Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Amazon Web Services SOA-C03 AWS Certified CloudOps Engineer - Associate Exam Practice Test

Demo: 27 questions
Total 151 questions

AWS Certified CloudOps Engineer - Associate Questions and Answers

Question 1

An AWS Lambda function is intermittently failing several times a day. A CloudOps engineer must find out how often this error occurred in the last 7 days.

Which action will meet this requirement in the MOST operationally efficient manner?

Options:

A.

Use Amazon Athena to query the Amazon CloudWatch logs that are associated with the Lambda function.

B.

Use Amazon Athena to query the AWS CloudTrail logs that are associated with the Lambda function.

C.

Use Amazon CloudWatch Logs Insights to query the associated Lambda function logs.

D.

Use Amazon OpenSearch Service to stream the Amazon CloudWatch logs for the Lambda function.

Question 2

Application A runs on Amazon EC2 instances behind a Network Load Balancer (NLB). The EC2 instances are in an Auto Scaling group and are in the same subnet that is associated with the NLB. Other applications from an on-premises environment cannot communicate with Application A on port 8080.

To troubleshoot the issue, a CloudOps engineer analyzes the flow logs. The flow logs include the following records:

    ACCEPT from 192.168.0.13:59003 → 172.31.16.139:8080

    REJECT from 172.31.16.139:8080 → 192.168.0.13:59003

What is the reason for the rejected traffic?

Options:

A.

The security group of the EC2 instances has no Allow rule for the traffic from the NLB.

B.

The security group of the NLB has no Allow rule for the traffic from the on-premises environment.

C.

The ACL of the on-premises environment does not allow traffic to the AWS environment.

D.

The network ACL that is associated with the subnet does not allow outbound traffic for the ephemeral port range.

Question 3

A company’s architecture team must receive immediate email notifications whenever new Amazon EC2 instances are launched in the company’s main AWS production account.

What should a CloudOps engineer do to meet this requirement?

Options:

A.

Create a user data script that sends an email message through a smart host connector. Include the architecture team's email address in the user data script as the recipient. Ensure that all new EC2 instances include the user data script as part of a standardized build process.

B.

Create an Amazon Simple Notification Service (Amazon SNS) topic and a subscription that uses the email protocol. Enter the architecture team's email address as the subscriber. Create an Amazon EventBridge rule that reacts when EC2 instances are launched. Specify the SNS topic as the rule's target.

C.

Create an Amazon Simple Queue Service (Amazon SQS) queue and a subscription that uses the email protocol. Enter the architecture team's email address as the subscriber. Create an Amazon EventBridge rule that reacts when EC2 instances are launched. Specify the SQS queue as the rule's target.

D.

Create an Amazon Simple Notification Service (Amazon SNS) topic. Configure AWS Systems Manager to publish EC2 events to the SNS topic. Create an AWS Lambda function to poll the SNS topic. Configure the Lambda function to send any messages to the architecture team's email address.

Question 4

A company uses AWS Organizations to manage its AWS environment. The company implements a process that uses prebuilt Amazon Machine Images (AMIs) to launch instances as a security measure. All AMIs are tagged automatically with a key named ApprovedAMI.

The company wants to ensure that employees can use only the approved prebuilt AMIs to launch new instances.

Which solution will meet this requirement?

Options:

A.

Implement a tag policy for the company's organization to require users to set the ApprovedAMI tag to launch new EC2 instances.

B.

Implement an IAM policy that includes an aws:ResourceTag/ApprovedAMI condition.

C.

Set up an AWS Config required-tags rule to prevent users from launching any nonapproved AMIs.

D.

Use Amazon GuardDuty to constantly monitor DefenseEvasion:EC2/UnusualDoHActivity findings.

Question 5

A company’s Amazon EC2 instance with high CPU utilization is a t3.large instance running a test web app. The company determines the app would run better on a compute-optimized large instance.

What should the CloudOps engineer do?

Options:

A.

Migrate the EC2 instance to a compute optimized instance by using AWS VM Import/Export.

B.

Enable hibernation on the EC2 instance. Change the instance type to a compute optimized instance. Disable hibernation on the EC2 instance.

C.

Stop the EC2 instance. Change the instance type to a compute optimized instance. Start the EC2 instance.

D.

Change the instance type to a compute optimized instance while the EC2 instance is running.

