AWS Solution Architecture Practice Questions Part 6

AWS Solution Architecture Practice Questions Part 6

 

1.A client application requires operating system privileges on a relational database server.What an appropriate configuration for a highly available database architecture?

  1. A standalone Amazon EC2 instance
  2. Amazon RDS in a Multi-AZ configuration
  3. Amazon EC2 instances in a replication configuration utilizing a single Availability zone 
  4. Amazon EC2 instances in a replication configuration utilizing two different Availability zone

Ans : D

2.You have been tasked with choosing a datastore to persist GPS coordinates for a new app.The service needs consistent,single-digit-millisecond latency at any scale.Which AWS service meets your requirements?

  1. Amazon Redshift
  2. Amazon DynamoDB
  3. Amazon S3
  4. Amazon RDS

ANS:B

3.Your company IT policy prohibits employees from handling application credentials.Any credentials must be rotated least monthly. You plan to deploy a new application on Amazon EC2 instances in an Auto Scaling group within a VPC.The application must access objects within an Amazon S3 bucket.The application will leverage an Amazon SDK.Which approach meets these requirements?

  1. Have the application call AWS STS to obtain temporary credentials that have access privileges to the Amazon S3 bucket
  2. Configure the application to retrieve temporary credentials from the Amazon-provided server at 169.254.169.253
  3. Launch the Amazon EC2 instances with an IAM role that has access privileges to the amazon S3 bucket
  4. Configure an Amazon S3 bucket policy that grants the application access to the Amazon S3 bucket

 

Ans :C

4.A company has configured and peered two VPC-1 and VPC-2.VPC-1 contains only private subnets,and VPC-2 CONTAINS only public subnets.The company uses a single AWS Direct Connect  connection and private virtual interface to connect their on premises network with VPC-1.Which two methods increases the fault tolerance of the connection to VPC-1?(2 TWO)

  1. Establish a hardware VPN over the Internet between VPC-2 and the on-premises network 
  2. Establish a hardware VPN over the Internet between VPC-1 and the on-premises network
  3. Establish a new AWS  Direct Connect connection and private virtual interface in the same region as VPC-2
  4. Establish a new AWS  Direct Connect connection and private virtual interface IN A DIFFERENT AWS region than VPC-1
  5. Establish a new AWS  Direct Connect connection and and private virtual interface IN the same AWS region as VPC-1

Ans :B,E

  1. Which of the following requires a custom CloudWatch metric to monitor?

 

  1. Memory Utilization of an EC2 instance
  2. CPU Utilization of an EC2 instance
  3. Disk usage activity of an EC2 instance
  4. Data transfer of an EC2 instance

🡪 Ans :A

6.An application on an Amazon EC2 instance routinely stops responding to requests and requires a reboot to recover.The application logs are already exported into Amazon CloudWatch,and you notice that the problem consistently follows the appearance of a specific message in the log.The application team is working to address the bug,but has not provided a date for the fix.What work around can you implement to automate recovery of the instance until the fix is deployed?

 

  1. Create an Amazon CloudWatch alarm on an Amazon CloudWatch Logs filter for that message;based on that alarm,trigger an Amazon CloudWatch action to reboot the instance
  2. Create an AWS CloudTrail alarm on low CPU;based on that alarm,trigger an Amazon SNS message to the Operations team 
  3. Create an Amazon CloudWatch alarm on instance memory usage;based on that alarm,trigger an Amazon CloudWatch action to reboot the instance
  4. Create an AWS CloudTrail alarm to detect the deadlock,based on the alarm,trigger an Amazon SNS message to the Operations team

Ans :A

 

7.When creation of an  EBS snapshot is initiated,but not completed,the EBS volume

 

  1. Cannot be used until the snapshot completes
  2. Can be used in read-only mode while the snapshot is in progress
  3. Can be used while the snapshot is in progress
  4. Cannot be detached or attached to an EC2 instance until the snapshot completes

 

Ans :C

 

8.Your company’s IT policies mandate that all critical data must be duplicated in two physical locations at least 200 miles apart.Which storage option meets this requirement?

 

  1. Two Amazon S3 buckets in different regions
  2. One Amazon S3 bucket
  3. Two Amazon S3 buckets in the same region

Ans :B

 

9.You are designing a high performance computing(HPC) cluster.You will launch 20 Amazon EC2 r3.2xlarge instances into a placement group.You need the highest packet-per-second performance and lowest latency for your application 

Which configuration should you use?

