Which of the following Is a simple way to achieve that goal?
Your EC2-Based Multi-tier application includes a monitoring instance that periodically makes application-level read only
requests of various application components and if any of those fail more than three times 30 seconds calls CloudWatch
lo fire an alarm, and the alarm notifies your operations team by email and SMS of a possible application health problem.
However, you also need to watch the watcher-the monitoring instance itself-and be notified if it becomes unhealthy. Which
of the following Is a simple way to achieve that goal?
What two actions could you take to rectify this?
You are using ElastiCache Memcached to store session state and cache database queries in your infrastructure You
notice in Cloud Watch that Evictions and GetMisses are Doth very high. What two actions could you take to rectify this?
(Choose two.)
What are three best-practices for you to prepare for an…
When preparing for a compliance assessment of your system built inside of AWS. What are three best-practices for you
to prepare for an audit? (Choose three.)
What option would you implement to successfully launch …
The majority of your Infrastructure is on premises and you have a small footprint on AWS. Your company has decided to
roll out a new application that is heavily dependent on low latency connectivity to LOAP for authentication. Your security
policy requires minimal changes to the company’s existing application user management processes. What option would
you implement to successfully launch this application?
Which of the following approaches can help ensure that …
You have set up Individual AWS accounts for each project. You have been asked to make sure your AWS Infrastructure
costs do not exceed the budget set per project for each month. Which of the following approaches can help ensure that
you do not exceed the budget each month?
Which method would be the best way to authenticate you…
You are creating an Auto Scaling group whose Instances need to insert a custom metric into CloudWatch. Which method
would be the best way to authenticate your CloudWatch PUT request?
Which two of the following options would allow an organ…
Your organization’s security policy requires that all privileged users either use frequently rotated passwords or one-time
access credentials in addition to username/password. Which two of the following options would allow an organization to
enforce this policy for AWS users? (Choose two.)
Which should be your next step in troubleshooting and a…
You have a Linux EC2 web server instance running inside a VPC The instance is In a public subnet and has an EIP
associated with it so you can connect to It over the Internet via HTTP or SSH The instance was also fully accessible when
you last logged in via SSH. and was also serving web requests on port 80. Now you are not able to SSH into the host nor
does it respond to web requests on port 80 that were working fine last time you checked. You have double-checked that
all networking configuration parameters (security groups route tables. IGW’EIP, NACLs etc.) are properly configured {and
you haven’t made any changes to those anyway since you were last able to reach the Instance). You look at the EC2
console and notice that system status check shows “impaired”. Which should be your next step in troubleshooting and
attempting to get the instance back to a healthy state so that you can log in again?
How should you implement this for each deployment?
Your application is currently running on Amazon EC2 instances behind a load balancer. Your management has decided
to use a Blue/Green deployment strategy. How should you implement this for each deployment?
Which of the following methods should you use to implem…
You have an application consisting of a stateless web server tier running on Amazon EC2 instances behind load balancer,
and are using Amazon RDS with read replicas. Which of the following methods should you use to implement a selfhealing and cost-effective architecture? (Choose two.)