Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

SOA-C01 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

SOA-C01 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: AWS Certified SysOps Administrator - Associate
  • Last Update: May 17, 2024
  • Questions and Answers: 263
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

SOA-C01 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

SOA-C01 Practice Exam Questions with Answers AWS Certified SysOps Administrator - Associate Certification

Question # 6

A SysOps Administrator is maintaining an application that runs on Amazon EC2 instances behind an application Load Balancer (ALB). Users are reporting errors when attempting to launch the application. The administrator notices an increase in the httpcode_ELS_5xx_Count Amazon CloudWatch metric for the load balancer.

What is the possible cause for this increase?

A.

The ALB Is associated with private subnets within the VPC.

B.

The ALB received a request from a client, but the client closed the connection.

C.

The ALB security group is not configured to allow inbound traffic from the users.

D.

The ALB target group does not contain healthy EC2 instances.

Full Access
Question # 7

A company has deployed its infrastructure using AWS CloudFormation Recently the company made manual changes to the infrastructure. A SysOps Administrator is tasked with determining what was changed and updating the CloudFormation template

Which solution will ensure all the changes are captured?

A.

Create a new CloudFormation stack based on the changes that were made Delete the old stack and deploy the new stack

B.

Update the CloudFormation stack using a change set Review the changes and update the stack

C.

Update the CloudFormation stack by modifying the selected parameters in the template to match what was changed

D.

Use drift detection on the CloudFormation stack Use the output to update the CloudFormation template and redeploy the stack

Full Access
Question # 8

Based on the AWS Shared Responsibility Model, which of the following actions are the responsibility of the customer for an Aurora database?

A.

Performing underlying OS updates

B.

Provisioning of storage for database

C.

Scheduling maintenance, patches, and other updates

D.

Executing maintenance, patches, and other updates

Full Access
Question # 9

A company's IT department noticed an increase in the spend of their Developer AWS account. There are over 50 Developers using the account and the Finance Tram wants to determine the service costs incurred by each Developer.

What should a SysOps Administrator do to collect this information? (Select TWO)

A.

Activate the createdBy tag in the account

B.

Analyze the usage with Amazon CloudWatch dashboards

C.

Analyze the usage with Cost Explorer

D.

Configure AWS Trusted Advisor to track resource usage

E.

Create a billing alarm in AWS Budgets

Full Access
Question # 10

A company is running multiple AWS Lambda functions in a non-VPC environment. Most of the functions are application-specific; an operational function is involved synchronously every hour.

Recently, the Applications team deployed new functions that are triggered based on an Amazon S3 event to process multiple files that are uploaded to an S3 bucket simultaneously. The SysOps Administrator notices that the operational function occasionally fails to execute due to throttling.

What step should the Administrator take to make sure that the operational function executes?

A.

Redeploy the operational function to a VPC.

B.

Increase the operational function timeout.

C.

Set the operational function concurrency to 1.

D.

Increase the operational function memory.

Full Access
Question # 11

A SysOps Administrator is responsible for maintaining an Amazo EC2 instance that acts as a bastion host. The Administrator can sucessfully connect to the instance using SSH, but attempts to ping the instance result in a timeout.

What is one reason for the issue?

A.

The instance does not have an Elastic IP address.

B.

The instance has security group that does not allow Internet Control Message Protocol (ICMP) traffic

C.

The instance is not set up in a VPC using AWS Direct Connect.

D.

The instance is running in a peered VPC.

Full Access
Question # 12

A SysOps Administration team is supporting an applications that stores a configuration file in an Amazon S3 bucket Previous revisions of the configuration file must be maintained for change control and rollback

How should the S3 bucket be configured to meet these requirements?

A.

Enable a lifecycle policy on the S3 bucket

B.

Enable cross-origin resource sharing on the S3 bucket

C.

Enable object tagging on the S3 bucket

D.

Enable versioning on the S3 bucket

Full Access
Question # 13

An organization stores sensitive customer information in S3 buckets protected by bucket policies. Recently, there have been reports that unauthorized entities within the company have been trying to access the data on those S3 buckets. The chief information security officer (CISO) would like to know which buckets are being targeted and determine who is responsible for trying to access that information.

Which steps should a SysOps administrator take to meet the CISO's requirement? (Select TWO.)

