AWS Certified Solutions Architect – Professional (SAP-C01) Exam Dumps

The AWS Certified Solutions Architect – Professional (SAP-C01) examination is intended for individuals who perform a solutions architect professional role. This exam validates advanced technical skills and experience in designing distributed applications and systems on the AWS platform. PassQuestion new released AWS Certified Solutions Architect – Professional (SAP-C01) Exam Dumps for your best preparation and ensure you pass your SAP-C01 exam successfully in your first time.

AWS Certified Solutions Architect – Professional (SAP-C01) Exam Dumps

1. Your company policies require encryption of sensitive data at rest. You are considering the possible options for protecting data while storing it at rest on an EBS data volume, attached to an EC2 instance.

Which of these options would allow you to encrypt your data at rest? (Choose three.)

 
 
 
 
 

2. A customer is deploying an SSL enabled web application to AWS and would like to implement a separation of roles between the EC2 service administrators that are entitled to login to instances as well as making API calls and the security officers who will maintain and have exclusive access to the application’s X.509 certificate that contains the private key.

 
 
 
 

3. You have recently joined a startup company building sensors to measure street noise and air quality in urban areas. The company has been running a pilot deployment of around 100 sensors for 3 months each sensor uploads 1KB of sensor data every minute to a backend hosted on AWS. During the pilot, you measured a peak or 10 IOPS on the database, and you stored an average of 3GB of sensor data per month in the database. The current deployment consists of a load-balanced auto scaled Ingestion layer using EC2 instances and a PostgreSQL RDS database with 500GB standard storage. The pilot is considered a success and your CEO has managed to get the attention or some potential investors. The business plan requires a deployment of at least 100K sensors which needs to be supported by the backend. You also need to store sensor data for at least two years to be able to compare year over year Improvements. To secure funding, you have to make sure that the platform meets these requirements and leaves room for further scaling.

Which setup win meet the requirements?

 
 
 
 

4. A web company is looking to implement an intrusion detection and prevention system into their deployed VPC. This platform should have the ability to scale to thousands of instances running inside of the VPC.

How should they architect their solution to achieve these goals?

 
 
 
 

5. A company is storing data on Amazon Simple Storage Service (S3). The company’s security policy mandates that data is encrypted at rest.

Which of the following methods can achieve this? (Choose three.)

 
 
 
 
 
 

6. Your firm has uploaded a large amount of aerial image data to S3. In the past, in your on-premises environment, you used a dedicated group of servers to oaten process this data and used Rabbit MQ – An open source messaging system to get job information to the servers. Once processed the data would go to tape and be shipped offsite. Your manager told you to stay with the current design, and leverage AWS archival storage and messaging services to minimize cost.

Which is correct?

 
 
 
 

7. You’ve been hired to enhance the overall security posture for a very large e-commerce site. They have a well architected multi-tier application running in a VPC that uses ELBs in front of both the web and the app tier with static assets served directly from S3. They are using a combination of RDS and DynamoDB for their dynamic data and then archiving nightly into S3 for further processing with EMR. They are concerned because they found questionable log entries and suspect someone is attempting to gain unauthorized access.

Which approach provides a cost effective scalable mitigation to this kind of attack?

 
 
 
 

8. Your company is in the process of developing a next generation pet collar that collects biometric information to assist families with promoting healthy lifestyles for their pets. Each collar will push 30kb of biometric data in JSON format every 2 seconds to a collection platform that will process and analyze the data providing health trending information back to the pet owners and veterinarians via a web portal. Management has tasked you to architect the collection platform ensuring the following requirements are met.

– Provide the ability for real-time analytics of the inbound biometric data

– Ensure processing of the biometric data is highly durable. Elastic and parallel

– The results of the analytic processing should be persisted for data mining

Which architecture outlined below win meet the initial requirements for the collection platform?

 
 
 
 

9. You are designing Internet connectivity for your VPC. The Web servers must be available on the Internet. The application must have a highly available architecture.

Which alternatives should you consider? (Choose two.)

 
 
 
 
 

10. Your team has a tomcat-based Java application you need to deploy into development, test and production environments. After some research, you opt to use Elastic Beanstalk due to its tight integration with your developer tools and RDS due to its ease of management. Your QA team lead points out that you need to roll a sanitized set of production data into your environment on a nightly basis. Similarly, other software teams in your org want access to that same restored data via their EC2 instances in your VPC.

The optimal setup for persistence and security that meets the above requirements would be the following.

 
 
 
 

11. Your company has an on-premises multi-tier PHP web application, which recently experienced downtime due to a large burst in web traffic due to a company announcement Over the coming days, you are expecting similar announcements to drive similar unpredictable bursts, and are looking to find ways to quickly improve your infrastructures ability to handle unexpected increases in traffic. The application currently consists of 2 tiers a web tier which consists of a load balancer and several Linux Apache web servers as well as a database tier which hosts a Linux server hosting a MySQL database.

Which scenario below will provide full site functionality, while helping to improve the ability of your application in the short timeframe required?

 
 
 
 

12. You are implementing AWS Direct Connect. You intend to use AWS public service end points such as Amazon S3, across the AWS Direct Connect link. You want other Internet traffic to use your existing link to an Internet Service Provider.

What is the correct way to configure AWS Direct connect for access to services such as Amazon S3?

 
 
 
 

13. Your application is using an ELB in front of an Auto Scaling group of web/application servers deployed across two AZs and a Multi-AZ RDS Instance for data persistence. The database CPU is often above 80% usage and 90% of I/O operations on the database are reads. To improve performance you recently added a single-node Memcached ElastiCache Cluster to cache frequent DB query results. In the next weeks the overall workload is expected to grow by 30%.

Do you need to change anything in the architecture to maintain the high availability or the application with the anticipated additional load? Why?

 
 
 
 

14. An ERP application is deployed across multiple AZs in a single region. In the event of failure, the Recovery Time Objective (RTO) must be less than 3 hours, and the Recovery Point Objective (RPO) must be 15 minutes. The customer realizes that data corruption occurred roughly 1.5 hours ago.

What DR strategy could be used to achieve this RTO and RPO in the event of this kind of failure?

 
 
 
 

15. You are designing the network infrastructure for an application server in Amazon VPC. Users will access all application instances from the Internet, as well as from an on-premises network. The on-premises network is connected to your VPC over an AWS Direct Connect link.

How would you design routing to meet the above requirements?

 
 
 
 

16. You control access to S3 buckets and objects with:

 
 
 
 

17. The AWS IT infrastructure that AWS provides, complies with the following IT security standards, including:

 
 
 
 
 

18. Auto Scaling requests are signed with a _________ signature calculated from the request and the user’s private key.

 
 
 
 

19. The following policy can be attached to an IAM group. It lets an IAM user in that group access a “home directory” in AWS S3 that matches their user name using the console.

{

“Version”: “2012-10-17”,

“Statement”: [

{

“Action”: [“s3:*”],

“Effect”: “Allow”,

“Resource”: [“arn:aws:s3:::bucket-name”],

“Condition”:{“StringLike”:{“s3:prefix”:[“home/${aws:username}/*”]}}

},

{

“Action”:[“s3:*”],

“Effect”:”Allow”,

“Resource”: [“arn:aws:s3:::bucket-name/home/${aws:username}/*”]

}

]

}

 
 

20. What does elasticity mean to AWS?

 
 
 
 

AWS Certified DevOps Engineer - Professional DOP-C01 Real Questions

Leave a Reply

Your email address will not be published. Required fields are marked *