Proper study guides for Most recent Amazon AWS Certified SysOps Administrator Associate certified begins with Amazon aws certified sysops administrator book preparation products which designed to deliver the Highest Quality aws certified sysops administrator pdf questions by making you pass the aws certified sysops administrator book test at your first time. Try the free sysops aws demo right now.

Q97. - (Topic 3) 

A user is trying to launch an EBS backed EC2 instance under free usage. The user wants to achieve 

encryption of the EBS volume. How can the user encrypt the data at rest? 

A. Use AWS EBS encryption to encrypt the data at rest 

B. The user cannot use EBS encryption and has to encrypt the data manually or using a third party tool 

C. The user has to select the encryption enabled flag while launching the EC2 instance 

D. Encryption of volume is not available as a part of the free usage tier 

Answer:

Explanation: 

AWS EBS supports encryption of the volume while creating new volumes. It supports encryption of the data at rest, the I/O as well as all the snapshots of the EBS volume. The EBS supports encryption for the selected instance type and the newer generation instances, such as m3, c3, cr1, r3, g2. It is not supported with a micro instance. 


Q98. - (Topic 2) 

A user has created an S3 bucket which is not publicly accessible. The bucket is having thirty objects which are also private. If the user wants to make the objects public, how can he configure this with minimal efforts? 

A. The user should select all objects from the console and apply a single policy to mark them public 

B. The user can write a program which programmatically makes all objects public using S3 SDK 

C. Set the AWS bucket policy which marks all objects as public 

D. Make the bucket ACL as public so it will also mark all objects as public 

Answer:

Explanation: 

A system admin can grant permission of the S3 objects or buckets to any user or make the objects public using the bucket policy and user policy. Both use the JSON-based access policy language. Generally if the user is defining the ACL on the bucket, the objects in the bucket do not inherit it and vice a versa. The bucket policy can be defined at the bucket level which allows the objects as well as the bucket to be public with a single policy applied to that bucket. 


Q99. - (Topic 1) 

You are creating an Auto Scaling group whose Instances need to insert a custom metric into CloudWatch. 

Which method would be the best way to authenticate your CloudWatch PUT request? 

A. Create an IAM role with the Put MetricData permission and modify the Auto Scaling launch configuration to launch instances in that role 

B. Create an IAM user with the PutMetricData permission and modify the Auto Scaling launch configuration to inject the userscredentials into the instance User Data 

C. Modify the appropriate Cloud Watch metric policies to allow the Put MetricData permission to instances from the Auto Scaling group 

D. Create an IAM user with the PutMetricData permission and put the credentials in a private repository and have applications on the server pull the credentials as needed 

Answer:


Q100. - (Topic 3) 

A user is trying to create a PIOPS EBS volume with 8 GB size and 200 IOPS. Will AWS create the volume? 

A. Yes, since the ratio between EBS and IOPS is less than 30 

B. No, since the PIOPS and EBS size ratio is less than 30 

C. No, the EBS size is less than 10 GB 

D. Yes, since PIOPS is higher than 100 

Answer:

Explanation: 

A provisioned IOPS EBS volume can range in size from 10 GB to 1 TB and the user can provision up to 4000 IOPS per volume. The ratio of IOPS provisioned to the volume size requested should be a maximum of 30; for example, a volume with 3000 IOPS must be at least 100 GB. 


Q101. - (Topic 3) 

An organization has created 10 IAM users. The organization wants each of the IAM users to have access to a separate DyanmoDB table. All the users are added to the same group and the organization wants to setup a group level policy for this. How can the organization achieve this? 

