New Year Special Sales Coupon - 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4s55disc

CLF-C01 PDF

$45

$99.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CLF-C01 PDF + Testing Engine

$72

$159.99

3 Months Free Update

  • Exam Name: AWS Certified Cloud Practitioner
  • Last Update: Jan 23, 2022
  • Questions and Answers: 554
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CLF-C01 Engine

$54

$119.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CLF-C01 AWS Certified Cloud Practitioner Questions and Answers

Question # 6

A user needs to quickly deploy a nonrelational database on AWS. The user does not want to manage the underlying hardware or the database software. Which AWS service cart be used to accomplish this?

A.

Amazon RDS

B.

Amazon DynamoDB

C.

Amazon Aurora

D.

Amazon Redshift

Full Access
Question # 7

A company would like to host its MySQL databases on AWS and maintain full control over the operating system, database installation, and configuration. Which AWS service should the company use to host the databases?

A.

Amazon RDS

B.

Amazon EC2

C.

Amazon DynamoDB

D.

Amazon Aurora

Full Access
Question # 8

What credential components are required to gain programmatic access to an AWS account? (Select TWO.)

A.

An access key ID

B.

A primary key

C.

A secret access key

D.

A user ID

E.

A secondary key

Full Access
Question # 9

A security officer wants a list of any potential vulnerabilities in Amazon EC2 security groups. Which AWS service should the officer use?

A.

Amazon GuardDuty

B.

AWS Trusted Advisor

C.

AWS CloudTrail

D.

AWS Artifact

Full Access
Question # 10

Which AWS service or component allows inbound traffic from the internet to access a VPC?

A.

Internet gateway

B.

NAT gateway

C.

AWS WAF

D.

VPC peering

Full Access
Question # 11

Which duty is a responsibility of AWS under the AWS shared responsibility model?

A.

Identity and access management

B.

Server-side encryption (SSE)

C.

Firewall configuration

D.

Maintaining physical hardware

Full Access
Question # 12

Which AWS service or feature can be used to prevent SQL injection attacks?

A.

Security groups

B.

Network ACLs

C.

AWS WAF

D.

IAM policy

Full Access
Question # 13

A company with AWS Enterprise Support needs help understanding its monthly AWS bill and wants to implement billing best practices. Which AWS tool or resource is available to accomplish these goals?

A.

Resource lagging

B.

AWS Concierge Support team

C.

AWS Abuse team

D.

AWS Support

Full Access
Question # 14

When comparing AWS to on-premises total cost of ownership (TCO), what costs are included with AWS?

A.

Data center security

B.

Business analysis

C.

Project management

D.

Operating system administration

Full Access
Question # 15

Which AWS service or feature provides log information of the inbound and outbound traffic on network interfaces in a VPC?

A.

Amazon CloudWatch Logs

B.

AWS CloudTrail

C.

VPC Flow Logs

D.

AWS Identity and Access Management (IAM)

Full Access
Question # 16

Which AWS service provides a report that enables users to assess AWS infrastructure compliance?

A.

AWS Certificate Manager (ACM)

B.

Amazon DocumentDB (with MongoDB compatibility)

C.

AWS Artifact

D.

AWS Trusted Advisor

Full Access
Question # 17

How can a user achieve high availability for a web application hosted on AWS?

A.

Use a Classic Load Balancer across multiple AWS Regions

B.

Use an Application Load Balancer across multiple Availability Zones in one AWS Region

C.

Set up automatic scaling and load balancing with another application instance running on premises

D.

Use the AWS Region with the highest number of Availability Zones

Full Access
Question # 18

What is an AWS Identity and Access Management (IAM) role?

A.

A user associated with an AWS resource

B.

A group associated with an AWS resource

C.

An entity that defines a set of permissions for use with an AWS resource

D.

An authentication credential associated with a multi-factor authentication (MFA) token

Full Access
Question # 19

Using AWS Config to record audit and evaluate changes to AWS resources to enable traceability is an example of which AWS Wed-Architected Framework pillar?

