce website with a Memcached cluster hosted in
Amazon ElastiCache. Due to the growth of the site's userbase, the SysOps Administrator needs
to vertically scale the ElastiCache cluster by using a larger instance type.
Which combination of steps should the Administrator implement in this scenario? (Select TWO.)
- CORRECT ANSWER - -Specify the new EC2 instance type in the [CacheNoteType]
parameter
-use the [CreateCacheCluster] API action to create a new ElastiCache cluster
A data analytics company decided to augment their on-premises infrastructure with AWS. They
need a new service that can analyze clickstream data from their global clients in order to segment
users, understand user preferences, and deliver more effective ads. As the SysOps Administrator,
you have to set up their cloud architecture where it can automatically provision thousands of
compute instances to process data at any scale.
Which of the following should you use to meet the requirement? - CORRECT ANSWER -
Amazon Elastic MapReduce
A data warehouse is hosted on a Redshift cluster which is being used by an online analytics
application in your AWS VPC. There is a requirement to ensure that the logs for the cluster are
tracked and stored for auditing purposes, which is done annually. The logs should contain the
information about connections and user activities in your database.
Which of the following logs would be available for you to track your Redshift cluster? (Select
THREE.) - CORRECT ANSWER - -Connection Log
-User Log
-User activity log
A top investment bank has a set of Customer Master Keys defined in AWS Key Management
Service to secure their financial data. As the Systems Administrator, you need to review who has
access to which keys to prevent any security breach. In addition, you need to make the required
changes based on the policy documents defined by the company.
Where could you make changes to who can access the keys in the KMS service? - CORRECT
ANSWER - Key Policies