CLF-C02 Practice Test Questions

817 Questions


Topic 1: Exam Pool A

Which encryption types can be used to protect objects at rest in Amazon S3? (Select TWO.)


A. Server-side encryption with AmazonS3 managed encryption keys (SSE-S3)


B. Server-side encryption with AWS KMSmanaged keys (SSE-KMS)


C. TLS


D. SSL


E. Transparent Data Encryption (TDE)





A.
  Server-side encryption with AmazonS3 managed encryption keys (SSE-S3)

B.
  Server-side encryption with AWS KMSmanaged keys (SSE-KMS)

Explanation: Server-side encryption with Amazon S3 managed encryption keys (SSE-S3) and server-side encryption with AWS KMS managed keys (SSE-KMS) are the encryption types that can be used to protect objects at rest in Amazon S3. Server-side encryption means that Amazon S3 encrypts the objects before saving them on disks and decrypts them when they are downloaded. SSE-S3 uses one master key per bucket that is managed by Amazon S3. SSE-KMS uses a customer master key (CMK) that is stored in AWS Key Management Service (AWS KMS) and provides additional benefits, such as audit trails and key rotation. For more information, see Protecting Data Using Server-Side Encryption and Protecting Data Using Encryption.

Which AWS service can defend against DDoS attacks?


A. AWS Firewall Manager


B. AWS Shield Standard


C. AWS WAF


D. Amazon Inspector





B.
  AWS Shield Standard

Explanation: AWS Shield Standard is a service that provides protection against Distributed Denial of Service (DDoS) attacks for all AWS customers at no additional charge. It automatically detects and mitigates the most common and frequently occurring network and transport layer DDoS attacks that target AWS resources, such as Amazon EC2 instances, Elastic Load Balancers, Amazon CloudFront distributions, and Amazon Route 53 hosted zones. AWS Firewall Manager is a service that allows users to centrally configure and manage firewall rules across their AWS accounts and resources, such as AWS WAF web ACLs, AWS Shield Advanced protections, and Amazon VPC security groups. AWS WAF is a web application firewall that helps protect web applications from common web exploits, such as SQL injection, cross-site scripting, and bot attacks. Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It analyzes the behavior of the applications and checks for vulnerabilities, exposures, and deviations from best practices.

A company has an environment that includes Amazon EC2 instances, Amazon Lightsail, and on-premises servers. The company wants to automate the security updates for its operating systems and applications. Which solution will meet these requirements with the LEAST operational effort?


A. Use AWS Shield to identify and manage security events.


B. Connect to each server by using a remote desktop connection. Run an update script.


C. Use the AWS Systems Manager Patch Manager capability.


D. Schedule Amazon GuardDuty to run on a nightly basis.





C.
  Use the AWS Systems Manager Patch Manager capability.

Explanation: AWS Systems Manager Patch Manager is a capability that allows users to automate the security updates for their operating systems and applications. It enables users to scan their instances for missing patches, define patch baselines, schedule patching windows, and monitor patch compliance. It supports Amazon EC2 instances, Amazon Lightsail instances, and on-premises servers. AWS Shield is a service that provides protection against Distributed Denial of Service (DDoS) attacks for AWS resources and services. It does not automate the security updates for operating systems and applications. Connecting to each server by using a remote desktop connection and running an update script is a manual and time-consuming solution that requires a lot of operational effort. It is not a recommended best practice for automating the security updates for operating systems and applications. Amazon GuardDuty is a service that provides intelligent threat detection and continuous monitoring for AWS accounts and resources. It does not automate the security updates for operating systems and applications.

A company wants to migrate its application to AWS. The company wants to replace upfront expenses with variable payment that is based on usage. What should the company do to meet these requirements?


A. Use pay-as-you-go pricing.


B. Purchase Reserved Instances.


C. Pay less by using more.


D. Rightsize instances





A.
  Use pay-as-you-go pricing.

Explanation: Pay-as-you-go pricing is one of the main benefits of AWS. With pay-as-yougo pricing, you pay only for what you use, when you use it. There are no long-term contracts, termination fees, or complex licensing. You replace upfront expenses with lower variable costs and pay only for the resources you consume.

Which AWS service is always free of charge for users?


A. Amazon S3


B. Amazon Aurora


C. Amazon EC2


D. AWS Identity and Access Management (IAM)





D.
  AWS Identity and Access Management (IAM)

Explanation: AWS Identity and Access Management (IAM) is a service that allows users to manage access to AWS resources and services. It enables users to create and manage users, groups, roles, and policies that control who can do what in AWS. IAM is always free of charge for users, as there is no additional cost for using IAM with any AWS service1. Amazon S3 is a storage service that provides scalable, durable, and secure object storage. Amazon S3 has a free tier that offers 5 GB of storage, 20,000 GET requests, and 2,000 PUT requests per month for one year. However, users are charged for any additional usage beyond the free tier limits2. Amazon Aurora is a relational database service that is compatible with MySQL and PostgreSQL. Amazon Aurora has a free tier that offers 750 hours of Aurora Single-AZ db.t2.small database usage and 20 GB of storage per month for one year. However, users are charged for any additional usage beyond the free tier limits3. Amazon EC2 is a compute service that provides resizable virtual servers. Amazon EC2 has a free tier that offers 750 hours of Linux and Windows t2.micro instances per month for one year. However, users are charged for any additional usage beyond the free tier limits4.

A company has set up a VPC in its AWS account and has created a subnet in the VPC. The company wants to make the subnet public. Which AWS features should the company use to meet this requirement? (Select TWO.)


A. Amazon VPC internet gateway


B. Amazon VPC NAT gateway


C. Amazon VPC route tables


D. Amazon VPC network ACL


E. Amazon EC2 security groups





A.
  Amazon VPC internet gateway

C.
  Amazon VPC route tables

Explanation: To make a subnet public, the company should use an Amazon VPC internet gateway and an Amazon VPC route table. An internet gateway is a horizontally scaled, redundant, and highly available VPC component that allows communication between your VPC and the internet. A route table contains a set of rules, called routes, that are used to determine where network traffic from your subnet or gateway is directed. To enable internet access for a subnet, you need to attach an internet gateway to your VPC and add a route to the internet gateway in the route table associated with the subnet.

Which options are perspectives that include foundational capabilities of the AWS Cloud Adoption Framework (AWS CAF)? (Select TWO.)


A. Sustainability


B. Security


C. Operations


D. Performance efficiency


E. Reliability





C.
  Operations

D.
  Performance efficiency

Explanation: The options that are perspectives that include foundational capabilities of the AWS Cloud Adoption Framework (AWS CAF) are operations and performance efficiency. The AWS CAF is a guidance that helps organizations design and travel an accelerated path to successful cloud adoption. The AWS CAF organizes the cloud adoption process into six areas of focus, called perspectives, which are business, people, governance, platform, security, and operations. Each perspective is divided into capabilities, which are further divided into skills and responsibilities. The operations perspective focuses on the management and monitoring of the cloud resources and applications, as well as the automation and optimization of the operational processes. The operations perspective capabilities are operations support, operations integration, and service management. The performance efficiency perspective focuses on the selection and configuration of the right cloud resources and services to meet the performance requirements of the applications, as well as the continuous improvement and innovation of the cloud solutions. The performance efficiency perspective capabilities are selection, review, and monitoring. Sustainability, security, and reliability are not perspectives of the AWS CAF, but they are aspects of the AWS Well-Architected Framework. The AWS Well-Architected Framework is a guidance that helps users build and operate secure, reliable, efficient, and cost-effective systems in the cloud. The AWS Well-Architected Framework consists of five pillars, which are operational excellence, security, reliability, performance efficiency, and cost optimization. Sustainability is a cross-cutting theme that applies to all the pillars, and refers to the environmental and social impact of the cloud solutions.

A company wants to push VPC Flow Logs to an Amazon S3 bucket. A company wants to optimize long-term compute costs of AWS Lambda functions and Amazon EC2 instances. Which AWS purchasing option should the company choose to meet these requirements?


A. Dedicated Hosts


B. Compute Savings Plans


C. Reserved Instances


D. Spot Instances





B.
  Compute Savings Plans

Explanation: Compute Savings Plans are a flexible and cost-effective way to optimize long-term compute costs of AWS Lambda functions and Amazon EC2 instances. With Compute Savings Plans, customers can commit to a consistent amount of compute usage (measured in $/hour) for a 1-year or 3-year term and receive a discount of up to 66% compared to On-Demand prices3. Dedicated Hosts are physical servers with EC2 instance capacity fully dedicated to the customer’s use. They are suitable for customers who have specific server-bound software licenses or compliance requirements4. Reserved Instances are a pricing model that provides a significant discount (up to 75%) compared to On- Demand pricing and a capacity reservation for EC2 instances. They are available in 1-year or 3-year terms and different payment options5. Spot Instances are spare EC2 instances that are available at up to 90% discount compared to On-Demand prices. They are suitable for customers who have flexible start and end times, can withstand interruptions, and can handle excess capacity.

Which task is the responsibility of AWS when using AWS services?


A. Management of IAM user permissions


B. Creation of security group rules for outbound access


C. Maintenance of physical and environmental controls


D. Application of Amazon EC2 operating system patches





C.
  Maintenance of physical and environmental controls

Explanation: AWS is responsible for maintaining the physical and environmental controls of the AWS Cloud, such as power, cooling, fire suppression, and physical security1. The customer is responsible for managing the IAM user permissions, creating security group rules for outbound access, applying Amazon EC2 operating system patches, and other aspects of security in the cloud1.

Which AWS service is designed to help users build conversational interfaces into applications using voice and text?


A. Amazon Lex


B. Amazon Transcribe


C. Amazon Comprehend


D. Amazon Timestream





A.
  Amazon Lex

Explanation: A is correct because Amazon Lex is the AWS service that helps users build conversational interfaces into applications using voice and text. B is incorrect because Amazon Transcribe is the AWS service that helps users convert speech to text. C is incorrect because Amazon Comprehend is the AWS service that helps users analyze text using natural language processing. D is incorrect because Amazon Timestream is the AWS service that helps users collect, store, and process time series data.

What does "security of the cloud" refer to in the AWS shared responsibility model?


A. Availability of AWS services such as Amazon EC2


B. Security of the cloud infrastructure that runs all the AWS services


C. Implementation of password policies for IAM users


D. Security of customer environments by using AWS Network Firewall partners





B.
  Security of the cloud infrastructure that runs all the AWS services

Explanation: Security of the cloud refers to the security of the cloud infrastructure that runs all the AWS services. This includes the hardware, software, networking, and facilities that AWS operates and manages. AWS is responsible for protecting the security of the cloud as part of the AWS shared responsibility model. Availability of AWS services such as Amazon EC2 refers to the ability of the services to be up and running and to meet the expected performance. Availability is part of the reliability pillar of the AWS Well-Architected Framework and is a shared responsibility between AWS and the customer .

Which task can a company perform by using security groups in the AWS Cloud?


A. Allow access to an Amazon EC2 instance through only a specific port.


B. Deny access to malicious IP addresses at a subnet level.


C. Protect data that is cached by Amazon CloudFront.


D. Apply a stateless firewall to an Amazon EC2 instance.





A.
  Allow access to an Amazon EC2 instance through only a specific port.

Explanation: Security groups are virtual firewalls that control the inbound and outbound traffic for Amazon EC2 instances. They can be used to allow access to an Amazon EC2 instance through only a specific port, such as port 22 for SSH or port 80 for HTTP. Security groups cannot deny access to malicious IP addresses at a subnet level, as they only allow or deny traffic based on the rules defined by the customer. To block malicious IP addresses, customers can use network ACLs, which are stateless firewalls that can be applied to subnets. Security groups cannot protect data that is cached by Amazon CloudFront, as they only apply to EC2 instances. To protect data that is cached by Amazon CloudFront, customers can use encryption, signed URLs, or signed cookies. Security groups are not stateless firewalls, as they track the state of the traffic and automatically allow the response traffic to flow back to the source. Stateless firewalls do not track the state of the traffic and require rules for both inbound and outbound traffic.


Page 18 out of 69 Pages
Previous