PrepAway - Latest Free Exam Questions & Answers

Category: AWS-SAP (v.1)

Exam AWS-SAP: AWS Certified Solutions Architect – Professional (update june 4th, 2017)

Which of the following configurations will support thes…

An AWS customer is deploying an application that is composed of an AutoScaling group of EC2
instances.
The customers security policy requires that every outbound connection from these instances to
any other service within the customers Virtual Private Cloud must be authenticated using a
unique X.509 certificate that contains the specific Instance-id.
In addition, all X.509 certificates must be signed by the customer’s key management service in
order to be trusted for authentication.
Which of the following configurations will support these requirements:

which of the following would allow the application Inst…

An administrator is using Amazon CloudFormation to deploy a three tier web application that
consists of a web tier and application tier that will utilize Amazon DynamoDB for storage.
When creating the CloudFormation template which of the following would allow the application
Instance access to the DynamoDB tables without exposing API credentials?

you need to consider so you can set up a solution that …

Your fortune 500 company has under taken a TCO analysis evaluating the use of Amazon S3
versus acquiring more hardware. The outcome was that all employees would be granted access
to use Amazon S3 for storage of their personal documents.
Which of the following will you need to consider so you can set up a solution that incorporates
single sign-on from your corporate AD or LDAP directory and restricts access for each user to a
designated user folder in a bucket? Choose 3 answers

Which option below will meet the needs for your NOC members?

Your company has recently extended its datacenter into a VPC on AWS to add burst computing
capacity as needed. Members of your Network Operations Center need to be able to go to the
AWS Management Console and administer Amazon EC2 instances as necessary.
You don’t want to create new IAM users for each NOC member and make those users sign in
again to the AWS Management Console.
Which option below will meet the needs for your NOC members?

Which approach provides a cost effective, scalable miti…

You’ve been hired to enhance the overall security posture for a very large e-commerce site. They
have a well architected, multi-tier application running in a VPC that uses ELBs in front of both the
web and the app tier with static assets served directly from S3. They are using a combination of
RDS and DynamoDB for their dynamic data and then archiving nightly into S3 for further
processing with EMR. They are concerned because they found questionable log entries and
suspect someone is attempting to gain unauthorized access.
Which approach provides a cost effective, scalable mitigation to this kind of attack?

Which activity would be useful in defending against thi…

A benefits enrollment company is hosting a 3-tier web application running in a VPC on AWS
which includes a NAT (Network Address Translation) instance in the public Web tier. There is
enough provisioned capacity for the expected workload for the new fiscal year benefit enrollment
period plus some extra overhead. Enrollment proceeds nicely for a few days and then the web
tier becomes unresponsive. Upon investigation using CloudWatch and other monitoring tools it is
discovered that there is an extremely large and unanticipated amount of inbound traffic coming
from a set of 15 specific IP addresses over port 80 from a country where the benefits company
has no customers. The web tier instances are so overloaded that benefit enrollment
administrators cannot even SSH into them.
Which activity would be useful in defending against this attack?

Which of these solutions would you recommend?

You currently operate a web application in the AWS US-East region. The application runs on an
auto- scaled layer of EC2 instances and an RDS Multi-AZ database. Your IT security compliance
officer has tasked you to develop a reliable and durable logging solution to track changes made
to your EC2, IAM, and RDS resources.
The solution must ensure the integrity and confidentiality of your log data.
Which of these solutions would you recommend?


Page 23 of 28« First...10...2122232425...Last »