A.

Enable Amazon S3 Analytics on all affected S3 buckets to obtain a report of which buckets are being accessed without authorization.

B.

Enable Amazon S3 Server Access Logging on all affected S3 buckets and have the logs stored in a bucket dedicated for logs.

C.

Use Amazon Athena to query S3 Analytics reports for HTTP 403 errors, and determine the 1AM user or role making the requests.

D.

Use Amazon Athena to query the S3 Server Access Logs for HTTP 403 errors, and determine the 1AM user or role making the requests.

E.

Use Amazon Athena to query the S3 Server Access Logs for HTTP 503 errors, and determine the 1AM user or role making the requests.

Full Access
Question # 14

A SysOps administrator is investigating why a user has been unable to use RDP to connect over the internet from their home computer to a bastion server running on an Amazon EC2 Windows instance

Which of the following are possible causes of this issue? (Select TWO.)

A.

A network ACL associated with the bastion's subnet is blocking the network traffic

B.

The instance does not have a private IP address.

C.

The route table associated with the bastion's subnet does not have a route to the internet gateway

D.

The security group for the instance does not have an inbound rule on port 22

E.

The security group for the instance does not have an outbound rule on port 3389.

Full Access
Question # 15

A company is expanding its use of AWS services across its portfolios. The company wants to provision AWS accounts for each team to ensure a separation of business processes for security, compliance, and billing account creation and bootstrapping should be completed in a scalable and efficient way so new accounts are created with a defined baseline and governance guardrails in place. A sysops administrator needs to design a provisioning process that save time and resources.

Which action should be taken to meet these requirements?

A.

Automate using AWS Elastic Beanstalk to provision the AWS Accounts, set up infrastructure, and integrate with AWS Organizations.

B.

Create bootstrapping scripts in AWS OpsWorks and combine them with AWS CloudFormation templates to provision accounts and infrastructure.

C.

Use AWS config to provision accounts and deploy instances using AWS service catalog.

D.

Use AWS Control Tower to create a template in account factory and use the template to provision new accounts.

Full Access
Question # 16

Company A purchases company B and inherits three new AWS accounts. Company A would like to centralize billing and reserved instance benefits but wants to keep all other resources separate.

How can this be accomplished?

A.

Implement AWS Organizations and create a service control policy that defines the billing relationship with the new master account.

B.

Configure AWS Organizations Consolidated Billing and provide the finance team with IAM access to the billing console.

C.

Send Cost and Usage Reports files to a central Amazon S3 bucket and load the data into Amazon Redshift. Use Amazon QuickSight to provide visualizations to the finance team.

D.

Link the Reserved Instances to the master payer account and use Amazon Redshift Spectrum to query Detailed Billing Report data across all accounts.

Full Access
Question # 17

A SysOps Administrator has implemented a VPC network design with the following requirements

• Two Availability Zones (AZs) - Two private subnets

• Two public subnets

• One internet gateway

• One NAT gateway

What would potentially cause applications in the VPC to fail during an AZ outage?

A.

A single virtual private gateway, because it can be associated with a single AZ only.

B.

A single internet gateway, because it is not redundant across both AZs.

C.

A single NAT gateway, because it is not redundant across both AZs

D.

The default VPC route table, because it can be associated with a single AZ only

Full Access
Question # 18

A SysOps Administrator has configured health checks on a load balancer. An Amazon EC2 instance attached to this load balancer fails the health check.

What will happen next? (Choose two.)

A.

The load balancer will continue to perform the health check on the EC2 instance.

B.

The EC2 instance will be terminated based on the health check failure.

C.

The EC2 instance will be rebooted.

D.

The load balancer will stop sending traffic to the EC2 instance.

E.

A new EC2 instance will be deployed to replace the unhealthy instance.

Full Access
Question # 19

A SysOps Administrator is responsible for a large fleet of EC2 instances and must know whether any

instances will be affected by upcoming hardware maintenance.

Which option would provide this information with the LEAST administrative overhead?

A.

Monitor AWS CloudTrail for StopInstances API calls related to upcoming maintenance.

B.

Review the Personal Health Dashboard for any scheduled maintenance.

C.

From the AWS Management Console, list any instances with failed system status checks.

D.

Deploy a third-party monitoring solution to provide real-time EC2 instance monitoring.

Full Access
Question # 20

A SysOps Administrator manages an Amazon RDS MySQL DB instance in production. The database is accessed by several applications. The Administrator needs to ensure minimal downtime of the applications in the event the database suffers a failure. This change must not impact customer use during regular business hours.

Which action will make the database MORE highly available?

A.

Contact AWS Support to pre-warm the database to ensure that it can handle any unexpected spikes in traffic

B.

Create a new Multi-AZ RDS DB instance. Migrate the data to the new DB instance and delete the old one

C.

Create a read replica from the existing database outside of business hours

D.

Modify the DB instance to outside of business hours be a Multi-AZ deployment

Full Access
Question # 21

A SysOps Administrator must find a way to set up alerts when Amazon EC2 service limits are close to being reached.

How can the Administrator achieve this requirement?

A.

Use Amazon Inspector and Amazon CloudWatch Events.

B.

Use AWS Trusted Advisor and Amazon CloudWatch Events.

C.

Use the Personal Health Dashboard and CloudWatch Events.

D.

Use AWS CloudTrail and CloudWatch Events.

Full Access
Question # 22

A company runs a web application that users access using the domain name www example com The company manages the domain name using Amazon Route 53 The company created an Amazon CloudFront distribution in front of the application and would like www example com to access the application through CloudFront

What is the MOST cost-effective way to achieve this?

A.

Create a CNAME record in Amazon Route 53 that points to the CloudFront distribution URL

B.

Create an ALIAS record in Amazon Route 53 that points to the CloudFront distribution URL

C.

Creole an A record in Amazon Route 53 that points to the public IP address of the web application

D.

Create a PTR record in Amazon Route 53 that points to the public IP address of the web application

Full Access
Question # 23

A sysops administrator is creating two AWS Cloud Formation templates The first template will create a VPC with associated resources, such as subnets, route tables, and an internet gateway The second template will deploy application resources within the VPC that was created by the first template The second template should refer to the resources created by the first template

How can this be accomplished with the LEAST amount of administrative effort?

A.

Add an export field to the outputs of the first template and import the values in the second template

B.

Create a custom resource that queries the stack created by the first template and retrieves the required values.

C.

Create a mapping in the first template that is referenced by the second template

D.

Input the names of resources in the first template and refer to those names in the second template as a parameter

Full Access
Question # 24

A company has a business application hosted on Amazon EC2 instances behind an Application Load

Balancer. Amazon CloudWatch metrics show that the CPU utilization on the EC2 instances is very high. There are also reports from users that receive HTTP 503 and 504 errors when they try to connect to the application.

Which action will resolve these issues?

A.

Place the EC2 instances into an AWS Auto Scaling group.

B.

Configure the ALB's Target Group to use more frequent health checks.

C.

Enable sticky sessions on the Application Load Balancer.

D.

Increase the idle timeout setting of the Application Load Balancer.

Full Access
Question # 25

A company is managing multiple AWS accounts using AWS Organizations. One of these accounts is used only for retaining logs in an Amazon S3 bucket The company wants to make sure that compute resources cannot be used in the account.

How can this be accomplished with the LEAST administrative effort?

A.

Apply an 1AM policy to all 1AM entities in the account with a statement to explicitly deny NotAction: s3:

B.

Configure AWS Config to terminate compute resources that have been created in the accounts.

C.

Configure AWS CloudTrail to block any action where the event source is not s3.amazonaws.com.

D.

Update the service control policy on the account to deny the unapproved services.

Full Access
Question # 26

A SysOps Administrator is maintaining a web application using an Amazon Cloud Front web distribution, an Application Load Balancer (ALB), Amazon RDS, and Amazon EC2 in a VPC. All services have services have logging enabled. The Administrator needs to investigate HTTP Layer 7 status codes from the web application.

Which log source contain the status codes? (Select TWO.)

A.

VPC Flow Logs

B.

AWS CloudTrail logs

C.

ALB access logs

D.

ClodFront access logs

E.

RDS logs

Full Access
Question # 27

An application resides on multiple EC2 instances in public subnets in two Availability Zones. To improve security, the Information Security team has deployed an Application Load Balancer (ALB) in separate subnets and pointed the DNS at the ALB instead of the EC2 instances.

After the change, traffic is not reaching the instances, and an error is being returned from the ALB.

What steps must a SysOps Administrator take to resolve this issue and improve the security of the application? (Select TWO.)

A.

Add the EC2 instances to the ALB target group, configure the health check, and ensure that the instances report healthy.

B.

Add the EC2 instances to an Auto Scaling group, configure the health check to ensure that the instances report healthy, and remove the public IPs from the instances.

C.

Create a new subnet in which EC2 instances and ALB will reside to ensure that they can communicate, and remove the public IPs from the instances.

D.

Change the security group for the EC2 instances to allow access from only the ALB security group, and remove the public IPs from the instances.

E.

Change the security group to allow access from 0.0.0.0/0, which permits access from the ALB.

Full Access
Question # 28

A local agency plans to deploy 500 Raspberry Pi devices throughout a city. All the devices need to be managed centrally and their configurations need to be consistent. What is the BEST service for managing these devices?

A.

AWS Config

B.

AWS Systems Manager

C.

Amazon inspector

D.

AWS Service Catalog

Full Access
Question # 29

A company needs to have real-time access to image data while seamlessly maintaining a copy of the images in an offsite location Which AWS solution would allow access to the image data locally while also providing for disaster recovery?

A.

Create an AWS Storage Gateway volume gateway configured as a stored volume Mount it from clients using Internet Small Computer System Interface OSCSI)

B.

Mount an Amazon EFS volume on a local server Share this volume with employees who need access to the images

C.

Store the images in Amazon S3 and use AWS Data Pipeline to allow for caching of S3 data on local workstations

D.

Use Amazon S3 for file storage, and enable S3 Transfer Acceleration to maintain a cache for frequently used files to increase local performance

Full Access
Question # 30

An application is running on multiple EC2 instances. As part of an initiative to improve overall infrastructure security, the EC2 instances were moved to a private subnet. However, since moving, the EC2 instances have not been able to automatically update, and a SysOps Administrator has not been able to SSH into them remotely.

Which two actions could the Administrator take to securely resolve these issues? (Choose two.)

A.

Set up a bastion host in a public subnet, and configure security groups and route tables accordingly.

B.

Set up a bastion host in the private subnet, and configure security groups accordingly.

C.

Configure a load balancer in a public subnet, and configure the route tables accordingly.

D.

Set up a NAT gateway in a public subnet, and change the private subnet route tables accordingly.

E.

Set up a NAT gateway in a private subnet, and ensure that the route tables are configured accordingly.

Full Access
Question # 31

A new Amazon Redshift Spectrum Cluster has been launched for a team of Business Analysis. When the team attempts to use the cluster to query the data in Amazon S3, they receive the following error:

SOA-C01 question answer

What is one cause of this?

A.

The cluster has Enhanced VPC Routing enabled and it must be turned off

B.

The cluster is only a single node and needs to be expanded to multi-node.

C.

The cluster login credentials are incorrect request new credentials from the Administrator

D.

The cluster nodes are running in multiple Availability Zones, and all need to be placed in a single Availability Zone.

Full Access
Question # 32

An application running on Amazon EC2 needs login credentials to access a database. The login credentials are stored in AWS Systems Manager Parameter Store as secure string parameters.

What is the MOST secure way to grant the application access to the credentials?

A.

Create an IAM EC2 role for the EC2 instances and grant the role permission to read the Systems Manager parameters

B.

Create an IAM group for the application and grant the group permissions to read the Systems Manager parameters

C.

Create an IAM policy for the application and grant the policy permission to read the Systems Manager parameters

D.

Create an IAM user for the application and grant the user permission to read the Systems Manager parameters

Full Access
Question # 33

A SysOps Administrator observes a large number of rogue HTTP requests on an Application Load Balancer (ALB). The requests originate from various IP addresses.

Which action should be taken to block this traffic?

A.

Use Amazon CloudFront to cache the traffic and block access to the web servers

B.

Use Amazon GuardDuty to protect the web servers from bots and scrapers

C.

Use AWS Lambda to analyze the web server logs, detect bot traffic, and block the IP address in the security groups

D.

Use AWS WAF rate-based blacklisting to block this traffic when it exceeds a defined threshold

Full Access
Question # 34

An organization has been running their website on several m2 Linux instances behind a Classic Load Balancer for more than two years. Traffic and utilization have been constant and predictable.

What should the organization do to reduce costs?

A.

Purchase Reserved Instances for the specific m2 instances

B.

Change the m2 instances to equivalent m5 types, and purchase Reserved Instances for the specific m5 instances

C.

Change the Classic Load Balancer to an Application Load Balancer, and purchase Reserved Instances for the specific m2 instances.

D.

Purchase Spot Instances for the specific m2 instances

Full Access
Question # 35

A company is storing monthly reports on Amazon S3. The company’s security requirement states that traffic from the client VPC to Amazon S3 cannot traverse the internet.

What should the SysOps Administrator do to meet this requirement?

A.

Use AWS Direct Connect and a public virtual interface to connect to Amazon S3.

B.

Use a managed NAT gateway to connect to Amazon S3.

C.

Deploy a VPC endpoint to connect to Amazon S3.

D.

Deploy an internet gateway to connect to Amazon S3.

Full Access
Question # 36

A SysOps Administrator receives reports of an Auto Scaling group failing to scale when the nodes running Amazon Linux in the cluster are constrained by high memory utilization.

What should the Administrator do to enable scaling to better adapt to the high memory utilization?

A.

Create a custom script that pipes memory utilization to Amazon S3, then, scale with an AWS Lambda-powered event

B.

Install the Amazon CloudWatch memory monitoring scripts, and create a custom metric based on the script’s results

C.

Increase the minimum size of the cluster to meet memory and application load demands

D.

Deploy an Application Load Balancer to more evenly distribute traffic among nodes

Full Access
Question # 37

A SysOps administrator needs to register targets for a Network Load Balancer (NL8) using IP addresses Which prerequisite should the SysOps administrator validate to perform this task?

A.

Ensure the NLB listener security policy is set to ELBSecuntyPohcy-TLS-1-2-Ext-2018-06, ELBSecuntyPolicy-FS-1-2-Res-2019-08 or ELBSecuntyPolicy-TLS-1-0-2015-04

B.

Ensure the heath check setting on the NLB for the Matcher configuration is between 200 and 399

C.

Ensure the targets are within any of these CIDR blocks: 10.0.0.0/8 (RFC I918)r 100.64.0.0/10 (RFC 6598): 172.16.0.0/12 (RFC 1918), or 192.168.0.0/16 (RFC 1918).

D.

Ensure the NLB is exposed as an endpoint service before registering the targets using IP addresses

Full Access
Question # 38

A security researcher has published a new Common Vulnerabilities and Exposures (CVE) report that impacts a popular operating system A SysOps Administrator is concerned with the new CVE report and wants to patch the company's systems immediately The Administrator contacts AWS Support and requests the patch be applied to all Amazon EC2 instances

How will AWS respond to this request?

A.

AWS will apply the patch during the next maintenance window and will provide the Administrator with a report of all patched EC2 instances

B.

AWS will relaunch the EC2 instances with the latest version of the Amazon Machine Image (AMI) and will provide the Administrator with a report of all patched EC2 instances

C.

AWS will research the vulnerability to see if the Administrator's operating system is impacted and will patch the EC2 instances that are affected

D.

AWS will review the shared responsibility model with the Administrator and advise them regarding how to patch the EC2 instances

Full Access
Question # 39

An Amazon EC2 instance has a secondary Amazon Elastic Block Store (EBS) volume attached that contains sensitive data A new company policy requires the secondary volume to be encrypted at rest. Which solution will meet this requirement?

A.

Create a snapshot of the volume. Create a new volume from the snapshot with the Encrypted parameter set to true. Detach the original volume and attach the new volume to the instance.

B.

Create an encrypted Amazon Machine Image (AMI) of the EC2 instance. Launch a new instance with the encrypted AMI. Terminate the original instance.

C.

Stop the EC2 instance. Encrypt the volume with AWS CloudHSM. Start the instance and verify encryption.

D.

Stop the EC2 instance. Modify the instance properties and set the Encrypted parameter to true. Start the instance and verify encryption.

Full Access