Search Header Logo

AWS Solution Architect

Authored by Priyaadharshini M

Computers

University

Used 13+ times

AWS Solution Architect
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company must migrate 20 TB of data from a data centre to the AWS Cloud within 30 days. The company's network bandwidth is limited to 15 Mbps and cannot exceed 70% utilization. What should a solutions architect do to meet these requirements?

AWS Snowball

AWS DataSyn

AWS S3

AWS Glacier

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A solutions architect must create a highly available bastion host architecture. The solution needs to be resilient within a single AWS Region and should require only minimal effort to maintain. What should the solutions architect do to meet these requirements?

. Create a Network Load Balancer backed by an Auto Scaling group with a UDP listener.

Create a Network Load Balancer backed by a Spot Fleet with instances in a partition placement group

Create a Network Load Balancer backed by the existing servers in different Availability Zones as the target

Create a Network Load Balancer backed by an Auto Scaling group with instances in multiple Availability Zones as the target

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company is running a highly sensitive application on Amazon EC2 backed by an Amazon RDS database Compliance regulations mandate that all personally identifiable information (Pll) be encrypted at rest. Which solution should a solutions architect recommend to meet this requirement with the LEAST amount of changes to the infrastructure?

Deploy AWS Certificate Manager to generate certificates Use the certificates to encrypt the database volume

Deploy AWS CloudHSM, generate encryption keys, and use the customer master key (CMK) to encrypt database volumes

Configure SSL encryption using AWS Key Management Service customer master keys (AWS KMS CMKs) to encrypt database volumes.

Configure Amazon Elastic Block Store (Amazon EBS) encryption and Amazon RDS encryption with AWS Key Management Service (AWS KMS) keys to encrypt instance and database volumes

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company is storing an access key (access key ID and secret access key) in a text file on a custom AMI. The company uses the access key to access DynamoDB tables from instances created from the AMI. The security team has mandated a more secure solution. Which solution will meet the security team’s mandate?

Put the access key in an S3 bucket, and retrieve the access key on boot from the instance.

Pass the access key to the instances through instance user data.

Obtain the access key from a key server launched in a private subnet.

Create an IAM role with permissions to access the table, and launch all instances with the new role.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Company salespeople upload their sales figures daily. A Solutions Architect needs a durable storage solution for these documents that also protects against users accidentally deleting important documents. Which action will protect against unintended user actions?

Store data in an EBS volume and create snapshots once a week.

Store data in an S3 bucket and enable versioning.

Store data in two S3 buckets in different AWS regions.

Store data on EC2 instance storage.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An application saves the logs to an S3 bucket. A user wants to keep the logs for one month for troubleshooting purposes, and then purge the logs. What feature will enable this?

Adding a bucket policy on the S3 bucket.

Configuring lifecycle configuration rules on the S3 bucket.

Creating an IAM policy for the S3 bucket.

Enabling CORS on the S3 bucket.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization is building an Amazon Redshift cluster in their shared services VPC. The cluster will host sensitive data. How can the organization control which networks can access the cluster?

Run the cluster in a different VPC and connect through VPC peering.

Create a database user inside the Amazon Redshift cluster only for users on the network.

Define a cluster security group for the cluster that allows access from the allowed networks.

Only allow access to networks that connect with the shared services network via VPN.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers