Which of the following should the Architect do to meet this requirement?

A company is deploying a Microsoft SharePoint Server environment on AWS using CloudFormation. The Solutions Architect needs to install and configure the architecture that is composed of Microsoft Active Directory (AD) domain controllers, Microsoft SQL Server 2012, multiple Amazon EC2 instances to host the Microsoft SharePoint Server and many other...

August 26, 2022 No Comments READ MORE +

How will you automate the monitoring and repair of the system status check failure in an AWS environment?

One of your EC2 instances is reporting an unhealthy system status check. The operations team is looking for an easier way to monitor and repair these instances instead of fixing them manually . How will you automate the monitoring and repair of the system status check failure in an AWS...

August 26, 2022 No Comments READ MORE +

Which is the most suitable configuration for your application as well as your Aurora database cluster to achieve this requirement?

An online shopping platform is hosted on an Auto Scaling group of Spot EC2 instances and uses Amazon Aurora PostgreSQL as its database. There is a requirement to optimize your database workloads in your cluster where you have to direct the write operations of the production traffic to your high-capacity...

August 26, 2022 No Comments READ MORE +

What is one of the major advantages of having a VPN in AWS?

A company has an existing VPC which is quite unutilized for the past few months. The Business Manager instructed the Solutions Architect to integrate the company’s on-premises data center and its VPC. The architect explained the list of tasks that he’ll be doing and discussed the Virtual Private Network (VPN)...

August 25, 2022 No Comments READ MORE +

Which EC2 instance will be the first one to be terminated by your Auto Scaling group?

A suite of web applications is hosted in an Auto Scaling group of EC2 instances across three Availability Zones and is configured with default settings. There is an Application Load Balancer that forwards the request to the respective target group on the URL path. The scale-in policy has been triggered...

August 25, 2022 No Comments READ MORE +

In this scenario, which of the following can be used to fulfill this requirement?

A pharmaceutical company has resources hosted on both their on-premises network and in AWS cloud. They want all of their Software Architects to access resources on both environments using their on-premises credentials, which is stored in Active Directory. In this scenario, which of the following can be used to fulfill...

August 25, 2022 No Comments READ MORE +

Which S3 encryption technique should the Architect use?

An online medical system hosted in AWS stores sensitive Personally Identifiable Information (PII) of the users in an Amazon S3 bucket. Both the master keys and the unencrypted data should never be sent to AWS to comply with the strict compliance and regulatory requirements of the company . Which S3...

August 25, 2022 No Comments READ MORE +

Which of the following is the most suitable solution to mitigate these kinds of attacks?

A Solutions Architect identified a series of DDoS attacks while monitoring the VPC. The Architect needs to fortify the current cloud infrastructure to protect the data of the clients. Which of the following is the most suitable solution to mitigate these kinds of attacks?A . A combination of Security Groups...

August 25, 2022 No Comments READ MORE +

Which EC2 instance will be the first one to be terminated by your Auto Scaling group?

A suite of web applications is hosted in an Auto Scaling group of EC2 instances across three Availability Zones and is configured with default settings. There is an Application Load Balancer that forwards the request to the respective target group on the URL path. The scale-in policy has been triggered...

August 25, 2022 No Comments READ MORE +

Which of the following options will meet this requirement?

A company requires all the data stored in the cloud to be encrypted at rest. To easily integrate this with other AWS services, they must have full control over the encryption of the created keys and also the ability to immediately remove the key material from AWS KMS. The solution...

August 25, 2022 No Comments READ MORE +