AWS Certified Solutions Architect - Associate SAA-C03 證照考古題

閱讀時間約 104 分鐘

AWS 架構師證照考古題大全20241023

Amazon Web Service(AWS 亞馬遜)全系列考古題,2024年最新題庫,持續更新,全網最完整。AWS 證照含金量高,自我進修、跨足雲端產業必備近期版本更新,隨時追蹤最新趨勢變化。

QUESTION 561

A company is expecting rapid growth in the near future. A solutions architect needs to configure existing users and grant permissions to new users on AWS. The solutions architect has decided to create IAM


groups. The solutions architect will add the new users to IAM groups based on department. Which additional action is the MOST secure way to grant permissions to the new users?

A.       Apply service control policies (SCPs) to manage access permissions

B.       Create IAM roles that have least privilege permission. Attach the roles to the IAM groups

C.      Create an IAM policy that grants least privilege permission. Attach the policy to the IAM groups

D.      Create IAM roles. Associate the roles with a permissions boundary that defines the maximum permissions

 

Correct Answer: C

Section: (none)

QUESTION 562

A group requires permissions to list an Amazon S3 bucket and delete objects from that bucket. An administrator has created thefollowing IAM policy to provide access to the bucket and applied that policy to the group. The group is not able to delete objects inthe bucket. The company follows least-privilege access rules.

raw-image

Which statement should a solutions architect add to the policy to correct bucket access? 

A

raw-image

B

raw-image

C

raw-image

D

raw-image

A.       OPTION A

B.       OPTION B

C.      OPTION C

D.      OPTION D

 

Correct Answer: D

Section: (none)

QUESTION 563

A law firm needs to share information with the public. The information includes hundreds of files that must be publicly readable.Modifications or deletions of the files by anyone before a designated future date are prohibited.

Which solution will meet these requirements in the MOST secure way?


A.       Upload all files to an Amazon S3 bucket that is configured for static website hosting. Grant read-only IAM permissions to any AWS principals that access the S3 bucket until the designated date.

B.       Create a new Amazon S3 bucket with S3 Versioning enabled. Use S3 Object Lock with a retention period in accordancewith the designated date. Configure the S3 bucket for static website hosting. Set an S3 bucket policy to allow read-only access to the objects.

C.      Create a new Amazon S3 bucket with S3 Versioning enabled. Configure an event trigger to run an AWS Lambda function incase of object modification or deletion. Configure the Lambda function to replace the objects with the original versions from a private S3 bucket.

D.      Upload all files to an Amazon S3 bucket that is configured for static website hosting. Select the folder that contains thefiles. Use S3 Object Lock with a retention period in accordance with the designated date. Grant read-only IAM permissions to any AWS principals that access the S3 bucket.

 

Correct Answer: B

Section: (none)

QUESTION 564

A company is making a prototype of the infrastructure for its new website by manually provisioning the necessary infrastructure. This infrastructure includes an Auto Scaling group, an Application Load Balancer and an Amazon RDS database. After the configuration has been thoroughly validated, the company wants the capability to immediately deploy the infrastructure fordevelopment and production use in two Availability Zones in an automated fashion.

What should a solutions architect recommend to meet these requirements?

 

A.       Use AWS Systems Manager to replicate and provision the prototype infrastructure in two Availability Zones

B.       Define the infrastructure as a template by using the prototype infrastructure as a guide. Deploy the infrastructure with AWS CloudFormation.

C.      Use AWS Config to record the inventory of resources that are used in the prototype infrastructure. Use AWS Config to deploy the prototype infrastructure into two Availability Zones.

D.      Use AWS Elastic Beanstalk and configure it to use an automated reference to the prototype infrastructure to automatically deploy new environments in two Availability Zones.

 

Correct Answer: B

Section: (none)

QUESTION 565

A business application is hosted on Amazon EC2 and uses Amazon S3 for encrypted object storage. The chief information security officer has directed that no application traffic between the two services should traverse the public internet.

Which capability should the solutions architect use to meet the compliance requirements?

 

A.       AWS Key Management Service (AWS KMS)

B.       VPC endpoint

C.      Private subnet

D.      Virtual private gateway

 

Correct Answer: B

Section: (none)


解決您雲端架設的所有疑難雜症,點擊這裡 了解小豬科技如何幫助您!


QUESTION 566

A company hosts a three-tier web application in the AWS Cloud. A Multi-AZAmazon RDS for MySQL server forms the database layer Amazon ElastiCache forms the cache layer. The company wants a caching strategy that adds or updates data in the cachewhen a customer adds an item to the database. The data in the cache must always match the data in the database.

Which solution will meet these requirements?

