AWS Solution Architect Associate Practice Questions, Part-1

AWS Solution Architect Associate Practice Questions, Part-1

·

10 min read

  1. True/false: The Developer Support plan provides access to a support application programming interface (API).

    A. True B. False

    The Business plan offers access to a support API, but the Developer plan does not.

  2. True/false: AWS is responsible for managing the network configuration of your EC2 instances.

    A. True B. False

    Customers are responsible for managing the network configuration of EC2 instances. AWS is responsible for the physical network infrastructure.

  3. Which of the following services is most useful for decoupling the components of a monolithic application?

    A. SNS

    B. KMS

    C. SQS

    D. Glacier

    Simple Queue Service (SQS) allows for event-driven messaging within distributed systems that can decouple while coordinating the discrete steps of a larger process.

  4. An application you want to run on EC2 requires you to license it based on the number of physical CPU sockets and cores on the hardware you plan to run the application on. Which of the following tenancy models should you specify?

    A. Dedicated host

    B. Dedicated instance

    C. Shared tenancy

    D. Bring your own license

    The dedicated host option lets you see the number of physical CPU sockets and cores on a host.

  5. True/false: Changing the instance type of an EC2 instance will change its elastic IP address.

    A. True B. False

    An elastic IP address will not change. A public IP address attached to an instance will change if the instance is stopped, as would happen when changing the instance type.

  6. True/false: You can use a Quick Start Amazon Machine Image (AMI) to create any instance type.

    A. True B. False

    A Quick Start AMI is independent of the instance type

  7. Which S3 encryption option does not require AWS persistently storing the encryption keys it uses to decrypt data?

    A. Client-side encryption

    B. SSE-KMS

    C. SSE-S3

    D. SSE-C

    With SSE-C you provide your own keys for Amazon to use to decrypt and encrypt your data. AWS doesn’t persistently store the keys.

  8. True/false: Durability measures the percentage of likelihood that a given object will not be inadvertently lost by AWS over the course of a year.

    A. True B. False

    Durability corresponds to an average annual expected loss of objects stored on S3, not including objects you delete. Availability measures the amount of time S3 will be available to let you retrieve those objects

  9. True/false: After uploading a new object to S3, there will be a slight delay (one to two seconds) before the object is available.

    A. True B. False

    S3 uses a read-after-write consistency model for new objects, so once you upload an object to S3, it’s immediately available.

  10. You created a Virtual Private Cloud (VPC) using the Classless Inter-Domain Routing (CIDR) block 10.0.0.0/24. You need to connect to this VPC from your internal network, but the IP addresses in use on your internal network overlap with the CIDR. Which of the following is a valid way to address this problem?

    A. Remove the CIDR and use IPv6 instead.

    B. Change the VPC’s CIDR.

    C. Create a new VPC with a different CIDR.

    D. Create a secondary CIDR for the VPC.

    You can’t change the primary CIDR for a VPC, so you must create a new one to connect it to your internal network

  11. True/false: An EC2 instance must be in a public subnet to access the internet.

    A. True B. False

    An EC2 instance can access the Internet from a private subnet provided it uses a NAT gateway or NAT instance.

  12. True/false: The route table for a public subnet must have a default route pointing to an Internet gateway as a target.

    A. True B. False

    The definition of a public subnet is a subnet that has a default route pointing to an Internet gateway as a target. Otherwise, it’s a private subnet.

  13. Which of the following use cases is well suited for DynamoDB?

    A. Running a MongoDB database on AWS

    B. Storing large binary files exceeding 1 GB in size

    C. Storing JSON documents that have a consistent structure

    D. Storing image assets for a website

    DynamoDB is a key-value store that can be used to store items up to 400 KB in size.

  14. True/false: You can create a DynamoDB global secondary index for an existing table at any time.

    A. True B. False

    You can create a global secondary index for an existing table at any time. You can create a local secondary index only when you create the table.

  15. True/false: Enabling point-in-time RDS snapshots is sufficient to give you a recovery point objective (RPO) of less than 10 minutes.

    A. True B. False

    Enabling point-in-time recovery gives you an RPO of about five minutes. The recovery time objective (RTO) depends on the amount of data to restore.

  16. Which of the following steps does the most to protect your AWS account? A. Deleting unused Identity and Access Management (IAM) policies

    B. Revoking unnecessary access for IAM users

    C. Rotating root access keys

    D. Restricting access to S3 buckets

    E. Rotating Secure Shell (SSH) key pairs

    Revoking unnecessary access for IAM users is the most effective of the listed measures for protecting your AWS account.

  17. Which of the following can be used to encrypt the operating system of an EC2 instance?

    A. AWS Secrets Manager

    B. CloudHSM

    C. AWS Key Management Service (KMS)

    D. AWS Security Token Service (STS)

    KMS can be used to encrypt Elastic Block Store (EBS) volumes that store an instance’s operating system.

  18. What is a difference between a token generated by the AWS Security Token Service (STS) and an IAM access key?

    A. The token generated by STS can’t be used by an IAM principal.

    B. An IAM access key is unique.

    C. The token generated by STS can be used only once.

    D. The token generated by STS expires.

    STS tokens expire while IAM access keys do not. An STS token can be used more than once. IAM access keys and STS tokens are both unique. An IAM principal can use an STS token

  19. True/false: EC2 sends instance memory utilization metrics to CloudWatch every five minutes.

    A. True B. False

    EC2 doesn’t track instance memory utilization

  20. You configured a CloudWatch alarm to monitor CPU utilization for an EC2 instance. The alarm began in the INSUFFICIENT_DATA state and then entered the ALARM state. What can you conclude from this?

    A. The instance recently rebooted.

    B. CPU utilization is too high.

    C. The CPU utilization metric crossed the alarm threshold.

    D. The instance is stopped.

    EC2 doesn’t track instance memory utilizationThe transition to the ALARM state simply implies that the metric crossed a threshold but doesn’t tell you what the threshold is. Newly created alarms start out in the INSUFFICIENT_DATA

  21. Where do AWS Config and CloudTrail store their logs?

    A. S3 buckets

    B. CloudWatch Logs

    C. CloudTrail Events

    D. DynamoDB

    E. Amazon Athena

    Both store their logs in S3 buckets

  22. True/false: An EC2 instance in a private subnet can resolve an “A” resource record for a public hosted zone hosted in Route 53.

    A. True B. False

    An EC2 instance in a private subnet still has access to Amazon’s private DNS servers, which can resolve records stored in public hosted zones.

  23. You want to use Route 53 to send users to the application load balancer closest to them. Which of the following routing policies lets you do this with the least effort?

    A. Latency routing

    B. Geolocation routing

    C. Geoproximity routing

    D. Edge routing

    Geoproximity routing routes users to the location closest to them. Geolocation routing requires you to create records for specific locations or create a default record.

  24. True/false: You can use an existing domain name with Route 53 without switching its registration to AWS.

    A. True B. False

    Route 53 is a true DNS service in that it can host zones for any domain name. You can also register domain names with or transfer them to Route 53.

  25. You’re designing an application that takes multiple image files and combines them into a video file that users on the Internet can download. Which of the following can help you quickly implement your application in the fastest, most highly available, and most costeffective manner?

    A. EC2 spot fleet

    B. Lambda

    C. Relational Database Service (RDS)

    D. Auto Scaling

    Lambda is a highly available, reliable, “serverless” compute platform that runs functions as needed and scales elastically to meet demand. EC2 spot instances can be shut down on short notice

  26. You’re using EC2 Auto Scaling and want to implement a scaling policy that adds one extra instance only when the average CPU utilization of each instance exceeds 90 percent. However, you don’t want it to add more than one instance every five minutes. Which of the following scaling policies should you use?

