Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

SOA-C03 AWS Certified CloudOps Engineer - Associate Questions and Answers

Questions 4

A company’s ecommerce application is running on Amazon EC2 instances that are behind an Application Load Balancer (ALB). The instances are in an Auto Scaling group. Customers report that the website is occasionally down. When the website is down, it returns an HTTP 500 (server error) status code to customer browsers.

The Auto Scaling group’s health check is configured for EC2 status checks, and the instances appear healthy.

Which solution will resolve the problem?

Options:

A.

Replace the ALB with a Network Load Balancer.

B.

Add Elastic Load Balancing (ELB) health checks to the Auto Scaling group.

C.

Update the target group configuration on the ALB. Enable session affinity (sticky sessions).

D.

Install the Amazon CloudWatch agent on all instances. Configure the agent to reboot the instances.

Buy Now
Questions 5

A company's security policy requires incoming SSH traffic to be restricted to a defined set of addresses. The company is using an AWS Config rule to check whether security groups allow unrestricted incoming SSH traffic.

A CloudOps engineer discovers a noncompliant resource and fixes the security group manually. The CloudOps engineer wants to automate the remediation of other noncompliant resources.

What is the MOST operationally efficient solution that meets these requirements?

Options:

A.

Create a CloudWatch alarm for the AWS Config rule and invoke a Lambda function to remediate.

B.

Configure an automatic remediation action on the AWS Config rule using AWS-DisableIncomingSSHOnPort22.

C.

Create an EventBridge rule for AWS Config events and invoke a Lambda function.

D.

Run a scheduled Lambda function to inspect and remediate security groups.

Buy Now
Questions 6

A company runs an application on Amazon EC2 instances in an Auto Scaling group. Scale-out actions take a long time because of long-running boot scripts. The CloudOps engineer must reduce scale-out time without overprovisioning.

Which solution will meet these requirements?

Options:

A.

Change the launch configuration to use a larger instance size.

B.

Increase the minimum number of instances in the Auto Scaling group.

C.

Add a predictive scaling policy to the Auto Scaling group.

D.

Add a warm pool to the Auto Scaling group.

Buy Now
Questions 7

A company moves workloads from public subnets to private subnets to improve security. During testing, servers in the private subnets cannot reach an external API. The VPC has a CIDR block of 10.0.0.0/16, two public subnets, two private subnets, one internet gateway, and a NAT gateway in each private subnet.

The company must ensure that workloads in the private subnets can reach the external API.

Which solution will meet this requirement?

Options:

A.

Deploy an outbound-only internet gateway and update route tables.

B.

Create an Amazon API Gateway HTTP API as a proxy.

C.

Deploy a NAT gateway in each public subnet and update private subnet route tables.

D.

Create a VPC interface endpoint and update route tables.

Buy Now
Questions 8

A company runs several workloads on AWS. The company identifies five AWS Trusted Advisor service quota metrics to monitor in a specific AWS Region. The company wants to receive email notifications each time resource usage exceeds 60% of one of the service quotas.

Which solution will meet these requirements?

Options:

A.

Create five Amazon CloudWatch alarms, one for each Trusted Advisor service quota metric. Configure an Amazon Simple Notification Service (Amazon SNS) topic for email notification each time that usage exceeds 60% of one of the service quotas.

B.

Create five Amazon CloudWatch alarms, one for each Trusted Advisor service quota metric. Configure an Amazon Simple Queue Service (Amazon SQS) queue for email notification.

C.

Use the AWS Health Dashboard to monitor each Trusted Advisor service quota metric. Configure an Amazon SQS queue for email notification.

D.

Use the AWS Health Dashboard to monitor each Trusted Advisor service quota metric. Configure an Amazon SNS topic for email notification.

Buy Now
Questions 9

A SysOps administrator needs to implement a solution that protects credentials for an Amazon RDS for MySQL DB instance. The solution must rotate the credentials automatically one time every week.

Which combination of steps will meet these requirements? (Select TWO.)

Options:

A.

Configure an RDS proxy to store the credentials.

B.

Add the credentials to AWS Secrets Manager.

C.

Add the credentials to AWS Systems Manager Parameter Store.

D.

Create an AWS Lambda function to rotate the credentials.

E.

Create an AWS Systems Manager Automation runbook to rotate the credentials.

Buy Now
Questions 10

A company uses memory-optimized Amazon EC2 instances behind a Network Load Balancer (NLB) to run an application. The company launched the EC2 instances from an AWS-provided Red Hat Enterprise Linux (RHEL) AMI.

A CloudOps engineer must monitor RAM utilization in 5-minute intervals. The CloudOps engineer must ensure that the EC2 instances scale in and out appropriately based on incoming load.

Which solution will meet these requirements?

Options:

A.

Configure detailed monitoring for the EC2 instances. Configure the Amazon CloudWatch agent on the EC2 instances. Create an EC2 Auto Scaling group and Auto Scaling policy that is based on the mem_active metric.

B.

