We provide aws sysops dumps which are the best for clearing AWS-SysOps test, and to get certified by Amazon AWS Certified SysOps Administrator Associate. The aws sysops exam covers all the knowledge points of the real AWS-SysOps exam. Crack your Amazon AWS-SysOps Exam with latest dumps, guaranteed!

Free demo questions for Amazon AWS-SysOps Exam Dumps Below:

NEW QUESTION 1
A user has configured ELB with SSL using a security policy for secure negotiation between the client and load balancer. Which of the below mentioned SSL protocols is not supported by the security policy?

  • A. TLS 1.3
  • B. TLS 1.2
  • C. SSL 2.0
  • D. SSL 3.0

Answer: A

Explanation:
Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. Elastic Load Balancing supports the following versions of the SSL protocol: TLS 1.2 TLS 1.1 TLS 1.0 SSL 3.0 SSL 2.0

NEW QUESTION 2
A system admin is planning to encrypt all objects being uploaded to S3 from an application. The system admin does not want to implement his own encryption algorithm; instead he is planning to use server side encryption by supplying his own key (SSE-C.. Which parameter is not required while making a call for SSE-C?

  • A. x-amz-server-side-encryption-customer-key-AES-256
  • B. x-amz-server-side-encryption-customer-key
  • C. x-amz-server-side-encryption-customer-algorithm
  • D. x-amz-server-side-encryption-customer-key-MD5

Answer: A

Explanation:
AWS S3 supports client side or server side encryption to encrypt all data at rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key (SSE-C.. When the user is supplying his own encryption key, the user has to send the below mentioned parameters as a part of the API calls: x-amz-server-side-encryption-customer-algorithm: Specifies the encryption algorithm x-amz-server-side-encryption-customer-key: To provide the base64-encoded encryption key x-amz-server-side-encryption-customer-key-MD5: To provide the base64-encoded 128-bit MD5 digest of the encryption key

NEW QUESTION 3
Your mission is to create a lights-out datacenter environment, and you plan to use AWS OpsWorks to accomplish this. First you created a stack and added an App Server layer with an instance running in it. Next you added an application to the instance, and now you need to deploy a MySQL RDS database instance.
Which of the following answers accurately describe how to add a backend database server to an OpsWorks stack? Choose 3 answers

  • A. Add a new database layer and then add recipes to the deploy actions of the database and App Server layer
  • B. Use OpsWorks' "Clone Stack" feature to create a second RDS stack in another Availability Zone for redundancy in the event of a failure in the Primary A
  • C. To switch to the secondary RDS instance, set the [:database] attributes to values that are appropriate for your server which you can do by using custom JSO
  • D. The variables that characterize the RDS database connection—host, user, and so on—are set using the corresponding values from the deploy JSON's [:depioy][:app_name][:database] attribute
  • E. Cookbook attributes are stored in a repository, so OpsWorks requires that the "password": "your_password" attribute for the RDS instance must be encrypted using at least a 256-bit ke
  • F. Set up the connection between the app server and the RDS layer by using a custom recip
  • G. The recipe configures the app server as required, typically by creating a configuration fil
  • H. The recipe gets the connection data such as the host and database name from a set of attributes in the stack configuration and deployment JSON that AWS OpsWorks installs on every instanc

Answer: BCE

NEW QUESTION 4
An organization has setup multiple IAM users. The organization wants that each IAM user accesses the IAM console only within the organization and not from outside. How can it achieve this?

  • A. Create an IAM policy with the security group and use that security group for AWS console login
  • B. Create an IAM policy with a condition which denies access when the IP address range is not from the organization
  • C. Configure the EC2 instance security group which allows traffic only from the organization’s IP range
  • D. Create an IAM policy with VPC and allow a secure gateway between the organization and AWS Console

Answer: B

Explanation:
AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. The user can add conditions as a part of the IAM policies. The condition can be set on AWS Tags, Time, and Client IP as well as on many other parameters. If the organization wants the user to access only from a specific IP range, they should set an IAM policy condition which denies access when the IP is not in a certain range. E.g. The sample policy given below denies all traffic when the IP is not in a certain range.
"Statement": [{
"Effect": "Deny",
"Action": "*",
"Resource": "*",
"Condition": {
"NotIpAddress": {
"aws:SourceIp": ["10.10.10.0/24", "20.20.30.0/24"]
}
}
}]

