Skip to main content

AWS

 

~ from Internet

 Practice Questions:

1. A company recently implemented hybrid cloud connectivity using AWS Direct Connect and is migrating data to Amazon S3. The company is looking for a fully managed solution that will automate and accelerate the replication of data between the on-premises storage systems and AWS storage services. Which solution should a solutions architect recommend to keep the data private? 

A. Deploy an AWS Storage Gateway volume gateway for the on-premises environment Configure it to store data 
locally, and asynchronously back up point-in-time snapshots to AWS. 
B. Deploy an AWS Storage Gateway file gateway for the on-premises environment. Configure it to store data 
locally, and asynchronously back up point-in-lime snapshots to AWS. 
C. Deploy an AWS DataSync agent tor the on-premises environment Configure a sync job to replicate the data.
and connect it with an AWS service endpoint. 
D. Deploy an AWS DataSync agent for the on-premises environment. Schedule a batch job to replicate point-In-time snapshots to AWS


Answer: C



2. Your website has been suffering performance issues, and you have been able to determine 
that this is due to a spike in traffic to your servers. The servers are behind an ELB and the 
CPU on both Amazon EC2 instances hovers around 95% during this time frame. Your 
boss has asked you to find a way improve performance without impacting cost any more 
than is absolutely necessary, What should you do? 
A. Create an EC2 Auto Scaling group and have Amazon CloudTrail trigger an autoscale 
event to scale up when the CPU teaches 80% and seale down when the CPU drops to 
40%. 
B. Creare an EC2 Auto Scaling group and have Amazon Cloud Watch trigger an 
autoscale event to scale up when the CPU reaches 80% and scale down when the CPU 
drops to 40%, 
C. Create an EC2 Auto Scaling group and have Amazon Cloud Watch trigger an 
autoscale event to scale up when the CPU reaches 95% and scale down when the CPU 
drops to 40%, 
D. Create an EC2 Auto Scaling group and have Amazon Cloud Watch trigger an 
auroscale event to scale up when the CPU reaches 80% and scale down when the CPU 
drops to 75%,


Answer: B



3. A Developer wants to debug an application by searching and filtering log data. The application logs are stored in Amazon CloudWatch Logs. The Developer creates a new metric filter to count exceptions in the application logs. However, no results are returned from the logs. 
What is the reason that no filtered results are being returned? 

A. A setup of the Amazon CloudWatch interface VPC endpoint is required for filtering the 
CloudWatch Logs in the VPC 
B. CloudWatch Logs only publishes metric data for events that happen after the filter is created 
C. The log group for CloudWatch Logs should be first streamed to Amazon Elasticsearch Service 
before metric filtering returns the results 
D. Metric data points for logs groups can be filtered only after they are exported to an Amazon 
S3 bucket


Answer: B



4. When a developer calls the Amazon CloudWatch API, he receives HTTP 400: ThrottlingException errors 
sporadically. When a call is not successful, no data is obtained. 
Which best practice should be implemented first in order to remedy this issue? 
A. Contact AWS Support for a limit increase. 
B. Use the AWS CLI to get the metrics 
C. Analyze the applications and remove the API call 
D. Retry the call with exponential backoff 


Answer: B



5. Your company has a set of resources hosted on the AWS(Amazon Web Service) Cloud. As a part of the new governing model, there is a requirement that all activity on AWS(Amazon Web Service) resources should be monitored. What is the most efficient way to have this implemented? 
Options are: 
A. Use VPC Flow Logs to monitor all activity in your VPC. 
B. Use AWS(Amazon Web Service) Trusted Advisor to monitor all of your AWS(Amazon Web Service) resources. 
C. Use AWS(Amazon Web Service) Inspector to inspect all of the resources in your account. 
D. Use AWS(Amazon Web Service) CloudTrail to monitor all API activity. 


Answer: D



6. A data-processing application runs on an i3 large EC2 instance with a single 100 GB EBS gp2 volume. The application stores temporary data in a small database (less than 30 GB) located on the EBS root volume. The application is struggling to process the data fast enough, and a Solutions Architect has determined that the I/O speed of the temporary database is the bottleneck. 
What is the MOST cost-efficient way to improve the database response times? 
A. Enable EBS optimization on the instance and keep the temporary files on the existing volume. 
B. Move the temporary database onto instance storage. 
C. Put the temporary database on a new 50-GB EBS io1 volume with a 3-K lOPS provision. 
D. Put the temporary database on a new 50-GB EBS gp2 volume. 


Answer: B



* 7. A media company asked a Solutions Architect to design a highly available storage solution to serve as a centralized document store for their Amazon EC2 instances. The storage solution needs to be POSIX-compliant, scale dynamically, and be able to serve up to 100 concurrent EC2 instances. 
Which solution meets these requirements? 
A. Create an Amazon S3 bucket and store all of the documents in this bucket. 
B. Create an Amazon EBS volume and allow multiple users to mount that volume to their EC2 
instance(s). 
C. Use Amazon Glacier to store all of the documents. 
D. Create an Amazon Elastic File System (Amazon EFS) to store and share the documents.


Answer: D



8. A company has 500 TB of data in an on-premises file share that needs to be moved to Amazon S3 Glacier. The migration must not saturate the company’s low-bandwidth internet connection, and the company must complete it within a few weeks. What is the MOST cost-effective solution? 
A. Upload the files to Amazon S3 Glacier using the available bandwidth. 
B. Use AWS Global Accelerator to accelerate upload and optimize usage of the available bandwidth. 
C. Order 7 AWS Snowball appliances and select an S3 Glacier vault as the destination.  
D. Order 7 AWS Snowball appliances and select an Amazon S3 bucket as the destination. Create a lifecycle policy to transition the S3 objects to Amazon S3 Glacier


Answer: D



9. A Solutions Architect is designing a stateful web application that will run for one year (24/7) and then be decommissioned. Load on this platform will be constant, using a number of r4.8 x large instances. Key drivers for this system include high availability, but elasticity is not required. 
What is the MOST cost-effective way to purchase compute for this platform? Scheduled Reserved A. Instances 
B. Convertible Reserved Instances 
C. Standard Reserved Instances 
D. Spot Instances


Answer: C



10. A web application requires a minimum of six Amazon Elastic Compute Cloud (EC2) instances running at all times. You are tasked to deploy the application to three availability zones in the EU Ireland region (eu-west-la, eu-west-Ib, and eu-west-Ic). It is required that the system is fault tolerant up to the loss of one Availability Zone. 
Which of the following setup is the most cost-effective solution which also maintains the fault-tolerance of your system? 
A. 6 instances in eu-west-la, 6 instances in eu-west-lb, and 6 instances in eu-west-Ic 
B. 3 instances in eu-west-la, 3 instances in eu-west-lb, and 3 instances in eu-west-lc 
C. 6 instances in eu-west-la, 6 instances in eu-west-lb, and no instances in eu-west-lc 
D. 2 instances in eu-west-la, 2 instances in eu-west-lb, and 2 instances in eu-west-lc


Answer: B



11. On Amazon EC2, a business hosts an ecommerce application. The application is composed of a stateless web layer that needs a minimum of 10 instances and a maximum of 250 instances to run. 80% of the time, the program needs 50 instances. 
Which solution should be adopted in order to keep expenses down? 
A. Purchase Reserved Instances to cover 250 instances. 
B. Purchase Reserved Instances to cover 80 instances. Use Spot Instances to cover the remaining  instances. 
C. Purchase On-Demand Instances to cover 40 instances. Use Spot Instances to cover the remaining instances. 
D. Purchase Reserved Instances to cover 50 instances. Use On-Demand and Spot Instances to cover the remaining instance. 


Answer: D



12. A solutions architect is designing a two-tier web application The application consists of a public-facing web tier hosted on Amazon EC2 in public subnets The database tier consists of Microsoft SQL Server running on Amazon EC2 in a private subnet Security is a high priority for the company How should security groups be configured in this situation? (Select TWO ) 
A. Configure the security group for the database tier to allow inbound traffic on ports 443 and 1433 from the security group for the web tier 
B. Configure the security group for the web tier to allow inbound traffic on port 443 from 0 0 0 0/0 
C. Configure the security group for the database tier to allow inbound traffic on port 1433 from the security group for the web tier 
D. Configure the security group for the web tier to allow outbound traffic on port 443 from 00 0 0/0 
E. Configure the security group for the database tier to allow outbound traffic on ports 443 and 1433 to the security group for the web tier 



Answer: B & C



* 13. A company developed a set of APIs that are being served through the Amazon API Gateway. The API calls need to be authenticated based on OpenID identity providers such as Amazon or Facebook. The APIs should allow access based on a custom authorization model. 
Which is the simplest and MOST secure design to use to build an authentication and authorization model for the APIs? 
 A. Use Amazon Cognito user pools and a custom authorizer to authenticate and authorize users based 
on JSON Web Tokens. 
B. Build a OpenID token broker with Amazon and Facebook. Users will authenticate with these identify providers and pass the JSON Web Token to the API to authenticate each API call. 
C. Store user credentials in Amazon DynamoDB and have the application retrieve temporary credentials from AWS STS. Make API calls by passing user credentials to the APIs for authentication and authorization. 
D. Use Amazon RDS to store user credentials and pass them to the APIs for authentications and 
authorization. 