    A. Simple

    B. Step

    C. Target tracking

    D. PercentChangeInCapacity

    A simple scaling policy changes the group size and then has a cooldown period before doing so again. Step scaling policies don’t have cooldown periods. Target tracking policies attempt to keep a metric at a set value. PercentChangeInCapacity is a simple scaling adjustment type, not a scaling policy

  27. True/false: EC2 Auto Scaling automatically replaces group instances directly terminated by the root user.

    A. True B. False

    Auto Scaling always attempts to maintain the minimum group size or, if set, the desired capacity.

  28. Which ElastiCache engine can persistently store data?

    A. MySQL

    B. Memcached

    C. MongoDB

    D. Redis

    ElastiCache supports Memcached and Redis, but only the latter can store data persistently

  29. Which of the following is not an AWS service?

    A. CloudFormation

    B. Puppet

    C. OpsWorks

    D. Snowball

    Puppet is a configuration management platform that AWS offers via OpsWorks but is not itself an AWS service.

  30. True/false: S3 cross-region replication uses transfer acceleration.

    A. True B. False

    S3 cross-region replication transfers objects between different buckets. Transfer acceleration uses a CloudFront edge location to speed up transfers between S3 and the Internet

  31. Which of the following services can you deactivate on your account?

    A. Security Token Service (STS)

    B. CloudWatch

    C. Virtual Private Cloud (VPC)

    D. Lambda

    You can deactivate STS for all regions except US East.

  32. Which of the following services can alert you to malware on an EC2 instance?

    A. AWS GuardDuty

    B. AWS Inspector

    C. AWS Shield

    D. AWS Web Application Firewall

    GuardDuty looks for potentially malicious activity. Inspector looks for vulnerabilities that may result in compromise. Shield and Web Application Firewall protect applications from attack

  33. True/false: If versioning is enabled on an S3 bucket, applying encryption to an unencrypted object in that bucket will create a new, encrypted version of that object.

    A. True B. False

    Applying encryption to an unencrypted object will create a new, encrypted version of that object. Previous versions remain unencrypted.

  34. Which instance type will, if left running, continue to incur costs?

    A. Spot

    B. Standard reserved

    C. On-demand

    D. Convertible reserved

    On-demand instances will continue to run and incur costs. Reserved instances cost the same whether they’re running or stopped. Spot instances will be terminated when the spot price exceeds your bid price.

  35. True/false: The EBS Lifecycle Manager can take snapshots of volumes that were once attached to terminated instances.

    A. True B. False

    The EBS Lifecycle Manager can take scheduled snapshots of any EBS volume, regardless of attachment state

  36. Which of the following lets you spin up new web servers the quickest?

    A. Lambda

    B. Auto Scaling

    C. Elastic Container Service

    D. CloudFront

    Elastic Container Service lets you run containers that can launch in a matter of seconds. EC2 instances take longer. Lambda is “serverless,” so you can’t use it to run a web server. CloudFront provides caching but isn’t a web server

  37. True/false: CloudFormation stack names are case-sensitive.

    A. True B. False

    Almost everything in CloudFormation is case sensitive.

  38. Where might CodeDeploy look for the appspec.yml file? (Choose two.)

    A. GitHub

    B. CodeCommit

    C. S3

    D. CloudFormation

    A, C. CodeDeploy looks for the appspec.yml file with the application files it is to deploy, which can be stored in S3 or on GitHub.

  39. True/false: You can use either CodeDeploy or an AWS Systems Manager command document to deploy a Lambda application.

    A. True B. False

    You can use CodeDeploy to deploy an application to Lambda or EC2 instances. But an AWS Systems Manager command document works only on EC2 instances.

    (Answers are Verified)

Thank you!

Checkout my Medium Blog

medium.com/@inchararlingappa

Linkedin

linkedin.com/in/inchara-r-2b2a76213

Instagram

instagram.com/inchara_ramalingappa

YouTube

youtube.com/@DevOpswithIncharaRamalingappa