 

A.       Implement the lazy loading caching strategy

B.       Implement the write-through caching strategy


C.      Implement the adding TTL caching strategy

D.      Implement the AWS AppConfig caching strategy

 

Correct Answer: B

Section: (none)

QUESTION 567

A company wants to migrate 100 GB of historical data from an on-premises location to an Amazon S3 bucket. The company has a 100 megabits per second (Mbps) internet connection on premises. The company needs to encrypt the data in transit tothe S3 bucket. The company will store new data directly in Amazon S3.

Which solution will meet these requirements with the LEAST operational overhead?

 

A.       Use the s3 sync command in the AWS CLI to move the data directly to an S3 bucket

B.       Use AWS DataSync to migrate the data from the on-premises location to an S3 bucket

C.      Use AWS Snowball to move the data to an S3 bucket

D.      Set up an IPsec VPN from the on-premises location to AWS. Use the s3 cp command in the AWS CLI to move the data directly to an S3 bucket

 

Correct Answer: B

Section: (none)

QUESTION 568

A company wants to move from many standalone AWS accounts to a consolidated, multi-account architecture. The company plans to create many new AWS accounts for different business units. The company needs to authenticate access to these AWSaccounts by using a centralized corporate directory service.

Which combination of actions should a solutions architect recommend to meet these requirements? (Choose two.)

 

A.       Create a new organization in AWS Organizations with all features turned on. Create the new AWS accounts in the organization.

B.       Set up an Amazon Cognito identity pool. Configure AWS IAM Identity Center (AWS Single Sign-On) to accept Amazon Cognito authentication.

C.      Configure a service control policy (SCP) to manage the AWS accounts. Add AWS IAM Identity Center (AWS Single Sign-On) to AWS Directory Service.

D.      Create a new organization in AWS Organizations. Configure the organization's authentication mechanism to use AWS Directory Service directly.

E.       Set up AWS IAM Identity Center (AWS Single Sign-On) in the organization. Configure IAM Identity Center, and integrate it with the company's corporate directory service.

 

Correct Answer: AE

Section: (none)

QUESTION 569

A company is looking for a solution that can store video archives in AWS from old news footage. The company needs tominimize costs and will rarely need to restore these files. When the files are needed, they must be available in a maximum of five minutes.

What is the MOST cost-effective solution?

 

A.       Store the video archives in Amazon S3 Glacier and use Expedited retrievals.

B.       Store the video archives in Amazon S3 Glacier and use Standard retrievals.

C.      Store the video archives in Amazon S3 Standard-Infrequent Access (S3 Standard-IA).

D.      Store the video archives in Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA).

 

Correct Answer: C

Section: (none)


QUESTION 570

A company is building a three-tier application on AWS. The presentation tier will serve a static website The logic tier is a containerized application. This application will store data in a relational database. The company wants to simplify deployment and to reduce operational costs.

Which solution will meet these requirements?

 

A.       Use Amazon S3 to host static content. Use Amazon Elastic Container Service (Amazon ECS) with AWS Fargate for compute power. Use a managed Amazon RDS cluster for the database.

B.       Use Amazon CloudFront to host static content. Use Amazon Elastic Container Service (Amazon ECS) with Amazon EC2 for compute power. Use a managed Amazon RDS cluster for the database.

C.      Use Amazon S3 to host static content. Use Amazon Elastic Kubernetes Service (Amazon EKS) with AWS Fargate for compute power. Use a managed Amazon RDS cluster for the database.

D.      Use Amazon EC2 Reserved Instances to host static content. Use Amazon Elastic Kubernetes Service (Amazon EKS) with Amazon EC2 for compute power. Use a managed Amazon RDS cluster for the database.

 

Correct Answer: A

Section: (none)


不再等待,立即註冊,享受雲端無限可能!


QUESTION 571

A company seeks a storage solution for its application. The solution must be highly available and scalable. The solution also must function as a file system be mountable by multiple Linux instances in AWS and on premises through native protocols, and have no minimum size requirements. The company has set up a Site-to-Site VPN for access from its on-premises network to its VPC.

Which storage solution meets these requirements?

 

A.       Amazon FSx Multi-AZ deployments

B.       Amazon Elastic Block Store (Amazon EBS) Multi-Attach volumes

C.      Amazon Elastic File System (Amazon EFS) with multiple mount targets

D.      Amazon Elastic File System (Amazon EFS) with a single mount target and multiple access points

 

Correct Answer: C

Section: (none)

QUESTION 572

A 4-year-old media company is using the AWS Organizations all features feature set to organize its AWS accounts. Accordingto the company's finance team, the billing information on the member accounts must not be accessible to anyone, including the root user of the member accounts.

Which solution will meet these requirements?

 

A.       Add all finance team users to an IAM group. Attach an AWS managed policy named Billing to the group.

B.       Attach an identity-based policy to deny access to the billing information to all users, including the root user.

C.      Create a service control policy (SCP) to deny access to the billing information. Attach the SCP to the root organizational unit (OU).

D.      Convert from the Organizations all features feature set to the Organizations consolidated billing feature set.

 

Correct Answer: C

Section: (none)

QUESTION 573

An ecommerce company runs an application in the AWS Cloud that is integrated with an on-premises warehouse solution. Thecompany uses Amazon Simple Notification Service (Amazon SNS) to send order messages to an on-premises HTTPS endpointso the warehouse application can process the orders. The local data center team has detected that some of the order messages were not received.


A solutions architect needs to retain messages that are not delivered and analyze the messages for up to 14 days.

Which solution will meet these requirements with the LEAST development effort?

 

A.       Configure an Amazon SNS dead letter queue that has an Amazon Kinesis Data Stream target with a retention period of 14 days.

B.       Add an Amazon Simple Queue Service (Amazon SQS) queue with a retention period of 14 days between the application and Amazon SNS.

C.      Configure an Amazon SNS dead letter queue that has an Amazon Simple Queue Service (Amazon SQS) target with a retention period of 14 days.

D.      Configure an Amazon SNS dead letter queue that has an Amazon DynamoDB target with a TTL attribute set for a retention period of 14 days.

 

Correct Answer: C

Section: (none)

QUESTION 574

A company has multiple AWS accounts for development work. Some staff consistently use oversized Amazon EC2instances, which causes the company to exceed the yearly budget for the development accounts. The company wants to centrally restrict the creation of AWS resources in these accounts.

Which solution will meet these requirements with the LEAST development effort?

 

A.       Develop AWS Systems Manager templates that use an approved EC2 creation process. Use the approved Systems Manager templates to provision EC2 instances.

B.       Use AWS Organizations to organize the accounts into organizational units (OUs). Define and attach a service control policy (SCP) to control the usage of EC2 instance types.

C.      Configure an Amazon EventBridge rule that invokes an AWS Lambda function when an EC2 instance is created. Stop disallowed EC2 instance types.

D.      Set up AWS Service Catalog products for the staff to create the allowed EC2 instance types. Ensure that staff can deploy EC2 instances only by using the Service Catalog products.

 

Correct Answer: B

Section: (none)

QUESTION 575

A company uses Amazon EC2 instances to host its internal systems. As part of a deployment operation, an administrator tries touse the AWS CLI to terminate an EC2 instance. However, the administrator receives a 403 (Access Denied) error message.

The administrator is using an IAM role that has the following IAM policy attached: What is the cause of the unsuccessful request?

A.       The EC2 instance has a resource-based policy with a Deny statement.

B.       The principal has not been specified in the policy statement.

C.      The "Action" field does not grant the actions that are required to terminate the EC2 instance.

D.      The request to terminate the EC2 instance does not originate from the CIDR blocks 192.0.2.0/24 or 203.0.113.0/24.

 

Correct Answer: D

Section: (none)


小豬科技全方位支持,聯絡專員


QUESTION 576

A company is conducting an internal audit. The company wants to ensure that the data in an Amazon S3 bucket that is associated with the company AWS Lake Formation data lake does not contain sensitive customer or employee data. The company wants to discover personally identifiable information (PII) or financial information, including passport numbers and credit card numbers.

Which solution will meet these requirements?


A.       Configure AWS Audit Manager on the account. Select the Payment Card Industry Data Security Standards (PCI DSS) for auditing.

B.       Configure Amazon S3 Inventory on the S3 bucket Configure Amazon Athena to query the inventory.

C.      Configure Amazon Macie to run a data discovery job that uses managed identifiers for the required data types.

D.      Use Amazon S3 Select to run a report across the S3 bucket.

 

Correct Answer: C

Section: (none)

QUESTION 577

A company uses on-premises servers to host its applications. The company is running out of storage capacity. The applicationsuse both block storage and NFS storage. The company needs a high-performing solution that supports local caching without re-architecting its existing applications.

Which combination of actions should a solutions architect take to meet these requirements? (Choose two.)

 

A.       Mount Amazon S3 as a file system to the on-premises servers.

B.       Deploy an AWS Storage Gateway file gateway to replace NFS storage.

C.      Deploy AWS Snowball Edge to provision NFS mounts to on-premises servers.

D.      Deploy an AWS Storage Gateway volume gateway to replace the block storage.

E.       Deploy Amazon Elastic File System (Amazon EFS) volumes and mount them to on-premises servers.

 

Correct Answer: BD

Section: (none)

QUESTION 578

A company has a service that reads and writes large amounts of data from an Amazon S3 bucket in the same AWS Region. Theservice is deployed on Amazon EC2 instances within the private subnet of a VPC. The service communicates with Amazon S3 over a NAT gateway in the public subnet. However, the company wants a solution that will reduce the data output costs.

Which solution will meet these requirements MOST cost-effectively?

 

A.       Provision a dedicated EC2 NAT instance in the public subnet. Configure the route table for the private subnet to use the elastic network interface of this instance as the destination for all S3 traffic.

