AWS-Solution-Architect-Associate
AWS Certified Solutions Architect - Associate
Version: Demo
Your Partner of IT Exam visit - http://www.exambible.com
About Exambible
Your Partner of IT Exam
Found in 1998
Exambible is a company specialized on providing high quality IT exam practice study
materials, especially Cisco CCNA, CCDA, CCNP, CCIE, Checkpoint CCSE, CompTIA
A+, Network+ certification practice exams and so on. We guarantee that the candidates
will not only pass any IT exam at the first attempt but also get profound understanding
about the certificates they have got. There are so many alike companies in this industry,
however, Exambible has its unique advantages that other companies could not achieve.
Our Advances
* 99.9% Uptime
All examinations will be up to date.
* 24/7 Quality Support
We will provide service round the clock.
* 100% Pass Rate
Our guarantee that you will pass the exam.
* Unique Gurantee
If you do not pass the exam at the first time, we will not only arrange FULL
REFUND for you, but also provide you another exam of your claim,
ABSOLUTELY FREE!
Your Partner of IT Exam visit - http://www.exambible.com
1. You are designing an intrusion detection prevention (IDS/IPS) solution for a customer web application in a
single VPC. You are considering the options for implementing IOS IPS protection for traffic coming from the
Internet.
Which of the following options would you consider? (Choose 2 answers)
A. Implement IDS/IPS agents on each Instance running In VPC
B. Configure an instance in each subnet to switch its network interface card to promiscuous mode and
analyze network traffic.
C. Implement Elastic Load Balancing with SSL listeners In front of the web applications
D. Implement a reverse proxy layer in front of web servers and configure IDS/IPS agents on each reverse
proxy server.
Answer: CD
2. Your customer is willing to consolidate their log streams (access logs application logs security logs etc.) in
one single system. Once consolidated, the customer wants to analyze these logs in real time based on
heuristics. From time to time, the customer needs to validate heuristics, which requires going back to data
samples extracted from the last 12 hours?
What is the best approach to meet your customer’s requirements?
A. Send all the log events to Amazon SQS. Setup an Auto Scaling group of EC2 servers to consume the logs
and apply the heuristics.
B. Send all the log events to Amazon Kinesis develop a client process to apply heuristics on the logs
C. Configure Amazon Cloud Trail to receive custom logs, use EMR to apply heuristics the logs
D. Setup an Auto Scaling group of EC2 syslogd servers, store the logs on S3 use EMR to apply heuristics on
the logs
Answer: C
3. You require the ability to analyze a customer\'s clickstream data on a website so they can do behavioral
analysis. Your customer needs to know what sequence of pages and ads their customer clicked on. This data
will be used in real time to modify the page layouts as customers click through the site to increase stickiness
and advertising click-through. Which option meets the requirements for captioning and analyzing this data?
A. Log clicks in weblogs by URL store to Amazon S3, and then analyze with Elastic MapReduce
B. Push web clicks by session to Amazon Kinesis and analyze behavior using Kinesis workers
C. Write click events directly to Amazon Redshift and then analyze with SQL
Your Partner of IT Exam visit - http://www.exambible.com
D. Publish web clicks by session to an Amazon SQS queue men periodically drain these events to Amazon
RDS and analyze with sol
Answer: B
4. You are designing a connectivity solution between on-premises infrastructure and Amazon VPC Your
server’s on-premises will De communicating with your VPC instances You will De establishing IPSec tunnels
over the internet You will be using VPN gateways and terminating the IPsec tunnels on AWS-supported
customer gateways.
Which of the following objectives would you achieve by implementing an IPSec tunnel as outlined above?
(Choose 4 answers)
A. End-to-end protection of data in transit
B. End-to-end Identity authentication
C. Data encryption across the Internet
D. Protection of data in transit over the Internet
E. Peer identity authentication between VPN gateway and customer gateway
F. Data integrity protection across the Internet
Answer: CDEF
5. Your company produces customer commissioned one-of-a-kind skiing helmets combining nigh fashion with
custom technical enhancements Customers can show oft their Individuality on the ski slopes and have access
to head-up-displays. GPS rear-view cams and any other technical innovation they wish to embed in the
helmet.
The current manufacturing process is data rich and complex including assessments to ensure that the custom
electronics and materials used to assemble the helmets are to the highest standards Assessments are a
mixture of human and automated assessments you need to add a new set of assessment to model the failure
modes of the custom electronics using GPUs with CUDA. across a cluster of servers with low latency
networking.
What architecture would allow you to automate the existing process using a hybrid approach and ensure that
the architecture can support the evolution of processes over time?
A. Use AWS Data Pipeline to manage movement of data & meta-data and assessments Use an auto-scaling
group of G2 instances in a placement group.
B. Use Amazon Simple Workflow (SWF) 10 manages assessments, movement of data & meta-data Use an
auto-scaling group of G2 instances in a placement group.
C. Use Amazon Simple Workflow (SWF) lo manages assessments movement of data & meta-data Use an
Your Partner of IT Exam visit - http://www.exambible.com
auto-scaling group of C3 instances with SR-IOV (Single Root I/O Virtualization).
D. Use AWS data Pipeline to manage movement of data & meta-data and assessments use auto-scaling
group of C3 with SR-IOV (Single Root I/O virtualization).
Answer: A
6. A web-startup runs its very successful social news application on Amazon EC2 with an Elastic Load
Balancer, an Auto-Scaling group of Java/Tomcat application-servers, and DynamoDB as data store. The main
web-application best runs on m2 x large instances since it is highly memory- bound Each new deployment
requires semi-automated creation and testing of a new AMI for the application servers which takes quite a
while ana is therefore only done once per week.
Recently, a new chat feature has been implemented in nodejs and wails to be integrated in the architecture.
First tests show that the new component is CPU bound Because the company has some experience with
using Chef, they decided to streamline the deployment process and use AWS Ops Works as an application
life cycle tool to simplify management of the application and reduce the deployment cycles.
What configuration in AWS Ops Works is necessary to integrate the new chat module in the most cost-
efficient and flexible way?
A. Create one AWS Ops Works stack, create one AWS Ops Works layer, create one custom recipe
B. Create one AWS Ops Works stack create two AWS Ops Works layers create one custom recipe
C. Create two AWS Ops Works stacks create two AWS Ops Works layers create one custom recipe
D. Create two AWS Ops Works stacks create two AWS Ops Works layers create two custom recipe
Answer: C
7. You\'ve been hired to enhance the overall security posture for a very large e-commerce site They have a
well architected multi-tier application running in a VPC that uses ELBs in front of both the web and the app tier
with static assets served directly from S3 They are using a combination of RDS and DynamoOB for their
dynamic data and then archiving nightly into S3 for further processing with EMR They are concerned because
they found questionable log entries and suspect someone is attempting to gain unauthorized access.
Which approach provides a cost effective scalable mitigation to this kind of attack?
A. Recommend mat they lease space at a DirectConnect partner location and establish a 1G DirectConnect
connection to tneirvPC they would then establish Internet connectivity into their space, filter the traffic in
hardware Web Application Firewall (WAF). And then pass the traffic through the DirectConnect connection
into their application running in their VPC.
B. Add previously identified hostile source IPs as an explicit INBOUND DENY NACL to the web tier subnet.
C. Add a WAF tier by creating a new ELB and an AutoScalmg group of EC2 Instances running a host-based
WAF They would redirect Route 53 to resolve to the new WAF tier ELB The WAF tier would thier pass the
Your Partner of IT Exam visit - http://www.exambible.com