What should the user do in this case?
A user is planning to scale up an application by 8 AM and scale down by 7 PM daily using Auto
Scaling. What should the user do in this case?
How can the instances in the private subnet connect to theinternet?
A user has created a VPC with two subnets: one public and one private. The user is planning to
run the patch update for the instances in the private subnet. How can the instances in the private
subnet connect to theinternet?
Which of the below mentioned CloudWatch endpoint URLs should the user use?
A user has configured an EC2 instance in the US-East-1a zone. The user has enabled detailed
monitoring of the instance. The user is trying to get the data from CloudWatch using a CLI. Which
of the below mentioned CloudWatch endpoint URLs should the user use?
What will happen to the instances launched during the suspension period?
A user has configured ELB with Auto Scaling. The user suspended the Auto Scaling
AddToLoadBalancer
(which adds instances to the load balancer. process for a while. What will happen to the instances
launched during the suspension period?
Which of the below mentioned activities are not captured by the log?
A sys admin has enabled a log on ELB. Which of the below mentioned activities are not captured
by the log?
Which of the below mentioned statements is not true in this condition?
A user has moved an object to Glacier using the life cycle rules. The user requests to restore the
archive after 6 months. When the restore request is completed the user accesses that archive.
Which of the below mentioned statements is not true in this condition?
How can the user configure this with CloudWatch?
A user is running a batch process on EBS backed EC2 instances. The batch process starts a few
instances to process hadoop Map reduce jobs which can run between 50 – 600 minutes or
sometimes for more time. The user wants to configure that the instance gets terminated only when
the process is completed. How can the user configure this with CloudWatch?
what is recommended to the user for the purpose of security?
A user has enabled versioning on an S3 bucket. The user is using server side encryption for data
at rest. If the user is supplying his own keys for encryption (SSE-C., what is recommended to the
user for the purpose of security?
Which of the below mentioned activities is the user performing with the step given above?
A user runs the command “dd if=/dev/xvdf of=/dev/null bs=1M” on an EBS volume created from a
snapshot and attached to a Linux instance. Which of the below mentioned activities is the user
performing with the step given above?
How can the user convert it?
A user has launched an EC2 Windows instance from an instance store backed AMI. The user
wants to convert the AMI to an EBS backed AMI. How can the user convert it?