Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Amazon Web Services AWS Certified Associate SOA-C03 Questions and answers with Dumpstech

Exam SOA-C03 Premium Access

View all detail and faqs for the SOA-C03 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

A CloudOps engineer is using AWS Compute Optimizer to generate recommendations for a fleet of Amazon EC2 instances. Some of the instances use newly released instance types, while other instances use older instance types.

After the analysis is complete, the CloudOps engineer notices that some of the EC2 instances are missing from the Compute Optimizer dashboard.

What is the likely cause of this issue?

Options:

A.

The missing instances have insufficient historical Amazon CloudWatch metric data for analysis.

B.

Compute Optimizer does not support the instance types of the missing instances.

C.

Compute Optimizer already considers the missing instances to be optimized.

D.

The missing instances are running a Windows operating system.

Questions # 22:

A company has a new security policy that requires all Amazon Elastic Block Store (Amazon EBS) volumes to be encrypted at rest. The company needs to use a custom key policy to manage access to the encryption keys. The company must rotate the keys once each year.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.

Create AWS KMS symmetric customer managed keys. Enable automatic key rotation.

B.

Use AWS owned AWS KMS keys across the company's AWS environment.

C.

Create AWS KMS asymmetric customer managed keys. Enable automatic key rotation.

D.

Create AWS KMS symmetric customer managed keys by using imported key material. Rotate the keys on a yearly basis.

Questions # 23:

A SysOps administrator needs to implement a solution that protects credentials for an Amazon RDS for MySQL DB instance. The solution must rotate the credentials automatically one time every week.

Which combination of steps will meet these requirements? (Select TWO.)

Options:

A.

Configure an RDS proxy to store the credentials.

B.

Add the credentials to AWS Secrets Manager.

C.

Add the credentials to AWS Systems Manager Parameter Store.

D.

Create an AWS Lambda function to rotate the credentials.

E.

Create an AWS Systems Manager Automation runbook to rotate the credentials.

Questions # 24:

An application runs on Amazon EC2 instances that are in an Auto Scaling group. A CloudOps engineer needs to implement a solution that provides a central storage location for errors that the application logs to disk. The solution must also provide an alert when the application logs an error.

What should the CloudOps engineer do to meet these requirements?

Options:

A.

Deploy and configure the Amazon CloudWatch agent on the EC2 instances to log to a CloudWatch log group. Create a metric filter on the target CloudWatch log group. Create a CloudWatch alarm that publishes to an Amazon Simple Notification Service (Amazon SNS) topic that has an email subscription.

B.

Create a cron job on the EC2 instances to identify errors and push the errors to an Amazon CloudWatch metric filter. Configure the filter to publish to an Amazon Simple Notification Service (Amazon SNS) topic that has an SMS subscription.

C.

Deploy an AWS Lambda function that pushes the errors directly to Amazon CloudWatch Logs. Configure the Lambda function to run every time the log file is updated on disk.

D.

Create an Auto Scaling lifecycle hook that invokes an EC2-based script to identify errors. Configure the script to push the error messages to an Amazon CloudWatch log group when the EC2 instances scale in. Create a CloudWatch alarm that publishes to an Amazon Simple Notification Service (Amazon SNS) topic that has an email subscription when the number of error messages exceeds a threshold.

Questions # 25:

A SysOps administrator is configuring an Auto Scaling group of Amazon EC2 instances for an application. The average CPU utilization of the instances in the Auto Scaling group must remain at approximately 40% when the load on the application changes.

Which solution will meet this requirement in the MOST operationally efficient manner?

Options:

A.

Create a scheduled scaling action. Configure the action to run at times when the application typically experiences an increase in traffic.

B.

Configure a simple scaling policy. Create an Amazon CloudWatch alarm that enters ALARM state when CPU utilization is greater than 40%. Associate the alarm with the scaling policy.

C.

Configure a step scaling policy. Create an Amazon CloudWatch alarm that enters ALARM state when CPU utilization is greater than 40%. Associate the alarm with the scaling policy.

D.

Configure a target tracking scaling policy. Specify a target value of 40 for average CPU utilization.

Questions # 26:

A company maintains a list of 75 approved Amazon Machine Images (AMIs) that can be used across an organization in AWS Organizations. The company's development team has been launching Amazon EC2 instances from unapproved AMIs.

A SysOps administrator must prevent users from launching EC2 instances from unapproved AMIs.

Which solution will meet this requirement?

Options:

A.

Add a tag to the approved AMIs. Create an IAM policy that includes a tag condition that allows users to launch EC2 instances from only the tagged AMIs.

B.

Create a service-linked role. Attach a policy that denies the ability to launch EC2 instances from a list of unapproved AMIs. Assign the role to users.

C.

Use AWS Config with an AWS Lambda function to check for EC2 instances that are launched from unapproved AMIs. Program the Lambda function to send an Amazon Simple Notification Service (Amazon SNS) message to the SysOps administrator to terminate those EC2 instances.

D.

Use AWS Trusted Advisor to check for EC2 instances that are launched from unapproved AMIs. Configure Trusted Advisor to invoke an AWS Lambda function to terminate those EC2 instances.

Questions # 27:

A CloudOps engineer needs to track the costs of data transfer between AWS Regions. The CloudOps engineer must implement a solution to send alerts to an email distribution list when transfer costs reach 75% of a specific threshold.

What should the CloudOps engineer do to meet these requirements?

Options:

A.

Create an AWS Cost and Usage Report. Analyze the results in Amazon Athena. Configure an alarm to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic when costs reach 75% of the threshold. Subscribe the email distribution list to the topic.

B.

Create an Amazon CloudWatch billing alarm to detect when costs reach 75% of the threshold. Configure the alarm to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the email distribution list to the topic.

C.

Use AWS Budgets to create a cost budget for data transfer costs. Set an alert at 75% of the budgeted amount. Configure the budget to send a notification to the email distribution list when costs reach 75% of the threshold.

D.

Set up a VPC flow log. Set up a subscription filter to an AWS Lambda function to analyze data transfer. Configure the Lambda function to send a notification to the email distribution list when costs reach 75% of the threshold.

Questions # 28:

A CloudOps engineer must manage the security of an AWS account. Recently, an IAM user’s access key was mistakenly uploaded to a public code repository. The engineer must identify everything that was changed using this compromised key.

How should the CloudOps engineer meet these requirements?

Options:

A.

Create an Amazon EventBridge rule to send all IAM events to an AWS Lambda function for analysis.

B.

Query Amazon EC2 logs by using Amazon CloudWatch Logs Insights for all events initiated with the compromised access key within the suspected timeframe.

C.

Search AWS CloudTrail event history for all events initiated with the compromised access key within the suspected timeframe.

D.

Search VPC Flow Logs for all events initiated with the compromised access key within the suspected timeframe.

Questions # 29:

A SysOps administrator needs to give an existing AWS Lambda function access to an existing Amazon S3 bucket. Traffic between the Lambda function and the S3 bucket must not use public IP addresses. The Lambda function has been configured to run in a VPC.

Which solution will meet these requirements?

Options:

A.

Configure VPC sharing between the Lambda VPC and the S3 bucket.

B.

Attach a transit gateway to the Lambda VPC to allow the Lambda function to connect to the S3 bucket.

C.

Create a NAT gateway. Associate the NAT gateway with the subnet where the Lambda function is configured to run.

D.

Create an S3 interface endpoint. Change the Lambda function to use the new S3 DNS name.

Questions # 30:

A company needs to enforce tagging requirements for Amazon DynamoDB tables in its AWS accounts. A CloudOps engineer must implement a solution to identify and remediate all DynamoDB tables that do not have the appropriate tags.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.

Create a custom AWS Lambda function to evaluate and remediate all DynamoDB tables. Create an Amazon EventBridge scheduled rule to invoke the Lambda function.

B.

Create a custom AWS Lambda function to evaluate and remediate all DynamoDB tables. Create an AWS Config custom rule to invoke the Lambda function.

C.

Use the required-tags AWS Config managed rule to evaluate all DynamoDB tables for the appropriate tags. Configure an automatic remediation action that uses an AWS Systems Manager Automation custom runbook.

D.

Create an Amazon EventBridge managed rule to evaluate all DynamoDB tables for the appropriate tags. Configure the EventBridge rule to run an AWS Systems Manager Automation custom runbook for remediation.

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions