AWS Certified Solutions Architect – Professional SAP-C01 – Question239

In Amazon Cognito what is a silent push notification?

A.
It is a push message that is received by your application on a user's device that will not be seen by the user.
B. It is a push message that is received by your application on a user's device that will return the user's geolocation.
C. It is a push message that is received by your application on a user's device that will not be heard by the user.
D. It is a push message that is received by your application on a user's device that will return the user's authentication credentials.

Correct Answer: A

Explanation:

Explanation: Amazon Cognito uses the Amazon Simple Notification Service (SNS) to send silent push notifications to devices. A silent push notification is a push message that is received by your application on a user’s device that will not be seen by the user.
Reference:
http://aws.amazon.com/cognito/faqs/

AWS Certified Solutions Architect – Professional SAP-C01 – Question238

In the context of Amazon ElastiCache CLI, which of the following commands can you use to view all ElastiCache instance events for the past 24 hours?

A.
elasticache-events –duration 24
B. elasticache-events –duration 1440
C. elasticache-describe-events –duration 24
D. elasticache describe-events –source-type cache-cluster –duration 1440

Correct Answer: D

Explanation:

Explanation: In Amazon ElastiCache, the code “aws elasticache describe-events –source-type cache-cluster — duration 1440” is used to list the cache-cluster events for the past 24 hours (1440 minutes).
Reference:
http://docs.aws.amazon.com/AmazonElastiCache/latest/UserGuide/ECEve…

AWS Certified Solutions Architect – Professional SAP-C01 – Question237

In the context of IAM roles for Amazon EC2, which of the following NOT true about delegating permission to make API requests?

A.
You cannot create an IAM role.
B. You can have the application retrieve a set of temporary credentials and use them.
C. You can specify the role when you launch your instances.
D. You can define which accounts or AWS services can assume the role.

Correct Answer: A

Explanation:

Explanation: Amazon designed IAM roles so that your applications can securely make API requests from your instances, without requiring you to manage the security credentials that the applications use. Instead of creating and distributing your AWS credentials, you can delegate permission to make API requests using IAM roles as follows: Create an IAM role. Define which accounts or AWS services can assume the role. Define which API actions and resources the application can use after assuming the role. Specify the role when you launch your instances. Have the application retrieve a set of temporary credentials and use them.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-am…

AWS Certified Solutions Architect – Professional SAP-C01 – Question236

Out of the striping options available for the EBS volumes, which one has the following disadvantage: 'Doubles the amount of I/O required from the instance to EBS compared to RAID 0, because you're mirroring all writes to a pair of volumes, limiting how much you can stripe.'?

A.
Raid 1
B. Raid 0
C. RAID 1+0 (RAID 10)
D. Raid 2

Correct Answer: C

Explanation:

Explanation: RAID 1+0 (RAID 10) doubles the amount of I/O required from the instance to EBS compared to RAID 0, because you’re mirroring all writes to a pair of volumes, limiting how much you can stripe.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/raid-config.html

AWS Certified Solutions Architect – Professional SAP-C01 – Question235

Identify a true statement about using an IAM role to grant permissions to applications running on Amazon EC2 instances.

A.
When AWS credentials are rotated; developers have to update only the root Amazon EC2 instance that uses their credentials.
B. When AWS credentials are rotated, developers have to update only the Amazon EC2 instance on which the password policy was applied and which uses their credentials.
C. When AWS credentials are rotated, you don't have to manage credentials and you don't have to worry about long-term security risks.
D. When AWS credentials are rotated, you must manage credentials and you should consider precautions for long-term security risks.

Correct Answer: C

Explanation:

Explanation: Using IAM roles to grant permissions to applications that run on EC2 instances requires a bit of extra configuration. Because role credentials are temporary and rotated automatically, you don’t have to manage credentials, and you don’t have to worry about long-term security risks.
Reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/role-usecase-ec2app…

AWS Certified Solutions Architect – Professional SAP-C01 – Question234

In Amazon Redshift, how many slices does a dw2.8xlarge node have?