Configure detailed monitoring for the EC2 instances. Use the mem_used_percent metric that the detailed monitoring feature provides. Create an IAM role that allows the CloudWatch agent to upload data. Create an EC2 Auto Scaling group and Auto Scaling policy that is based on the mem_used_percent metric.

C.

Configure basic monitoring for the EC2 instances. Configure the Amazon CloudWatch agent on the EC2 instances. Create an IAM role that allows the CloudWatch agent to upload data. Create an EC2 Auto Scaling group and Auto Scaling policy that is based on the mem_used_percent metric.

D.

Configure basic monitoring for the EC2 instances. Use the standard mem_used_percent metric for monitoring. Create an EC2 Auto Scaling group and Auto Scaling policy that is based on the mem_used_percent metric.

Buy Now
Questions 11

A company hosts a static website on Amazon S3. An Amazon CloudFront distribution presents this site to global users. The company uses the Managed-CachingDisabled CloudFront cache policy. The company's developers confirm that they frequently update a file in Amazon S3 with new information.

Users report that the website presents correct information when the website first loads the file. However, the users' browsers do not retrieve the updated file after a refresh.

What should a SysOps administrator recommend to fix this issue?

Options:

A.

Add a Cache-Control header field with max-age=0 to the S3 object.

B.

Change the CloudFront cache policy to Managed-CachingOptimized.

C.

Disable bucket versioning in the S3 bucket configuration.

D.

Enable content compression in the CloudFront configuration.

Buy Now
Questions 12

A CloudOps engineer is preparing to deploy an application to Amazon EC2 instances that are in an Auto Scaling group. The application requires dependencies to be installed. Application updates are issued weekly.

The CloudOps engineer needs to implement a solution to incorporate the application updates on a regular basis. The solution also must conduct a vulnerability scan during Amazon Machine Image (AMI) creation.

What is the MOST operationally efficient solution that meets these requirements?

Options:

A.

Create a script that uses Packer and schedule a cron job.

B.

Install the application and dependencies on an EC2 instance and create an AMI.

C.

Use EC2 Image Builder with a custom recipe to install the application and dependencies.

D.

Invoke the EC2 CreateImage API operation by using an EventBridge scheduled rule.

Buy Now
Questions 13

A SysOps administrator monitors and maintains the availability of resources in an AWS environment. The SysOps administrator notices that the CPU utilization of an Amazon EC2 instance that runs web server software peaks above 80% at various times during each day. The CPU spikes correlate with peak daily loads. The high CPU load has resulted in performance issues for customers.

The SysOps administrator needs to resolve the system performance issue without causing any service disruptions. Which solution will meet these requirements?

Options:

A.

Configure an Amazon CloudWatch alarm that invokes an AWS Systems Manager Automation runbook to vertically scale the EC2 instance when the CPU utilization exceeds 80%.

B.

Configure an AWS Systems Manager Automation runbook to run a script that automatically restarts the application when CPU utilization exceeds 80%.

C.

Configure an Amazon EventBridge rule that invokes an AWS Systems Manager Automation document. Configure the document to increase the EC2 instance size when CPU utilization exceeds 80%.

D.

Set up an Auto Scaling group with an Amazon CloudWatch alarm that triggers a scaling policy to launch additional EC2 instances when the CPU utilization exceeds 80%.

Buy Now
Questions 14

A company hosts a production MySQL database on an Amazon Aurora single-node DB cluster. The database is queried heavily for reporting purposes. The DB cluster is experiencing periods of performance degradation because of high CPU utilization and maximum connections errors. A CloudOps engineer needs to improve the stability of the database.

Which solution will meet these requirements?

Options:

A.

Create an Aurora Replica node. Create an Auto Scaling policy to scale replicas based on CPU utilization. Ensure that all reporting requests use the read-only connection string.

B.

Create a second Aurora MySQL single-node DB cluster in a second Availability Zone. Ensure that all reporting requests use the connection string for this additional node.

C.

Create an AWS Lambda function that caches reporting requests. Ensure that all reporting requests call the Lambda function.

D.

Create a multi-node Amazon ElastiCache cluster. Ensure that all reporting requests use the ElastiCache cluster. Use the database if the data is not in the cache.

Buy Now
Questions 15

A company has a VPC that contains a public subnet and a private subnet. The company deploys an Amazon EC2 instance that uses an Amazon Linux AMI and has the AWS Systems Manager Agent (SSM Agent) installed in the private subnet. The EC2 instance is in a security group that allows only outbound traffic.

A CloudOps engineer needs to give a group of privileged administrators the ability to connect to the instance through SSH without exposing the instance to the internet.

Which solution will meet this requirement?

Options:

A.

Create an EC2 Instance Connect endpoint in the private subnet. Update the security group to allow inbound SSH traffic. Assign PowerUserAccess to administrators.

B.

Create a Systems Manager endpoint in the private subnet. Update the security group to allow SSH traffic from the endpoint network. Assign PowerUserAccess.

C.

Create an EC2 Instance Connect endpoint in the public subnet. Update the security group to allow SSH traffic from the private network. Assign PowerUserAccess.

D.

Create a Systems Manager endpoint in the public subnet. Create an IAM role with AmazonSSMManagedInstanceCore for the EC2 instance. Assign AmazonEC2ReadOnlyAccess to administrators.

Buy Now
Questions 16

A company hosts an FTP server on EC2 instances. AWS Security Hub sends findings to Amazon EventBridge when the FTP port becomes publicly exposed in attached security groups.

A CloudOps engineer needs an automated, event-driven remediation solution to remove public access from security groups.

Which solution will meet these requirements?

Options:

A.

Configure the existing EventBridge event to stop the EC2 instances that have the exposed port.

B.

Create a cron job for the FTP server to invoke an AWS Lambda function. Configure the Lambda function to modify the security group of the identified EC2 instances and to remove the instances that allow public access.

C.

Create a cron job for the FTP server that invokes an AWS Lambda function. Configure the Lambda function to modify the server to use SFTP instead of FTP.

D.

Configure the existing EventBridge event to invoke an AWS Lambda function. Configure the function to remove the security group rule that allows public access.

Buy Now
Questions 17

A company is storing backups in an Amazon S3 bucket. The backups must not be deleted for at least 3 months after the backups are created.

What should a CloudOps engineer do to meet this requirement?

Options:

A.

Configure an IAM policy that denies the s3:DeleteObject action for all users. Remove the policy after three months.

B.

Enable S3 Object Lock on a new S3 bucket in compliance mode. Place all backups in the new S3 bucket with a retention period of 3 months.

C.

Enable S3 Versioning on the existing S3 bucket. Configure S3 Lifecycle rules to protect the backups.

D.

Enable S3 Object Lock on a new S3 bucket in governance mode. Place all backups in the new S3 bucket with a retention period of 3 months.

Buy Now
Questions 18

A company needs to log and audit any principal that publishes messages to Amazon Simple Notification Service (Amazon SNS) topics and Amazon Simple Queue Service (Amazon SQS) queues. The company wants to ensure that all communication with these services uses VPC endpoints.

Which combination of solutions will meet these requirements? (Select TWO.)

Options:

A.

Use Amazon CloudWatch Logs to collect message content from Amazon SNS and Amazon SQS. Deliver logs to an Amazon S3 bucket for querying.

B.

Set up AWS CloudTrail. Enable tracking of data events for Amazon SNS and Amazon SQS. Deliver logs to an Amazon S3 bucket for querying.

C.

Create Amazon EventBridge rules to gather Amazon SNS and Amazon SQS events. Store the events in an Amazon S3 bucket.

D.

Configure VPC endpoints for Amazon SNS and Amazon SQS. Inspect the vpcEndpointId field in the AWS CloudTrail logs.

E.

Configure VPC endpoints for Amazon SNS and Amazon SQS. Inspect the vpcEndpoint field in the Amazon CloudWatch logs.

Buy Now
Questions 19

A CloudOps engineer has created an AWS Service Catalog portfolio and shared it with a second AWS account in the company, managed by a different CloudOps engineer.

Which action can the CloudOps engineer in the second account perform?

Options:

A.

Add a product from the imported portfolio to a local portfolio.

B.

Add new products to the imported portfolio.

C.

Change the launch role for the products contained in the imported portfolio.

D.

Customize the products in the imported portfolio.

Buy Now
Questions 20

A company is using an Amazon Aurora MySQL DB cluster that has point-in-time recovery, backtracking, and automatic backup enabled. A CloudOps engineer needs to roll back the DB cluster to a specific recovery point within the previous 72 hours. Restores must be completed in the same production DB cluster.

Which solution will meet these requirements?

Options:

A.

Create an Aurora Replica. Promote the replica to replace the primary DB instance.

B.

Create an AWS Lambda function to restore an automatic backup to the existing DB cluster.

C.

Use backtracking to rewind the existing DB cluster to the desired recovery point.

D.

Use point-in-time recovery to restore the existing DB cluster to the desired recovery point.

Buy Now
Questions 21

A company runs a web application on three Amazon EC2 instances behind an Application Load Balancer (ALB). The company notices that random periods of increased traffic cause a degradation in the application’s performance.

A CloudOps engineer must scale the application to meet the increased traffic.

Which solution meets these requirements?

Options:

A.

Create an Amazon CloudWatch alarm to monitor application latency and increase the size of each EC2 instance if the desired threshold is reached.

B.

Create an Amazon EventBridge rule to monitor application latency and add an EC2 instance to the ALB if the desired threshold is reached.

C.

Deploy the application to an Auto Scaling group of EC2 instances with a target tracking scaling policy. Attach the ALB to the Auto Scaling group.

D.

Deploy the application to an Auto Scaling group of EC2 instances with a scheduled scaling policy. Attach the ALB to the Auto Scaling group.

Buy Now
Questions 22

A CloudOps engineer has successfully deployed a VPC with an AWS CloudFormation template. The CloudOps engineer wants to deploy the same template across multiple accounts that are managed through AWS Organizations.

Which solution will meet this requirement with the LEAST operational overhead?

