Act now and download your Amazon-Web-Services SOA-C01 test today! Do not waste time for the worthless Amazon-Web-Services SOA-C01 tutorials. Download Regenerate Amazon-Web-Services AWS Certified SysOps Administrator - Associate exam with real questions and answers and begin to learn Amazon-Web-Services SOA-C01 with a classic professional.

Online SOA-C01 free questions and answers of New Version:

NEW QUESTION 1
You are tasked with setting up a cluster of EC2 Instances for a NoSQL database. The database requires random read IO disk performance up to a 100,000 IOPS at 4KB block side per node.
Which of the following EC2 instances will perform the best for this workload?

  • A. A High-Memory Quadruple Extra Large (m2.4xlarge) with EBS-Optimized set to true and a PIOPs EBS volume
  • B. A Cluster Compute Eight Extra Large (cc2.8xlarge) using instance storage
  • C. High I/O Quadruple Extra Large (hi1.4xlarge) using instance storage
  • D. A Cluster GPU Quadruple Extra Large (cg1.4xlarge) using four separate 4000 PIOPS EBS volumes in a RAID 0 configuration

Answer: C

Explanation:
Reference:
http://aws.amazon.com/ec2/instance-types/

NEW QUESTION 2
A user has configured an EC2 instance in the US-East-1a zone. The user has enabled detailed monitoring of the instance. The user is trying to get the data from CloudWatch using a CLI. Which of the below mentioned CloudWatch endpoint URLs should the user use?

  • A. monitoring.us-east-1.amazonaws.com
  • B. monitoring.us-east-1-a.amazonaws.com
  • C. monitoring.us-east-1a.amazonaws.com
  • D. cloudwatch.us-east-1a.amazonaws.com

Answer: A

Explanation:
The CloudWatch resources are always region specific and they will have the end point as region specific. If the user is trying to access the metric in the US-East-1 region, the endpoint URL will be: monitoring.us-east- 1.amazonaws.com

NEW QUESTION 3
A user has created an EBS volume of 10 GB and attached it to a running instance. The user is trying to access EBS for first time. Which of the below mentioned options is the correct statement with respect to a first time EBS access?

  • A. The volume will show a size of 8 GB
  • B. The volume will show a loss of the IOPS performance the first time
  • C. The volume will be blank
  • D. If the EBS is mounted it will ask the user to create a file system

Answer: B

Explanation:
A user can create an EBS volume either from a snapshot or as a blank volume. If the volume is from a
snapshot it will not be blank. The volume shows the right size only as long as it is mounted. This shows that the file system is created. When the user is accessing the volume the AWS EBS will wipe out the block storage or instantiate from the snapshot. Thus, the volume will show a loss of IOPS. It is recommended that the user should pre warm the EBS before use to achieve better IO.

NEW QUESTION 4
A root account owner is trying to understand the S3 bucket ACL. Which of the below mentioned options cannot be used to grant ACL on the object using the authorized predefined group?

  • A. Authenticated user group
  • B. All users group
  • C. Log Delivery Group
  • D. Canonical user group

Answer: D

Explanation:
An S3 bucket ACL grantee can be an AWS account or one of the predefined Amazon S3 groups. Amazon S3 has a set of predefined groups. When granting account access to a group, the user can specify one of the URLs of that group instead of a canonical user ID. AWS S3 has the following predefined groups:
Authenticated Users group: It represents all AWS accounts. All Users group: Access permission to this group allows anyone to access the resource. Log Delivery group: WRITE permission on a bucket enables this group to write server access logs to the bucket.

NEW QUESTION 5
A customer has a web application that uses cookie Based sessions to track logged in users It Is deployed on AWS using ELB and Auto Scaling The customer observes that when load increases. Auto Scaling launches new Instances but the load on the easting Instances does not decrease, causing all existing users to have a sluggish experience.
Which two answer choices independently describe a behavior that could be the cause of the sluggish user experience? Choose 2 answers

  • A. ELB's normal behavior sends requests from the same user to the same backend instance
  • B. ELB's behavior when sticky sessions are enabled causes ELB to send requests in the same session to the same backend instance
  • C. A faulty browser is not honoring the TTL of the ELB DNS name.
  • D. The web application uses long polling such as comet or websocket
  • E. Thereby keeping a connection open to a web server tor a long time
  • F. The web application uses long polling such as comet or websocket
  • G. Thereby keeping a connection open to a web server for a long time.

Answer: BD

NEW QUESTION 6
An organization has configured two single availability zones. The Auto Scaling groups are configured in separate zones. The user wants to merge the groups such that one group spans across multiple zones. How can the user configure this?

  • A. Run the command as-join-auto-scaling-group to join the two groups
  • B. Run the command as-update-auto-scaling-group to configure one group to span across zones and delete the other group
  • C. Run the command as-copy-auto-scaling-group to join the two groups
  • D. Run the command as-merge-auto-scaling-group to merge the groups

Answer: B

Explanation:
If the user has configured two separate single availability zone Auto Scaling groups and wants to merge them then he should update one of the groups and delete the other one. While updating the first group it is recommended that the user should increase the size of the minimum, maximum and desired capacity as a summation of both the groups.

NEW QUESTION 7
A user is running a batch process on EBS backed EC2 instances. The batch process starts a few instances to process hadoop Map reduce jobs which can run between 50 ?V 600 minutes or sometimes for more time. The user wants to configure that the instance gets terminated only when the process is completed. How can the user configure this with CloudWatch?

  • A. Setup the CloudWatch action to terminate the instance when the CPU utilization is less than 5%
  • B. Setup the CloudWatch with Auto Scaling to terminate all the instances
  • C. Setup a job which terminates all instances after 600 minutes
  • D. It is not possible to terminate instances automatically

Answer: D

Explanation:
Amazon CloudWatch alarm watches a single metric over a time period that the user specifies and performs one or more actions based on the value of the metric relative to a given threshold over a number of time periods. The user can setup an action which terminates the instances when their CPU utilization is below a certain threshold for a certain period of time. The EC2 action can either terminate or stop the instance as part of the EC2 action.

NEW QUESTION 8
A company is migrating an application to AWS that requires access to a legacy system, which remain in the company's data centre. The application runs inside a VPC in the company's AWS account. The application must offer a consistent and low-latency response to its users
How can these requirements be met?

  • A. Create a software-based VPN connection between the Amazon VPC and the on-premises network
  • B. Create an AWS Direct Connect connection between AWS and the on-premises network and then use a private virtual interface
  • C. Create a hardware-based IPsec VPN connection between the VPC in AWS and the on-premises network
  • D. Create an overlay network by using third-party software and use that to connect the X/PC back to the on-premises network

Answer: B

Explanation:
Private Connectivity to your Amazon VPC. You can use AWS Direct Connect to establish a private virtual interface from your on-premise network directly to your Amazon VPC, providing you with a private, high bandwidth network connection between your network and your VPC.

NEW QUESTION 9
A user is trying to understand the detailed CloudWatch monitoring concept. Which of the below mentioned services does not provide detailed monitoring with CloudWatch?

  • A. AWS EMR
  • B. AWS RDS
  • C. AWS ELB
  • D. AWS Route53

Answer: A

Explanation:
CloudWatch is used to monitor AWS as well as the custom services. It provides either basic or detailed monitoring for the supported AWS products. In basic monitoring, a service sends data points to CloudWatch every five minutes, while in detailed monitoring a service sends data points to CloudWatch every minute. Services, such as RDS, EC2, Auto Scaling, ELB, and Route 53 can provide the monitoring data every minute.

NEW QUESTION 10
A user has launched an EBS backed EC2 instance. What will be the difference while performing the
restart or stop/start options on that instance?

  • A. For restart it does not charge for an extra hour, while every stop/start it will be charged as a separate hour
  • B. Every restart is charged by AWS as a separate hour, while multiple start/stop actions during a single hour will be counted as a single hour
  • C. For every restart or start/stop it will be charged as a separate hour
  • D. For restart it charges extra only once, while for every stop/start it will be charged as a separate hour

Answer: A

Explanation:
For an EC2 instance launched with an EBS backed AMI, each time the instance state is changed from stop to start/ running, AWS charges a full instance hour, even if these transitions happen multiple times within a single hour. Anyway, rebooting an instance AWS does not charge a new instance billing hour.

NEW QUESTION 11
An organization has configured the custom metric upload with CloudWatch. The organization has given permission to its employees to upload data using CLI as well SDK. How can the user track the calls made to CloudWatch?

  • A. The user can enable logging with CloudWatch which logs all the activities
  • B. Use CloudTrail to monitor the API calls
  • C. Create an IAM user and allow each user to log the data using the S3 bucket
  • D. Enable detailed monitoring with CloudWatch

Answer: B

Explanation:
AWS CloudTrail is a web service which will allow the user to monitor the calls made to the Amazon CloudWatch API for the organization??s account, including calls made by the AWS Management Console, Command Line Interface (CLI., and other services. When CloudTrail logging is turned on, CloudWatch will write log files into the Amazon S3 bucket, which is specified during the CloudTrail configuration.

NEW QUESTION 12
A user has created an S3 bucket which is not publicly accessible. The bucket is having thirty objects which are also private. If the user wants to make the objects public, how can he configure this with minimal efforts?

  • A. The user should select all objects from the console and apply a single policy to mark them public
  • B. The user can write a program which programmatically makes all objects public using S3 SDK
  • C. Set the AWS bucket policy which marks all objects as public
  • D. Make the bucket ACL as public so it will also mark all objects as public

Answer: C

Explanation:
A system admin can grant permission of the S3 objects or buckets to any user or make the objects public using the bucket policy and user policy. Both use the JSON-based access policy language.
Generally, if the user is defining the ACL on the bucket, the objects in the bucket do not inherit it and vice a versa. The bucket policy can be defined at the bucket level which allows the objects as well as the bucket to be public with a single policy applied to that bucket.

NEW QUESTION 13
A user has created a launch configuration for Auto Scaling where CloudWatch detailed monitoring is disabled. The user wants to now enable detailed monitoring. How can the user achieve this?

  • A. Update the Launch config with CLI to set InstanceMonitoringDisabled = false
  • B. The user should change the Auto Scaling group from the AWS console to enable detailed monitoring
  • C. Update the Launch config with CLI to set InstanceMonitoring.Enabled = true
  • D. Create a new Launch Config with detail monitoring enabled and update the Auto Scaling group

Answer: D

Explanation:
CloudWatch is used to monitor AWS as well as the custom services. To enable detailed instance monitoring for a new Auto Scaling group, the user does not need to take any extra steps. When the user creates the AutoScaling launch config as the first step for creating an Auto Scaling group, each launch configuration contains a flag named InstanceMonitoring.Enabled. The default value of this flag is true. When the user has created a launch configuration with InstanceMonitoring.Enabled = false it will involve multiple steps to enable detail monitoring. The steps are:
Create a new Launch config with detailed monitoring enabled Update the Auto Scaling group with a new launch config Enable detail monitoring on each EC2 instance

NEW QUESTION 14
After a particularly high bill, an organization wants to review the use of AWS services.
What AWS service will allow the SysOps Administrator to quickly view this information to shared it, and will also forest expenses for the billing period?

  • A. AWS Trusted Advisor
  • B. Amazon QuickSight
  • C. AWS Cost and Usage Report
  • D. AWS Cost Explorer

Answer: C

NEW QUESTION 15
A user has created a VPC with two subnets: one public and one private. The user is planning to run the patch update for the instances in the private subnet. How can the instances in the private subnet connect to theinternet?

  • A. Use the internet gateway with a private IP
  • B. Allow outbound traffic in the security group for port 80 to allow internet updates
  • C. The private subnet can never connect to the internet
  • D. Use NAT with an elastic IP

Answer: D

Explanation:
A Virtual Private Cloud (VPC. is a virtual network dedicated to the user??s AWS account. A user can create a subnet with VPC and launch instances inside that subnet. If the user has created two subnets (one private and one public., he would need a Network Address Translation (NAT. instance with the elastic IP address. This enables the instances in the private subnet to send requests to the internet (for example, to perform software updates..