Question 6

A company hosts a critical legacy application on two Amazon EC2 instances that are in one Availability Zone. The instances run behind an Application Load Balancer (ALB). The company uses Amazon CloudWatch alarms to send Amazon Simple Notification Service (Amazon SNS) notifications when the ALB health checks detect an unhealthy instance. After a notification, the company's engineers manually restart the unhealthy instance. A CloudOps engineer must configure the application to be highly available and more resilient to failures. Which solution will meet these requirements?

Options:

A.

Create an Amazon Machine Image (AMI) from a healthy instance. Launch additional instances from the AMI in the same Availability Zone. Add the new instances to the ALB target group.

B.

Increase the size of each instance. Create an Amazon EventBridge rule. Configure the EventBridge rule to restart the instances if they enter a failed state.

C.

Create an Amazon Machine Image (AMI) from a healthy instance. Launch an additional instance from the AMI in the same Availability Zone. Add the new instance to the ALB target group. Create an AWS Lambda function that runs when an instance is unhealthy. Configure the Lambda function to stop and restart the unhealthy instance.

D.

Create an Amazon Machine Image (AMI) from a healthy instance. Create a launch template that uses the AMI. Create an Amazon EC2 Auto Scaling group that is deployed across multiple Availability Zones. Configure the Auto Scaling group to add instances to the ALB target group.

Question 7

A CloudOps engineer must manage the security of an AWS account. Recently, an IAM user’s access key was mistakenly uploaded to a public code repository. The engineer must identify everything that was changed using this compromised key.

How should the CloudOps engineer meet these requirements?

Options:

A.

Create an Amazon EventBridge rule to send all IAM events to an AWS Lambda function for analysis.

B.

Query Amazon EC2 logs by using Amazon CloudWatch Logs Insights for all events initiated with the compromised access key within the suspected timeframe.

C.

Search AWS CloudTrail event history for all events initiated with the compromised access key within the suspected timeframe.

D.

Search VPC Flow Logs for all events initiated with the compromised access key within the suspected timeframe.

Question 8

A company’s ecommerce application is running on Amazon EC2 instances that are behind an Application Load Balancer (ALB). The instances are in an Auto Scaling group. Customers report that the website is occasionally down. When the website is down, it returns an HTTP 500 (server error) status code to customer browsers.

The Auto Scaling group’s health check is configured for EC2 status checks, and the instances appear healthy.

Which solution will resolve the problem?

Options:

A.

Replace the ALB with a Network Load Balancer.

B.

Add Elastic Load Balancing (ELB) health checks to the Auto Scaling group.

C.

Update the target group configuration on the ALB. Enable session affinity (sticky sessions).

D.

Install the Amazon CloudWatch agent on all instances. Configure the agent to reboot the instances.

Question 9

A company hosts a static website in an Amazon S3 bucket, accessed globally via Amazon CloudFront. The Cache-Control max-age header is set to 1 hour, and Maximum TTL is set to 5 minutes. The CloudOps engineer observes that CloudFront is not caching objects for the expected duration.

What is the reason for this issue?

Options:

A.

The Expires header has been set to 3 hours.

B.

Cached assets are not expiring in the edge location.

C.

Cache invalidation is missing in the CloudFront configuration.

D.

Cache-duration settings conflict with each other.

Question 10

A company has a multi-account AWS environment that includes the following:

• A central identity account that contains all IAM users and groups

• Several member accounts that contain IAM roles

A SysOps administrator must grant permissions for a particular IAM group to assume a role in one of the member accounts. How should the SysOps administrator accomplish this task?

Options:

A.

In the member account, add sts:AssumeRole permissions to the role's policy. In the identity account, add a trust policy to the group that specifies the account number of the member account.

B.

In the member account, add the group Amazon Resource Name (ARN) to the role's trust policy. In the identity account, add an inline policy to the group with sts:AssumeRole permissions.

C.

In the member account, add the group Amazon Resource Name (ARN) to the role's trust policy. In the identity account, add an inline policy to the group with sts:PassRole permissions.

D.

In the member account, add the group Amazon Resource Name (ARN) to the role's inline policy. In the identity account, add a trust policy to the group with sts:AssumeRole permissions.

Question 11

A company hosts an FTP server on EC2 instances. AWS Security Hub sends findings to Amazon EventBridge when the FTP port becomes publicly exposed in attached security groups.

A CloudOps engineer needs an automated, event-driven remediation solution to remove public access from security groups.

Which solution will meet these requirements?

Options:

A.

Configure the existing EventBridge event to stop the EC2 instances that have the exposed port.

B.

Create a cron job for the FTP server to invoke an AWS Lambda function. Configure the Lambda function to modify the security group of the identified EC2 instances and to remove the instances that allow public access.

C.

Create a cron job for the FTP server that invokes an AWS Lambda function. Configure the Lambda function to modify the server to use SFTP instead of FTP.

D.

Configure the existing EventBridge event to invoke an AWS Lambda function. Configure the function to remove the security group rule that allows public access.

Question 12

A company’s application servers in AWS account 111122223333 use a security group sg-1234abcd. They need to access a database hosted in account 444455556666. The VPCs are connected using a VPC peering connection (pcx-b04deed9).

A CloudOps engineer must configure the database’s security group to allow new connections only from the application servers.

What should the engineer do?

Options:

A.

Add an inbound rule to the database's security group. Reference 111122223333/sg-1234abcd as the source.

B.

Add an inbound rule to the database's security group. Reference pcx-b04deed9/sg-1234abcd as the source.

C.

Add an inbound rule to the database's security group. Reference sg-1234abcd as the source.

D.

Add an inbound rule to the database's security group. Reference 444455556666/sg-1234abcd as the source.

Question 13

A company with millions of subscribers needs to automatically send notifications every Saturday. The company already uses Amazon SNS to send messages but has historically sent them manually.

Which solution will meet these requirements in the MOST operationally efficient way?

Options:

A.

Launch a new Amazon EC2 instance. Configure a cron job to use the AWS SDK to send an SNS notification to subscribers every Saturday.

B.

Create a rule in Amazon EventBridge that triggers every Saturday. Configure the rule to publish a notification to an SNS topic.

C.

Create an SNS subscription to a message fanout that sends notifications to subscribers every Saturday.

D.

Use AWS Step Functions scheduling to run a step every Saturday. Configure the step to publish a message to an SNS topic.

Question 14

A company runs an application on Amazon EC2 that connects to an Amazon Aurora PostgreSQL database. A developer accidentally drops a table from the database, causing application errors. Two hours later, a CloudOps engineer needs to recover the data and make the application functional again.

Which solution will meet this requirement?

Options:

A.

Use the Aurora Backtrack feature to rewind the database to a specified time, 2 hours in the past.

B.

Perform a point-in-time recovery on the existing database to restore the database to a specified point in time, 2 hours in the past.

C.

Perform a point-in-time recovery and create a new database to restore the database to a specified point in time, 2 hours in the past. Reconfigure the application to use a new database endpoint.

D.

Create a new Aurora cluster. Choose the Restore data from S3 bucket option. Choose log files up to the failure time 2 hours in the past.

Question 15

A company uses an Amazon Simple Queue Service (Amazon SQS) queue and Amazon EC2 instances in an Auto Scaling group with target tracking for a web application. The company collects the ASGAverageNetworkIn metric but notices that instances do not scale fast enough during peak traffic. There are a large number of SQS messages accumulating in the queue.

A CloudOps engineer must reduce the number of SQS messages during peak periods.

Which solution will meet this requirement?

Options:

A.

Define and use a new custom Amazon CloudWatch metric based on the SQS ApproximateNumberOfMessagesDelayed metric in the target tracking policy.

B.

Define and use Amazon CloudWatch metric math to calculate the SQS queue backlog for each instance in the target tracking policy.

C.

Define and use step scaling by specifying a ChangeInCapacity value for the EC2 instances.

D.

Define and use simple scaling by specifying a ChangeInCapacity value for the EC2 instances.

Question 16

A CloudOps engineer has created an AWS Service Catalog portfolio and shared it with a second AWS account in the company, managed by a different CloudOps engineer.

Which action can the CloudOps engineer in the second account perform?

Options:

A.

Add a product from the imported portfolio to a local portfolio.

B.

Add new products to the imported portfolio.

C.

Change the launch role for the products contained in the imported portfolio.

D.

Customize the products in the imported portfolio.

Question 17

A company's developers manually install software modules on Amazon EC2 instances to deploy new versions of a service. A security audit finds that instances contain inconsistent and unapproved modules.

A CloudOps engineer must create a new instance image that contains only approved software.

