What should the user do in this case?
A user is planning to scale up an application by 8 AM and scale down by 7 PM daily using Auto Scaling. What
should the user do in this case?
How can the instances in the private subnet connect to theinternet?
A user has created a VPC with two subnets: one public and one private. The user is planning to run the patch
update for the instances in the private subnet. How can the instances in the private subnet connect to
theinternet?
Which of the below mentioned CloudWatch endpoint URLs should the user use?
A user has configured an EC2 instance in the US-East-1a zone. The user has enabled detailed monitoring of the
instance. The user is trying to get the data from CloudWatch using a CLI. Which of the below mentioned
CloudWatch endpoint URLs should the user use?
What will happen to the instances launched during the suspension period?
A user has configured ELB with Auto Scaling. The user suspended the Auto Scaling AddToLoadBalancer
(which adds instances to the load balancer. process for a while. What will happen to the instances launched
during the suspension period?
Which of the below mentioned activities are not captured by the log?
A sys admin has enabled a log on ELB. Which of the below mentioned activities are not captured by the log?
Which of the below mentioned statements is not true in this condition?
A user has moved an object to Glacier using the life cycle rules. The user requests to restore the archive after 6
months. When the restore request is completed the user accesses that archive. Which of the below mentioned
statements is not true in this condition?
How can the user configure this with CloudWatch?
A user is running a batch process on EBS backed EC2 instances. The batch process starts a few instances to
process hadoop Map reduce jobs which can run between 50 – 600 minutes or sometimes for more time. The
user wants to configure that the instance gets terminated only when the process is completed. How can the
user configure this with CloudWatch?
what is recommended to the user for the purpose of security?
A user has enabled versioning on an S3 bucket. The user is using server side encryption for data at rest. If the
user is supplying his own keys for encryption (SSE-C., what is recommended to the user for the purpose of
security?
Which of the below mentioned activities is the user performing with the step given above?
A user runs the command “dd if=/dev/xvdf of=/dev/null bs=1M” on an EBS volume created from a snapshot
and attached to a Linux instance. Which of the below mentioned activities is the user performing with the step
given above?
How can the user convert it?
A user has launched an EC2 Windows instance from an instance store backed AMI. The user wants to convert
the AMI to an EBS backed AMI. How can the user convert it?