CLF-C02 Practice Test Questions

817 Questions


Topic 1: Exam Pool A

Company wants to protect its AWS Cloud information, systems, and assets while performing risk assessment and mitigation tasks. Which pillar of the AWS Well-Architected Framework is supported by these goals?


A. Reliability


B. Security


C. Operational excellence


D. Performance efficiency





B.
  Security

Explanation: The pillar of the AWS Well-Architected Framework that is supported by the goals of protecting AWS Cloud information, systems, and assets while performing risk assessment and mitigation tasks is security. Security is the ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies. The security pillar covers topics such as identity and access management, data protection, infrastructure protection, detective controls, incident response, and compliance.

Which task is the responsibility of AWS, according to the AWS shared responsibility model?


A. Set up multi-factor authentication (MFA) for each Workspaces user account.


B. Ensure the environmental safety and security of the AWS infrastructure that hosts Workspaces.


C. Provide security for Workspaces user accounts through AWS Identity and Access Management (IAM).


D. Configure AWS CloudTrail to log API calls and user activity. A company stores data in an Amazon S3 bucket. The company must control who has permission to read, write, or delete objects that the company stores in the S3 bucket.





B.
  Ensure the environmental safety and security of the AWS infrastructure that hosts Workspaces.

Explanation: The correct answer is B because ensuring the environmental safety and security of the AWS infrastructure that hosts Workspaces is the responsibility of AWS, according to the AWS shared responsibility model. The AWS shared responsibility model is a framework that defines the division of responsibilities between AWS and the customer for security and compliance. AWS is responsible for the security of the cloud, which includes the global infrastructure, such as the regions, availability zones, and edge locations; the hardware, software, networking, and facilities that run the AWS services; and the virtualization layer that separates the customer instances and storage. The customer is responsible for the security in the cloud, which includes the customer data, the guest operating systems, the applications, the identity and access management, the firewall configuration, and the encryption. The other options are incorrect because they are the responsibility of the customer, according to the AWS shared responsibility model. Setting up multi-factor authentication (MFA) for each Workspaces user account, providing security for Workspaces user accounts through AWS Identity and Access Management (IAM), configuring AWS CloudTrail to log API calls and user activity, and encrypting data at rest and in transit are all tasks that the customer has to perform to secure their Workspaces environment.

Which AWS service will help a company identify the user who deleted an Amazon EC2 instance yesterday?


A. Amazon CloudWatch


B. AWS Trusted Advisor


C. AWS CloudTrail


D. Amazon Inspector





C.
  AWS CloudTrail

Explanation: The correct answer is C because AWS CloudTrail is a service that will help a company identify the user who deleted an Amazon EC2 instance yesterday. AWS CloudTrail is a service that enables users to track user activity and API usage across their AWS account. AWS CloudTrail records the details of every API call made to AWS services, such as the identity of the caller, the time of the call, the source IP address of the caller, the parameters and responses of the call, and more. Users can use AWS CloudTrail to audit, monitor, and troubleshoot their AWS resources and actions. The other options are incorrect because they are not services that will help a company identify the user who deleted an Amazon EC2 instance yesterday. Amazon CloudWatch is a service that enables users to collect, analyze, and visualize metrics, logs, and events from their AWS resources and applications. AWS Trusted Advisor is a service that provides real-time guidance to help users follow AWS best practices for security, performance, cost optimization, and fault tolerance. Amazon Inspector is a service that helps users find security vulnerabilities and deviations from best practices in their Amazon EC2 instances.

Which AWS service or tool can be used to consolidate payments for a company with multiple AWS accounts?


A. AWS Cost and Usage Report


B. AWS Organizations


C. Cost Explorer


D. AWS Budgets





B.
  AWS Organizations

Explanation: AWS Organizations is an account management service that enables you to consolidate multiple AWS accounts into an organization that you create and centrally manage. AWS Organizations includes consolidated billing and account management capabilities that enable you to better meet the budgetary, security, and compliance needs of your business1.

Which AWS service will help protect applications running on AWS from DDoS attacks?


A. Amazon GuardDuty


B. AWS WAF


C. AWS Shield


D. Amazon Inspector





C.
  AWS Shield

Explanation: AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection3.

Which of the following are customer responsibilities under the AWS shared responsibility model? (Select TWO.)


A. Physical security of AWS facilities


B. Configuration of security groups


C. Encryption of customer data on AWS


D. Management of AWS Lambda infrastructure


E. Management of network throughput of each AWS Region





B.
  Configuration of security groups

C.
  Encryption of customer data on AWS

Explanation: The AWS shared responsibility model describes how AWS and the customer share responsibility for security and compliance of the AWS environment. AWS is responsible for the security of the cloud, which includes the physical security of AWS facilities, the infrastructure, hardware, software, and networking that run AWS services. The customer is responsible for security in the cloud, which includes the configuration of security groups, the encryption of customer data on AWS, the management of AWS Lambda infrastructure, and the management of network throughput of each AWS Region.