B.       Provision a dedicated EC2 NAT instance in the private subnet. Configure the route table for the public subnet to use the elastic network interface of this instance as the destination for all S3 traffic.

C.      Provision a VPC gateway endpoint. Configure the route table for the private subnet to use the gateway endpoint as the route for all S3 traffic.

D.      Provision a second NAT gateway. Configure the route table for the private subnet to use this NAT gateway as the destination for all S3 traffic.

 

Correct Answer: C

Section: (none)

QUESTION 579

A company needs to minimize the cost of its 1 Gbps AWS Direct Connect connection. The company's average connectionutilization is less than 10%. A solutions architect must recommend a solution that will reduce the cost without compromising security.

Which solution will meet these requirements?

 

A.       Set up a new 1 Gbps Direct Connect connection. Share the connection with another AWS account.

B.       Set up a new 200 Mbps Direct Connect connection in the AWS Management Console.

C.      Contact an AWS Direct Connect Partner to order a 1 Gbps connection. Share the connection with another AWS account.

D.      Contact an AWS Direct Connect Partner to order a 200 Mbps hosted connection for an existing AWS account.


Correct Answer: D

Section: (none)

QUESTION 580

A company has multiple Windows file servers on premises. The company wants to migrate and consolidate its files into an Amazon FSx for Windows File Server file system. File permissions must be preserved to ensure that access rights do not change.

Which solutions will meet these requirements? (Choose two.)

 

A.       Deploy AWS DataSync agents on premises. Schedule DataSync tasks to transfer the data to the FSx for Windows File Server file system.

B.       Copy the shares on each file server into Amazon S3 buckets by using the AWS CLI. Schedule AWS DataSync tasks to transfer the data to the FSx for Windows File Server file system.

C.      Remove the drives from each file server. Ship the drives to AWS for import into Amazon S3. Schedule AWS DataSync tasks to transfer the data to the FSx for Windows File Server file system.

D.      Order an AWS Snowcone device. Connect the device to the on-premises network. Launch AWS DataSync agents on thedevice. Schedule DataSync tasks to transfer the data to the FSx for Windows File Server file system.

E.       Order an AWS Snowball Edge Storage Optimized device. Connect the device to the on-premises network. Copy data to the device by using the AWS CLI. Ship the device back to AWS for import into Amazon S3. Schedule AWS DataSync tasksto transfer the data to the FSx for Windows File Server file system.

 

Correct Answer: AD

Section: (none)


想要將業務快速上雲?了解更多 小豬科技如何提供支援。


QUESTION 581

A company wants to ingest customer payment data into the company's data lake in Amazon S3. The company receivespayment data every minute on average. The company wants to analyze the payment data in real time. Then the company wants to ingest the data into the data lake.

Which solution will meet these requirements with the MOST operational efficiency?

 

A.       Use Amazon Kinesis Data Streams to ingest data. Use AWS Lambda to analyze the data in real time.

B.       Use AWS Glue to ingest data. Use Amazon Kinesis Data Analytics to analyze the data in real time.

C.      Use Amazon Kinesis Data Firehose to ingest data. Use Amazon Kinesis Data Analytics to analyze the data in real time.

D.      Use Amazon API Gateway to ingest data. Use AWS Lambda to analyze the data in real time.

 

Correct Answer: C

Section: (none)

QUESTION 582

A company runs a website that uses a content management system (CMS) on Amazon EC2. The CMS runs on a single EC2instance and uses an Amazon Aurora MySQL Multi-AZ DB instance for the data tier. Website images are stored on an Amazon Elastic Block Store (Amazon EBS) volume that is mounted inside the EC2 instance.

Which combination of actions should a solutions architect take to improve the performance and resilience of the website? (Choose two.)

 

A.       Move the website images into an Amazon S3 bucket that is mounted on every EC2 instance

B.       Share the website images by using an NFS share from the primary EC2 instance. Mount this share on the other EC2 instances.

C.      Move the website images onto an Amazon Elastic File System (Amazon EFS) file system that is mounted on every EC2 instance.

D.      Create an Amazon Machine Image (AMI) from the existing EC2 instance. Use the AMI to provision new instances behind an Application Load Balancer as part of an Auto Scaling group. Configure the Auto Scaling group to maintain a minimum of two instances. Configure an accelerator in AWS Global


Accelerator for the website

E.       Create an Amazon Machine Image (AMI) from the existing EC2 instance. Use the AMI to provision new instances behind an Application Load Balancer as part of an Auto Scaling group. Configure the Auto Scaling group to maintain a minimum oftwo instances. Configure an Amazon CloudFront distribution for the website.

 

Correct Answer: CE

Section: (none)

QUESTION 583

A company runs an infrastructure monitoring service. The company is building a new feature that will enable the service to monitor data in customer AWS accounts. The new feature will call AWS APIs in customer accounts to describe Amazon EC2 instances and read Amazon CloudWatch metrics.

What should the company do to obtain access to customer accounts in the MOST secure way?

 

A.       Ensure that the customers create an IAM role in their account with read-only EC2 and CloudWatch permissions and a trust policy to the company account.

B.       Create a serverless API that implements a token vending machine to provide temporary AWS credentials for a role with read-only EC2 and CloudWatch permissions.

C.      Ensure that the customers create an IAM user in their account with read-only EC2 and CloudWatch permissions.Encrypt and store customer access and secret keys in a secrets management system.

D.      Ensure that the customers create an Amazon Cognito user in their account to use an IAM role with read-only EC2 and CloudWatch permissions. Encrypt and store the Amazon Cognito user and password in a secrets management system.

 

Correct Answer: A

Section: (none)

QUESTION 584

A company needs to connect several VPCs in the us-east-1 Region that span hundreds of AWS accounts. The company's networking team has its own AWS account to manage the cloud network.

What is the MOST operationally efficient solution to connect the VPCs?

 

A.       Set up VPC peering connections between each VPC. Update each associated subnet route table

B.       Configure a NAT gateway and an internet gateway in each VPC to connect each VPC through the internet

C.      Create an AWS Transit Gateway in the networking team AWS account. Configure static routes from each VPC.

D.      Deploy VPN gateways in each VPC. Create a transit VPC in the networking team AWS account to connect to each VPC.

 

Correct Answer: C

Section: (none)

QUESTION 585

A company has Amazon EC2 instances that run nightly batch jobs to process data. The EC2 instances run in an Auto Scaling group that uses On-Demand billing. If a job fails on one instance, another instance will reprocess the job. The batch jobs run between 12:00 AM and 06:00 AM local time every day.

Which solution will provide EC2 instances to meet these requirements MOST cost-effectively?

 

A.       Purchase a 1-year Savings Plan for Amazon EC2 that covers the instance family of the Auto Scaling group that the batch job uses.

B.       Purchase a 1-year Reserved Instance for the specific instance type and operating system of the instances in the Auto Scaling group that the batch job uses.

C.      Create a new launch template for the Auto Scaling group. Set the instances to Spot Instances. Set a policy to scale out based on CPU usage.

D.      Create a new launch template for the Auto Scaling group. Increase the instance size. Set a policy to scale out based on CPU usage.


Correct Answer: C

Section: (none)


馬上開始雲端旅程,立即註冊 小豬科技!


QUESTION 586

A social media company is building a feature for its website. The feature will give users the ability to upload photos. The company expects significant increases in demand during large events and must ensure that the website can handle the upload traffic from users.

Which solution meets these requirements with the MOST scalability?

 

A.       Upload files from the user's browser to the application servers. Transfer the files to an Amazon S3 bucket.

B.       Provision an AWS Storage Gateway file gateway. Upload files directly from the user's browser to the file gateway.

C.      Generate Amazon S3 presigned URLs in the application. Upload files directly from the user's browser into an S3 bucket.

D.      Provision an Amazon Elastic File System (Amazon EFS) file system. Upload files directly from the user's browser to the file system.

 

Correct Answer: C

Section: (none)

QUESTION 587

A company has a web application for travel ticketing. The application is based on a database that runs in a single data center in North America. The company wants to expand the application to serve a global user base. The company needs to deploy the application to multiple AWS Regions. Average latency must be less than 1 second on updates to the reservation database.

The company wants to have separate deployments of its web platform across multiple Regions. However, the company must maintain a single primary reservation database that is globally consistent.

Which solution should a solutions architect recommend to meet these requirements?

 

A.       Convert the application to use Amazon DynamoDB. Use a global table for the center reservation table. Use the correct Regional endpoint in each Regional deployment.

B.       Migrate the database to an Amazon Aurora MySQL database. Deploy Aurora Read Replicas in each Region. Use thecorrect Regional endpoint in each Regional deployment for access to the database.

C.      Migrate the database to an Amazon RDS for MySQL database. Deploy MySQL read replicas in each Region. Use thecorrect Regional endpoint in each Regional deployment for access to the database.

D.      Migrate the application to an Amazon Aurora Serverless database. Deploy instances of the database to each Region. Usethe correct Regional endpoint in each Regional deployment to access the database. Use AWS Lambda functions to process event streams in each Region to synchronize the databases.

 

Correct Answer: A

Section: (none)

QUESTION 588

A company has migrated multiple Microsoft Windows Server workloads to Amazon EC2 instances that run in the us-west-1 Region. The company manually backs up the workloads to create an image as needed.

In the event of a natural disaster in the us-west-1 Region, the company wants to recover workloads quickly in the us-west-2 Region. The company wants no more than 24 hours of data loss on the EC2 instances.

The company also wants to automate any backups of the EC2 instances.

Which solutions will meet these requirements with the LEAST administrative effort? (Choose two.)

 

A.       Create an Amazon EC2-backed Amazon Machine Image (AMI) lifecycle policy to create a backup based on tags. Schedule the backup to run twice daily. Copy the image on demand.

B.       Create an Amazon EC2-backed Amazon Machine Image (AMI) lifecycle policy to create a backup based on tags. Schedule the backup to run twice daily. Configure the copy to the us-west-2 Region.


C.      Create backup vaults in us-west-1 and in us-west-2 by using AWS Backup. Create a backup plan for the EC2 instancesbased on tag values. Create an AWS Lambda function to run as a scheduled job to copy the backup data to us-west-2.

D.      Create a backup vault by using AWS Backup. Use AWS Backup to create a backup plan for the EC2 instances based on tag values. Define the destination for the copy as us-west-2. Specify the backup schedule to run twice daily.

E.       Create a backup vault by using AWS Backup. Use AWS Backup to create a backup plan for the EC2 instances based ontag values. Specify the backup schedule to run twice daily. Copy on demand to us- west-2.

 

Correct Answer: BD

Section: (none)

QUESTION 589

A company operates a two-tier application for image processing. The application uses two Availability Zones, each with onepublic subnet and one private subnet. An Application Load Balancer (ALB) for the web tier uses the public subnets. AmazonEC2 instances for the application tier use the private subnets.

Users report that the application is running more slowly than expected. A security audit of the web server log files shows that the application is receiving millions of illegitimate requests from a small number of IP addresses. A solutions architect needs toresolve the immediate performance problem while the company investigates a more permanent solution.

What should the solutions architect recommend to meet this requirement?

 

A.       Modify the inbound security group for the web tier. Add a deny rule for the IP addresses that are consuming resources.

B.       Modify the network ACL for the web tier subnets. Add an inbound deny rule for the IP addresses that are consuming resources.

C.      Modify the inbound security group for the application tier. Add a deny rule for the IP addresses that are consuming resources.

D.      Modify the network ACL for the application tier subnets. Add an inbound deny rule for the IP addresses that are consuming resources.

 

Correct Answer: B

Section: (none)

QUESTION 590

A global marketing company has applications that run in the ap-southeast-2 Region and the eu-west-1 Region. Applicationsthat run in a VPC in eu-west-1 need to communicate securely with databases that run in a VPC in ap-southeast-2.

Which network design will meet these requirements?

 

A.       Create a VPC peering connection between the eu-west-1 VPC and the ap-southeast-2 VPC. Create an inbound rule in the eu-west-1 application security group that allows traffic from the database server IP addresses in the ap-southeast-2 security group.

B.       Configure a VPC peering connection between the ap-southeast-2 VPC and the eu-west-1 VPC. Update the subnet route tables. Create an inbound rule in the ap-southeast-2 database security group that references the security group ID of the application servers in eu-west-1.

C.      Configure a VPC peering connection between the ap-southeast-2 VPC and the eu-west-1 VPUpdate the subnet route tables. Create an inbound rule in the ap-southeast-2 database security group that allows traffic from the eu-west-1 application server IP addresses.

D.      Create a transit gateway with a peering attachment between the eu-west-1 VPC and the ap-southeast-2 VPC. After thetransit gateways are properly peered and routing is configured, create an inbound rule in the database security group that references the security group ID of the application servers in eu-west- 1.

 

Correct Answer: C

Section: (none)


您有任何問題嗎?立即聯絡 我們的專員隨時為您服務!


QUESTION 591

A company is developing software that uses a PostgreSQL database schema. The company needs to configure multipledevelopment environments and databases for the company's developers. On average, each development environment is used for half of the 8-hour workday.

Which solution will meet these requirements MOST cost-effectively?

 

A.       Configure each development environment with its own Amazon Aurora PostgreSQL database

B.       Configure each development environment with its own Amazon RDS for PostgreSQL Single-AZ DB instances

C.      Configure each development environment with its own Amazon Aurora On-Demand PostgreSQL- Compatible database

D.      Configure each development environment with its own Amazon S3 bucket by using Amazon S3 Object Select

 

Correct Answer: C

Section: (none)

QUESTION 592

A company uses AWS Organizations with resources tagged by account. The company also uses AWS Backup to back up itsAWS infrastructure resources. The company needs to back up all AWS resources.

Which solution will meet these requirements with the LEAST operational overhead?

 

A.       Use AWS Config to identify all untagged resources. Tag the identified resources programmatically. Use tags in the backup plan.

B.       Use AWS Config to identify all resources that are not running. Add those resources to the backup vault.

C.      Require all AWS account owners to review their resources to identify the resources that need to be backed up.

D.      Use Amazon Inspector to identify all noncompliant resources.

 

Correct Answer: A

Section: (none)

QUESTION 593

A social media company wants to allow its users to upload images in an application that is hosted in the AWS Cloud. The company needs a solution that automatically resizes the images so that the images can be displayed on multiple device types.The application experiences unpredictable traffic patterns throughout the day. The company is seeking a highly available solution that maximizes scalability.

What should a solutions architect do to meet these requirements?

 

A.       Create a static website hosted in Amazon S3 that invokes AWS Lambda functions to resize the images and store the images in an Amazon S3 bucket.

B.       Create a static website hosted in Amazon CloudFront that invokes AWS Step Functions to resize the images and store the images in an Amazon RDS database.

C.      Create a dynamic website hosted on a web server that runs on an Amazon EC2 instance. Configure a process that runs on the EC2 instance to resize the images and store the images in an Amazon S3 bucket.

D.      Create a dynamic website hosted on an automatically scaling Amazon Elastic Container Service (Amazon ECS) clusterthat creates a resize job in Amazon Simple Queue Service (Amazon SQS). Set up an image-resizing program that runs on an Amazon EC2 instance to process the resize jobs.

 

Correct Answer: A

Section: (none)

QUESTION 594

A company is running a microservices application on Amazon EC2 instances. The company wants to migrate the application toan Amazon Elastic Kubernetes Service (Amazon EKS) cluster for scalability. The company must configure the Amazon EKS control plane with endpoint private access set to true and endpoint public access set to false to maintain security compliance. The company must also put the data


plane in private subnets. However, the company has received error notifications because the node cannot join the cluster.

Which solution will allow the node to join the cluster?

 

A.       Grant the required permission in AWS Identity and Access Management (IAM) to the AmazonEKSNodeRole IAM role.

B.       Create interface VPC endpoints to allow nodes to access the control plane.

C.      Recreate nodes in the public subnet. Restrict security groups for EC2 nodes.

D.      Allow outbound traffic in the security group of the nodes.

 

Correct Answer: B

Section: (none)

QUESTION 595

A company is migrating an on-premises application to AWS. The company wants to use Amazon Redshift as a solution.

Which use cases are suitable for Amazon Redshift in this scenario? (Choose three.)

 

A.       Supporting data APIs to access data with traditional, containerized, and event-driven applications

B.       Supporting client-side and server-side encryption

C.      Building analytics workloads during specified hours and when the application is not active

D.      Caching data to reduce the pressure on the backend database

E.       Scaling globally to support petabytes of data and tens of millions of requests per minute

F.       Creating a secondary replica of the cluster by using the AWS Management Console

 

Correct Answer: BCE

Section: (none)


掌握最新的雲端技術趨勢,了解更多 我們的全方位服務。


QUESTION 596

A company provides an API interface to customers so the customers can retrieve their financial information. he company expects a larger number of requests during peak usage times of the year.

The company requires the API to respond consistently with low latency to ensure customer satisfaction. The company needs to provide a compute host for the API.

Which solution will meet these requirements with the LEAST operational overhead?

 

A.       Use an Application Load Balancer and Amazon Elastic Container Service (Amazon ECS).

B.       Use Amazon API Gateway and AWS Lambda functions with provisioned concurrency.

C.      Use an Application Load Balancer and an Amazon Elastic Kubernetes Service (Amazon EKS) cluster.

D.      Use Amazon API Gateway and AWS Lambda functions with reserved concurrency.

 

Correct Answer: B

Section: (none)

QUESTION 597

An application uses an Amazon RDS MySQL DB instance. The RDS database is becoming low on disk space. A solutions architect wants to increase the disk space without downtime.

Which solution meets these requirements with the LEAST amount of effort?

 

A.       Enable storage autoscaling in RDS

B.       Increase the RDS database instance size

C.      Change the RDS database instance storage type to Provisioned IOPS

D.      Back up the RDS database, increase the storage capacity, restore the database, and stop the previous instance


Correct Answer: A

Section: (none)

QUESTION 598

A company is designing a new web application that will run on Amazon EC2 Instances. The application will use Amazon DynamoDB for backend data storage. The application traffic will be unpredictable. The company expects that the application read and write throughput to the database will be moderate to high. The company needs to scale in response to application traffic.

Which DynamoDB table configuration will meet these requirements MOST cost-effectively?

 

A.       Configure DynamoDB with provisioned read and write by using the DynamoDB Standard table class. Set DynamoDB auto scaling to a maximum defined capacity.

B.       Configure DynamoDB in on-demand mode by using the DynamoDB Standard table class.

C.      Configure DynamoDB with provisioned read and write by using the DynamoDB Standard Infrequent Access (DynamoDB Standard-IA) table class. Set DynamoDB auto scaling to a maximum defined capacity.

D.      Configure DynamoDB in on-demand mode by using the DynamoDB Standard Infrequent Access (DynamoDB Standard-IA) table class.