NEW QUESTION 5
A user has created a VPC with the public and private subnets using the VPC wizard. The VPC has CIDR
20.0.0.0/16. The public subnet uses CIDR 20.0.1.0/24. The user is planning to host a web server in the public subnet (port 80. and a DB server in the private subnet (port 3306.. The user is configuring a security group for the public subnet (WebSecGrp. and the private subnet (DBSecGrp.. Which of the below mentioned entries is required in the web server security group (WebSecGrp.?

  • A. Configure Destination as DB Security group ID (DbSecGr
  • B. for port 3306 Outbound
  • C. 80 for Destination 0.0.0.0/0 Outbound
  • D. Configure port 3306 for source 20.0.0.0/24 InBound
  • E. Configure port 80 InBound for source 20.0.0.0/16

Answer: A

Explanation:
A user can create a subnet with VPC and launch instances inside that subnet. If the user has created a public private subnet to host the web server and DB server respectively, the user should configure that the instances in the public subnet can receive inbound traffic directly from the internet. Thus, the user should configure port 80 with source 0.0.0.0/0 in InBound. The user should configure that the instance in the public subnet can send traffic to the private subnet instances on the DB port. Thus, the user should configure the DB Amazon AWS-SysOps : Practice Test
security group of the private subnet (DbSecGrp. as the destination for port 3306 in Outbound.

NEW QUESTION 6
A user is trying to launch an EBS backed EC2 instance under free usage. The user wants to achieve
encryption of the EBS volume. How can the user encrypt the data at rest?

  • A. Use AWS EBS encryption to encrypt the data at rest
  • B. The user cannot use EBS encryption and has to encrypt the data manually or using a third party tool
  • C. The user has to select the encryption enabled flag while launching the EC2 instance
  • D. Encryption of volume is not available as a part of the free usage tier

Answer: B

Explanation:
AWS EBS supports encryption of the volume while creating new volumes. It supports encryption of the data at rest, the I/O as well as all the snapshots of the EBS volume. The EBS supports encryption for the selected instance type and the newer generation instances, such as m3, c3, cr1, r3, g2. It is not supported with a micro instance.

NEW QUESTION 7
A user has configured ELB with Auto Scaling. The user suspended the Auto Scaling terminate process only for a while. What will happen to the availability zone rebalancing process (AZRebalance. during this period?

  • A. Auto Scaling will not launch or terminate any instances
  • B. Auto Scaling will allow the instances to grow more than the maximum size
  • C. Auto Scaling will keep launching instances till the maximum instance size
  • D. It is not possible to suspend the terminate process while keeping the launch active

Answer: B

Explanation:
Auto Scaling performs various processes, such as Launch, Terminate, Availability Zone Rebalance (AZRebalance. etc. The AZRebalance process type seeks to maintain a balanced number of instances across Availability Zones within a region. If the user suspends the Terminate process, the AZRebalance process can cause the Auto Scaling group to grow up to ten percent larger than the maximum size. This is because Auto Scaling allows groups to temporarily grow larger than the maximum size during rebalancing activities. If Auto Scaling cannot terminate instances, the Auto Scaling group could remain up to ten percent larger than the maximum size until the user resumes the Terminate process type.

NEW QUESTION 8
Which of the below mentioned AWS RDS logs cannot be viewed from the console for MySQL?

  • A. Error Log
  • B. Slow Query Log
  • C. Transaction Log
  • D. General Log

Answer: C

Explanation:
The user can view, download, and watch the database logs using the Amazon RDS console, the Command Line Interface (CLI., or the Amazon RDS API. For the MySQL RDS, the user can view the error log, slow querylog, and general logs. RDS does not support viewing the transaction logs.

