AWS-SysOps Guide

AWS-SysOps Exam Royal Pack (In Stock.)

  • Amazon
  • Exam Number/Code AWS-SysOps
  • Product Name AWS Certified SysOps Administrator Associate
  • Questions and Answers
  • 324 Q&As
  • Last Updated
  • July 24,2017
  • List Price
  • $128.99
  • Price
  • Today 59.99 USD

Free TrialVersion: demo Buy Now 50% OFF

Secrets to aws sysops pdf

We provide real aws certified sysops administrator exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Amazon aws sysops training Exam quickly & easily. The aws sysops certification dumps PDF type is available for reading and printing. You can print more and practice many times. With the help of our Amazon sysops aws dumps pdf and vce product and material, you can easily pass the aws certified sysops administrator associate exam.

Q171. - (Topic 3) 

Your organization is preparing for a security assessment of your use of AWS. 

In preparation for this assessment, which two IAM best practices should you consider implementing? Choose 2 answers 

A. Create individual IAM users for everyone in your organization 

B. Configure MFA on the root account and for privileged IAM users 

C. Assign IAM users and groups configured with policies granting least privilege access 

D. Ensure all users have been assigned and are frequently rotating a password, access ID/secret key, and X.509 certificate 

Answer: B,C 

Explanation: Reference: 

Q172. - (Topic 3) 

A user has configured ELB with SSL using a security policy for secure negotiation between the client and load balancer. Which of the below mentioned security policies is supported by ELB? 

A. Dynamic Security Policy 

B. All the other options 

C. Predefined Security Policy 

D. Default Security Policy 



Elastic Load Balancing uses a Secure Socket Layer (SSL. negotiation configuration which is known as a Security Policy. It is used to negotiate the SSL connections between a client and the load balancer. ELB supports two policies: Predefined Security Policy, which comes with predefined cipher and SSL protocols; Custom Security Policy, which allows the user to configure a policy. 

Q173. - (Topic 3) 

A user is trying to connect to a running EC2 instance using SSH. However, the user gets a Host key not found error. Which of the below mentioned options is a possible reason for rejection? 

A. The user has provided the wrong user name for the OS login 

B. The instance CPU is heavily loaded 

C. The security group is not configured properly 

D. The access key to connect to the instance is wrong 



If the user is trying to connect to a Linux EC2 instance and receives the Host Key not found error the probable reasons are: The private key pair is not right The user name to login is wrong 

Q174. - (Topic 1) 

Which of the following statements about this S3 bucket policy is true? 

A. Denies the server with the IP address 192 168 100 0 full access to the "mybucket" bucket 

B. Denies the server with the IP address 192 168 100 188 full access to the "mybucket" bucket 

C. Grants all the servers within the 192 168 100 0/24 subnet full access to the "mybucket" bucket 

D. Grants all the servers within the 192 168 100 188/32 subnet full access to the "mybucket" bucket 


Q175. - (Topic 3) 

You run a web application with the following components Elastic Load Balancer (EL8), 3 Web/Application servers, 1 MySQL RDS database with read replicas, and Amazon Simple Storage Service (Amazon S3) for static content. Average response time for users is increasing slowly. 

What three CloudWatch RDS metrics will allow you to identify if the database is the bottleneck? Choose 3 answers 

A. The number of outstanding IOs waiting to access the disk. 

B. The amount of write latency. 

C. The amount of disk space occupied by binary logs on the master. 

D. The amount of time a Read Replica DB Instance lags behind the source DB Instance 

E. The average number of disk I/O operations per second. 

Answer: A,B,D 

Q176. - (Topic 3) 

An organization is planning to create a user with IAM. They are trying to understand the limitations of IAM so that they can plan accordingly. Which of the below mentioned statements is not true with respect to the 

limitations of IAM? 

A. One IAM user can be a part of a maximum of 5 groups 

B. The organization can create 100 groups per AWS account 

C. One AWS account can have a maximum of 5000 IAM users 

D. One AWS account can have 250 roles 



AWS Identity and Access Management is a web service which allows organizations to manage users and user permissions for various AWS services. The default maximums for each of the IAM entities is given below: Groups per AWS account: 100 Users per AWS account: 5000 Roles per AWS account: 250 Number of groups per user: 10 (that is, one user can be part of these many groups. 

Q177. - (Topic 3) 

Your mission is to create a lights-out datacenter environment, and you plan to use AWS OpsWorks to accomplish this. First you created a stack and added an App Server layer with an instance running in it. Next you added an application to the instance, and now you need to deploy a MySQL RDS database instance. 

Which of the following answers accurately describe how to add a backend database server to an OpsWorks stack? Choose 3 answers 

A. Add a new database layer and then add recipes to the deploy actions of the database and App Server layers. 

B. Use OpsWorks' "Clone Stack" feature to create a second RDS stack in another Availability Zone for redundancy in the event of a failure in the Primary AZ. To switch to the secondary RDS instance, set the [:database] attributes to values that are appropriate for your server which you can do by using custom JSON. 

C. The variables that characterize the RDS database connection—host, user, and so on—are set using the corresponding values from the deploy JSON's [:depioy][:app_name][:database] attributes. 

D. Cookbook attributes are stored in a repository, so OpsWorks requires that the "password": "your_password" attribute for the RDS instance must be encrypted using at least a 256-bit key. 

E. Set up the connection between the app server and the RDS layer by using a custom recipe. The recipe configures the app server as required, typically by creating a configuration file. The recipe gets the connection data such as the host and database name from a set of attributes in the stack configuration and deployment JSON that AWS OpsWorks installs on every instance. 

Answer: B,C,E 

Q178. - (Topic 3) 

You have a business-to-business web application running in a VPC consisting of an Elastic Load Balancer (ELB), web servers, application servers and a database. Your web application should only accept traffic from pre-defined customer IP addresses. 

Which two options meet this security requirement? Choose 2 answers A. Configure web server VPC security groups to allow traffic from your customers' IPs 

B. Configure your web servers to filter traffic based on the ELB's "X-forwarded-for" header 

C. Configure ELB security groups to allow traffic from your customers' IPs and deny all outbound traffic 

D. Configure a VPC NACL to allow web traffic from your customers' IPs and deny all outbound traffic 

Answer: A,B 

Q179. - (Topic 3) 

A user has enabled versioning on an S3 bucket. The user is using server side encryption for data at Rest. If the user is supplying his own keys for encryption (SSE-C., which of the below mentioned statements is true? 

A. The user should use the same encryption key for all versions of the same object 

B. It is possible to have different encryption keys for different versions of the same object 

C. AWS S3 does not allow the user to upload his own keys for server side encryption 

D. The SSE-C does not work when versioning is enabled 



AWS S3 supports client side or server side encryption to encrypt all data at rest. The server side encryption can either have the S3 supplied AES-256 encryption key or the user can send the key along with each API call to supply his own encryption key (SSE-C.. If the bucket is versioning-enabled, each object version uploaded by the user using the SSE-C feature can have its own encryption key. The user is responsible for tracking which encryption key was used for which object's version 

Q180. - (Topic 3) 

A user has created a VPC with public and private subnets using the VPC wizard. Which of the below mentioned statements is not true in this scenario? 

A. The VPC will create a routing instance and attach it with a public subnet 

B. The VPC will create two subnets 

C. The VPC will create one internet gateway and attach it to VPC 

D. The VPC will launch one NAT instance with an elastic IP 



A user can create a subnet with VPC and launch instances inside that subnet. If the user has created a public private subnet, the instances in the public subnet can receive inbound traffic directly from the internet, whereas the instances in the private subnet cannot. If these subnets are created with Wizard, AWS will create a NAT instance with an elastic IP. Wizard will also create two subnets with route tables. It will also create an internet gateway and attach it to the VPC. 

To know more about the AWS-SysOps, click here.

Tagged as : Amazon AWS-SysOps Dumps, Download AWS-SysOps pdf, AWS-SysOps VCE, AWS-SysOps pass4sure, examcollection AWS-SysOps