AWS Certified Solutions Architect – Professional SAP-C01 – Question309

A user has created an AWS AMI. The user wants the AMI to be available only to his friend and not anyone else. How can the user manage this?

A.
Share the AMI with the community and setup the approval workflow before anyone launches it.
B. It is not possible to share the AMI with the selected user.
C. Share the AMI with a friend's AWS account ID.
D. Share the AMI with a friend's AWS login ID.

Correct Answer: C

Explanation:

Explanation: In Amazon Web Services, if a user has created an AMI and wants to share with his friends and colleagues he can share the AMI with their AWS account ID. Once the AMI is shared the other user can access it from the community AMIs under private AMIs options.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/sharingamis-expl…

AWS Certified Solutions Architect – Professional SAP-C01 – Question308

Will you be able to access EC2 snapshots using the regular Amazon S3 APIs?

A.
Yes, you will be able to access using S3 APIs if you have chosen the snapshot to be stored in S3.
B. No, snapshots are only available through the Amazon EBS APIs.
C. Yes, you will be able to access them using S3 APIs as all snapshots are stored in S3.
D. No, snapshots are only available through the Amazon EC2 APIs.

Correct Answer: D

Explanation:

Explanation: No, snapshots are only available through the Amazon EC2 APIs.
Reference:
https://aws.amazon.com/ec2/faqs/

AWS Certified Solutions Architect – Professional SAP-C01 – Question307

While assigning a tag to an instance, which of the below mentioned options is not a valid tag key/value pair?

A.
Key : "aws" Value:"aws"
B. Key: "aws:name" Value: "instanceAnswer: Aws"
C. Key: "Name :aws" Value: "instanceAnswer: Aws"
D. Key : "nameAnswer: Aws" Value:"aws:instance"

Correct Answer: B

Explanation:

Explanation: In Amazon Web Services, to help manage EC2 instances as well their usage in a better way, the user can tag the instances. The tags are metadata assigned by the user which consists of a key and value. The tag key cannot have a prefix as “aws:”, although it can have only “aws”.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Tags.html

AWS Certified Solutions Architect – Professional SAP-C01 – Question306

A user is accessing an EC2 instance on the SSH port for IP 10.20.30.40/32.
Which one is a secure way to configure that the instance can be accessed only from this IP?

A.
In the security group, open port 22 for IP 10.20.30.40
B. In the security group, open port 22 for IP 10.20.30.0
C. In the security group, open port 22 for IP 10.20.30.40/32
D. In the security group, open port 22 for IP 10.20.30.40/0

Correct Answer: C

Explanation:

Explanation: In AWS EC2, while configuring a security group, the user needs to specify the IP address in CIDR notation. The CIDR IP range 10.20.30.40/32 says it is for a single IP 10.20.30.40. If the user specifies the IP as 10.20.30.40 only, the security group will not accept and ask for it in a CIDR format.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-se…

AWS Certified Solutions Architect – Professional SAP-C01 – Question305

You have a website which requires international presence and consequently you have set it up as follows. It is hosted on 30 EC2 instances. It is on in 15 regions around the globe. Each region has 2 instances. All the instances are a public hosted zone.
Which of the following is the best way to configure your site to maintain availability with minimum downtime if one of the 15 regions was to lose network connectivity for an extended period? (Choose two.)

A.
Create a Route 53 Latency Based Routing Record set that resolves to an Elastic Load Balancer in each region and has the Evaluate Target Health flag set to true.
B. Create a Route 53 failover routing policy and configure an active-passive failover.
C. Create a Route 53 Failover Routing Policy and assign each resource record set a unique identifier and a relative weight.
D. Create a Route 53 Geolocation Routing Policy that resolves to an Elastic Load Balancer in each region and has the Evaluate Target Health flag set to false.

Correct Answer: AB

Explanation:

Explanation: It is best to use the latency routing policy when you have resources in multiple Amazon EC2 data centers that perform the same function and you want Amazon Route 53 to respond to DNS queries with the resources that provide the best latency. You could also use the failover routing policy (for public hosted zones only) when you want to configure an active-passive failover, in which one resource takes all traffic when it’s available and the other resource takes all traffic when the first resource isn’t available.
Reference:
http://docs.aws.amazon.com/Route53/latest/DeveloperGuide/routing-po…

AWS Certified Solutions Architect – Professional SAP-C01 – Question304

A user has configured two security groups which allow traffic as given below: 1: SecGrp1:
Inbound on port 80 for 0.0.0.0/0
Inbound on port 22 for 0.0.0.0/0 2: SecGrp2: Inbound on port 22 for 10.10.10.1/32
If both the security groups are associated with the same instance, which of the below mentioned statements is true?

A.
It is not possible to have more than one security group assigned to a single instance
B. It is not possible to create the security group with conflicting rules. AWS will reject the request
C. It allows inbound traffic for everyone on both ports 22 and 80
D. It allows inbound traffic on port 22 for IP 10.10.10.1 and for everyone else on port 80

Correct Answer: C

Explanation:

Explanation: A user can attach more than one security group to a single EC2 instance. In this case, the rules from each security group are effectively aggregated to create one set of rules. AWS uses this set of rules to determine whether to allow access or not. Thus, here the rule for port 22 with IP 10.10.10.1/32 will merge with IP 0.0.0.0/0 and open ports 22 and 80 for all.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-se…

AWS Certified Solutions Architect – Professional SAP-C01 – Question303

An organization hosts an app on EC2 instances which multiple developers need access to in order to perform updates. The organization plans to implement some security best practices related to instance access.
Which one of the following recommendations will not help improve its security in this way?

A.
Disable the password based login for all the users. All the users should use their own keys to connect with the instance securely.
B. Create an IAM policy allowing only IAM users to connect to the EC2 instances with their own SSH key.
C. Create a procedure to revoke the access rights of the individual user when they are not required to connect to EC2 instance anymore for the purpose of application configuration.
D. Apply the latest patch of OS and always keep it updated.

Correct Answer: B

Explanation:

Explanation: Since AWS is a public cloud any application hosted on EC2 is prone to hacker attacks. It becomes extremely important for a user to setup a proper security mechanism on the EC2 instances. A few of the security measures are listed below:
Always keep the OS updated with the latest patch

  • Always create separate users with in OS if they need to connect with the EC2 instances, create their keys and disable their password
  • Create a procedure using which the admin can revoke the access of the user when the business work on the EC2 instance is completed. . Lock down unnecessary ports
  • Audit any proprietary applications that the user may be running on the EC2 instance. Provide temporary escalated

privileges, such as sudo for users who need to perform occasional privileged tasks IAM is useful when users are required to work with AWS resources and actions, such as launching an instance. It is not useful in this case because it does not manage who can connect via RDP or SSH with an instance.
Reference:
http://aws.amazon.com/articles/1233/

AWS Certified Solutions Architect – Professional SAP-C01 – Question302

In CloudFormation, if you want to map an Amazon Elastic Block Store to an Amazon EC2 instance, _________.

A.
you reference the logical IDs to associate the block stores with the instance
B. you reference the physical IDs of the instance along with the resource type
C. you reference the instance IDs of the block store along with the resource properties
D. you reference the physical IDs of both the block stores and the instance

Correct Answer: A

Explanation:

Explanation: In AWS CloudFormation, if you want to map an Amazon Elastic Block Store to an Amazon EC2 instance, you reference the logical IDs to associate the block stores with the instance.
Reference:
http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/conce…

AWS Certified Solutions Architect – Professional SAP-C01 – Question301

You have written a CloudFormation template that creates 1 Elastic Load Balancer fronting 2 EC2 Instances.
Which section of the template should you edit so that the DNS of the load balancer is returned upon creation of the stack?

A.
Parameters
B. Outputs
C. Mappings
D. Resources

Correct Answer: B

Explanation:

Explanation: You can use AWS CloudFormation’s sample templates or create your own templates to describe the AWS resources, and any associated dependencies or runtime parameters, required to run your application. In the following example, the output named BackupLoadBalancerDNSName returns the DNS name for the resource with the logical ID BackupLoadBalancer only when the CreateProdResources condition is true. (The second output shows how to specify multiple outputs.)
“Outputs” : { “BackupLoadBalancerDNSName” : { “Description”: “The DNSName of the backup load balancer”, “Value” : { “Fn::GetAtt” : [ “BackupLoadBalancer”, “DNSName” ]}, “Condition” : “CreateProdResources” }, “InstanceID” : { “Description”: “The Instance ID”, “Value” : { “Ref” : “EC2Instance” } } }
Reference:
http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/outpu…

AWS Certified Solutions Architect – Professional SAP-C01 – Question300

Which system is used by Amazon Machine Images paravirtual (PV) virtualization during the boot process?

A.
PV-BOOT
B. PV-AMI
C. PV-WORM
D. PV-GRUB

Correct Answer: D

Explanation:

Explanation: Amazon Machine Images that use paravirtual (PV) virtualization use a system called PV-GRUB during the boot process. PVGRUB is a paravirtual boot loader that runs a patched version of GNU GRUB 0.97. When you start an instance, PV-GRUB starts the boot process and then chain loads the kernel specified by your image’s menu.lst file.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/UserProvidedKern…