NEW QUESTION 9
An organization (Account ID 123412341234. has attached the below mentioned IAM policy
to a user. What does this policy statement entitle the user to perform?
"Statement": [
{
"Sid": "AllowUsersAllActionsForCredentials",
"Effect": "Allow",
"Action": [
"iam:*AccessKey*",
],
"Resource": ["arn:aws:iam:: 123412341234:user/${aws:username}"]
}
]

  • A. 0
  • B. 0
  • C. 0
  • D. 0

Answer: A

Explanation:
AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. If the organization (Account ID 123412341234. wants some of their users to manage keys (access and secret access keys. of all IAM users, the organization should set the below mentioned policy which entitles the IAM user to modify keys of all IAM users with CLI, SDK or API.
"Statement": [
{
"Sid": "AllowUsersAllActionsForCredentials",
"Effect": "Allow",
"Action": [
"iam:*AccessKey*",
],
"Resource": ["arn:aws:iam:: 123412341234:user/${aws:username}"]
}
]

NEW QUESTION 10
You have a proprietary data store on-premises that must be backed up daily by dumping the data store contents to a single compressed 50GB file and sending the file to AWS. Your SLAs state that any dump file backed up within the past 7 days can be retrieved within 2 hours. Your compliance department has stated that all data must be held indefinitely. The time required to restore the data store from a backup is approximately 1 hour. Your on-premise network connection is capable of sustaining 1gbps to AWS.
Which backup methods to AWS would be most cost-effective while still meeting all of your requirements?

  • A. Send the daily backup files to Glacier immediately after being generated
  • B. Transfer the daily backup files to an EBS volume in AWS and take daily snapshots of the volume
  • C. Transfer the daily backup files to S3 and use appropriate bucket lifecycle policies to send to Glacier
  • D. Host the backup files on a Storage Gateway with Gateway-Cached Volumes and take daily snapshots

Answer: D

Explanation: Reference:
http://aws.amazon.com/storagegateway/faqs/

NEW QUESTION 11
A user has configured an SSL listener at ELB as well as on the back-end instances. Which of the below
mentioned statements helps the user understand ELB traffic handling with respect to the SSL listener?

  • A. It is not possible to have the SSL listener both at ELB and back-end instances
  • B. ELB will modify headers to add requestor details
  • C. ELB will intercept the request to add the cookie details if sticky session is enabled
  • D. ELB will not modify the headers

Answer: D

Explanation:
When the user has configured Transmission Control Protocol (TCP. or Secure Sockets Layer (SSL. for both front-end and back-end connections of the Elastic Load Balancer, the load balancer forwards the request to the back-end instances without modifying the request headers unless the proxy header is enabled. SSL does not support sticky sessions. If the user has enabled a proxy protocol it adds the source and destination IP to the header.

NEW QUESTION 12
A user has created an application which will be hosted on EC2. The application makes calls to DynamoDB to fetch certain data. The application is using the DynamoDB SDK to connect with from the EC2 instance. Which of the below mentioned statements is true with respect to the best practice for security in this scenario?

  • A. The user should attach an IAM role with DynamoDB access to the EC2 instance
  • B. The user should create an IAM user with DynamoDB access and use its credentials within the application to connect with DynamoDB
  • C. The user should create an IAM role, which has EC2 access so that it will allow deploying the application
  • D. The user should create an IAM user with DynamoDB and EC2 acces
  • E. Attach the user with the application so that it does not use the root account credentials

Answer: A

Explanation:
With AWS IAM a user is creating an application which runs on an EC2 instance and makes requests to AWS, such as DynamoDB or S3 calls. Here it is recommended that the user should not create an IAM user and pass the user's credentials to the application or embed those credentials inside the application. Instead, the user should use roles for EC2 and give that role access to DynamoDB /S3. When the roles are attached to EC2, it will give temporary security credentials to the application hosted on that EC2, to connect with DynamoDB / S3.

NEW QUESTION 13
You have identified network throughput as a bottleneck on your m1.small EC2 instance when uploading data Into Amazon S3 In the same region.
How do you remedy this situation?

  • A. Add an additional ENI
  • B. Change to a larger Instance
  • C. Use DirectConnect between EC2 and S3
  • D. Use EBS PIOPS on the local volume

Answer: B

Explanation: Reference:
https://media.amazonwebservices.com/AWS_Amazon_EMR_Best_Practices.pdf

NEW QUESTION 14
An AWS account owner has setup multiple IAM users. One IAM user only has CloudWatch access. He has setup the alarm action which stops the EC2 instances when the CPU utilization is below the threshold limit. What will happen in this case?