Which of the following is available to a company that has an AWS Business Support plan?


A. AWS Support concierge


B. AWS DDoS Response Team (DRT)


C. AWS technical account manager (TAM)


D. AWS Health API





D.
  AWS Health API

Explanation: AWS Health API is available to a company that has an AWS Business Support plan. The AWS Health API provides programmatic access to the AWS Health information that is presented in the AWS Personal Health Dashboard. The AWS Health API can help users get timely and personalized information about events that can affect the availability and performance of their AWS resources, such as scheduled maintenance, network issues, or service disruptions. The AWS Health API can also integrate with other AWS services, such as Amazon CloudWatch Events and AWS Lambda, to enable automated actions and notifications. AWS Health API OverviewAWS Support Plans

What can a user accomplish using AWS CloudTrail?


A. Generate an IAM user credentials report.


B. Record API calls made to AWS services.


C. Assess the compliance of AWS resource configurations with policies and guidelines.


D. Ensure that Amazon EC2 instances are patched with the latest security updates. A company uses Amazon Workspaces.





B.
  Record API calls made to AWS services.

Explanation: AWS CloudTrail is an AWS service that enables users to accomplish the task of recording API calls made to AWS services. AWS CloudTrail is a service that tracks user activity and API usage across the AWS account. AWS CloudTrail records the details of every API call made to AWS services, such as the identity of the caller, the time of the call, the source IP address of the caller, the parameters and responses of the call, and more. Users can use AWS CloudTrail to audit, monitor, and troubleshoot their AWS resources and actions. The other options are incorrect because they are not tasks that users can accomplish using AWS CloudTrail. Generating an IAM user credentials report is a task that users can accomplish using IAM, which is an AWS service that enables users to manage access and permissions to AWS resources and services. Assessing the compliance of AWS resource configurations with policies and guidelines is a task that users can accomplish using AWS Config, which is an AWS service that enables users to assess, audit, and evaluate the configurations of their AWS resources. Ensuring that Amazon EC2 instances are patched with the latest security updates is a task that users can accomplish using AWS Systems Manager, which is an AWS service that enables users to automate operational tasks, manage configuration and compliance, and monitor system health and performance.

Using Amazon Elastic Container Service (Amazon ECS) to break down a monolithic architecture into microservices is an example of:


A. a loosely coupled architecture.


B. a tightly coupled architecture.


C. a stateless architecture.


D. a stateful architecture.





A.
  a loosely coupled architecture.

Explanation: Using Amazon Elastic Container Service (Amazon ECS) to break down a monolithic architecture into microservices is an example of a loosely coupled architecture. A loosely coupled architecture is one where the components are independent and can communicate with each other through well-defined interfaces. This allows for greater scalability, flexibility, and resilience. A tightly coupled architecture is one where the components are interdependent and rely on each other for functionality. This can lead to increased complexity, fragility, and difficulty in changing or scaling the system. Amazon ECS Overview AWS Well-Architected Framework

Which AWS service can report how AWS resource configurations have changed over time?


A. AWS CloudTrail


B. Amazon CloudWatch


C. AWS Config


D. Amazon Inspector





C.
  AWS Config

Explanation: AWS Config is a service that enables users to assess, audit, and evaluate the configurations of AWS resources. It continuously monitors and records the configuration changes of the resources and evaluates them against desired configurations and best practices. It also provides a detailed view of the resource configuration history and relationships, as well as compliance reports and notifications. AWS Config can help users maintain consistent and secure configurations, troubleshoot issues, and simplify compliance auditing. AWS Config OverviewAWS Certified Cloud Practitioner - aws.amazon.com

A company needs to configure rules to identify threats and protect applications from malicious network access. Which AWS service should the company use to meet these requirements?


A. AWS Identity and Access Management (IAM)


B. Amazon QuickSight


C. AWS WAF


D. Amazon Detective





C.
  AWS WAF

Explanation: AWS WAF is the AWS service that the company should use to configure rules to identify threats and protect applications from malicious network access. AWS WAF is a web application firewall that helps to filter, monitor, and block malicious web requests based on customizable rules. AWS WAF can be integrated with other AWS services, such as Amazon CloudFront, Amazon API Gateway, and Application Load Balancer. For more information, see What is AWS WAF? and How AWS WAF Works.

A company wants to track its AWS account's service costs. The company also wants to receive notifications when costs are forecasted to reach a specific level. Which AWS service or tool provides this functionality?


A. AWS Budgets


B. AWS Cost Explorer


C. Savings Plans


D. AWS Billing Conductor





A.
  AWS Budgets

Explanation: AWS Budgets gives you the ability to set custom budgets that alert you when your costs or usage exceed (or are forecasted to exceed) your budgeted amount. You can also use AWS Budgets to set reservation utilization or coverage targets and receive alerts when your utilization drops below the threshold you define2.


Page 14 out of 69 Pages
Previous