NEW QUESTION 16
A user has launched 10 instances from the same AMI ID using Auto Scaling. The user is trying to see the average CPU utilization across all instances of the last 2 weeks under the CloudWatch console. How can the user achieve this?

  • A. View the Auto Scaling CPU metrics
  • B. Aggregate the data over the instance AMI ID
  • C. The user has to use the CloudWatchanalyser to find the average data across instances
  • D. It is not possible to see the average CPU utilization of the same AMI ID since the instance ID is different

Answer: A

Explanation:
Auto Scaling has its own aggregated CPU Utilization metric.

NEW QUESTION 17
A user is trying to setup a security policy for ELB. The user wants ELB to meet the cipher supported by the client by configuring the server order preference in ELB security policy. Which of the below mentioned
preconfigured policies supports this feature?

  • A. ELBSecurity Policy-2014-01
  • B. ELBSecurity Policy-2011-08
  • C. ELBDefault Negotiation Policy
  • D. ELBSample- OpenSSLDefault Cipher Policy

Answer: A

Explanation:
Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. If the load balancer is configured to support the Server Order Preference, then the load balancer gets to select the first cipher in its list that matches any one of the ciphers in the client's list. When the user verifies the preconfigured policies supported by ELB, the policy ??ELBSecurity Policy-2014-01?? supports server order preference.

NEW QUESTION 18
A user is trying to connect to a running EC2 instance using SSH. However, the user gets an Unprotected Private Key File error. Which of the below mentioned options can be a possible reason for rejection?

  • A. The private key file has the wrong file permission
  • B. The ppk file used for SSH is read only
  • C. The public key file has the wrong permission
  • D. The user has provided the wrong user name for the OS login

Answer: A

Explanation:
While doing SSH to an EC2 instance, if you get an Unprotected Private Key File error it means that the private key file's permissions on your computer are too open. Ideally the private key should have the Unix permission of 0400. To fix that, run the command:
chmod 0400 /path/to/private.key

NEW QUESTION 19
A Developers that an Amazon EC2 instance has failed. The developer reports that all the data was stored on the root volume is now gone.
What is the expiation for this issue?

  • A. The instance was using an Amazon EBS root volume
  • B. The instance was using Amazon S3 as the root volume
  • C. The instance was using an instance store root volume
  • D. The root volume with the data exists but needs to be re-attached

Answer: A

Explanation:
If your instance is ebs-backed, then you will not lose ebs root volume storage if you launched it with the "delete-on-termination" set to false. See the ec2-run-instances command for more information. Other ephemeral volumes will be lost when the instance is stopped/terminated.
If it is not ebs-backed, you will lose the root data when you terminate the instance (you cannot "stop" instance store instances).

NEW QUESTION 20
A user has created a VPC with CIDR 20.0.0.0/16 using the wizard. The user has created a public
subnet CIDR (20.0.0.0/24. and VPN only subnets CIDR (20.0.1.0/24. along with the VPN gateway (vgw-12345. to connect to the user??s data centre. Which of the below mentioned options is a valid entry for the main route table in this scenario?

  • A. Destination: 20.0.0.0/24 and Target: vgw-12345
  • B. Destination: 20.0.0.0/16 and Target: ALL
  • C. Destination: 20.0.1.0/16 and Target: vgw-12345
  • D. Destination: 0.0.0.0/0 and Target: vgw-12345

Answer: D

Explanation:
The user can create subnets as per the requirement within a VPC. If the user wants to connect VPC from his own data centre, he can setup a public and VPN only subnet which uses hardware VPN access to connect with his data centre. When the user has configured this setup with Wizard, it will create a virtual private gateway to route all traffic of the VPN subnet. Here are the valid entries for the main route table in this scenario: Destination: 0.0.0.0/0 & Target: vgw-12345 (To route all internet traffic to the VPN gateway.
Destination: 20.0.0.0/16 & Target: local (To allow local routing in VPC.

NEW QUESTION 21
......

P.S. Surepassexam now are offering 100% pass ensure SOA-C01 dumps! All SOA-C01 exam questions have been updated with correct answers: https://www.surepassexam.com/SOA-C01-exam-dumps.html (639 New Questions)