  • A. It is not possible to stop the instance using the CloudWatch alarm
  • B. CloudWatch will stop the instance when the action is executed
  • C. The user cannot set an alarm on EC2 since he does not have the permission
  • D. The user can setup the action but it will not be executed if the user does not have EC2 rights

Answer: D

Explanation:
Amazon CloudWatch alarms watch a single metric over a time period that the user specifies and performs one or more actions based on the value of the metric relative to a given threshold over a number of time periods. The user can setup an action which stops the instances when their CPU utilization is below a certain threshold for a certain period of time. The EC2 action can either terminate or stop the instance as part of the EC2 action. If the IAM user has read/write permissions for Amazon CloudWatch but not for Amazon EC2, he can still create an alarm. However, the stop or terminate actions will not be performed on the Amazon EC2 instance.

NEW QUESTION 15
A user is trying to setup a recurring Auto Scaling process. The user has setup one process to scale up every day at 8 am and scale down at 7 PM. The user is trying to setup another recurring process which scales up on the 1st of every month at 8 AM and scales down the same day at 7 PM. What will Auto Scaling do in this scenario?

  • A. Auto Scaling will execute both processes but will add just one instance on the 1st
  • B. Auto Scaling will add two instances on the 1st of the month
  • C. Auto Scaling will schedule both the processes but execute only one process randomly
  • D. Auto Scaling will throw an error since there is a conflict in the schedule of two separate Auto Scaling Processes

Answer: D

Explanation:
Auto Scaling based on a schedule allows the user to scale the application in response to predictable load changes. The user can also configure the recurring schedule action which will follow the Linux cron format. As per Auto Scaling, a scheduled action must have a unique time value. If the user attempts to schedule an activity at a time when another existing activity is already scheduled, the call will be rejected with an error message noting the conflict.

NEW QUESTION 16
What would happen to an RDS (Relational Database Service) multi-Availability Zone deployment of the primary OB instance fails?

  • A. The IP of the primary DB instance is switched to the standby OB instance
  • B. The RDS (Relational Database Service) DB instance reboots
  • C. A new DB instance is created in the standby availability zone
  • D. The canonical name record (CNAME) is changed from primary to standby

Answer: D

NEW QUESTION 17
When you put objects in Amazon S3, what is the indication that an object was successfully stored?

  • A. Each S3 account has a special bucket named_s3_log
  • B. Success codes are written to this bucket with a timestamp and checksu
  • C. A success code is inserted into the S3 object metadat
  • D. A HTTP 200 result code and MD5 checksum, taken together, indicate that the operation was successfu
  • E. Amazon S3 is engineered for 99.999999999% durabilit
  • F. Therefore there is no need to confirm that data was inserte

Answer: B

Explanation: Reference:
http://docs.aws.amazon.com/AmazonS3/latest/API/RESTObjectPUT.html

NEW QUESTION 18
A user is planning to evaluate AWS for their internal use. The user does not want to incur any charge on his account during the evaluation. Which of the below mentioned AWS services would incur a charge if used?

  • A. AWS S3 with 1 GB of storage
  • B. AWS micro instance running 24 hours daily
  • C. AWS ELB running 24 hours a day
  • D. AWS PIOPS volume of 10 GB size

Answer: D

Explanation:
AWS is introducing a free usage tier for one year to help the new AWS customers get started in Cloud. The free tier can be used for anything that the user wants to run in the Cloud. AWS offers a handful of AWS services as a part of this which includes 750 hours of free micro instances and 750 hours of ELB. It includes the AWS S3 of 5 GB and AWS EBS general purpose volume upto 30 GB. PIOPS is not part of free usage tier.

P.S. 2passeasy now are offering 100% pass ensure AWS-SysOps dumps! All AWS-SysOps exam questions have been updated with correct answers: https://www.2passeasy.com/dumps/AWS-SysOps/ (324 New Questions)