A. Define the group policy and add a condition which allows the access based on the IAM name 

B. Create a DynamoDB table with the same name as the IAM user name and define the policy rule which grants access based on the DynamoDB ARN using a variable 

C. Create a separate DynamoDB database for each user and configure a policy in the group based on the DB variable 

D. It is not possible to have a group level policy which allows different IAM users to different DynamoDB Tables 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. AWS DynamoDB has only tables and the organization cannot makeseparate databases. The organization should create a table with the same name as the IAM user name and use the ARN of DynamoDB as part of the group policy. The sample policy is shown below: 

"Version": "2012-10-17", 

"Statement": [{ 

"Effect": "Allow", 

"Action": ["dynamodb:*"], 

"Resource": "arn:aws:dynamodb:region:account-number-without-hyphens:table/${aws:username}" 


Q102. - (Topic 3) 

A user has setup a VPC with CIDR 20.0.0.0/16. The VPC has a private subnet (20.0.1.0/24. and a public 

subnet (20.0.0.0/24.. The user’s data centre has CIDR of 20.0.54.0/24 and 20.1.0.0/24. If the private subnet wants to communicate with the data centre, what will happen? 

A. It will allow traffic communication on both the CIDRs of the data centre 

B. It will not allow traffic with data centre on CIDR 20.1.0.0/24 but allows traffic communication on 

20.0.54.0/24 

C. It will not allow traffic communication on any of the data centre CIDRs 

D. It will allow traffic with data centre on CIDR 20.1.0.0/24 but does not allow on 20.0.54.0/24 

Answer:

Explanation: 

VPC allows the user to set up a connection between his VPC and corporate or home network data centre. If the user has an IP address prefix in the VPC that overlaps with one of the networks' prefixes, any traffic to the network's prefix is dropped. In this case CIDR 20.0.54.0/24 falls in the VPC’s CIDR range of 20.0.0.0/16. Thus, it will not allow traffic on that IP. In the case of 20.1.0.0/24, it does not fall in the VPC’s CIDR range. Thus, traffic will be allowed on it. 


Q103. A user has deployed an application on his private cloud. The user is using his own monitoring tool. He wants to configure that whenever there is an error, the monitoring tool should notify him via SMS. Which of the below mentioned AWS services will help in this scenario? 

A. None because the user infrastructure is in the private cloud/ 

B. AWS SNS 

C. AWS SES 

D. AWS SMS 

Answer:

Amazon Simple Notification Service (Amazon SNS. is a fast, flexible, and fully managed push messaging service. Amazon SNS can be used to make push notifications to mobile 

devices. Amazon SNS can deliver notifications by SMS text message or email to the Amazon Simple Queue Service (SQS. queues or to any HTTP endpoint. In this case user can use the SNS apis to send SMS. 


Q104. - (Topic 3) 

An organization has created one IAM user and applied the below mentioned policy to the user. What entitlements do the IAM users avail with this policy? 

"Version": "2012-10-17", 

"Statement": [ 

"Effect": "Allow", 

"Action": "ec2:Describe*", 

"Resource": "*" 

}, 

"Effect": "Allow" 

"Action": [ 

"cloudwatch:ListMetrics", 

"cloudwatch:GetMetricStatistics", 

"cloudwatch:Describe*" 

], 

"Resource": "*" 

}, 

"Effect": "Allow", 

"Action": "autoscaling:Describe*", 

"Resource": "*" 

A. The policy will allow the user to perform all read only activities on the EC2 services 

B. The policy will allow the user to list all the EC2 resources except EBS 

C. The policy will allow the user to perform all read and write activities on the EC2 services 

D. The policy will allow the user to perform all read only activities on the EC2 services except load Balancing 

Answer:

Explanation: 

AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. If an organization wants to setup read only access to EC2 for a particular user, they should mention the action in the IAM policy which entitles the user for Describe rights for EC2, CloudWatch, Auto Scaling and ELB. In the policy shown below, the user will have read only access for EC2 and EBS, CloudWatch and Auto Scaling. Since ELB is not mentioned as a part of the list, the user will not have access to ELB. 

"Version": "2012-10-17", 

"Statement": [ 

"Effect": "Allow", 

"Action": "ec2:Describe*", 

"Resource": "*" 

}, 

"Effect": "Allow", 

"Action": [ 

"cloudwatch:ListMetrics", 

"cloudwatch:GetMetricStatistics", 

"cloudwatch:Describe*" 

], 

"Resource": "*" 

}, 

"Effect": "Allow", 

"Action": "autoscaling:Describe*", 

"Resource": "*"