A.

Security

B.

Operational excellence

C.

Performance efficiency

D.

Cost optimization

Full Access
Question # 20

Which AWS service helps users create three-dimensional applications quickly without requiring any specialized programming or three-dimensional graphics expertise?

A.

AWS RoboMaker

B.

Amazon Rekognition

C.

Amazon Sumerian

D.

Amazon GameLift

Full Access
Question # 21

The continual reduction of AWS Cloud pricing is due to:

A.

pay-as-you go pricing.

B.

the AWS global infrastructure.

C.

economies of scale.

D.

reserved storage pricing.

Full Access
Question # 22

A security engineer wants a single-tenant AWS solution to create, control, and manage their own cryptographic keys to meet regulatory compliance requirements for data security. Which AWS service should the engineer use?

A.

AWS Key Management Service (AWS KMS)

B.

AWS Certificate Manager (ACM)

C.

AWS CloudHSM

D.

AWS Systems Manager

Full Access
Question # 23

Which AWS service or feature allows a user to establish a dedicated network connection between a company's on-premises data center and the AWS Cloud?

A.

AWS Direct Connect

B.

VPC peering

C.

AWS VPN

D.

Amazon Route 53

Full Access
Question # 24

To optimize costs and resource usage, a company needs to monitor the operational health of its entire system of AWS Cloud resources.

Which AWS service will meet these requirements?

A.

AWS Organizations

B.

Amazon CloudWatch

C.

AWS CloudTrail

D.

AWS Config

Full Access
Question # 25

Which of the following can be used to identify a specific user who stopped an amazon EC2 instance?

A.

AWS CloudTrail

B.

Amazon Inspector

C.

Amazon CloudWatch

D.

VPC Flow Logs

Full Access
Question # 26

Which pillar of the AWS Well-Architected Framework specifies that resources be provisioned in a timely manner and scale as needed to maintain effectiveness as demand changes?

A.

Cost optimization

B.

Security

C.

Operational excellence

D.

Performance efficiency

Full Access
Question # 27

What is a value proposition of the AWS Cloud?

A.

AWS is responsible for security in the AWS Cloud

B.

No long-term contract is required

C.

Provision new servers in days

D.

AWS manages user applications in the AWS Cloud

Full Access
Question # 28

How can consolidated billing within AWS Organizations help lower overall monthly expenses?

A.

By providing a consolidated view of monthly billing across multiple accounts

B.

By pooling usage across multiple accounts to achieve a pricing tier discount

C.

By automating the creation of new accounts through APIs

D.

By leveraging service control policies (SCPs) tor centralized service management

Full Access
Question # 29

A company needs to improve the response rate of high-volume queries to its relational database.

Which AWS service should the company use to offload requests to the database and improve overall response times?

A.

Amazon DynamoDB Accelerator (DAX)

B.

Amazon ElastiCache

C.

Elastic Load Balancing

D.

AWS Global Accelerator

Full Access
Question # 30

A company needs to transfer a large volume of data from an -on-premises data center to the AWS Cloud. The company's internet connectivity is slow and unreliable .

Which AWS service can facilitate this data transfer?

A.

Amazon S3 Glacier

B.

AW5 Snowball

C.

AWS Storage Gateway

D.

Amazon Elastic File System (Amazon EFS)

Full Access
Question # 31

A company uses Amazon EC2 Instances in its AWS account tor several different workloads. The company needs to perform an analysis to understand the cost of each. workload. What is the MOST operationally efficient way to meet this requirement?

A.

Move the EC2 instances for each workload into separate AWS accounts.

B.

Use a different EC2 instance family for each of the workloads.

C.

Add cost allocation tags to each EC2 instance, and activate the tags

D.

Update the workload applications to publish usage data to a cost allocation database.

Full Access
Question # 32

Which AWS service enables companies to deploy an application close to end users?

A.

Amazon CloudFront

B.

AWS Auto Scaling

C.

AWS AppSync

D.

Amazon Route 53

Full Access
Question # 33

A company has an uninterruptible application that runs on Amazon EC2 instances. The application constantly processes a backlog of files in an Amazon Simple Queue Service (Amazon SQS) queue. This usage is expected to continue to grow for years.

What is the MOST cost-effective EC2 instance purchasing model to meet these requirements?

A.

Spot Instances

B.

On-Demand Instances

C.

Savings Plans

D.

Dedicated Hosts

Full Access
Question # 34

A company has stopped all of its Amazon EC2 instances but monthly billing charges continue to occur. What could be causing this? {Select TWO.)

A.

Amazon Elastic Block Store (Amazon EBS) storage charges

B.

Operating system charges

C.

Hardware charges

D.

Elastic IP charges

E.

Input/output (I/O) charges

Full Access
Question # 35

A company wants to deploy and manage a Docker-based application on AWS.

Which solution meets these requirements with the LEAST amount of operational overhead?

A.

An open-source Docker orchestrator on Amazon EC2 instances

B.

AWS AppSync

C.

Amazon Elastic Container Registry (Amazon ECR)

D.

Amazon Elastic Container Service (Amazon ECS)

Full Access
Question # 36

A customer needs to run a MySQL database that easily scales.

Which AWS service should they use?

A.

Amazon Aurora

B.

Amazon Redshift

C.

Amazon DynamoDB

D.

Amazon ElastiCache

Full Access
Question # 37

According to the AWS shared responsibility model, which of the following are AWS responsibilities? (Select TWO)

A.

Network infrastructure and visualization of infrastructure

B.

Security of application data

C.

Guest operating systems

D.

Physical security of hardware

E.

Credentials and policies

Full Access
Question # 38

A batch workload takes 5 hours to finish on an Amazon EC2 instance. The amount of data to be processed doubles monthly and the processing time is proportional What is the best cloud architecture to address this consistently growing demand?

A.

Run the application on a bigger EC2 instance size.

B.

Switch to an EC2 instance family that better matches batch requirements

C.

Distribute the application across multiple EC2 instances and run the workload in parallel.

D.

Run the application on a bare metal EC2 instance.

Full Access
Question # 39

Which tasks require the use of the AWS account root user? (Select TWO.)

A.

Launching a new Amazon EC2 instance

B.

Viewing AWS CloudTrail logs

C.

Contacting AWS Support

D.

Changing AWS Support plans

E.

Changing billing currency

Full Access
Question # 40

How can users protect against distributed denial of service (DDoS) attacks in the AWS Cloud?

A.

Use Amazon CloudWatch monitoring.

B.

Configure a firewall.

C.

Use Amazon Redshift

D.

Monitor AWS CloudTrail logging

Full Access
Question # 41

How can moving to the AWS Cloud help users reduce the time dedicated to operating system patching? (Select TWO.)

A.

Users can take advantage of managed services on AWS.

B.

Users can outsource operating system patching to the AWS Support team.

C.

AWS Professional Services will upgrade instances to the latest operating system versions.

D.

Users have the ability to use license-included Amazon EC2 instances.

E.

Users can take advantage of AWS Systems Manager features.

Full Access
Question # 42

Which AWS Cloud service provides performance recommendations for an AWS account?

A.

Amazon Inspector

B.

AWS Trusted Advisor

C.

Amazon CloudWatch

D.

AWS CloudTrail

Full Access
Question # 43

Which of the following AWS features enables a user to launch a pre-configured Amazon Elastic Compute Cloud (Amazon EC2) instance?

A.

Amazon Elastic Block Store (Amazon EBS)

B.

Amazon Machine Image

C.

Amazon EC2 Systems Manager

D.

Amazon AppStream 2.0

Full Access
Question # 44

A company wants to improve the overall availability and performance of its applications that are hosted on AWS. Which AWS service should the company use?