Answer: A



* 14. When an enterprise migrates an application to the cloud as is, without making any modifications, what is this called? 
Answer Choices 
A. Rehost 
B. Refactor 
C. Rearchitect 
D. Remove

Answer: A



15. A solutions architect is designing a high performance computing (HPC) workload on Amazon EC2. The EC2 instances need to communicate to each other frequently and require network performance with low latency and high throughput. Which EC2 configuration meets these requirements'? 
A. Launch the EC2 instances in a cluster placement group in one Availability Zone 
B. Launch the EC2 instances in a spread placement group in one Availability Zone 
C. Launch the EC2 instances in an Auto Scaling group in two Regions and peer the VPCs 
D. Launch the EC2 instances in an Auto Scaling group spanning multiple Availability Zones 


Answer: A



* 16. A company's legacy application is currently relying on a single-instance Amazon RDS MySQL database without encryption. Due to new compliance requirements, all existing and new data in this database must be encrypted How should this be accomplished? 
A. Take a snapshot of the RDS instance Create an encrypted copy of the snapshot Restore the RDS instance from the encrypted snapshot 
B. Enable RDS Multi-AZ mode with encryption at rest enabled Perform a failover to the standby instance to delete the original instance 
C. Create an RDS read replica with encryption at rest enabled Promote the read replica to master and switch the application over to the new master Delete the old RDS instance. 
D. Create an Amazon S3 bucket with server-side encryption enabled Move all the data to Amazon S3 Delete the RDS instance 


Answer: A




17. A company needs to ingest terabytes of data each hour from thousands of sources  that are delivered almost continually throughout the day. The volume of messages generated varies over the course of the day. Messages must be delivered in real time for fraud detection and live operational dashboards. Which approach will meet these requirements? 
A. Send the messages to an Amazon SQS queue, then process the messages by using a fleet of 
Amazon EC2 instances 
B. Use the Amazon S3 API to write messages to an S3 bucket, then process the messages by 
using Amazon Redshift 
C. Use AWS Data Pipeline to automate the movement and transformation of data 
D. Use Amazon Kinesis Data Streams with Kinesis Client Library to ingest and deliver messages 


Answer: D



18. A company is planning to migrate a business-critical dataset to Amazon S3. The current solution design uses a single S3 bucket in the us-east-1. Region with versioning enabled to store the dataset. The company's disaster recovery policy states that all data multiple AWS Regions. 
How should a solutions architect design the S3 solution? 
A. Create an additional S3 bucket in another Region and configure cross-Region replication. 
B. Create an additional S3 bucket with versioning in another Region and configure cross-Region replication. 
C. Create an additional S3 bucket with versioning in another Region and configure cross-origin resource (CORS). 
D. Create an additional S3 bucket in another Region and configure cross-origin resource sharing (CORS).


Answer: 

Comments

Popular posts from this blog

Classes and Objects | Accenture TFA

  Question  1 Correct Mark 1.00 out of 1.00 Flag question Question text ___ and _____ are the access specifiers that can be applied to top level Class. Select one or more: public   protected default   private Feedback Your answer is correct. The correct answers are: default, public Question  2 Correct Mark 1.00 out of 1.00 Flag question Question text class Sample{      private double num = 100;    private int square(int a){ return a*a;    } }   public class Test{    public static void main(String args[]){   Sample obj = new Sample();   System.out.println(obj.num);  System.out.println(obj.square(10));    }   } Select one: Compile time error   Run time error Executes but no output 100 Feedback Your answer is correct. The correct answer is: Compile time error Question  3 Correct Mark 1.00 out of 1.00 Flag question Question text Choose the appropriate access specifier for the attribute value so that it can be accessed from anywhere. class Test { Choose... private protected public d

Classes and Objects, Packages | Accenture TFA

  Question  1 Correct Mark 1.00 out of 1.00 Flag question Question text State True or False When using eclipse whichever classes are needed for the present class can be imported automatically. Select one: True   False Feedback The correct answer is 'True'. Question  2 Correct Mark 1.00 out of 1.00 Flag question Question text switch(a) {     default:         System.out.println("Welcome"); } Of which data types can the variable ‘a’ be? 1. long 2. byte 3. int 4. char 5. float 6. short Select one: 3, 4 and 5 1 and 3 3 and 4 2,3, 4 and 6   Feedback Your answer is correct. The variable used in a switch statement can be a byte, short, int, char or String type only. The correct answer is:  2,3, 4 and 6 Question  3 Correct Mark 1.00 out of 1.00 Flag question Question text Predict the output.   public class Test {         public static void main(String args[])         {                     int a = 2, b = 0;              for ( ; b < 20; ++b) {                  if (b % a == 0)

Minimum Lights to Activate | Interview

Problem: Description There is a corridor in a Jail which is N units long. Given an array A of size N . The i th index of this array is 0 if the light at i th position is faulty otherwise it is 1. All the lights are of specific power B which if is placed at position X , it can light the corridor from [ X-B+1, X+B-1] . Initially all lights are off. Return the minimum number of lights to be turned ON to light the whole corridor or -1 if the whole corridor cannot be lighted. Problem Constraints 1 <= N <= 1000 1 <= B <= 1000 Input Format First argument is an integer array A where A[i] is either 0 or 1. Second argument is an integer B. Output Format Return the minimum number of lights to be turned ON to light the whole corridor or -1 if the whole corridor cannot be lighted. Example Input Input 1: A = [ 0, 0, 1, 1, 1, 0, 0, 1]. B = 3 Input 2: A = [ 0, 0, 0, 1, 0]. B = 3 Example Output Output 1: 2 Output 2: -1 Example Explanation Explanation 1: In the first configuration,