amazon AWS Certified Solutions Architect - Professional SAP-C01 online exam

What students need to know about the aws-certified-solutions-architect-professional-sap-c01 exam

  • Total 869 Questions & Answers

Question 1

A company decided to purchase Amazon EC2 Reserved Instances. A solutions architect is tasked with implementing a
solution where only the master account in AWS Organizations is able to purchase the Reserved Instances. Current and
future member accounts should be blocked from purchasing Reserved Instances.
Which solution will meet these requirements?

  • A. Create an SCP with the Deny effect on the ec2:PurchaseReservedInstancesOffering action. Attach the SCP to the root of the organization.
  • B. Create a new organizational unit (OU) Move all current member accounts to the new OU. Create an SCP with the Deny effect on the ec2:PurchaseReservedInstancesOffering action. Attach the SCP to the new OU.
  • C. Create an AWS Config rule event that triggers automation that will terminate any Reserved Instances launched by member accounts.
  • D. Create two new organizational units (OUs): OU1 and OU2. Move all member accounts to OU2 and the master account to OU1. Create an SCP with the Allow effect on the ec2:PurchaseReservedInstancesOffering action. Attach the SCP to OU1.
Answer:

C

Discussions

Question 2

A company has a standard three-tier architecture using two Availability Zones. During the companys off season, users
report that the website is not working. The Solutions Architect finds that no changes have been made to the environment
recently, the website is reachable, and it is possible to log in. However, when the Solutions Architect selects the find a store
near you function, the maps provided on the site by a third-party RESTful API call do not work about 50% of the time after
refreshing the page. The outbound API calls are made through Amazon EC2 NAT instances.
What is the MOST likely reason for this failure and how can it be mitigated in the future?

  • A. The network ACL for one subnet is blocking outbound web traffic. Open the network ACL and prevent administration from making future changes through IAM.
  • B. The fault is in the third-party environment. Contact the third party that provides the maps and request a fix that will provide better uptime.
  • C. One NAT instance has become overloaded. Replace both EC2 NAT instances with a larger-sized instance and make sure to account for growth when making the new instance size.
  • D. One of the NAT instances failed. Recommend replacing the EC2 NAT instances with a NAT gateway.
Answer:

D

Explanation:
The issue is 50% failure, means the balancing over 2 AZs is failing on one NAT instance in one AZ. The solution is to
replace the NAT instance with fully managed and high available NAT gateway.

Discussions

Question 3

A user authenticating with Amazon Cognito will go through a multi-step process to bootstrap their credentials. Amazon
Cognito has two different flows for authentication with public providers.
Which of the following are the two flows?

  • A. Authenticated and non-authenticated
  • B. Public and private
  • C. Enhanced and basic
  • D. Single step and multistep
Answer:

C

Explanation:
A user authenticating with Amazon Cognito will go through a multi-step process to bootstrap their credentials. Amazon
Cognito has two different flows for authentication with public providers: enhanced and basic.
Reference:
http://docs.aws.amazon.com/cognito/devguide/identity/concepts/authentication-flow/

Discussions

Question 4

A mobile app has become very popular, and usage has gone from a few hundred to millions of users. Users capture and
upload images of activities within a city, and provide ratings and recommendations. Data access patterns are unpredictable.
The current application is hosted on Amazon EC2 instances behind an Application Load Balancer (ALB). The application is
experiencing slowdowns and costs are growing rapidly.
Which changes should a solutions architect make to the application architecture to control costs and improve performance?

  • A. Create an Amazon CloudFront distribution and place the ALB behind the distribution. Store static content in Amazon S3 in an Infrequent Access storage class.
  • B. Store static content in an Amazon S3 bucket using the Intelligent Tiering storage class. Use an Amazon CloudFront distribution in front of the S3 bucket and the ALB.
  • C. Place AWS Global Accelerator in front of the ALB. Migrate the static content to Amazon EFS, and then run an AWS Lambda function to resize the images during the migration process.
  • D. Move the application code to AWS Fargate containers and swap out the EC2 instances with the Fargate containers.
Answer:

B

Discussions

Question 5

A group of research institutions and hospitals are in a partnership to study 2 PBs of genomic data. The institute that owns the
data stores it in an Amazon S3 bucket and updates it regularly. The institute would like to give all of the organizations in the
partnership read access to the data. All members of the partnership are extremely cost-conscious, and the institute that
owns the account with the S3 bucket is concerned about covering the costs for requests and data transfers from Amazon S3.
Which solution allows for secure datasharing without causing the institute that owns the bucket to assume all the costs for S3
requests and data transfers?

  • A. Ensure that all organizations in the partnership have AWS accounts. In the account with the S3 bucket, create a cross- account role for each account in the partnership that allows read access to the data. Have the organizations assume and use that read role when accessing the data.
  • B. Ensure that all organizations in the partnership have AWS accounts. Create a bucket policy on the bucket that owns the data. The policy should allow the accounts in the partnership read access to the bucket. Enable Requester Pays on the bucket. Have the organizations use their AWS credentials when accessing the data.
  • C. Ensure that all organizations in the partnership have AWS accounts. Configure buckets in each of the accounts with a bucket policy that allows the institute that owns the data the ability to write to the bucket. Periodically sync the data from the institutes account to the other organizations. Have the organizations use their AWS credentials when accessing the data using their accounts.
  • D. Ensure that all organizations in the partnership have AWS accounts. In the account with the S3 bucket, create a cross- account role for each account in the partnership that allows read access to the data. Enable Requester Pays on the bucket. Have the organizations assume and use that read role when accessing the data.
Answer:

A

Discussions

Question 6

A Solutions Architect is designing a highly available and reliable solution for a cluster of Amazon EC2 instances.
The Solutions Architect must ensure that any EC2 instance within the cluster recovers automatically after a system failure.
The solution must ensure that the recovered instance maintains the same IP address.
How can these requirements be met?

  • A. Create an AWS Lambda script to restart any EC2 instances that shut down unexpectedly.
  • B. Create an Auto Scaling group for each EC2 instance that has a minimum and maximum size of 1.
  • C. Create a new t2.micro instance to monitor the cluster instances. Configure the t2.micro instance to issue an aws ec2 reboot-instances command upon failure.
  • D. Create an Amazon CloudWatch alarm for the StatusCheckFailed_System metric, and then configure an EC2 action to recover the instance.
Answer:

D

Explanation:
Reference: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-recover.html

Discussions

Question 7

Which of the following cannot be used to manage Amazon ElastiCache and perform administrative tasks?

  • A. AWS software development kits (SDKs)
  • B. Amazon S3
  • C. ElastiCache command line interface (CLI)
  • D. AWS CloudWatch
Answer:

D

Explanation:
CloudWatch is a monitoring tool and doesn't give users access to manage Amazon ElastiCache.
Reference: http://docs.aws.amazon.com/AmazonElastiCache/latest/UserGuide/WhatIs.Managing.html

Discussions

Question 8

You are designing a data leak prevention solution for your VPC environment. You want your VPC Instances to be able to
access software depots and distributions on the Internet for product updates. The depots and distributions are accessible via
third party CDNs by their URLs.
You want to explicitly deny any other outbound connections from your VPC instances to hosts on the internet.
Which of the following options would you consider?

  • A. Configure a web proxy server in your VPC and enforce URL-based rules for outbound access Remove default routes.
  • B. Implement security groups and configure outbound rules to only permit traffic to software depots.
  • C. Move all your instances into private VPC subnets remove default routes from all routing tables and add specific routes to the software depots and distributions only.
  • D. Implement network access control lists to all specific destinations, with an Implicit deny all rule.
Answer:

A

Explanation:
Organizations usually implement proxy solutions to provide URL and web content filtering, IDS/IPS, data loss prevention,
monitoring, and advanced threat protection. Reference: https://d0.awsstatic.com/aws-
answers/Controlling_VPC_Egress_Traffic.pdf

Discussions

Question 9

A finance company is running its business-critical application on current-generation Linux EC2 instances. The application
includes a self-managed MySQL database performing heavy I/O operations. The application is working fine to handle a
moderate amount of traffic during the month. However, it slows down during the final three days of each month due to
month-end reporting, even though the company is using Elastic Load Balancers and Auto Scaling within its infrastructure to
meet the increased demand.
Which of the following actions would allow the database to handle the month-end load with the LEAST impact on
performance?

  • A. Pre-warming Elastic Load Balancers, using a bigger instance type, changing all Amazon EBS volumes to GP2 volumes.
  • B. Performing a one-time migration of the database cluster to Amazon RDS, and creating several additional read replicas to handle the load during end of month.
  • C. Using Amazon CloudWatch with AWS Lambda to change the type, size, or IOPS of Amazon EBS volumes in the cluster based on a specific CloudWatch metric.
  • D. Replacing all existing Amazon EBS volumes with new PIOPS volumes that have the maximum available storage size and I/O per second by taking snapshots before the end of the month and reverting back afterwards.
Answer:

D

Discussions

Question 10

A company is adding a new approved external vendor that only supports IPv6 connectivity. The companys backend systems
sit in the private subnet of an Amazon VPC. The company uses a NAT gateway to allow these systems to communicate with
external vendors over IPv4. Company policy requires systems that communicate with external vendors to use a security
group that limits access to only approved external vendors. The virtual private cloud (VPC) uses the default network ACL.
The Systems Operator successfully assigns IPv6 addresses to each of the backend systems. The Systems Operator also
updates the outbound security group to include the IPv6 CIDR of the external vendor (destination). The systems within the
VPC are able to ping one another successfully over IPv6. However, these systems are unable to communicate with the
external vendor.
What changes are required to enable communication with the external vendor?

  • A. Create an IPv6 NAT instance. Add a route for destination 0.0.0.0/0 pointing to the NAT instance.
  • B. Enable IPv6 on the NAT gateway. Add a route for destination ::/0 pointing to the NAT gateway.
  • C. Enable IPv6 on the internet gateway. Add a route for destination 0.0.0.0/0 pointing to the IGW.
  • D. Create an egress-only internet gateway. Add a route for destination ::/0 pointing to the gateway.
Answer:

D

Explanation:
Reference:
https://docs.aws.amazon.com/vpc/latest/userguide/egress-only-internet-gateway.html

Discussions
To page 2