PrepAway - Latest Free Exam Questions & Answers

Category: AWS-SAA

Exam AWS-SAA: AWS Certified Solutions Architect – Associate

you need to add a new set of assessment to model the failure modes of the custom electronics using GPUs with C

Your company produces customer commissioned one-of-a-kind skiing helmets combining nigh fashion with
custom technical enhancements Customers can show oft their Individuality on the ski slopes and have access
to head-up-displays. GPS rear-view cams and any other technical innovation they wish to embed in the helmet.
The current manufacturing process is data rich and complex including assessments to ensure that the custom
electronics and materials used to assemble the helmets are to the highest standards Assessments are a
mixture of human and automated assessments you need to add a new set of assessment to model the failure
modes of the custom electronics using GPUs with CUD

What backup solution would be most appropriate for this use case?

You’re running an application on-premises due to its dependency on non-x86 hardware and want to use AWS
for data backup. Your backup application is only able to write to POSIX-compatible block-based storage. You
have 140TB of data and would like to mount it as a single folder on your file server Users must be able to
access portions of this data while the backups are taking place. What backup solution would be most
appropriate for this use case?

Which of the following alternatives will lower costs without compromising average performance of the system or

Your department creates regular analytics reports from your company’s log files All log data is collected in
Amazon S3 and processed by daily Amazon Elastic MapReduce (EMR) jobs that generate daily PDF reports and
aggregated tables in CSV format for an Amazon Redshift data warehouse.
Your CFO requests that you optimize the cost structure for this system.
Which of the following alternatives will lower costs without compromising average performance of the system
or data integrity for the raw data?

what would you recommend?

You are the new IT architect in a company that operates a mobile sleep tracking application
When activated at night, the mobile app is sending collected data points of 1 kilobyte every 5 minutes to your
backend
The backend takes care of authenticating the user and writing the data points into an Amazon DynamoDB
table.
Every morning, you scan the table to extract and aggregate last night’s data on a per user basis, and store the
results in Amazon S3.
Users are notified via Amazon SMS mobile push notifications that new data is available, which is parsed and
visualized by (he mobile app Currently you have around 100k users who are mostly based out of North
America.
You have been tasked to optimize the architecture of the backend system to lower cost what would you
recommend? (Choose 2 answers)

How do you implement the most cost-efficient architecture without compromising high availability and quality o

Your website is serving on-demand training videos to your workforce. Videos are uploaded monthly in high
resolution MP4 format. Your workforce is distributed globally often on the move and using company-provided
tablets that require the HTTP Live Streaming (HLS) protocol to watch a video. Your company has no video
transcoding expertise and it required you may need to pay for a consultant.
How do you implement the most cost-efficient architecture without compromising high availability and quality
of video delivery’?

Which approach provides a cost effective scalable mitigation to this kind of attack?

You’ve been hired to enhance the overall security posture for a very large e-commerce site They have a well
architected multi-tier application running in a VPC that uses ELBs in front of both the web and the app tier with
static assets served directly from S3 They are using a combination of RDS and DynamoOB for their dynamic
data and then archiving nightly into S3 for further processing with EMR They are concerned because they
found questionable log entries and suspect someone is attempting to gain unauthorized access.
Which approach provides a cost effective scalable mitigation to this kind of attack?

Which of these solutions would you recommend?

You currently operate a web application In the AWS US-East region The application runs on an auto-scaled
layer of EC2 instances and an RDS Multi-AZ database Your IT security compliance officer has tasked you to
develop a reliable and durable logging solution to track changes made to your EC2.IAM And RDS resources.
The solution must ensure the integrity and confidentiality of your log dat
a. Which of these solutions would you recommend?

Which of the following would meet all of these conditions?

An enterprise wants to use a third-party SaaS application. The SaaS application needs to have access to issue
several API commands to discover Amazon EC2 resources running within the enterprise’s account The
enterprise has internal security policies that require any outside access to their environment must conform to

the principles of least privilege and there must be controls in place to ensure that the credentials used by the
SaaS vendor cannot be used by any other third party. Which of the following would meet all of these
conditions?

Which of the following options would you consider?

You are designing a data leak prevention solution for your VPC environment. You want your VPC Instances to
be able to access software depots and distributions on the Internet for product updates. The depots and
distributions are accessible via third party CONs by their URLs. You want to explicitly deny any other outbound
connections from your VPC instances to hosts on the internet.
Which of the following options would you consider?


Page 31 of 40« First...1020...2930313233...40...Last »