Vcehome > Amazon > AWS Certified Professional > SAP-C01 > SAP-C01 Online Practice Questions and Answers

SAP-C01 Online Practice Questions and Answers

Questions 4

An ERP application is deployed across multiple AZs in a single region. In the event of failure, the Recovery Time Objective (RTO) must be less than 3 hours, and the Recovery Point Objective (RPO) must be 15 minutes. The customer realizes that data corruption occurred roughly 1.5 hours ago.

What DR strategy could be used to achieve this RTO and RPO in the event of this kind of failure?

A. Take hourly DB backups to S3, with transaction logs stored in S3 every 5 minutes.

B. Use synchronous database master-slave replication between two availability zones.

C. Take hourly DB backups to EC2 Instance store volumes with transaction logs stored In S3 every 5 minutes.

D. Take 15 minute DB backups stored In Glacier with transaction logs stored in S3 every 5 minutes.

Browse 973 Q&As
Questions 5

A web company is looking to implement an external payment service into their highly available application deployed in a VPC Their application EC2 instances are behind a public facing ELB. Auto scaling is used to add additional instances as traffic increases under normal load the application runs 2 instances in the Auto Scaling group but at peak it can scale 3x in size. The application instances need to communicate with the payment service over the Internet which requires whitelisting of all public IP addresses used to communicate with it. A maximum of 4 whitelisting IP addresses are allowed at a time and can be added through an API.

How should they architect their solution?

A. Route payment requests through two NAT instances setup for High Availability and whitelist the Elastic IP addresses attached to the MAT instances.

B. Whitelist the VPC Internet Gateway Public IP and route payment requests through the Internet Gateway.

C. Whitelist the ELB IP addresses and route payment requests from the Application servers through the ELB.

D. Automatically assign public IP addresses to the application instances in the Auto Scaling group and run a script on boot that adds each instances public IP address to the payment validation whitelist API.

Browse 973 Q&As
Questions 6

In the Amazon RDS Oracle DB engine, the Database Diagnostic Pack and the Database Tuning Pack are only available with __________.

A. Oracle Standard Edition

B. Oracle Express Edition

C. Oracle Enterprise Edition

D. None of these

Browse 973 Q&As
Questions 7

A user is planning to use EBS for his DB requirement. The user already has an EC2 instance running in

the VPC private subnet.

How can the user attach the EBS volume to a running instance?

A. The user can create EBS in the same zone as the subnet of instance and attach that EBS to instance.

B. It is not possible to attach an EBS to an instance running in VPC until the instance is stopped.

C. The user can specify the same subnet while creating EBS and then attach it to a running instance.

D. The user must create EBS within the same VPC and then attach it to a running instance.

Browse 973 Q&As
Questions 8

Regarding Identity and Access Management (IAM), Which type of special account belonging to your application allows your code to access Google services programmatically?

A. Service account

B. Simple Key

C. OAuth

D. Code account

Browse 973 Q&As
Questions 9

An organization is setting up a web application with the JEE stack. The application uses the JBoss app server and MySQL DB. The application has a logging module which logs all the activities whenever a business function of the JEE application is called. The logging activity takes some time due to the large size of the log file.

If the application wants to setup a scalable infrastructure which of the below mentioned options will help achieve this setup?

A. Host the log files on EBS with PIOPS which will have higher I/O.

B. Host logging and the app server on separate servers such that they are both in the same zone.

C. Host logging and the app server on the same instance so that the network latency will be shorter.

D. Create a separate module for logging and using SQS compartmentalize the module such that all calls to logging are asynchronous.

Browse 973 Q&As
Questions 10

A user is using CloudFormation to launch an EC2 instance and then configure an application after the instance is launched. The user wants the stack creation of ELB and AutoScaling to wait until the EC2 instance is launched and configured properly.

How can the user configure this?