 

  1. Enable enhanced networking on all the Amazon EC2 instances
  2. Assign a minimum of two elastic network interfaces per Amazon EC2 Instance 
  3. Launch the Amazon EC2 instance across multiple Availability Zones
  4. Enable EBS optimization on all the Amazon EC2 instances

 

Ans :A 

 

10.Which services can invoke AWS Lambda functions(2)

 

  1. Amazon SNS
  2. Amazon Redshift
  3. Amazon Route53
  4. Amazon DynamoDB
  5. Elastic Load Balancing

 

Ans :A,D

 

*11.Which of the following does AWS own under the shared security responsibility mode(select 3)

  1. Physical security of  AWS data centers and facilities
  2. Logical security of customer SSH private key material
  3. Patching of Amazon Elastic Compute Cloud hypervisors
  4. Decommissioning storage devices at end of life 
  5. Encryption of traffic within a virtual private cloud
  6. Access control within a virtual private cloud

Ans :A,C,D

 

12.Your organization needs to ingest a big data stream into their data lake on Amazon S3.The data may stream in at a rate of hundreds of megabytes per second.What AWS service will accomplish the goal with the least amount of management?

  1. Amazon Kinesis Firehose
  2. Amazon Kinesis Streams
  3. Amazon CloudFront
  4. Amazon SQS


Ans :A

 

13.You have a distributed application that periodically processes large volumes of data across multiple Amazon EC2 instances.The application is designed to recover gracefully from Amazon EC2 instance failures.You are required to accomplish this task in the most cost-effective way.Which of the following will meet your requirements?

  1. Spot Instances
  2. Reserved Instances
  3. Dedicated Instances
  4. On-Demand Instances


Ans :A

 

14.Your Amazon RDS MySQL DB instance runs on the largest available instance type.The DB instance runs at near capacity for CPU and network bandwith.You expect traffic to increase and are looking for ways you can continue to scale your database.

 Which  strategies allow you to continue to scale and take on more traffic( select 2)

  1. Convert the DB instance  to a Multi-AZ DEPLOYMENT:configure the app to send read-only calls to the standby
  2. Create an Amazon ElastiCache duster:configure the app to retrieve frequently accessed data and queries from the cache
  3. Create a cross-region read replica of the master database:configure the app to send read-only calls to the replica
  4. Create a read replica of the master database in another Availability Zone :configure the app to send read-only calls to the replica
  5. Create additional database accounts in the DB instance :configure the app servers to make calls using different account credentials

 

Ans :B,D

 

15.Which of the following are characteristics of a reserved instance?(select 3)

  1. It CAN BE USED to lower Total Cost of Ownership (TCO) of a system
  2. It can be modified for reservation in another region
  3. It is specific to an Amazon Machine Image(AMI)
  4. Its is specific to an Instance Type
  5. It CAN BE applied to instances launched by Auto Scaling
  6. It can be cancelled after it is purchased 

 

Ans :A,D.E

 

16.Which security functions are based on AWS STS?(Select 2)

  1. Granting cross-account access with IAM roles
  2. Adding conditions to managed policies
  3. Authenticating IAM user by using access keys
  4. Assigning managed policies to IAM GROUPS

    Ans :A,C

 

17.You are trying to use SSH to connect from your laptop an Amazon EC2 instance over the Internet.You cannot establish a connection

  1. The security group does not allow any outbound TCP traffic to your laptop IP address
  2. There is no security group and no network ACL associated with the Amazon EC2 instance 
  3. The network ACL is set to deny all outbound TCP traffic to your laptop IP address
  4. The IAM access key on your laptop does not have console access to the Amazon EC2 instance

 

Ans :C

18.Your company has separate AWS account for development and production.Each developer is assigned an IAM user in the development account.Developers occasionally need to access the production account to roll out changes to that environment.Your company does not allow the creation of IAM users in the production account?

  1. Create an IAM role in the development account .Allow IAM Users in the development account to assume the role
  2. Create an IAM group in the production account Grant IAM users in the development account membership in the group
  3. Create an IAM role in the production account Allow IAM users in the development account to assume the role
  4. Create an IAM group in the development account Grant IAM users in the development account membership in the group

Ans :C

19.Which of the following are characteristics of Amazon VPC subnets?(select 2)

  1. Each subnet spans at least 2 Availability Zones to provide a high-availability environment
  2. Each subnet maps to a single Availability Zone
  3. A CIDR block mask of /25 is the smallest range supported
  4. By default all subnets can route between each other,whether they are private or public
  5. Instances in a private subnet can communicate with the Internet only if they have an Elastic IP

Ans :B

20.A customer is leveraging Amazon Simple Storage Service in eu-west-1 to store static content for a web-based property.The customer is storing objects using the Standard Storage class.Where are the customer’s objects replicated?

  1. A single facility in eu-west-1 and a single facility in eu-central-1
  2. A single facility in eu-west-1 and a single facility in us-east-1
  3. Multiple facilities in eu-west-1
  4. A single facility in eu-west-1

Ans :C

21.You have been asked to design a fault-tolerant and scalable web application across three Availability zones.The presentation logic will reside on web servers behind an ELB classic Load Balancer,and the application logic will reside on a set of app servers behind a second load balancer.How should you use Auto Scaling groups?

  1. Deploy one auto scaling group that includes all the web and app servers across all availability zones
  2. Deploy three auto scaling group:one for each availability zone that includes both web and app servers
  3. Deploy two auto scaling groups:one for the web servers in all availability zones and one for the app servers in all availability zones
  4. Deploy six auto scaling groups:a web server group in each availability zone and an app server group in each availability zone

Ans :C

22.You are launching an application in an Auto Scaling group.TO store the user session state,you need structured storage,service with durability and low latency.Which service meets your needs?

  1. Amazon elasticache
  2. Amazon s3
  3. Amazon ec2 instance storage 
  4. Amazon dynamodb

Ans :a

23.You have an application running on an Amazon ec2 instance that uploads 4-gb video objects to amazon s3.Video uploads are taking longer than expected,resulting in poor application performance.Which action can help improve the upload performance?

  1. Apply an amazon s3 bucket policy
  2. Use amazon ebs provisioned IOPS
  3. Use amazon s3 multipart upload
  4. Request a service limit increase

Ans :C

24.After creating a new IAM user which of the following must be done before they can successfully make API calls?

  1. Add a password to the user
  2. Enable multi-factor authentication for the user
  3. Assign a password policy to the user
  4. Create a set of access keys for the user

Ans 😀

25.You’ve been tasked with choosing a datastore to persist GPS coordinates for a new app.The service needs consistent,single-digit-millisecond latency at any scale.In order to support future growth,the datastore must also support cross-region replication.Which AWS service meets your requirements?

 

  1. Amazon redshift
  2. Amazon dynamodb
  3. Amazon s3
  4. Amazon rds

Ans :B

26.Your company runs an application that generates several thousand 1-gb reports a month.Approximately 10% of these reports will be accessed once during the first 30 days and must be available on demand.After 30 days,reports are no longer  accessed as a part of normal business processes but must be retained for compliance reasons.Which architecture would meets these requirements with the lowest cost?

 

  • Upload the reports to amazon s3 standard storage class.Set a lifecycle configuration on the bucket to transition the reports to Amazon  Glacier after 30 days

 

  1. Upload the reports to amazon s3 standard-infrequent access storage class.Set a lifecycle configuration on the bucket to transition the reports to Amazon glacier after 30 days
  2. Upload the reports to amazon glacier.When reports are requested,copy them to amazon s3 standard storage class for access.Delete the copied reports after they have been viewed
  3. Upload the reports to amazon s3 standard-infrequent access storage class.When reports are requested,copy them to amazon s3  standard storage class for access.Delete the copied reports after they have been viewed

Ans :A

27.You are designing a scalable web application with stateless web servers.Which service or feature is well suited to store user session information?

  1. Amazon ebs
  2. Amazon dynamodb
  3. Amazon ec2 instance store
  4. Amazon sqs

Ans :B

28.A company has a workflow that uploads video files from their data center to AWS for transcoding.They use Amazon EC2 worker instances that pull transcoding jobs from SQS.Why  is SQS an appropriate service for this scenario?

  1. SQS can accommodate message payloads of any size XX
  2. SQS check the health of the worker instances 
  3. SQS synchronously provides transcoding output
  4. SQS decouples the transcoding task from the upload 

Ans 😀

https://aws.amazon.com/sqs/faqs/

29.Which of the following services natively encrypts data at rest within an AWS region(select 2)

  1. AWS storage gateway
  2. Amazon dynamodb
  3. Amazon cloudfront
  4. Amazon glacier
  5. Amazon simple queue service 

Ans :A,D

30.Per the AWS Acceptable Use Policy,penetration testing of EC2 instances:

  1. May be performed by the customer on their own instances,only if performed from EC2 instances 
  2. May be performed by AWS,and is periodically performed by AWS
  3. May be performed by AWS,and will be performed by AWS upon customer request
  4. Are expressly prohibited under all circumstances
  5. May be performed by the customer on their own instances with prior authorization from AWS

Ans :E

31.You have a CloudFront distribution configured with the following path patterns:

a)static1/* -> an s3 bucket in us-east-1

 

  • b)*              -> an ELB in us-east-1
  • c)static2/* -> an S3 bucket in us-west-2

 

When users request objects that start with ‘static2/’.they are receiving 404 response codes..What might be the problem ?

  1. CloudFront distributions cannot have origins in different AWS Regions
  2. CloudFront distributions cannot have multiple different origin types
  3. The ‘*’path pattern must appear after the ‘static2/*’ path.
  4. The ‘*’path pattern must appear before ‘static1/*’ path.

Ans :C

32.You are running a mobile media application and are considering API Gateway for the client entry point.What benefits would this provide?(Select TWO)

  1. Caching API responses
  2. IP blacklisting
  3. Intrusion prevention
  4. Load balancing
  5. Throttling traffic

Ans :C,E

33.You have been asked to architect a life system for user’s home directories. The solution must be accessible simultaneously to individuals across an organization. Users and groups must have permissions defined at the file or directory level.What AWS service can meet all of these requirements ?

  1. Amazon ebs
  2. Amazon s3
  3. Amazon EFS
  4. Amazon dynamodb

 

Ans :C

34.Your Auto Scaling group is configured to launch one new Amazon EC2 instance if the overall CPU load exceeds 65% over a five-minute interval. Occasionally, the Auto Scaling group launches a second Amazon EC2 instance before the first is operational. The second instance is not required and introduces needless compute costs.How can you prevent the Auto Scaling group from launching the second instance?

  1. Configure a lifecycle hook for your Auto Scaling group
  2. Add a scaling-specific cooldown period to the scaling policy
  3. Adjust the CPU threshold that triggers a scaling action
  4. Attach a new launch configuration to the Auto Scaling group

Ans :B

35.You’re building an API backend available at services.your company.com.The API is implemented with API Gateway and Lambda.You successfully tested the API  curl.You implemented javaScript to call the API from a webpage on your corporate website www.yourcompany.com .When you access that page in your browser,you get the following error:“The same origin policy disallows reading the remote resource”How can you allow your corporate webpages to invoke the API ?

  1. Add a policy.xss file to your website
  2. Add a Policy:xss header to the API request
  3. Enable CORS in the API Gateway
  4. Enable  CORS in the Javascript frontend

 

Ans :C

35.You have a Cassandra cluster  running in private subnets in an Amazon VPC.A new application in a different Amazon VPC needs access to the database.How can the new application access the database?

  1. Set up a dual-homed instance with ENIs in both Amazon VPCs
  2. Set up a VPC peering connection between the two Amazon VPCs
  3. Set up a NAT   Gateway in the database’s Amazon VPC
  4. Set up a NAT Gateway in the application’s Amazon VPC

 

Ans :B

36.A company is preparing to give AWS Management Console access to developers. Company policy mandates identity federation and role-based access control .Roles are currently assigned using groups in the corporate Active Directory. What combination of the following will give developers access to the AWS console?(Select TWO)

  1. AWS Directory Service AD Connector 
  2. AWS Directory Service Simple AD
  3. AWS Identity and Access Management groups
  4. AWS Identity and Access Management roles
  5. AWS Identity and Access Management users

Ans :A,D

37.A client application requires operating system privileges on relational database server.What is an appropriate configuration for a highly available database architecture?

 

  1. A standalone Amazon EC2 instance
  2. Amazon RDS in a Multi-AZ configuration 
  3. Amazon EC2 instances in a replication configuration utilizing a single Availability Zone 
  4. Amazon EC2 instances in a replication configuration utilizing two different Availability Zones

 

Ans 😀

 

38.You need to pass a custom script to new Amazon Linux instances created in your Auto Scaling group.Which feature allows you to accomplish this?

  1. User data
  2. EC2Config service
  3. IAM roles
  4. AWS Config 

 

Ans :A

39.An Auto-Scaling group spans 3 AZs and currently has 4 running EC2 instances.When Auto Scaling needs to terminate an EC2 instance,by default AutoScaling will: (Select 2)

  1. Terminate the instance with the least active network connections.If multiple instances meet this criterion one will be randomly selected
  2. Terminate an instance in the AZ which currently has 2 running EC2 instances
  3. Send an SNS notification if configured to do so
  4. Randomly select one of the 3 AZs,and then terminate an instance in that AZ
  5. Allow at least five minutes for Windows/Linux shutdown scripts to complete before terminating the instance

Ans :B,C

40.Which of the following notification endpoints or clients are supported by Amazon Simple Notification Service?(select two)

  1. Email
  2. CloudFront distribution
  3. File Transfer Protocol
  4. Simple Network Management Protocol

 

Ans :A,D

  1. Your application currently stores data on an unencrypted EBS volume.A new security policy mandates that all data must be encrypted at rest How can you encrypt the data?
  1. Create a snapshot of the volume.Create a new,encrypted volume from the snapshot.Replace the volume
  2. Stop the instance.Detach the volume.Modify the EBS settings to encrypt the volume.Reattach the volume.Start the instance
  3. Create a snapshot of the volume.Make an encrypted copy of the snapshot.Create a new volume from the new snapshot.Replace the volume
  4. Modify the EBS settings to encrypt the volume.You do need to detach the volume or stop the instance

 

Ans :C

 

42.You are running a web application with four Amazon EC2 instances across two Availability Zones.The instances are in an Auto Scaling group behind an ELB Classic Load Balancer.A scaling event adds one instance to the group.After the event,you notice that,although all instances are serving traffic,some instances are serving more traffic than others.Which of the following could be the problem?

  1. Cross-zone load balancing is not configured on the ELB Classic Load Balancer
  2. Access logs are not enabled on the ELB Classic Load Balancer
  3. A SSL/TLS certificate  has not been deployed on the ELB Classic Load Balancer
  4. Sticky bits is not enabled on the ELB Classic Load Balancer 

Ans :A

43.Which of the following are true regarding encrypted Amazon Elastic Block Store(EBS) volumes?(Select 2)

  1. Supported on all Amazon EBS volume types
  2. Snapshots are automatically encrypted 
  3. Available to all instance types
  4. Existing volumes can be encrypted 
  5. Shared volumes can be encrypted 

 

Ans :A,B

44.Your security team requires each Amazon ECS task to have an IAM policy that limits the task’s privileges to only those required for its use of AWS services.How can you achieve this?

  1. Use IAM roles for Amazon ECS tasks to associate a specific IAM role with each ECS task definition 
  2. Use IAM roles on the Amazon ECS container instances to associate IAM role with each ECS task on that instance 
  3. Connect to each running amazon ECS container instance and add discrete credentials 
  4. Reboot each Amazon ECS task programmatically to generate new instance metadata for each task

Ans :A

45.You have created an API powered by API gateway and AWS Lambda.Because of a new feature release,you expect traffic volume on your API to increase 10-fold

Which configuration should you use?

 

  1. Use a multiple copies of the Lambda function,each with API Gateway as the trigger.You are changed per request not per function
  2. Use one Lambda function with API Gateway as the trigger.AWS Lambda will allocate capacity to match the rate of incoming events
  3. Use one Lambda function with API Gateway as the trigger.Increase the amount of memory configured for the Lambda function
  4. Use multiple API Gateway endpoints,each triggering a Lambda function

 

Ans :B

46.You bid $0.22 for an Amazon EC2 Spot Instance when the market price was $0.20.For 90 minutes,the market price remained at $0.20.Then the market price changed to $0.25,and your instance was terminated by AWS What was your cost of running the instance for the entire duration?

  1. $0.47
  2. $0.20
  3. $0.40
  4. $0.22

 

Ans 😀

 

46.A company is building software on AWS that requires access to various AWS services.Which configuration should be used to ensure that AWS credentials (i.e,Access Key ID/Secret Access Key combination) are not compromised

    1. Enable Multi-Factor Authentication for your AWS root account XX

 

  • Assign an IAM role to the Amazon EC2 instance

 

  1. Store the AWS Access Key ID/Secret Access Key combination in software comments XX
  2. Assign an IAM user to the Amazon EC2 instance XX

 

Ans :B

47.Your application provides data transformation services.Files containing data to be transformed are first uploaded to Amazon S3 and then transformed by a fleet of spot EC2 instances.File submitted by your premium customers must be transformed with the highest priority.How should you implement such a system?

 

  1. Use a single SQS queue.Each message contains the priority level.Transformation instances poll high-priority messages first
  2. Use two SQS queues,one for high priority messages,the other for default priority.Transformation instances first poll the high priority queue;if there is no message,they poll the default priority queue
  3. Use a DynamoDB table with an attribute defining the priority level.Transformation instances will scan the table for tasks.sorting the results by priority level
  4. Use router 53 latency based-routing to send high priority tasks to the closest transformation instances.

 

Ans :B

48.You have been asked to design a NAT solution for your company ‘s VPC-based web application .Traffic from the private subnets varies throughout the day from 500Mbps to spikes of 7 Gbps What is the most cost-effective and scalable solution?

  1. More the Internet gateway for the VPC to a public subnet route all Internet traffic through the Internet gateway XX
  2. Create an Amazon EC2 NAT instance with a second elastic network interface (ENI) in a public subnet:route all private subnet Internet  traffic through the NAT gateway
  3. Create a NAT gateway in a public subnet route all private subnet Internet traffic through the NAT gateway
  4. Create an Auto Scaling group of Amazon EC2 NAT instances in a public subnet;route all private subnet Internet traffic through the NAT XX

 

Ans :C

49.A customer’s security team requires the logging of all network access attempts to Amazon EC2 instances in their production VPC on AWS Which configuration will meet the security team’s requirement?

  1. Enable CloudTrail for the production VPC
  2. Enable VPC Flow Logs for the production VPC
  3. Enable both CloudTrail and VPC Flow Logs for the production VPC
  4. Enable both CloudTrail and VPC Flow Logs for the AWS account 

 

Ans :B

50.Which AWS services are valid origins for an Amazon CloudFront distribution?(Select 2)

  1. Amazon RDS
  2. ELB Classic Load Balancer
  3. Amazon S3
  4. Amazon DynamoDB
  5. Amazon Glacier

Ans :B,C

51.You are running a Customer Relationship Management application and want to minimize costs.You need 400GB of disk space and 1000 IOPS,but occasionally up to 2000 IOPS Which EBS volume types should you choose?

  1. General Purpose SSD
  2. Provisioned IOPS SSD with 1000 IOPS
  3. Provisioned IOPS SSD with 2000 IOPS 
  4. Throughput-Optimized HDD

 

Ans :A

52.A company is designing a hybrid IT architecture and requires a private connection between an on-premises data center and their virtual private cloud(VPC).Which of the following would enable the company to achieve this ?(Select 2)

  1. AWS Data Pipeline
  2. ClassicLink
  3. AWS Direct Connect
  4. Amazon Route53
  5. VPN connection

 

Ans :C,E

Share this post

Comments (42)

  • Mahi Reply

    Hi Sonali, Congratulations for clearing the exam. Please help with corrections and new questions for people like us who are next in the line. Timing is running out and I have booked my exam for this week. Any help with more clear details from anyone is greatly appreciated!!!

    July 24, 2018 at 4:45 am
  • sonali kumar Reply

    I cleared the exam . hey , i felt some of the answers are incorrect

    July 23, 2018 at 12:46 am
    • Pruthvi Reply

      Hi Sonali,

      Good to hear that you cleared the exam. Can you please confirm if the dump is still valid.As i’m taking up the exam next week.

      July 23, 2018 at 7:03 pm
  • Mahi Reply

    Thanks Prashant for your feedback, very much appreciated. Can you share any new questions and corrections from your notes so it can benefit all the others who are planning to take the exam this month?

    July 14, 2018 at 10:59 pm
  • Prashant Reply

    I am able to clear the exam today. Test 6 is important and there are many questions came from this test but don’t expect that all question will be from this set. In my exam there were many new questions. I like to correct few questions SA5 Q10. ANS is $0.20, SA5 Q4 Correct Answer is Email and Short Message Service. Add few more questions 1. What are characteristics of Amazon S3? Choose 2 answers
    A.
    S3 allows you to store objects of virtually unlimited size.

    B.
    S3 offers Provisioned IOPS.

    C.
    S3 allows you to store unlimited amounts of data.

    D.
    S3 should be used to host a relational database.

    E.
    Objects are directly accessible via a URL.
    ANS: C,E

    July 9, 2018 at 12:01 pm
  • Mahi Reply

    Thanks for your feedback badboy. Can you please correct the answers and share the new ones that were not covered. I have my exam lined up in a couple of weeks and looking forward to the most accurate dumps and any corrections…

    July 5, 2018 at 3:54 pm

Leave a Reply

Your email address will not be published. Required fields are marked *


error: