Browse SOA Questions
Study all 99 questions at your own pace with detailed explanations
Total: 99 questionsPage: 6 of 10
Question 51 of 99
A user has provisioned 2000 IOPS to the EBS volume. The application hosted on that EBS is experiencing less IOPS than provisioned. Which of the below mentioned options does not affect the IOPS of the volume?
AThe instance is EBS optimized
BThe EC2 instance has 10 Gigabit Network connectivity
CThe application does not have enough IO for the volume
DThe volume size is too large
đź’ˇ Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 52 of 99
An organization has configured Auto Scaling with ELB. One of the instance health check returns the status as Impaired to Auto Scaling. What will Auto Scaling do in this scenario?
APerform a health check until cool down before declaring that the instance has failed
BNotify ELB to stop sending traffic to the impaired instance
CNotify the user using SNS for the failed state
DTerminate the instance and launch a new instance
đź’ˇ Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 53 of 99
An organization has configured Auto Scaling with ELB. There is a memory issue in the application which is causing CPU utilization to go above 90%. The higher CPU usage triggers an event for Auto Scaling as per the scaling policy. If the user wants to find the root cause inside the application without triggering a scaling activity, how can he achieve this?
ADelete Auto Scaling until research is completed
BSuspend the scaling process until research is completed
CIt is not possible to find the root cause from that instance without triggering scaling
DStop the scaling process until research is completed
đź’ˇ Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 54 of 99
A user runs the command “dd if=/dev/xvdf of=/dev/null bs=1M” on an EBS volume created from a snapshot and attached to a Linux instance. Which of the below mentioned activities is the user performing with the step given above?
AInitiating the device to mount on the EBS volume
BCopying the data from a snapshot to the device
CPre warming the EBS volume
DFormatting the volume
đź’ˇ Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 55 of 99
A user is planning to setup infrastructure on AWS for the Christmas sales. The user is planning to use Auto Scaling based on the schedule for proactive scaling. What advise would you give to the user?
AWait till end of November before scheduling the activity
BThe scaling should be setup only one week before Christmas
CIt is not advisable to use scheduled based scaling
DIt is good to schedule now because if the user forgets later on it will not scale up
đź’ˇ Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 56 of 99
A user has launched an EBS backed EC2 instance. The user has rebooted the instance. Which of the below mentioned statements is not true with respect to the reboot action?
AThe Elastic IP remains associated with the instance
BThe instance runs on a new host computer
CThe private and public address remains the same
DThe volume is preserved
đź’ˇ Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 57 of 99
An organization is using cost allocation tags to find the cost distribution of different departments and projects. One of the instances has two separate tags with the key/ value as “InstanceName/HR”, “CostCenter/HR”. What will AWS do in this case?
AInstanceName is a reserved tag for AWS. Thus, AWS will not allow this tag
BAWS will not allow the tags as the value is the same for different keys
CAWS will allow tags but will not show correctly in the cost allocation report due to the same value of the two separate keys
DAWS will allow both the tags and show properly in the cost distribution report
đź’ˇ Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 58 of 99
A user has created a mobile application which makes calls to DynamoDB to fetch certain data. The application is using the DynamoDB SDK and root account access/secret access key to connect to DynamoDB from mobile. Which of the below mentioned statements is true with respect to the best practice for security in this scenario?
AThe user should create an IAM role with DynamoDB and EC2 access. Attach the role with EC2 and route all calls from the mobile through EC2
BThe application should use an IAM role with web identity federation which validates calls to DynamoDB with identity providers, such as Google, Amazon, and Facebook
CThe user should create a separate IAM user for each mobile application and provide DynamoDB access with it
DCreate an IAM Role with DynamoDB access and attach it with the mobile application
đź’ˇ Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 59 of 99
A user is planning to scale up an application by 8 AM and scale down by 7 PM daily using Auto Scaling. What should the user do in this case?
ASetup the scaling policy to scale up and down based on the CloudWatch alarms
BThe user should setup a batch process which launches the EC2 instance at a specific time
CThe user should increase the desired capacity at 8 AM and decrease it by 7 PM manually
DSetup scheduled actions to scale up or down at a specific time
đź’ˇ Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 60 of 99
A user is planning to setup notifications on the RDS DB for a snapshot. Which of the below mentioned event categories is not supported by RDS for this snapshot source type?
ACreation
BRestoration
CBackup
DDeletion
đź’ˇ Try to answer first, then click "Show Answer" to see the correct answer and explanation