A. The user can use the DependentCondition resource to hold the creation of the other dependent resources.

B. It is not possible that the stack creation will wait until one service is created and launched.

C. The user can use the HoldCondition resource to wait for the creation of the other dependent resources.

D. The user can use the WaitCondition resource to hold the creation of the other dependent resources.

Browse 973 Q&As
Questions 11

What is a circular dependency in AWS CloudFormation?

A. When Nested Stacks depend on each other.

B. When Resources form a Depend On loop.

C. When a Template references an earlier version of itself.

D. When a Template references a region, which references the original Template.

Browse 973 Q&As
Questions 12

A financial services company logs personally identifiable information to its application logs stored in Amazon S3. Due to regulatory compliance requirements, the log files must be encrypted at rest. The security team has mandated that the company's on-premises hardware security modules (HSMs) be used to generate the CMK material.

Which steps should the solutions architect take to meet these requirements?

A. Create an AWS CloudHSM cluster. Create a new CMK in AWS KMS using AWS_CloudHSM as the source for the key material and an origin of AWS_CLOUDHSM. Enable automatic key rotation on the CMK with a duration of 1 year. Configure a bucket policy on the logging bucket that disallows uploads of unencrypted data and requires that the encryption source be AWS KMS.

B. Provision an AWS Direct Connect connection, ensuring there is no overlap of the RFC 1918 address space between on-premises hardware and the VPCs. Configure an AWS bucket policy on the logging bucket that requires all objects to be encrypted. Configure the logging application to query the on-premises HSMs from the AWS environment for the encryption key material, and create a unique CMK for each logging event.

C. Create a CMK in AWS KMS with no key material and an origin of EXTERNAL. Import the key material generated from the on-premises HSMs into the CMK using the public key and import token provided by AWS. Configure a bucket policy on the logging bucket that disallows uploads of non-encrypted data and requires that the encryption source be AWS KMS.

D. Create a new CMK in AWS KMS with AWS-provided key material and an origin of AWS_KMS. Disable

this CMK, and overwrite the key material with the key material from the on-premises HSM using the

public key and import token provided by AWS. Re-enable the CMK. Enable automatic key rotation on

the CMK with a duration of 1 year. Configure a bucket policy on the logging bucket that disallows

uploads of non-encrypted data and requires that the encryption source be AWS KMS.

Browse 973 Q&As
Questions 13

A media company uses Amazon DynamoDB to store metadata for its catalog of movies that are available to stream. Each media item contains user-facing content that includes a description of the media, a list of searchable tags, and other similar data. In addition, media items include a list of Amazon S3 key names that relate to movie files. The company stores these movie files in a single S3 bucket that has versioning enabled. The company uses Amazon CloudFront to serve these movie files.

The company has 100,000 media items, and each media item can have many different S3 objects that represent different encodings of the same media. S3 objects that belong to the same media item are grouped together under the same key prefix, which is a random unique ID.

Because of an expiring contract with a media provider, the company must remove 2,000 media items. The company must completely delete all DynamoDB keys and movie files on Amazon S3 that are related to these media items within 36 hours. The company must ensure that the content cannot be recovered.

Which combination of actions will meet these requirements? (Choose two.)

A. Configure the DynamoDB table with a TTL field. Create and invoke an AWS Lambda function to perform a conditional update. Set the TTL field to the time of the contract's expiration on every affected

media item.

B. Configure an S3 Lifecycle object expiration rule that is based on the contract's expiration date.

C. Write a script to perform a conditional delete on all the affected DynamoDB records.

D. Temporarily suspend versioning on the S3 bucket. Create and invoke an AWS Lambda function that deletes affected objects. Reactivate versioning when the operation is complete.

E. Write a script to delete objects from Amazon S3. Specify in each request a NoncurrentVersionExpiration property with a NoncurrentDays attribute set to 0.

Browse 973 Q&As
Exam Code: SAP-C01
Exam Name: AWS Certified Solutions Architect - Professional (SAP-C01)
Last Update:
Questions: 973 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99