A.

Amazon Connect

B.

Amazon Lightsail

C.

AWS Global Accelerator

D.

AWS Storage Gateway

Full Access
Question # 45

When an Amazon EC2 instance is terminated, which AWS service can identify the user that made the API call?

A.

Amazon CloudWatch

B.

AWS CloudTrail

C.

AWS X-Ray

D.

AWS Identity and Access Management (IAM)

Full Access
Question # 46

A user is building an application on AWS that requires a backend database. The application requires access to the operating system of the instance where the database is installed in order to run scripts. Where should the database be hosted if the user's goal is to create minimum management overhead?

A.

On Amazon RDS

B.

On Amazon EC2

C.

On Amazon DynamoDB

D.

On Amazon S3

Full Access
Question # 47

Which of the following security-related services does AWS offer? (Select TWO.)

A.

Multi-factor authentication physical tokens

B.

AWS Trusted Advisor security checks

C.

Data encryption

D.

Automated penetration testing

E.

Amazon S3 copyrighted content detection

Full Access
Question # 48

Using Amazon Elastic Container Service (Amazon ECS) to break down a monolithic architecture into microservices is an example of:

A.

a loosely coupled architecture

B.

a tightly coupled architecture

C.

a stateless architecture

D.

a stateful architecture

Full Access
Question # 49

Which AWS service can be used to encrypt data at rest?

A.

Amazon GuardDuty

B.

AWS Shield

C.

AWS Security Hub

D.

AWS Key Management Service (AWS KMS)

Full Access
Question # 50

A user has underutilized on-premises resources. Which AWS Cloud concept can BEST address this Issue?

A.

High availability

B.

Elasticity

C.

Security

D.

Loose coupling

Full Access
Question # 51

A company wants to deploy its application on AWS by using Amazon EC2 instances. The application has flexible start times and end times. The application also can be restarted if necessary.

Which instance purchasing option is the MOST cost-effective for this use case?

A.

Savings Plans

B.

Reserved Instances

C.

Spot Instances

D.

On-Demand Instances

Full Access
Question # 52

How does AWS CloudFormation help users operate in the AWS Cloud?

A.

It supports the simple coding of cloud-native applications

B.

It monitors the cloud environment

C.

It automates the responses to threats, reducing remediation and recovery time

D.

It provides the ability to model and provision the resources needed for applications

Full Access
Question # 53

A large company is using the AWS Cloud for its business units. Each business until uses one VPC for each business application. The company is acquiring other companies that have their own VPCs that run new applications. The company needs to manage connectivity between its existing VPCs and the newly acquired VPCs.

Which AWS service can the company use to meet this requirement?

A.

AWS App Mesh

B.

AWS Cloud Map

C.

AWS Transit Gateway

D.

AWS Site-to-Site VPN

Full Access
Question # 54

Which of the following are advantages of AWS consolidated billing? (Select TWO.)

A.

The ability to receive one bill for multiple accounts

B.

Service limits increasing by default in all accounts

C.

A fixed discount on the monthly bill

D.

Potential volume discounts, as usage in all accounts is combined

E.

The automatic extension of the master account’s AWS support plan to all accounts

Full Access
Question # 55

A company needs to allocate AWS costs across three different departments running in a single VPC. Each department has a number of Amazon EC2 instances dedicated to the applications that are specific to the given department.

How can the costs be allocated across the three departments?

A.

Have each department tag their resources, then run a cost allocation report.

B.

Create an AWS IAM account with billing access and use the AWS CLI to view EC2 instance use statistics.

C.

Enable billing alerts through Amazon CloudWatch

D.

Configure three VPCs. allocating one tor each department

Full Access
Question # 56

A company wants to secure its consumer web application by using SSL/TLS to encrypt traffic. Which AWS service can the company use to meet this goal?

A.

AWS WAF

B.

