How can you accomplish this?
An application that you are managing has EC2 instances & Dynamo OB tables deployed to several AWS Regions
In order to monitor the performance of the application globally, you would like to see two graphs 1) Avg CPU
Utilization across all EC2 instances and 2) Number of Throttled Requests for all DynamoDB tables.
How can you accomplish this?
which of the following three credentials should be evaluated?
When assessing an organization s use of AWS API access credentials which of the following three credentials
should be evaluated?
Choose 3 answers
Which should be your next step in troubleshooting and attempting to get the instance back to a healthy state s
You have a Linux EC2 web server instance running inside a VPC The instance is In a public subnet and has an
EIP associated with it so you can connect to It over the Internet via HTTP or SSH The instance was also fully
accessible when you last logged in via SSH. and was also serving web requests on port 80.
Now you are not able to SSH into the host nor does it respond to web requests on port 80 that were working
fine last time you checked You have double-checked that all networking configuration parameters (security
groups route tables. IGW’EIP. NACLs etc) are properly configured {and you haven’t made any changes to those
anyway since you were last able to reach the Instance). You look at the EC2 console and notice that system
status check shows “impaired.”
Which should be your next step in troubleshooting and attempting to get the instance back to a healthy state
so that you can log in again?
What is a placement group?
What is a placement group?
Can you configure the security groups for these instances to only allow the ICMP ping…
Your entire AWS infrastructure lives inside of one Amazon VPC You have an Infrastructure monitoring
application running on an Amazon instance in Availability Zone (AZ) A of the region, and another application
instance running in AZ B. The monitoring application needs to make use of ICMP ping to confirm network
reachability of the instance hosting the application.
Can you configure the security groups for these instances to only allow the ICMP ping to pass from the
monitoring instance to the application instance and nothing else” If so how?
Which two things do we need to confirm in the VPC settings so that these EC2 instances can communicate inside
You have two Elastic Compute Cloud (EC2) instances inside a Virtual Private Cloud (VPC) in the same
Availability Zone (AZ) but in different subnets. One instance is running a database and the other instance an
application that will interface with the database. You want to confirm that they can talk to each other for your
application to work properly.
Which two things do we need to confirm in the VPC settings so that these EC2 instances can communicate
inside the VPC?
Choose 2 answers
Which services allow the customer to retain full administrative privileges of the underlying EC2 instances?
Which services allow the customer to retain full administrative privileges of the underlying EC2 instances?
Choose 2 answers
How can you best resolve the issue of the application responses not meeting your SLA?
You have a web-style application with a stateless but CPU and memory-intensive web tier running on a cc2
8xlarge EC2 instance inside of a VPC The instance when under load is having problems returning requests
within the SLA as defined by your business The application maintains its state in a DynamoDB table, but the
data tier is properly provisioned and responses are consistently fast.
How can you best resolve the issue of the application responses not meeting your SLA?
Which two mechanisms will allow the application to failover to new instances without the need for reconfigurat
You are managing a legacy application Inside VPC with hard coded IP addresses in its configuration.
Which two mechanisms will allow the application to failover to new instances without the need for
reconfiguration? Choose 2 answers
Which of the following approaches would you select?
You are designing a system that has a Bastion host. This component needs to be highly available without
human intervention.
Which of the following approaches would you select?