 

Correct Answer: B

Section: (none)

QUESTION 599

A retail company has several businesses. The IT team for each business manages its own AWS account. Each team account is part of an organization in AWS Organizations. Each team monitors its product inventory levels in an Amazon DynamoDB table in the team's own AWS account.

The company is deploying a central inventory reporting application into a shared AWS account. The application must be able to read items from all the teams' DynamoDB tables.

Which authentication option will meet these requirements MOST securely?

 

A.       Integrate DynamoDB with AWS Secrets Manager in the inventory application account. Configure the application to usethe correct secret from Secrets Manager to authenticate and read the DynamoDB table. Schedule secret rotation for every 30 days.

B.       In every business account, create an IAM user that has programmatic access. Configure the application to use the correct IAM user access key ID and secret access key to authenticate and read the DynamoDB table. Manually rotate IAM access keys every 30 days.

C.      In every business account, create an IAM role named BU_ROLE with a policy that gives the role access to the DynamoDB table and a trust policy to trust a specific role in the inventory application account. In the inventory account, create a rolenamed APP_ROLE that allows access to the STS AssumeRole API operation. Configure the application to use APP_ROLEand assume the crossaccount role BU_ROLE to read the DynamoDB table.

D.      Integrate DynamoDB with AWS Certificate Manager (ACM). Generate identity certificates to authenticate DynamoDB.Configure the application to use the correct certificate to authenticate and read the DynamoDB table.

 

Correct Answer: C

Section: (none)

QUESTION 600

A company runs a microservice-based serverless web application. The application must be able to retrieve data from multipleAmazon DynamoDB tables A solutions architect needs to give the application the ability to retrieve the data with no impact on the baseline performance of the application.

Which solution will meet these requirements in the MOST operationally efficient way?

 

A.       AWS AppSync pipeline resolvers

B.       Amazon CloudFront with Lambda@Edge functions

C.      Edge-optimized Amazon API Gateway with AWS Lambda functions

D.      Amazon Athena Federated Query with a DynamoDB connector

Correct Answer: D

Section: (none)

雲端解決方案專家在這裡,點擊這裡 聯絡小豬科技,獲取支援。

avatar-img
2會員
95內容數
小豬科技 - 您的雲端伺服器解決方案 我們是領先的雲端伺服器供應商,提供來自 AWS、GCP、阿里雲、騰訊雲等頂級供應商的解決方案。我們主要提供高效能 VPS(虛擬機),以滿足客戶的多樣化需求。
留言0
查看全部
avatar-img
發表第一個留言支持創作者!
你可能也想看
Google News 追蹤
Thumbnail
這個秋,Chill 嗨嗨!穿搭美美去賞楓,裝備款款去露營⋯⋯你的秋天怎麼過?秋日 To Do List 等你分享! 秋季全站徵文,我們準備了五個創作主題,參賽還有機會獲得「火烤兩用鍋」,一起來看看如何參加吧~
Thumbnail
11/20日NVDA即將公布最新一期的財報, 今天Sell Side的分析師, 開始調高目標價, 市場的股價也開始反應, 未來一週NVDA將重新回到美股市場的焦點, 今天我們要分析NVDA Sell Side怎麼看待這次NVDA的財報預測, 以及實際上Buy Side的倉位及操作, 從
Thumbnail
Hi 大家好,我是Ethan😊 相近大家都知道保濕是皮膚保養中最基本,也是最重要的一步。無論是在畫室裡長時間對著畫布,還是在旅途中面對各種氣候變化,保持皮膚的水分平衡對我來說至關重要。保濕化妝水不僅能迅速為皮膚補水,還能提升後續保養品的吸收效率。 曾經,我的保養程序簡單到只包括清潔和隨意上乳液
Thumbnail
這個秋,Chill 嗨嗨!穿搭美美去賞楓,裝備款款去露營⋯⋯你的秋天怎麼過?秋日 To Do List 等你分享! 秋季全站徵文,我們準備了五個創作主題,參賽還有機會獲得「火烤兩用鍋」,一起來看看如何參加吧~
Thumbnail
11/20日NVDA即將公布最新一期的財報, 今天Sell Side的分析師, 開始調高目標價, 市場的股價也開始反應, 未來一週NVDA將重新回到美股市場的焦點, 今天我們要分析NVDA Sell Side怎麼看待這次NVDA的財報預測, 以及實際上Buy Side的倉位及操作, 從
Thumbnail
Hi 大家好,我是Ethan😊 相近大家都知道保濕是皮膚保養中最基本,也是最重要的一步。無論是在畫室裡長時間對著畫布,還是在旅途中面對各種氣候變化,保持皮膚的水分平衡對我來說至關重要。保濕化妝水不僅能迅速為皮膚補水,還能提升後續保養品的吸收效率。 曾經,我的保養程序簡單到只包括清潔和隨意上乳液