Which solution will meet these requirements?

Options:

A.

Use Amazon Detective to continuously find and uninstall unauthorized modules from the instances.

B.

Use Amazon GuardDuty to create and deploy an Amazon Machine Image (AMI) that includes only the approved modules.

C.

Use AWS Systems Manager Run Command to install the approved modules on all running instances during an in-place update.

D.

Use EC2 Image Builder to create and test an Amazon Machine Image (AMI) that includes only the approved modules. Update the deployment workflow to use the new AMI.

Question 18

A SysOps administrator needs to implement a solution that protects credentials for an Amazon RDS for MySQL DB instance. The solution must rotate the credentials automatically one time every week.

Which combination of steps will meet these requirements? (Select TWO.)

Options:

A.

Configure an RDS proxy to store the credentials.

B.

Add the credentials to AWS Secrets Manager.

C.

Add the credentials to AWS Systems Manager Parameter Store.

D.

Create an AWS Lambda function to rotate the credentials.

E.

Create an AWS Systems Manager Automation runbook to rotate the credentials.

Question 19

A company uses AWS Organizations to manage multiple AWS accounts. A CloudOps engineer must identify all IPv4 ports open to 0.0.0.0/0 across the organization’s accounts.

Which solution will meet this requirement with the LEAST operational effort?

Options:

A.

Use the AWS CLI to print all security group rules for review.

B.

Review AWS Trusted Advisor findings in an organizational view for the Security Groups – Specific Ports Unrestricted check.

C.

Create an AWS Lambda function to gather security group rules from all accounts. Aggregate the findings in an Amazon S3 bucket.

D.

Enable Amazon Inspector in each account. Run an automated workload discovery job.

Question 20

A CloudOps engineer is configuring an Amazon CloudFront distribution to use an SSL/TLS certificate. The CloudOps engineer must ensure automatic certificate renewal.

Which combination of steps will meet this requirement? (Select TWO.)

Options:

A.

Use a certificate issued by AWS Certificate Manager (ACM).

B.

Use a certificate issued by a third-party certificate authority (CA).

C.

Configure CloudFront to automatically renew the certificate when the certificate expires.

D.

Configure email validation for the certificate.

E.

Configure DNS validation for the certificate.

Question 21

A company is using an Amazon Aurora MySQL DB cluster that has point-in-time recovery, backtracking, and automatic backup enabled. A CloudOps engineer needs to roll back the DB cluster to a specific recovery point within the previous 72 hours. Restores must be completed in the same production DB cluster.

Which solution will meet these requirements?

Options:

A.

Create an Aurora Replica. Promote the replica to replace the primary DB instance.

B.

Create an AWS Lambda function to restore an automatic backup to the existing DB cluster.

C.

Use backtracking to rewind the existing DB cluster to the desired recovery point.

D.

Use point-in-time recovery to restore the existing DB cluster to the desired recovery point.

Question 22

A company runs applications on Amazon EC2 instances. The company wants to ensure that SSH ports on the EC2 instances are never open. The company has enabled AWS Config and has set up the restricted-ssh AWS managed rule.

A CloudOps engineer must implement a solution to remediate SSH port access for noncompliant security groups.

What should the engineer do to meet this requirement with the MOST operational efficiency?

Options:

A.

Configure the AWS Config rule to identify noncompliant security groups. Configure the rule to use the AWS-PublishSNSNotification AWS Systems Manager Automation runbook to send notifications about noncompliant resources.

B.

Configure the AWS Config rule to identify noncompliant security groups. Configure the rule to use the AWS-DisableIncomingSSHOnPort22 AWS Systems Manager Automation runbook to remediate noncompliant resources.

C.

Make an AWS Config API call to search for noncompliant security groups. Disable SSH access for noncompliant security groups by using a Deny rule.

D.

Configure the AWS Config rule to identify noncompliant security groups. Manually update each noncompliant security group to remove the Allow rule.

Question 23

A company needs to upload gigabytes of files daily to Amazon S3 and requires higher throughput and faster upload speeds.

Which action should a CloudOps engineer take?

Options:

A.

Create an Amazon CloudFront distribution with the GET HTTP method allowed and the S3 bucket as an origin.

B.

Create an Amazon ElastiCache cluster and enable caching for the S3 bucket.

C.

Set up AWS Global Accelerator and configure it with the S3 bucket.

