Skip to content
Home » AWS Solutions Architect Questions and Answers Part-7

AWS Solutions Architect Questions and Answers Part-7

    AWS Solutions Architect Questions and Answers Part-7

    Get ready to excel in your AWS Solutions Architect certification with this comprehensive collection of questions and answers. Covering critical topics like cloud architecture design, AWS services, security best practices, and cost optimization, these Q&A sessions will help you gain a deep understanding of AWS concepts and prepare effectively for the exam. Whether you are a beginner or an experienced professional, these answers provide clear explanations and practical examples to solidify your AWS knowledge and boost your confidence.

    Test your skills

    1.Company B is launching a new game app for mobile devices. Users will log into the game using their existing social media account to streamline data capture. Company B would like to directly save player data and scoring information from the mobile app to a Dynamo DS table named Score Data When a user saves their game the progress data will be stored to the Game state S3 bucket. What is the best approach for storing data to DynamoDB and S3?

                         A. Use an EC2 Instance that is launched with an EC2 role providing access                               to the Score Data DynamoDB table and the Game State S3 bucket that                                   communicates with the mobile app via web services.
     
                         B. Use temporary security credentials that assume a role providing access to                             the Score Data DynamoDB table and the Game State S3 bucket using web                             identity federation.
     
                         C. Use Login with Amazon allowing users to sign in with an Amazon account                             providing the mobile app with access to the Score Data DynamoDB table                               and the Game State S3 bucket.
     
                         D. Use an IAM user with access credentials assigned a role providing access                             to the Score Data DynamoDB table and the Game State S3 bucket for                                   distribution with the mobile app.

    B. Use temporary security credentials that assume a role providing access to the Score Data DynamoDB table and the Game State S3 bucket using web identity federation.

    Click to know answer Hide

    2. Your company runs a customer facing event registration site This site is built with a 3-tier architecture with web and application tier servers and a MySQL database The application requires 6 web tier servers and 6 application tier servers for normal operation, but can run on a minimum of 65% server capacity and a single MySQL database. When deploying this application  in a region with three availability zones (AZs) which architecture provides high availability?

                         A. A web tier deployed across 2 AZs with 3 EC2 (Elastic Compute Cloud)                                 instances in each AZ inside an Auto Scaling Group behind an ELB (elastic                           load balancer), and an application tier deployed across 2 AZs with 3 EC2                             instances in each AZ inside an Auto Scaling Group behind an ELB. and one                           RDS (Relational Database Service) instance deployed with read replicas in                           the other AZ.
     
                        B. A web tier deployed across 3 AZs with 2 EC2 (Elastic Compute Cloud)                                  instances in each A2 inside an Auto Scaling Group behind an ELB (elastic                            load balancer) and an application tier deployed across 3 AZs with 2 EC2                              instances in each AZ inside an Auto Scaling Group behind an ELB and one                            RDS (Relational Database Service) Instance deployed with read replicas in                            the two other AZs.
     
     
                         C. A web tier deployed across 2 AZs with 3 EC2 (Elastic Compute Cloud)                                 instances in each AZ inside an Auto Scaling Group behind an ELB (elastic                           load balancer) and an application tier deployed across 2 AZs with 3 EC2                               instances m each AZ inside an Auto Scaling Group behind an ELS and a                               Multi-AZ RDS (Relational Database Service)deployment.
     
                         D. A web tier deployed across 3 AZs with 2 EC2 (Elastic Compute Cloud)                                 instances in each AZ Inside an Auto Scaling Group behind an ELB (elastic                           load balancer). And an application tier deployed across 3 AZs with 2 EC2                             instances In each AZ inside an Auto Scaling Group behind an ELB. And a                             Multi-AZ RDS (Relational Database services)deployment.

    D. A web tier deployed across 3 AZs with 2 EC2 (Elastic Compute Cloud) instances in each AZ Inside an Auto Scaling Group behind an ELB (elastic load balancer). And an application tier deployed across 3 AZs with 2 EC2 instances in each AZ inside an Auto Scaling Group behind an ELB and a Multi-AZ RDS (Relational Database services) deployment.

    Click to know answer Hide
    3. You have an application running on an EC2 Instance which will allow users to download flies from a private S3 bucket using a pre-assigned URL. Before generating the URL the application should verify the existence of the file in S3.
    How should the application use AWS credentials to access the S3 bucket securely?
     
     
                         A. Use the AWS account access Keys the application retrieves the credentials                           from the source code of the application.
     
                         B. Create a IAM user for the application with permissions that allow list                                   access to the S3 bucket launch the instance as the IAM user and retrieve                               the IAM user’s credentials from the EC2 instance user data.
     
                         C. Create an IAM role for EC2 that allows list access to objects in the S3                                 bucket. Launch the instance with the role, and retrieve the role’s                                         credentials from the EC2 Instance metadata
     
                         D. Create an IAM user for the application with permissions that allow list                                 access to the S3 bucket. The application retrieves the IAM user credentials                           from a temporary directory with permissions that allow read access only to                           the application user.

    C. Create an IAM role for EC2 that allows list access to objects in the S3 bucket. Launch the instance with the role, and retrieve the role’s credentials from the EC2 Instance metadata 

    Click to know answer Hide

    4. You have been asked to design the storage layer for an application. The application requires disk performance of at least 100,000 IOPS in addition, the storage layer must be able to survive the loss of an individual disk. EC2 instance, or Availability Zone without any data loss. The volume you provide must have a capacity of at least 3 TB. Which of the following designs will meet these objectives’?

                         A. Instantiate an 12 8xlarge instance in us-east-1a Create a RAID 0 volume                               using the four 800GB SSD ephemeral disks provided with the instance                                 Provision 3×1 TB EBS volumes attach them to the instance and configure                             them as a second RAID 0 volume Configure synchronous, block-level                                   replication from the ephemeral-backed volume to the EBS-backed volume.
     
                         B. Instantiate an 12 8xlarge instance in us-east-1a create a raid 0 volume                                 using the four 800GB SSD ephemeral disks provide with the Instance                                   Configure synchronous block-level replication to an Identically configured                           Instance in us-east-1b.
     
                         C. Instantiate a c3 8xlarge Instance In us-east-1 Provision an AWS Storage                               Gateway and configure it for 3 TB of storage and 100 000 IOPS Attach the                           volume to the instance.
     
                         D. Instantiate a c3 8xlarge instance in us-east-i provision 4x1TB EBS                                       volumes, attach them to the instance, and configure them as a single RAID                           5 volume Ensure that EBS snapshots are performed every 15 minutes.
     
                         E. Instantiate a c3 8xlarge Instance in us-east-1 Provision 3x1TB EBS                                     volumes attach them to the instance, and configure them as a single RAID                             0 volume Ensure that EBS snapshots are performed every 15 minutes.

    B.Instantiate an i2.8xlarge instance in us-east-1a. Create a RAID 0 volume using the four 800GB SSD ephemeral disks provided with the instance. Configure synchronous, block-level replication to an identically configured instance in us-east-1b.

    Click to know answer Hide
    5. To serve Web traffic for a popular product your chief financial officer and IT director have purchased 10 ml large heavy utilization Reserved Instances (RIs) evenly spread across two availability zones: Route 53 is used to deliver the traffic to an Elastic Load Balancer (ELB). After several months, the product grows even more popular and you need additional capacity As a result, your company purchases two C3.2xlarge medium utilization Ris You register the two c3 2xlarge instances with your ELB and quickly find that the ml large instances are at 100% of capacity and the c3 2xlarge instances have significant capacity that’s unused Which option is the most cost effective and uses EC2 capacity most effectively?
     
     
                         A. Use a separate ELB for each instance type and distribute load to ELBs with                           Route 53 weighted round robin
     
                         B. Configure Autoscaning group and Launch Configuration with ELB                                       to add up to 10 more on-demand mi large instances when triggered by                                  Cloudwatch shut off c3 2xiarge instances
     
                         C. Route traffic to EC2 ml large and c3 2xlarge instances directly                                           using Route 53 latency based routing and health checks shut off ELB
     
                         D. Configure ELB with two c3 2xiarge Instances and use on-demand                                         Autoscailng group for up to two additional c3.2xlarge instances Shut on                               mi .large instances.

    A. Use a separate ELB for each instance type and distribute load to ELBs with Route 53 weighted round robin.

    Click to know answer Hide

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    Need Help?
    Call Now