Browse SOA Questions
Study all 99 questions at your own pace with detailed explanations
Total: 99 questionsPage: 8 of 10
Question 71 of 99
George has shared an EC2 AMI created in the US East region from his AWS account with Stefano. George copies the same AMI to the US West region. Can Stefano access the copied AMI of George’s account from the US West region?
ANo, copy AMI does not copy the permission
BYes, since copy AMI copies all the permissions attached with the AMI
CIt is not possible to share the AMI with a specific account
DYes, since copy AMI copies all private account sharing permissions
💡 Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 72 of 99
A user want’s to configure a CloudWatch alarm on RDS to receive a notification when the CPU utilization of RDS is higher than 50%. Currently – at the time the user wants to create the alarm, there is some activity on RDS, such as RDS unavailability. How must the user procede?
AIt is not possible to setup the alarm on RDS under the circumstances
BSetup the notification when the CPU utilization is less than 10%
CSetup the notification when the state is Insufficient Data
DSetup the notification when the CPU is more than 75% on RDS
💡 Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 73 of 99
A user has setup a VPC with CIDR 20.0.0.0/16. The VPC has a private subnet (20.0.1.0/24) and a public subnet (20.0.0.0/24). The user’s data centre has CIDR of 20.0.54.0/24 and 20.1.0.0/24. If the private subnet wants to communicate with the data centre, what will happen?
AIt will allow traffic with data centre on CIDR 20.1.0.0/24 but does not allow on 20.0.54.0/24
BIt will not allow traffic with data centre on CIDR 20.1.0.0/24 but allows traffic communication on 20.0.54.0/24
CIt will allow traffic communication on both the CIDRs of the data centre
DIt will not allow traffic communication on any of the data centre CIDRs
💡 Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 74 of 99
A user has setup a billing alarm using CloudWatch for $200. The usage of AWS exceeded $200 after some days. The user wants to increase the limit from $200 to $400? What should the user do?
AUpdate the alarm to set the limit at $400 instead of $200
BCreate a new alarm of $400 and link it with the first alarm
CIt is not possible to modify the alarm once it has crossed the usage limit
DCreate a new alarm for the additional $200 amount
💡 Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 75 of 99
A user has created a VPC with public and private subnets using the VPC wizard. The VPC has CIDR 20.0.0.0/16. The private subnet uses CIDR 20.0.0.0/24. The NAT instance ID is i-a12345. Which of the below mentioned entries are required in the main route table attached with the private subnet to allow instances to connect with the internet?
ADestination: 20.0.0.0/0 and Target: 80
BDestination: 0.0.0.0/0 and Target: i-a12345
CDestination: 20.0.0.0/0 and Target: i-a12345
DDestination: 20.0.0.0/24 and Target: i-a12345
💡 Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 76 of 99
A user has deployed an application on his private cloud. The user is using his own monitoring tool. He wants to configure it so that whenever there is an error, the monitoring tool will notify him via SMS. Which of the below mentioned AWS services will help in this scenario?
AAWS SNS
BNone because the user infrastructure is in the private cloud.
CAWS SES
DAWS SMS
💡 Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 77 of 99
A user has stored data on an encrypted EBS volume. The user wants to share the data with his friend’s AWS account. How can user achieve this?
ATake a snapshot and share the snapshot with a friend
BIf both the accounts are using the same encryption key then the user can share the volume directly
CCopy the data to an unencrypted volume and then share
DCreate an AMI from the volume and share the AMI
💡 Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 78 of 99
A user has created a launch configuration for Auto Scaling where CloudWatch detailed monitoring is disabled. The user wants to now enable detailed monitoring. How can the user achieve this?
AUpdate the Launch config with CLI to set InstanceMonitoring.Enabled = true
BUpdate the Launch config with CLI to set InstanceMonitoringDisabled = false
CThe user should change the Auto Scaling group from the AWS console to enable detailed monitoring
DCreate a new Launch Config with detail monitoring enabled and update the Auto Scaling group
💡 Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 79 of 99
A root account owner has created an S3 bucket testmycloud. The account owner wants to allow everyone to upload the objects as well as enforce that the person who uploaded the object should manage the permission of those objects. Which is the easiest way to achieve this?
AThe root account owner should create a bucket policy which allows the IAM users to upload the object
BThe root account should create the IAM users and provide them the permission to upload content to the bucket
CThe root account owner should create the bucket policy which allows the other account owners to set the object policy of that bucket
DThe root account should use ACL with the bucket to allow everyone to upload the object
💡 Try to answer first, then click "Show Answer" to see the correct answer and explanation
Question 80 of 99
A user has created a VPC with CIDR 20.0.0.0/16 with only a private subnet and VPN connection using the VPC wizard. The user wants to connect to the instance in a private subnet over SSH. How should the user define the security rule for SSH?
AThe user can connect to a instance in a private subnet using the NAT instance
BAllow Inbound traffic on port 80 and 22 to allow the user to connect to a private subnet over the internet
CAllow Inbound traffic on port 22 from the user’s network
DThe user has to create an instance in EC2 Classic with an elastic IP and configure the security group of a private subnet to allow SSH from that elastic IP
💡 Try to answer first, then click "Show Answer" to see the correct answer and explanation