Inspirational journeys

Follow the stories of academics and their research expeditions

AWS Certified SysOps Administrator - Associate - Part 18

Mary Smith

Sat, 12 Jul 2025

AWS Certified SysOps Administrator - Associate - Part 18

1. An organization plans to use AWS for their production role out. The organization wants to implement automation for deployment so that it automatically creates a LAMP stack, download the latest installable PHP from S3 and ELB configuration. Among AWS services mentioned below meets the requirement to make an orderly deployment of the software?

A) None
B) AWS cloud formation
C) AWS Dev Ops
D) AWS cloud before
E) AWS Elastic Beanstalk


2. A user tries to delete an Auto Scaling group of CLI. Which by the user to perform the steps mentioned below?

A) There is no need to change the capacity. Run-suppression as control group and wil Restores all values ''to 0
B) The Terminate instances the Automatic scaling with the command-end instance
C) None
D) Terminate the case with EC2 instance end command
E) Set the minimum and the desired capacity size 0


3. A system administrator provides notifications of installation events on RDS. Among the services mentioned below will help admin configuration notifications?

A) None
B) AWSSES
C) AWSSNS
D) AWS cloud shows
E) AWS cloud track


4. A user has installed an alarm shows an EC2 Cloud action when CPU utilization exceeds 75%. The alarm notifies the alarm SNS state. If the user wants to simulate the alarm action how can it be achieved?

A) Run the manual action will SNS
B) None
C) The user can set the alarm status to the alarm using CLI
D) activities run on the CPU so its in use over 75%
E) From the console AWS change the alarm status


5. A system administrator manages buckets, objects, and folders with AWS S3. Which of the below mentioned is true and should be taken into consideration by the system admin?

A) Both the object and the bucket can have ACLs, but the files can not have ACL
B) Folders can have a policy
C) Both the object and the bucket can have an access policy, but the record does not have a policy
D) None
E) The files support only ACL


1. Right Answer: B
Explanation: AWS Cloud formation is an application management tool that provides an application modeling, deployment, configuration, management and related activities. Cloud formation provides an easy way to create and delete collection related AWS resources and provision them in an orderly manner. AWS cloud formation automates and simplifies the task of creating repeatedly and predictably related resource groups that feed the ¬ Usera applications Ys. AWS Cloud is a CDN before; Elastic Beanstalk is a fairly large number of tasks required. However, there is a PAAS that uses an AMI ready. AWS Elastic Beanstalk provides an environment to easily develop and run applications in the cloud.

2. Right Answer: E
Explanation: If the user wants to delete the Auto Scaling group, user must manually set the values ''of the minimum and desired ability to 0. Otherwise Auto Scaling does not allow the removal of the CLI group. While trying to AWS console, the user need not set the values ''to 0 as the Auto Scaling automatically if console.

3. Right Answer: C
Explanation: Amazon RDS uses the Amazon Simple Notification Service to provide notification when an event occurs Amazon RDS. These notifications can be in any form of notification backed by Amazon SNS for an AWS Region, as an email, a text message or a call to an HTTP endpoint

4. Right Answer: C
Explanation: Amazon cloud alarms Shows a single measure over time as users and fill specifies one or more actions based on the value of the metric with respect to a given threshold over several periods of time. The user can test an alarm putting any State using the API Set Alarm state (MON-control set-alarm status .. This temporary change of state only lasts until the next comparison of alarm occurs.

5. Right Answer: E
Explanation: The admin A can grant permission to S3 buckets or objects to any user or to public policy objects using the bucket and user policy. Both use the language of the JSON based access policy. In general, if the user sets the ACL on the bucket, the objects in the bucket do not Inherit and vice versa a. The bucket policy can be defined at the level of the bucket, which allows objects and the bucket to be a unique public policy applied to this bucket. It can not be applied at the object. Folders are similar to objects without content. Thus, files can have an ACL and can not have a policy.

0 Comments

Leave a comment