Inspirational journeys

Follow the stories of academics and their research expeditions

AWS Certified SysOps Administrator - Associate - Part 44

Mary Smith

Wed, 15 Apr 2026

AWS Certified SysOps Administrator - Associate - Part 44

1. A user has created an Auto Scaling group with default CLI configurations. The user wants to set the alarm shows Cloud EC2 instances, which are launched by Auto Scaling group. The user has installed an alarm for monitoring the CPU usage every minute. Which of the below mentioned is true?

A) The user must first enable the detailed monitoring on EC2 instances to alarm monitoring support every minute
B) He fetches the data every minute, but the four data points corresponding 1 to 4 minutes] have no value n as the EC2 basic monitoring measurements are collected every five minutes
C) None
D) The creation will fail alarm because the user did not allow detailed monitoring of the EC2 instances
E) He fetches the data every minute that the detailed monitoring on EC2 will be enabled by default launch configuration setting auto scale


2. A user tries to install a security policy for ELB. ELB User wants to meet the encryption algorithm supported by the client by setting the preference of the server in order ELB security policy. Which of the below mentioned preconfigured policies support this feature?

A) ELB security policy-2011-08
B) ELB-2014-01 Security Policy
C) ELB default political negotiation
D) None
E) ELB Sam OpenSSL Cipher Default Policy


3. AWS account owner has set up multiple users AMI. A user does Watch IAM cloud access. He set up the alarm action that stops EC2 instances when the CPU usage is below the threshold limit. What will happen then?

A) None
B) The user can not set an alarm on EC2 because it does not have permission
C) It is impossible to stop the instance using the Alarm Watch Cloud
D) The user can setup the action, but it will not be executed if the user has no rights EC2
E) Cloud Watch stops the instance when the action is executed


4. A user configured with SSL ELB using a security policy for the secure negotiation between the client and the load balancer. Which security policies listed below is supported by ELB?

A) None
B) Default security policy
C) Al other options
D) Security Policy Predefined
E) Dynamic Security Policy


5. A user tries to understand the concept detailed monitoring of Cloud Watch. Among the services listed below does not provide monitoring with Cloud Watch?

A) AWS Route53
B) AWS EMR
C) AWS ELB
D) None
E) AWS RDS


1. Right Answer: E
Explanation: Cloud Watch is used to monitor AWS, as well as personalized services. To enable such detailed monitoring of a new Auto Scaling group, the user does not need to take additional measures. When the user creates an autorun configuration by setting the CLI scale, each launch configuration contains a named instance monitoring indicator .Enabled. The default value of this flag I true. Thus, surveillance detailed fault will be enabled for Auto Scaling, as well as all instances launched by Auto Scaling group.

2. Right Answer: B
Explanation: Elastic Load Balancing uses a Secure Socket Layer (SSL configuration. Negotiating is known as a security policy, it is used to negotiate SSL connections between a client and load balancing. If load balancing is configured to Order support the preference server and the load balancer manages to select the first digit in its list that matches one of the ciphers in the clientà ¬ Ys list. When the user checks preconfigured policies supported by the ELB, politics à ¬ Å?ELB Policy-2014-security ¬ O1A supports preferably in the order of the server.

3. Right Answer: E
Explanation: Amazon cloud alarms Shows a single measure over time as users and fill specifies one or more actions based on the value of the metric with respect to a given threshold over several periods of time. The user can configure an action that stops where their CPU usage is below a certain threshold for a certain period of time. The EC2 action may either terminate or stop the instance under the action EC2. If the user IAM has read / write permissions for Amazon Cloud watch, but not for Amazon EC2, you can still create an alarm. However, stopping or ending of actions will not be executed on the Amazon EC2 instance.

4. Right Answer: D
Explanation: ... Elastic Load Balancing uses a Secure Socket Layer (SSL negotiation configuration is known as a security policy is used to negotiate SSL connections between a client and load balancing support ELB two policies: predefined security policy, which comes with pre-defined encryption and SSL protocols, custom security policy, which the user Vow to set a strategy.

5. Right Answer: B
Explanation: Cloud Watch is used to monitor AWS, as well as personalized services. It provides either baseline monitoring or detailed for products supported by AWS. In the basic monitoring, cloud service sends data points watch every five minutes, while the detailed monitoring of a cloud service sends data points shows every minute. Services such as RDS EC2 Last automatic scaling, ELB and Route 53 can provide monitoring data every minute.

0 Comments

Leave a comment