Options:

A.

Assume the OrganizationAccountAccessRole IAM role from the management account. Deploy the template in each of the accounts.

B.

Create an AWS Lambda function to assume a role in each account. Deploy the template by using the AWS CloudFormation CreateStack API call.

C.

Create an AWS Lambda function to query for a list of accounts. Deploy the template by using the AWS CloudFormation CreateStack API call.

D.

Use AWS CloudFormation StackSets from the management account to deploy the template in each of the accounts.

Buy Now
Questions 23

An application runs on Amazon EC2 instances that are in an Auto Scaling group. A CloudOps engineer needs to implement a solution that provides a central storage location for errors that the application logs to disk. The solution must also provide an alert when the application logs an error.

What should the CloudOps engineer do to meet these requirements?

Options:

A.

Deploy and configure the Amazon CloudWatch agent on the EC2 instances to log to a CloudWatch log group. Create a metric filter on the target CloudWatch log group. Create a CloudWatch alarm that publishes to an Amazon Simple Notification Service (Amazon SNS) topic that has an email subscription.

B.

Create a cron job on the EC2 instances to identify errors and push the errors to an Amazon CloudWatch metric filter. Configure the filter to publish to an Amazon Simple Notification Service (Amazon SNS) topic that has an SMS subscription.

C.

Deploy an AWS Lambda function that pushes the errors directly to Amazon CloudWatch Logs. Configure the Lambda function to run every time the log file is updated on disk.

D.

Create an Auto Scaling lifecycle hook that invokes an EC2-based script to identify errors. Configure the script to push the error messages to an Amazon CloudWatch log group when the EC2 instances scale in. Create a CloudWatch alarm that publishes to an Amazon Simple Notification Service (Amazon SNS) topic that has an email subscription when the number of error messages exceeds a threshold.

Buy Now
Questions 24

A multinational company uses an organization in AWS Organizations to manage over 200 member accounts across multiple AWS Regions. The company must ensure that all AWS resources meet specific security requirements.

The company must not deploy any EC2 instances in the ap-southeast-2 Region. The company must completely block root user actions in all member accounts. The company must prevent any user from deleting AWS CloudTrail logs, including administrators. The company requires a centrally managed solution that the company can automatically apply to all existing and future accounts. Which solution will meet these requirements?

Options:

A.

Create AWS Config rules with remediation actions in each account to detect policy violations. Implement IAM permissions boundaries for the account root users.

B.

Enable AWS Security Hub across the organization. Create custom security standards to enforce the security requirements. Use AWS CloudFormation StackSets to deploy the standards to all the accounts in the organization. Set up Security Hub automated remediation actions.

C.

Use AWS Control Tower for account governance. Configure Region deny controls. Use Service Control Policies (SCPs) to restrict root user access.

D.

Configure AWS Firewall Manager with security policies to meet the security requirements. Use an AWS Config aggregator with organization-wide conformance packs to detect security policy violations.

Buy Now
Questions 25

A CloudOps engineer has an AWS CloudFormation template of the company’s existing infrastructure in us-west-2. The CloudOps engineer attempts to use the template to launch a new stack in eu-west-1, but the stack partially deploys, receives an error message, and then rolls back.

Why would this template fail to deploy? (Select TWO.)

Options:

A.

The template referenced an IAM user that is not available in eu-west-1.

B.

The template referenced an Amazon Machine Image (AMI) that is not available in eu-west-1.

C.

The template did not have the proper level of permissions to deploy the resources.

D.

The template requested services that do not exist in eu-west-1.

E.

CloudFormation templates can be used only to update existing services.

Buy Now
Questions 26

A global company runs a critical primary workload in the us-east-1 Region. The company wants to ensure business continuity with minimal downtime in case of a workload failure. The company wants to replicate the workload to a second AWS Region.

A CloudOps engineer needs a solution that achieves a recovery time objective (RTO) of less than 10 minutes and a zero recovery point objective (RPO) to meet service level agreements.

Which solution will meet these requirements?

Options:

A.

Implement a pilot light architecture that provides real-time data replication in the second Region. Configure Amazon Route 53 health checks and automated DNS failover.

B.

Implement a warm standby architecture that provides regular data replication in a second Region. Configure Amazon Route 53 health checks and automated DNS failover.

C.

Implement an active-active architecture that provides real-time data replication across two Regions. Use Amazon Route 53 health checks and a weighted routing policy.

D.

Implement a custom script to generate a regular backup of the data and store it in an S3 bucket that is in a second Region. Use the backup to launch the application in the second Region in the event of a workload failure.

Buy Now
Questions 27

A company runs an application on an Amazon EC2 instance. The application uses a MySQL database. The EC2 instance has a General Purpose SSD (gp3) Amazon EBS volume attached. The company wants to perform load testing using a new MySQL database created from an EBS snapshot of the production instance. The new database must perform as similarly as possible to production.

Which solution will meet these requirements in the LEAST amount of time?

Options:

A.

Use Amazon EBS fast snapshot restore (FSR) to create a new General Purpose SSD volume from the production snapshot.

B.

Use Amazon EBS fast snapshot restore (FSR) to create a new Provisioned IOPS SSD volume from the production snapshot.

C.

Use Amazon EBS standard snapshot restore to create a new General Purpose SSD volume from the production snapshot.

D.

Use Amazon EBS standard snapshot restore to create a new Provisioned IOPS SSD volume from the production snapshot.

Buy Now
Questions 28

A company runs a business application on more than 300 Linux-based instances. Each instance has the AWS Systems Manager Agent (SSM Agent) installed. The company expects the number of instances to grow in the future. All business application instances have the same user-defined tag.

A CloudOps engineer wants to run a command on all the business application instances to download and install a package from a private repository. To avoid overwhelming the repository, the CloudOps engineer wants to ensure that no more than 30 downloads occur at one time.

Which solution will meet this requirement in the MOST operationally efficient way?

Options:

A.

Use a secondary tag to create 10 batches of 30 instances each. Use a Systems Manager Run Command document to download and install the package. Run each batch one time.

B.

Use an AWS Lambda function to automatically run a Systems Manager Run Command document. Set reserved concurrency for the Lambda function to 30.

C.

Use a Systems Manager Run Command document to download and install the package. Use rate control to set concurrency to 30. Specify the target by using the user-defined tag.

D.

Use a parallel workflow state in AWS Step Functions. Set the number of parallel states to 30.

Buy Now
Questions 29

A company uses AWS Systems Manager Session Manager to manage EC2 instances in the eu-west-1 Region. The company wants private connectivity using VPC endpoints.

Which VPC endpoints are required to meet these requirements? (Select THREE.)

Options:

A.

com.amazonaws.eu-west-1.ssm

B.

com.amazonaws.eu-west-1.ec2messages

C.

com.amazonaws.eu-west-1.ec2

D.

com.amazonaws.eu-west-1.ssmmessages

E.

com.amazonaws.eu-west-1.s3

F.

com.amazonaws.eu-west-1.states

Buy Now
Questions 30

A company's website runs on an Amazon EC2 Linux instance. The website needs to serve PDF files from an Amazon S3 bucket. All public access to the S3 bucket is blocked at the account level. The company needs to allow website users to download the PDF files.

Which solution will meet these requirements with the LEAST administrative effort?

Options:

A.

Create an IAM role that has a policy that allows s3:list* and s3:get* permissions. Assign the role to the EC2 instance. Assign a company employee to download requested PDF files to the EC2 instance and deliver the files to website users. Create an AWS Lambda function to periodically delete local files.

B.

Create an Amazon CloudFront distribution that uses an origin access control (OAC) that points to the S3 bucket. Apply a bucket policy to the bucket to allow connections from the CloudFront distribution. Assign a company employee to provide a download URL that contains the distribution URL and the object path to users when users request PDF files.

C.

Change the S3 bucket permissions to allow public access on the source S3 bucket. Assign a company employee to provide a PDF file URL to users when users request the PDF files.

D.

Deploy an EC2 instance that has an IAM instance profile to a public subnet. Use a signed URL from the EC2 instance to provide temporary access to the S3 bucket for website users.

Buy Now
Questions 31

A company must ensure that all Amazon EC2 Windows instances that are launched in an AWS account have a third-party agent installed. The company uses AWS Systems Manager, and the Windows instances are tagged appropriately. The company must deploy periodic updates to the third-party agent when the updates become available.

Which combination of steps will meet these requirements with the LEAST operational effort? (Select TWO.)

Options:

A.

Create a Systems Manager Distributor package for the third-party agent.

B.

Create a Systems Manager OpsItem that includes the tag value for Windows. Attach Systems Manager inventory to the OpsItem.

C.

Create an AWS Lambda function. Program the Lambda function to log in to each instance and to install or update the third-party agent as needed.

D.

Create a Systems Manager State Manager association to run the AWS-RunRemoteScript document. Populate the details of the third-party agent package.

E.

Create a Systems Manager State Manager association to run the AWS-ConfigureAWSPackage document. Populate the details of the third-party agent package. Specify instance targets based on the appropriate tag value for Windows.

Buy Now
Questions 32

A SysOps administrator creates a custom Amazon Machine Image (AMI) in the eu-west-2 Region and uses the AMI to launch Amazon EC2 instances. The SysOps administrator needs to use the same AMI to launch EC2 instances in two other Regions: us-east-1 and us-east-2.

What must the SysOps administrator do to use the custom AMI in the additional Regions?

Options:

A.

Copy the AMI to the additional Regions

B.

Make the AMI public in the Community AMIs section of the AWS Management Console

C.

Share the AMI to the additional Regions. Assign the required access permissions.

D.

Copy the AMI to a new Amazon S3 bucket. Assign access permissions to the AMI for the additional Regions

Buy Now
Questions 33

A company hosts a critical legacy application on two Amazon EC2 instances that are in one Availability Zone. The instances run behind an Application Load Balancer (ALB). The company uses Amazon CloudWatch alarms to send Amazon Simple Notification Service (Amazon SNS) notifications when the ALB health checks detect an unhealthy instance. After a notification, the company's engineers manually restart the unhealthy instance. A CloudOps engineer must configure the application to be highly available and more resilient to failures. Which solution will meet these requirements?

Options:

A.

Create an Amazon Machine Image (AMI) from a healthy instance. Launch additional instances from the AMI in the same Availability Zone. Add the new instances to the ALB target group.

B.

Increase the size of each instance. Create an Amazon EventBridge rule. Configure the EventBridge rule to restart the instances if they enter a failed state.

C.

Create an Amazon Machine Image (AMI) from a healthy instance. Launch an additional instance from the AMI in the same Availability Zone. Add the new instance to the ALB target group. Create an AWS Lambda function that runs when an instance is unhealthy. Configure the Lambda function to stop and restart the unhealthy instance.

D.

Create an Amazon Machine Image (AMI) from a healthy instance. Create a launch template that uses the AMI. Create an Amazon EC2 Auto Scaling group that is deployed across multiple Availability Zones. Configure the Auto Scaling group to add instances to the ALB target group.

Buy Now
Questions 34

A company uses hundreds of Amazon EC2 On-Demand Instances and Spot Instances to run production and non-production workloads. The company installs and configures the AWS Systems Manager Agent (SSM Agent) on the EC2 instances.

During a recent instance patch operation, some instances were not patched because the instances were either busy or down. The company needs to generate a report that lists the current patch version of all instances.

Which solution will meet these requirements in the MOST operationally efficient way?

Options:

A.

Use Systems Manager Inventory to collect patch versions. Generate a report of all instances.

B.

Use Systems Manager Run Command to remotely collect patch version information. Generate a report of all instances.

C.

Use AWS Config to track EC2 instance configuration changes by using output from the SSM Agents. Create a custom rule to check for patch versions. Generate a report of all unpatched instances.

D.

Use AWS Config to monitor the patch status of the EC2 instances by using output from the SSM Agents. Create a configuration compliance rule to check whether patches are installed. Generate a report of all instances.

Buy Now
Questions 35

A CloudOps engineer is responsible for a company's disaster recovery procedures. The company has a source Amazon S3 bucket in a production account, and it wants to replicate objects from the source to a destination S3 bucket in a nonproduction account. The CloudOps engineer configures S3 cross-Region, cross-account replication to copy the source S3 bucket to the destination S3 bucket. When the CloudOps engineer attempts to access objects in the destination S3 bucket, they receive an Access Denied error.

Which solution will resolve this problem?

Options:

A.

Modify the replication configuration to change object ownership to the destination S3 bucket owner.

B.

Ensure that the replication rule applies to all objects in the source S3 bucket and is not scoped to a single prefix.

C.

Retry the request when the S3 Replication Time Control (S3 RTC) has elapsed.

D.

Verify that the storage class for the replicated objects did not change between the source S3 bucket and the destination S3 bucket.

Buy Now
Questions 36

A financial services company stores customer images in an Amazon S3 bucket in the us-east-1 Region. To comply with regulations, the company must ensure that all existing objects are replicated to an S3 bucket in a second AWS Region. If an object replication fails, the company must be able to retry replication for the object.

What solution will meet these requirements?

Options:

A.

Configure Amazon S3 Cross-Region Replication (CRR). Use Amazon S3 live replication to replicate existing objects.

B.

Configure Amazon S3 Cross-Region Replication (CRR). Use S3 Batch Replication to replicate existing objects.

C.

Configure Amazon S3 Cross-Region Replication (CRR). Use S3 Replication Time Control (S3 RTC) to replicate existing objects.

D.

Use S3 Lifecycle rules to move objects to the destination bucket in a second Region.

Buy Now
Questions 37

An AWS CloudFormation template creates an Amazon RDS instance. This template is used to build up development environments as needed and then delete the stack when the environment is no longer required. The RDS-persisted data must be retained for further use, even after the CloudFormation stack is deleted.

How can this be achieved in a reliable and efficient way?

Options:

A.

Write a script to continue backing up the RDS instance every five minutes.

B.

Create an AWS Lambda function to take a snapshot of the RDS instance, and manually invoke the function before deleting the stack.

C.

Use the Snapshot Deletion Policy in the CloudFormation template definition of the RDS instance.

D.

Create a new CloudFormation template to perform backups of the RDS instance, and run this template before deleting the stack.

Buy Now
Questions 38

A CloudOps engineer is examining the following AWS CloudFormation template:

AWSTemplateFormatVersion: '2010-09-09'

Description: 'Creates an EC2 Instance'

Resources:

EC2Instance:

Type: AWS::EC2::Instance

Properties:

ImageId: ami-79fd7eee

InstanceType: m5n.large

SubnetId: subnet-1abc3d3fg

PrivateDnsName: ip-10-24-34-0.ec2.internal

Tags:

- Key: Name

Value: !Sub "${AWS::StackName} Instance"

Why will the stack creation fail?

Options:

A.

The Outputs section of the CloudFormation template was omitted.

B.

The Parameters section of the CloudFormation template was omitted.

C.

The PrivateDnsName cannot be set from a CloudFormation template.

D.

The VPC was not specified in the CloudFormation template.

Buy Now
Questions 39

An errant process is known to use an entire processor and run at 100% CPU. A CloudOps engineer wants to automate restarting an Amazon EC2 instance when the problem occurs for more than 2 minutes.

How can this be accomplished?

Options:

A.

Create an Amazon CloudWatch alarm for the EC2 instance with basic monitoring. Add an action to restart the instance.

B.

Create an Amazon CloudWatch alarm for the EC2 instance with detailed monitoring. Add an action to restart the instance.

C.

Create an AWS Lambda function to restart the EC2 instance, invoked on a scheduled basis every 2 minutes.

D.

Create an AWS Lambda function to restart the EC2 instance, invoked by EC2 health checks.

Buy Now
Questions 40

A CloudOps engineer must manage the security of an AWS account. Recently, an IAM user’s access key was mistakenly uploaded to a public code repository. The engineer must identify everything that was changed using this compromised key.

How should the CloudOps engineer meet these requirements?

Options:

A.

Create an Amazon EventBridge rule to send all IAM events to an AWS Lambda function for analysis.

B.

Query Amazon EC2 logs by using Amazon CloudWatch Logs Insights for all events initiated with the compromised access key within the suspected timeframe.

C.

Search AWS CloudTrail event history for all events initiated with the compromised access key within the suspected timeframe.

D.

Search VPC Flow Logs for all events initiated with the compromised access key within the suspected timeframe.

Buy Now
Questions 41

A company deploys an application on Amazon EC2 instances in an Auto Scaling group behind an Application Load Balancer (ALB). The company wants to protect the application from SQL injection attacks.

Which solution will meet this requirement?

Options:

A.

Deploy AWS Shield Advanced in front of the ALB. Enable SQL injection filtering.

B.

Deploy AWS Shield Standard in front of the ALB. Enable SQL injection filtering.

C.

Deploy a vulnerability scanner on each EC2 instance. Continuously scan the application code.

D.

Deploy AWS WAF in front of the ALB. Subscribe to an AWS Managed Rule for SQL injection filtering.

Buy Now
Questions 42

A media company hosts a public news and video portal on AWS. The portal uses an Amazon DynamoDB table with provisioned capacity to maintain an index of video files that are stored in an Amazon S3 bucket. During a recent event, millions of visitors came to the portal for news. This increase in traffic caused read requests to be throttled in the DynamoDB table. Videos could not be displayed in the portal.

The company's operations team manually increased the provisioned capacity on a temporary basis to meet the demand. The company wants the operations team to receive an alert before the table is throttled in the future. The company has created an Amazon Simple Notification Service (Amazon SNS) topic and has subscribed the operations team's email address to the SNS topic.

What should the company do next to meet these requirements?

Options:

A.

Create an Amazon CloudWatch alarm that uses the ConsumedReadCapacityUnits metric. Set the alarm threshold to a value that is close to the DynamoDB table's provisioned capacity. Configure the alarm to publish notifications to the SNS topic.

B.

Turn on auto scaling on the DynamoDB table. Configure an Amazon EventBridge rule to publish notifications to the SNS topic during scaling events.

C.

Turn on Amazon CloudWatch Logs for the DynamoDB table. Create an Amazon CloudWatch metric filter to pattern match the THROTTLING_EXCEPTION status code from DynamoDB. Create a CloudWatch alarm for the metric. Select the SNS topic for notifications.

D.

Configure the application to store logs in Amazon CloudWatch Logs. Create an Amazon CloudWatch metric filter to pattern match the THROTTLING_EXCEPTION status code from DynamoDB. Create a CloudWatch alarm for the metric. Select the SNS topic for notifications.

Buy Now
Questions 43

A company is implementing security and compliance by using AWS Trusted Advisor. The company’s CloudOps team is validating the list of Trusted Advisor checks that it can access.

Which factor will affect the quantity of available Trusted Advisor checks?

Options:

A.

Whether at least one Amazon EC2 instance is in the running state

B.

The AWS Support plan

C.

An AWS Organizations service control policy (SCP)

D.

Whether the AWS account root user has multi-factor authentication (MFA) enabled

Buy Now
Questions 44

A company runs thousands of Amazon EC2 instances that are based on the Amazon Linux 2 Amazon Machine Image (AMI). A SysOps administrator must implement a solution to record commands and output from any user that needs an interactive session on one of the EC2 instances. The solution must log the data to a durable storage location. The solution also must provide automated notifications and alarms that are based on the log data.

Which solution will meet these requirements with the MOST operational efficiency?

Options:

A.

Configure command session logging on each EC2 instance. Configure the unified Amazon CloudWatch agent to send session logs to Amazon CloudWatch Logs. Set up query filters and alerts by using Amazon Athena.

B.

Require all users to use a central bastion host when they need command line access to an EC2 instance. Configure the unified Amazon CloudWatch agent on the bastion host to send session logs to Amazon CloudWatch Logs. Set up a metric filter and a metric alarm for relevant security findings in CloudWatch Logs.

C.

Require all users to use AWS Systems Manager Session Manager when they need command line access to an EC2 instance. Configure Session Manager to stream session logs to Amazon CloudWatch Logs. Set up a metric filter and a metric alarm for relevant security findings in CloudWatch Logs.

D.

Configure command session logging on each EC2 instance. Require all users to use AWS Systems Manager Run Command documents when they need command line access to an EC2 instance. Configure the unified Amazon CloudWatch agent to send session logs to Amazon CloudWatch Logs. Set up CloudWatch alarms that are based on Amazon Athena query results.

Buy Now
Questions 45

A company that uses AWS Organizations recently implemented AWS Control Tower. The company now needs to centralize identity management. A CloudOps engineer must federate AWS IAM Identity Center with an external SAML 2.0 identity provider (IdP) to centrally manage access to all AWS accounts and cloud applications.

Which prerequisites must the CloudOps engineer have so that the CloudOps engineer can connect to the external IdP? (Select TWO.)

Options:

A.

A copy of the IAM Identity Center SAML metadata

B.

The IdP metadata, including the public X.509 certificate

C.

The IP address of the IdP

D.

Root access to the management account

E.

Administrative permissions to the member accounts of the organization

Buy Now
Questions 46

A company hosts a web application on an Amazon EC2 instance. The web server logs are published to Amazon CloudWatch Logs. The log events have the same structure and include the HTTP response codes associated with user requests. The company needs to monitor the number of times the web server returns an HTTP 404 response.

What is the MOST operationally efficient solution that meets these requirements?

Options:

A.

Create a CloudWatch Logs metric filter that counts the number of times the web server returns an HTTP 404 response.

B.

Create a CloudWatch Logs subscription filter that counts the number of HTTP 404 responses.

C.

Create an AWS Lambda function that runs a CloudWatch Logs Insights query every hour.

D.

Create a script that runs a CloudWatch Logs Insights query every hour.

Buy Now
Questions 47

A company's AWS accounts are in an organization in AWS Organizations. The organization has all features enabled. The accounts use Amazon EC2 instances to host applications. The company manages the EC2 instances manually by using the AWS Management Console. The company applies updates to the EC2 instances by using an SSH connection to each EC2 instance.

The company needs a solution that uses AWS Systems Manager to manage all the organization's current and future EC2 instances. The latest version of Systems Manager Agent (SSM Agent) is running on the EC2 instances.

Which solution will meet these requirements?

Options:

A.

Configure a home AWS Region in Systems Manager Quick Setup in the organization's management account. Deploy the Systems Manager Default Host Management Configuration Quick Setup from the management account.

B.

Configure a home AWS Region in Systems Manager Quick Setup in the organization's management account. Create a Systems Manager Run Command that attaches the AmazonSSMServiceRolePolicy IAM policy to every IAM role that the EC2 instances use. Invoke the command in every account in the organization.

C.

Create an AWS CloudFormation stack set that contains a Systems Manager parameter to define the Default Host Management Configuration role. Use the organization's management account to deploy the stack set to every account in the organization.

D.

Create an AWS CloudFormation stack set that contains an EC2 instance profile with the AmazonSSMManagedEC2InstanceDefaultPolicy IAM policy attached. Use the organization's management account to deploy the stack set to every account in the organization.

Buy Now
Questions 48

A company manages a set of AWS accounts by using AWS Organizations. The company’s security team wants to use a native AWS service to regularly scan all AWS accounts against the Center for Internet Security (CIS) AWS Foundations Benchmark.

What is the MOST operationally efficient way to meet these requirements?

Options:

A.

Designate a central security account as the AWS Security Hub administrator account. Use scripts to invite and accept member accounts.

B.

Run the CIS AWS Foundations Benchmark by using Amazon Inspector.

C.

Designate a central security account as the Amazon GuardDuty administrator account and configure CIS scans.

D.

Designate an AWS Security Hub administrator account, automatically enroll new organization accounts, and enable CIS AWS Foundations Benchmark.

Buy Now
Questions 49

A SysOps administrator needs to give an existing AWS Lambda function access to an existing Amazon S3 bucket. Traffic between the Lambda function and the S3 bucket must not use public IP addresses. The Lambda function has been configured to run in a VPC.

Which solution will meet these requirements?

Options:

A.

Configure VPC sharing between the Lambda VPC and the S3 bucket.

B.

Attach a transit gateway to the Lambda VPC to allow the Lambda function to connect to the S3 bucket.

C.

Create a NAT gateway. Associate the NAT gateway with the subnet where the Lambda function is configured to run.

D.

Create an S3 interface endpoint. Change the Lambda function to use the new S3 DNS name.

Buy Now
Exam Code: SOA-C03
Exam Name: AWS Certified CloudOps Engineer - Associate
Last Update: Feb 25, 2026
Questions: 165

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99