AWS Shield

C.

Amazon VPC

D.

AWS Certificate Manager (ACM)

Full Access
Question # 57

Which of the following is an AWS value proposition that describes a user's ability to scale infrastructure based on demand?

A.

Speed of innovation

B.

Resource elasticity

C.

Decoupled architecture

D.

Global deployment

Full Access
Question # 58

Which AWS service will automatically identify and protect a user's sensitive data?

A.

Amazon GuardDuty

B.

Amazon Macie

C.

Amazon Cloud Watch

D.

Amazon Inspector

Full Access
Question # 59

Which AWS services can help reduce application latency and improve performance by using edge locations? (Select TWO.)

A.

Amazon Route 53

B.

AWS Global Accelerator

C.

AWS Direct Connect

D.

Amazon Connect

E.

Amazon CloudFront

Full Access
Question # 60

A company is building a mobile app to provide shopping recommendations lo its customers. The company wants to use a graph database as part of the shopping recommendation engine.

Which AWS database service should the company choose?

A.

Amazon DynamoDB

B.

Amazon Aurora

C.

Amazon Neptune

D.

Amazon DocumentDB (with MongoDB compatibility)

Full Access
Question # 61

Which Amazon S3 feature or storage class gives a company the ability to recover files that have been accidently deleted?

A.

S3 Intelligent-Tiering

B.

S3 Standard

C.

S3 Lifecycle policies

D.

S3 Versioning

Full Access
Question # 62

A company wants to improve its security and audit posture by limiting Amazon EC2 inbound access.

What should the company use to access instances remotely instead of opening inbound SSH ports and managing SSH keys9

A.

EC2 key pairs

B.

AWS Systems Manager Session Manager

C.

AWS Identity and Access Management (IAM)

D.

Network ACLs

Full Access
Question # 63

A company plans to migrate an on-premises Microsoft SQL Server database to the AWS Cloud The database supports a legacy application. The company wants to maintain administrative control of the database configuration and host operating system

Which AWS service or feature meets these requirements?

A.

Amazon RDS for SOL Server

B . SQL Server on Amazon EC2

B.

Amazon DynamoDB

C.

Amazon DocumentDB

Full Access
Question # 64

A company has a serverless application that includes an Amazon API Gateway DynamoDB database a function, and an Amazon Which AWS service can the company use to trace user requests as they move through the application s components ?

A.

AWS CloudTrail

B.

Amazon CloudWatch

C.

Amazon Inspector

D.

AWS X-Ray

Full Access
Question # 65

How can a user protect an Amazon EC2 instance from a suspicious IP address?

A.

Block the IP on the inbound rule of a network ACL.

B.

Block the IP on the outbound rule of a security group.

C.

Block the IP on the inbound rule of a security group and network ACL.

D.

Block the IP on the outbound rule of a security group and network ACL.

Full Access
Question # 66

Which AWS service enables users to create copies of resources across AWS Regions?

A.

Amazon ElastiCache

B.

AWS CloudFormation

C.

AWS CloudTrail

D.

AWS Systems Manager

Full Access
Question # 67

Which AWS service allows users to provision resources using a consistent and repeatable process?

A.

AWS Systems Manager

B.

AWS CloudFormation

C.

AWS Batch

D.

AWS Config

Full Access
Question # 68

A company plans to move its on-premises servers to Amazon EC2 instances. The company has 50 different business units and wants to separate each billing for each unit.

What should a cloud practitioner recommend?

A.

Use separate AWS accounts for each business unit, then filter by unit using the coverage report.

B.

Place each business unit in a different AWS Region, then filter by unit in Cost Explorer.

C.

Tag each business unit's resources, then filter by unit in Cost Explorer.

D.

Use a different VPC for each business unit, then filter by unit using an AWS Cost and Usage Report.

Full Access
Question # 69

Which of the following are benefits of using AWS Trusted Advisor? (Choose two.)

A.

