Inspirational journeys

Follow the stories of academics and their research expeditions

AWS Certified DevOps Engineer - Professional Certification - Part 10

Mary Smith

Thu, 19 Jun 2025

AWS Certified DevOps Engineer - Professional Certification - Part 10

1. Your development team is using an Elastic beanstalk environment. After a week, the environment was torn down and a new one was created. When the development team tried to access the data on the older environment, it was not available. Why is this the case?

A) This is because the underlying EC2 Instances are created with lOPS volumes and cannot be accessed once1 the environment has been terminated.
B) This is because the underlying EC2 Instances are created with no persistent local storage
C) This is because the underlying EC2 Instances are created with encrypted storage and cannot be accessed once the environment has been terminated.
D) This is because before the environment termination. Elastic beanstalk copies the data to Dynamo DB. and hence the data is not present in the EBS volumes



2. Your development team use .Net to code their web application. They want to deploy it to AWS(Amazon Web Service) for the purpose of continuous Integration and deployment. The application code is hosted in a Git repository. Which of the following combination of steps can be used to fulfil this requirement. Choose 2 answers from the options given below ?(Select 2answers)

A) Use the Elastic beanstalk service to provision an lIS platform web environment to host the application.
B) Create a source bundle for the .Net code and upload It as an application revision.
C) Use a chef recipe to deploy the code and attach it to the Elastic beanstalk environment.
D) Use the Code Pipeline service to provision an uS environment to host the application



3. You have a set of EC2 Instances hosting an nix server and a web application that is used by a set of users in your organization. After a recent application version upgrade, the instance runs into technical issues and needs an Immediate restart. This does not give you enough time to inspect the cause of the issue on the server. Which of the below options if implemented prior to the incident would have assisted in detecting the underlying cause of the issue?

A) Enable detailed monitoring and check the Cloud watch metrics to see the cause of the issue.
B) Create a snapshot of the EBS volume before restart attach it to another instance as a volume and then diagnose the issue.
C) Install Cloud watch logs agent on the instance and send all the logs to Cloud watch logs.
D) Stream all the data to Amazon Kinesis and then analyze the data in real time.



4. Your company has a set of EC2 Instances that access data objects stored in an S3 bucket. Your IT Security department Is concerned about the security of this architecture and wants you to implement the following 1) Ensure that the EC2 Instance securely accesses the data objects stored in the S3 bucket 2) Ensure that the integrity of the objects stored in S3 is maintained. Which of the following would help fulfill the requirements of the IT Security department. Choose 2 answers from the options given below Please select:(Select 2answers)

A) Use 53 Cross Region replication to replicate the objects so that the integrity of data is maintained.
B) Create an lAM user and ensure the EC2 Instances uses the lAM user credentials to access the data in the bucket.
C) Use an 53 bucket policy that ensures that MFA Delete Is set on the objects In the bucket Your answer is partially correct.
D) Create an lAM Role and ensure the EC2 Instances uses the lAM Role to access the data in the bucket.



5. You have been tasked with building out a duplicate environment in another region for disaster recovery purposes. Part of your environment relies on EC2 instances with preconfigured software. What steps would you take to configure the Instances in another region? Choose the correct answer from the options below Please select:

A) Create an AMP of the EC2 instance
B) Make the EC2 instance shareable among other regions through lAM permissions
C) Create an AMP of the EC2 instance and copy the AMI to the desired region
D) None of the above



1. Right Answer: B
Explanation:

2. Right Answer: A,B
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: C,D
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment