0/65
90:00
1. AWS recommends some practices to help organizations avoid unexpected charges on their bill. Which of the following is NOT one of these practices?
2. Select TWO examples of the AWS shared controls.
3. Which of the following activities may help reduce your AWS monthly costs?
4. What is the AWS service that provides you the highest level of control over the underlying virtual infrastructure?
5. Which options does AWS make available for customers who want to learn about security in the cloud in an instructor-led setting? (Select TWO)
6. Which service is used to ensure that messages between software components are not lost if one or more components fail?
7. Which AWS services can be used to improve the performance of a global application and reduce latency for its users? (Choose TWO)
8. A company is concerned that they are spending money on underutilized compute resources in AWS. Which AWS feature will help ensure that their applications are automatically adding/removing EC2 compute capacity to closely match the required demand?
9. Which of the following EC2 instance purchasing options supports the Bring Your Own License (BYOL) model for almost every BYOL scenario?
10. Which AWS support plan includes a dedicated Technical Account Manager?
11. Which of the following procedures will help reduce your Amazon S3 costs?
12. What does Amazon ElastiCache provide?
13. Which AWS Service can be used to establish a dedicated, private network connection between AWS and your datacenter?
14. The principle "design for failure and nothing will fail" is very important when designing your AWS Cloud architecture. Which of the following would help adhere to this principle? (Choose TWO)
15. Which of the following services will help businesses ensure compliance in AWS?
16. Which of the following aspects of security are managed by AWS? (Choose TWO)
17. Your company is designing a new application that will store and retrieve photos and videos. Which of the following services should you recommend as the underlying storage mechanism?
18. Jessica is managing an e-commerce web application in AWS. The application is hosted on six EC2 instances. One day, three of the instances crashed; but none of her customers were affected. What has Jessica done correctly in this scenario?
19. A company has moved to AWS recently. Which of the following AWS Services will help ensure that they have the proper security settings? (Choose TWO)
20. Which statement best describes the operational excellence pillar of the AWS Well-Architected Framework?
21. Based on the AWS Shared Responsibility Model, which of the following are the sole responsibility of AWS? (Choose TWO)
22. Which of the following AWS services can be used as a compute resource? (Choose TWO)
23. You are working on two projects that require completely different network configurations. Which AWS service or feature will allow you to isolate resources and network configurations?
24. Which of the following AWS security features is associated with an EC2 instance and functions to filter incoming traffic requests?
25. Which S3 storage class is best for data with unpredictable access patterns?
26. Which of the following is equivalent to a user name and password and is used to authenticate your programmatic access to AWS services and APIs?
27. A global company with a large number of AWS accounts is seeking a way in which they can centrally manage billing and security policies across all accounts. Which AWS Service will assist them in meeting these goals?
28. You work as an on-premises MySQL DBA. The work of database configuration, backups, patching, and DR can be time-consuming and repetitive. Your company has decided to migrate to the AWS Cloud. Which of the following can help save time on database maintenance so you can focus on data architecture and performance?
29. What are the AWS services/features that can help you maintain a highly available and fault-tolerant architecture in AWS? (Choose TWO)
30. A company is introducing a new product to their customers, and is expecting a surge in traffic to their web application. As part of their Enterprise Support plan, which of the following provides the company with architectural and scaling guidance?
31. What are the default security credentials that are required to access the AWS management console for an IAM user account?
32. According to the AWS Shared responsibility model, which of the following are the responsibility of the customer? (Choose TWO)
33. Which AWS security service protects applications from distributed denial of service attacks with always-on detection and automatic inline mitigations?
34. Using Amazon RDS falls under the shared responsibility model. Which of the following are customer responsibilities? (Choose TWO)
35. What is an example of agility in the AWS Cloud?
36. What is the AWS serverless service that allows you to run your applications without any administrative burden?
37. What is the AWS database service that allows you to upload data structured in key-value format?
38. A company has a large amount of structured data stored in their on-premises data center. They are planning to migrate all the data to AWS, what is the most appropriate AWS database option?
39. What is the AWS service/feature that takes advantage of Amazon CloudFront's globally distributed edge locations to transfer files to S3 with higher upload speeds?
40. What are the change management tools that helps AWS customers audit and monitor all resource changes in their AWS environment? (Choose TWO)
41. Which of the below are responsibilities of the customer when using Amazon EC2? (Choose TWO)
42. Which service provides object-level storage in AWS?
43. What are the benefits of using the AWS Cloud for companies with customers in many countries around the world? (Choose two.)
44. AWS has created a large number of Edge Locations as part of its Global Infrastructure. Which of the following is NOT a benefit of using Edge Locations?
45. Which of the following is used to control network traffic in AWS? (Choose TWO)
46. Which of the following is one of the benefits of moving infrastructure from an on-premises data center to AWS?
47. According to the AWS Acceptable Use Policy, which of the following statements is true regarding penetration testing of EC2 instances?
48. Which of the following services can help protect your web applications from SQL injection and other vulnerabilities in your application code?
49. What are two advantages of using Cloud Computing over using traditional data centers? (Choose TWO)
50. An organization needs to analyze and process a large number of data sets. Which AWS service should they use?
51. The use of what AWS feature or service allows companies to track and categorize spending on a detailed level?
52. What is the AWS feature that provides an additional level of security above the default authentication mechanism of usernames and passwords?
53. In your on-premises environment, you can create as many virtual servers as you need from a single template. What can you use to perform the same in AWS?
54. What is the AWS service that enables you to manage all of your AWS accounts from a single master account?
55. Which of the below is a best-practice when designing solutions on AWS?
56. A company has created a solution that helps AWS customers improve their architectures on AWS. Which AWS program may support this company?
57. What does AWS Shield Standard provide?
58. What is the AWS service that provides a virtual network dedicated to your AWS account?
59. What is the recommended storage option when hosting an often-changing database on an Amazon EC2 instance?
60. How are AWS customers billed for Linux-based Amazon EC2 usage?
61. A company wants to set up a highly available workload in AWS with a disaster recovery plan that will allow the company to recover in case of a regional service interruption. Which configuration will meet these requirements?
62. Which of the following steps should be taken by a customer when conducting penetration testing on AWS?
63. Which of the following is NOT correct regarding Amazon EC2 On-demand instances?
64. Which of the following services allows you to run containerized applications on a cluster of EC2 instances?
65. Which of the following are important design principles you should adopt when designing systems on AWS? (Choose TWO)