Providing high-performance container orchestration

B.

Creating and rotating encryption keys

C.

Detecting underutilized resources to save costs

D.

Improving security by proactively monitoring the AWS environment

E.

Implementing enforced tagging across AWS resources

Full Access
Question # 70

Which actions are within the scope of AWS Support? (Select TWO.)

A.

Debugging custom software

B.

Troubleshooting operational problems with AWS resources

C.

Performing system administration tasks

D.

Investigating issues detected by health checks

E.

Developing application code

Full Access
Question # 71

Which AWS service or feature enables users to encrypt data at rest in Amazon S3?

A.

IAM policies

B.

Server-side encryption

C.

Amazon GuardDuty

D.

Client-side encryption

Full Access
Question # 72

A company needs to set up a notification that provides an alert when the company’s AWS account reaches a present spending limit. Which AWS service or tool can meet this requirement?

A.

AWS Cost and Usage Report

B.

AWS Budgets

C.

Cost Explorer

D.

AWS Trusted Advisor

Full Access
Question # 73

A company wants to migrate its applications from on premises to the AWS Cloud. Which AWS sen/ice or feature can help automate the migration?

A.

AWS Data Exchange

B.

CloudEndure Migration

C.

AWS AppSync

D.

AWS CloudFormation

Full Access
Question # 74

Which AWS Trusted Advisor check includes the verification of AWS CloudTraii logging?

A.

Performance

B.

Fault tolerance

C.

Security

D.

Service limits

Full Access
Question # 75

According to the AWS shared responsibility model, which task is the responsibility of AWS for workloads running on Amazon EC2?

A.

Updating the physical hardware

B.

Updating the operating system

C.

Updating the database engine

D.

Updating the user data

Full Access
Question # 76

Which AWS service or tool allows users to visualize, understand, and manage AWS costs and usage over time?

A.

AWS Budgets

B.

AWS Trusted Advisor

C.

AWS CloudTrail

D.

Cost Explorer

Full Access
Question # 77

Which AWS database allows for analytics that use SQL queries?

A.

Amazon S3

B.

Amazon Redshift

C.

Amazon DynamoDB

D.

Amazon Neplune

Full Access
Question # 78

A company uses a database that has a simple sign-up page to create users, and a basic login form to authenticate users so they can access the database. The company wants to give users the ability to store personal information, but user access must be controlled in a more secure and reliable way.

Which AWS service or feature will meet these requirements?

A.

Security groups

B.

Amazon GuardDuty

C.

AWS Secrets Manager

D.

Amazon Cognito

Full Access
Question # 79

A user wants to identify any security group that is allowing unrestricted incoming SSH traffic Which AWS service can be used to accomplish this goal?

A.

Amazon Cognito

B.

AWS Shield

C.

Amazon Macie

D.

AWS Trusted Advisor

Full Access
Question # 80

A company has a global website with static content.

Which AWS service will deliver the static content with low latency?

A.

AWS Lambda

B.

Amazon CloudFront

C.

Amazon EC2 Auto Scaling

D.

AWS Compute Optimizer

Full Access
Question # 81

Which AWS services or tools can help optimize the costs of AWS resources? (Select TWO.)

A.

AWS Trusted Advisor

B.

AWS CloudTrail

C.

AWS Personal Health Dashboard

D.

AWS Pricing Calculator

E.

Cost Explorer

Full Access
Question # 82

A company needs to establish a private virtual interface (VIF) from its on-premises network directly to its VPC. Which AWS connectivity option should the company use?

A.

VPC peering

B.

AWS PrivateLink

C.

AWS Global Accelerator

D.

AWS Direct Connect

Full Access
Question # 83

What is one of the core principles to follow when designing a highly available application in the AWS Cloud?

A.

Design using a serverless architecture.

B.

Assume that all components within an application can fail.

C.

Design AWS Auto Scaling Into every application.

D.

Design all components using open-source code.

Full Access