D.

Enable S3 Transfer Acceleration and use the acceleration endpoint when uploading files.

Question 24

A media company hosts a public news and video portal on AWS. The portal uses an Amazon DynamoDB table with provisioned capacity to maintain an index of video files that are stored in an Amazon S3 bucket. During a recent event, millions of visitors came to the portal for news. This increase in traffic caused read requests to be throttled in the DynamoDB table. Videos could not be displayed in the portal.

The company's operations team manually increased the provisioned capacity on a temporary basis to meet the demand. The company wants the operations team to receive an alert before the table is throttled in the future. The company has created an Amazon Simple Notification Service (Amazon SNS) topic and has subscribed the operations team's email address to the SNS topic.

What should the company do next to meet these requirements?

Options:

A.

Create an Amazon CloudWatch alarm that uses the ConsumedReadCapacityUnits metric. Set the alarm threshold to a value that is close to the DynamoDB table's provisioned capacity. Configure the alarm to publish notifications to the SNS topic.

B.

Turn on auto scaling on the DynamoDB table. Configure an Amazon EventBridge rule to publish notifications to the SNS topic during scaling events.

C.

Turn on Amazon CloudWatch Logs for the DynamoDB table. Create an Amazon CloudWatch metric filter to pattern match the THROTTLING_EXCEPTION status code from DynamoDB. Create a CloudWatch alarm for the metric. Select the SNS topic for notifications.

D.

Configure the application to store logs in Amazon CloudWatch Logs. Create an Amazon CloudWatch metric filter to pattern match the THROTTLING_EXCEPTION status code from DynamoDB. Create a CloudWatch alarm for the metric. Select the SNS topic for notifications.

Question 25

A company hosts an encrypted Amazon S3 bucket in the ap-southeast-2 Region. Users from the eu-west-2 Region access the S3 bucket through the internet. The users from eu-west-2 need faster transfers to and from the S3 bucket for large files.

Which solution will meet these requirements?

Options:

A.

Create an S3 access point in eu-west-2 to use as the destination for S3 replication from ap-southeast-2. Ensure all users switch to the new S3 access point.

B.

Create an Amazon Route 53 hosted zone with a geolocation routing policy. Choose the Alias to S3 website endpoint option. Specify the S3 bucket that is in ap-southeast-2 as the source bucket.

C.

Create a new S3 bucket in eu-west-2. Copy all contents from ap-southeast-2 to the new bucket in eu-west-2. Create an S3 access point, and associate it with both buckets. Ensure users use the new S3 access point.

D.

Configure and activate S3 Transfer Acceleration on the S3 bucket. Use the new S3 acceleration endpoint's domain name for access.

Question 26

A company runs a website on Amazon EC2 instances. Users can upload images to an Amazon S3 bucket and publish the images to the website. The company wants to deploy a serverless image-processing application that uses an AWS Lambda function to resize the uploaded images.

The company's development team has created the Lambda function. A CloudOps engineer must implement a solution to invoke the Lambda function when users upload new images to the S3 bucket.

Which solution will meet this requirement?

Options:

A.

Configure an Amazon Simple Notification Service (Amazon SNS) topic to invoke the Lambda function when a user uploads a new image to the S3 bucket.

B.

Configure an Amazon CloudWatch alarm to invoke the Lambda function when a user uploads a new image to the S3 bucket.

C.

Configure S3 Event Notifications to invoke the Lambda function when a user uploads a new image to the S3 bucket.

D.

Configure an Amazon Simple Queue Service (Amazon SQS) queue to invoke the Lambda function when a user uploads a new image to the S3 bucket.

Question 27

A company’s security policy prohibits connecting to Amazon EC2 instances through SSH and RDP. Instead, staff must use AWS Systems Manager Session Manager. Users report they cannot connect to one Ubuntu instance, even though they can connect to others.

What should a CloudOps engineer do to resolve this issue?

Options:

A.

Add an inbound rule for port 22 in the security group associated with the Ubuntu instance.

B.

Assign the AmazonSSMManagedInstanceCore managed policy to the EC2 instance profile for the Ubuntu instance.

C.

Configure the SSM Agent to log in with a user name of "ubuntu".

D.

Generate a new key pair, configure Session Manager to use this new key pair, and provide the private key to the users.

Demo: 27 questions
Total 151 questions