A.
16
B. 8
C. 32
D. 2

Correct Answer: C

Explanation:

Explanation: The disk storage for a compute node in Amazon Redshift is divided into a number of slices, equal to the number of processor cores on the node. For example, each DW1.XL compute node has two slices, and each DW2.8XL compute node has 32 slices.
Reference:
http://docs.aws.amazon.com/redshift/latest/dg/t_Distributing_data.html

AWS Certified Solutions Architect – Professional SAP-C01 – Question233

True or False: The Amazon ElastiCache clusters are not available for use in VPC at this time.

A.
TRUE
B. True, but they are available only in the GovCloud.
C. True, but they are available only on request
D. FALSE

Correct Answer: D

Explanation:

Explanation: Amazon Elasticache clusters can be run in an Amazon VPC. With Amazon VPC, you can define a virtual network topology and customize the network configuration to closely resemble a traditional network that you might operate in your own datacenter. You can now take advantage of the manageability, availability and scalability benefits of Amazon ElastiCache Clusters in your own isolated network. The same functionality of Amazon ElastiCache, including automatic failure detection, recovery, scaling, auto discovery, Amazon CloudWatch metrics, and software patching, are now available in Amazon VPC.
Reference:
http://aws.amazon.com/about-aws/whats-new/2012/12/20/amazon-elastic…

AWS Certified Solutions Architect – Professional SAP-C01 – Question232

A user has created a VPC with CIDR 20.0.0.0/16. The user has created one subnet with CIDR 20.0.0.0/16 in this VPC. The user is trying to create another subnet with the same VPC for CIDR 20.0.0.1/24.
What will happen in this scenario?

A.
The VPC will modify the first subnet CIDR automatically to allow the second subnet IP range
B. The second subnet will be created
C. It will throw a CIDR overlaps error
D. It is not possible to create a subnet with the same CIDR as VPC

Correct Answer: C

Explanation:

Explanation: A Virtual Private Cloud (VPC) is a virtual network dedicated to the user’s AWS account. A user can create a subnet with VPC and launch instances inside that subnet. The user can create a subnet with the same size of VPC. However, he cannot create any other subnet since the CIDR of the second subnet will conflict with the first subnet.
Reference:
http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Subnets.html

AWS Certified Solutions Architect – Professional SAP-C01 – Question231

ABC has created a multi-tenant Learning Management System (LMS). The application is hosted for five different tenants (clients) in the VPCs of the respective AWS accounts of the tenant. ABC wants to setup a centralized server which can connect with the LMS of each tenant upgrade if required. ABC also wants to ensure that one tenant VPC should not be able to connect to the other tenant VPC for security reasons.
How can ABC setup this scenario?

A.
ABC has to setup one centralized VPC which will peer in to all the other VPCs of the tenants.
B. ABC should setup VPC peering with all the VPCs peering each other but block the IPs from CIDR of the tenant VPCs to deny them.
C. ABC should setup all the VPCs with the same CIDR but have a centralized VPC. This way only the centralized VPC can talk to the other VPCs using VPC peering.
D. ABC should setup all the VPCs meshed together with VPC peering for all VPCs.

Correct Answer: A

Explanation:

Explanation: A Virtual Private Cloud (VPC) is a virtual network dedicated to the user’s AWS account. It enables the user to launch AWS resources into a virtual network that the user has defined. A VPC peering connection allows the user to route traffic between the peer VPCs using private IP addresses as if they are a part of the same network. This is helpful when one VPC from the same or different AWS account wants to connect with resources of the other VPC. The organization wants to setup that one VPC can connect with all the other VPCs but all other VPCs cannot connect among each other. This can be achieved by configuring VPC peering where one VPC is peered with all the other VPCs, but the other VPCs are not peered to each other. The VPCs are in the same or a separate AWS account and should not have overlapping CIDR blocks.
Reference:
http://docs.aws.amazon.com/AmazonVPC/latest/PeeringGuide/peering-co…

AWS Certified Solutions Architect – Professional SAP-C01 – Question230

Can a Direct Connect link be connected directly to the Internet?

A.
Yes, this can be done if you pay for it.
B. Yes, this can be done only for certain regions.
C. Yes
D. No

Correct Answer: D

Explanation:

Explanation: AWS Direct Connect is a network service that provides an alternative to using the Internet to utilize AWS cloud service. Hence, a Direct Connect link cannot be connected to the Internet directly.
Reference:
http://aws.amazon.com/directconnect/faqs/