CLF-C02 Practice Test Questions

817 Questions


Topic 3: Exam Pool C

Which AWS service or feature allows a user to establish a dedicated network connection between a company's on-premises data center and the AWS Cloud?


A. AWS Direct Connect


B. VPC peering


C. AWS VPN


D. Amazon Route 53





A.
  AWS Direct Connect

Explanation: AWS Direct Connect is an AWS service that allows users to establish a dedicated network connection between their on-premises data center and the AWS Cloud. This connection bypasses the public internet and provides more predictable network performance, reduced bandwidth costs, and increased security. Users can choose from different port speeds and connection types, and use AWS Direct Connect to access AWS services in any AWS Region globally. Users can also use AWS Direct Connect in conjunction with AWS VPN to create a hybrid network architecture that combines the benefits of both private and public connectivity.

Which AWS service is used to provide encryption for Amazon EBS?


A. AWS Certificate Manager


B. AWS Systems Manager


C. AWS KMS


D. AWS Config





C.
  AWS KMS

Explanation: AWS KMS is the service that is used to provide encryption for Amazon EBS. AWS KMS is a managed service that enables you to easily create and control the encryption keys used to encrypt your data. Amazon EBS uses AWS KMS to encrypt and decrypt your EBS volumes and snapshots. You can choose to use either the default AWS managed CMK or your own customer managed CMK for encryption. AWS KMS also provides features such as key rotation, audit logging, and access control policies to help you manage your encryption keys and protect your data12. The other services are not used to provide encryption for Amazon EBS. AWS Certificate Manager is a service that lets you provision, manage, and deploy public and private SSL/TLS certificates for use with AWS services and your internal connected resources3. AWS Systems Manager is a service that provides a unified user interface to view and manage your AWS resources, automate common operational tasks, and apply compliance policies4. AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources.

A developer wants to deploy an application quickly on AWS without manually creating the required resources. Which AWS service will meet these requirements?


A. Amazon EC2


B. AWS Elastic Beanstalk


C. AWS CodeBuild


D. Amazon Personalize





B.
  AWS Elastic Beanstalk

Explanation: AWS Elastic Beanstalk is a service that allows you to deploy and manage applications on AWS without manually creating and configuring the required resources, such as EC2 instances, load balancers, security groups, databases, and more. AWS Elastic Beanstalk automatically handles the provisioning, scaling, load balancing, health monitoring, and updating of your application, while giving you full control over the underlying AWS resources if needed. AWS Elastic Beanstalk supports a variety of platforms and languages, such as Java, .NET, PHP, Node.js, Python, Ruby, Go, and Docker. You can use the AWS Management Console, the AWS CLI, the AWS SDKs, or the AWS Elastic Beanstalk API to create and manage your applications. You can also use AWS CodeStar, AWS CodeCommit, AWS CodeBuild, AWS CodeDeploy, and AWS CodePipeline to integrate AWS Elastic Beanstalk with your development and deployment workflows12.

A company wants high levels of detection and near-real-time (NRT) mitigation against large and sophisticated distributed denial of service (DDoS) attacks on applications running on AWS. Which AWS service should the company use?


A. Amazon GuardDuty


B. Amazon Inspector


C. AWS Shield Advanced


D. Amazon Macie





C.
  AWS Shield Advanced

Explanation: AWS Shield Advanced is a service that provides high levels of detection and near-real-time (NRT) mitigation against large and sophisticated distributed denial of service (DDoS) attacks on applications running on AWS. AWS Shield Advanced also provides you with 24x7 access to the AWS DDoS Response Team (DRT) and protection against DDoS attacks of any size or duration1. Amazon GuardDuty is a service that provides threat detection for your AWS accounts and workloads, but it does not offer DDoS protection3. Amazon Inspector is a service that helps you improve the security and compliance of your applications deployed on AWS by automatically assessing them for vulnerabilities and deviations from best practices. Amazon Macie is a service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS.

Which option is an AWS Cloud Adoption Framework (AWS CAF) foundational capability for the operations perspective?


A. Performance and capacity management


B. Application portfolio management


C. Identity and access management


D. Product management





C.
  Identity and access management

Explanation: Identity and access management is one of the foundational capabilities for the operations perspective of the AWS Cloud Adoption Framework (AWS CAF). It involves managing the identities, roles, permissions, and credentials of users and systems that interact with AWS resources. Performance and capacity management is a capability for the platform perspective. Application portfolio management is a capability for the business perspective. Product management is a capability for the governance perspective.

Which AWS service supports a hybrid architecture that gives users the ability to extend AWS infrastructure, AWS services, APIs, and tools to data centers, co-location environments, or on-premises facilities?


A. AWS Snowmobile


B. AWS Local Zones


C. AWS Outposts


D. AWS Fargate





C.
  AWS Outposts

Explanation: AWS Outposts is a service that delivers AWS infrastructure and services to virtually any on-premises or edge location for a truly consistent hybrid experience. AWS Outposts allows you to extend and run native AWS services on premises, and is available in a variety of form factors, from 1U and 2U Outposts servers to 42U Outposts racks, and multiple rack deployments. With AWS Outposts, you can run some AWS services locally and connect to a broad range of services available in the local AWS Region. Run applications and workloads on premises using familiar AWS services, tools, and APIs2. AWS Outposts is the only AWS service that supports a hybrid architecture that gives users the ability to extend AWS infrastructure, AWS services, APIs, and tools to data centers, colocation environments, or on-premises facilities.

A company needs to securely store important credentials that an application uses to connect users to a database. Which AWS service can meet this requirement with the MINIMAL amount of operational overhead?


A. AWS Key Management Service (AWS KMS)


B. AWS Config


C. AWS Secrets Manager


D. Amazon GuardDuty





C.
  AWS Secrets Manager

Explanation: AWS Secrets Manager is a service that helps you protect secrets needed to access your applications, services, and IT resources. You can use AWS Secrets Manager to store, rotate, and retrieve database credentials, API keys, and other secrets throughout their lifecycle. AWS Secrets Manager eliminates the need to hardcode sensitive information in plain text, and reduces the risk of unauthorized access or leakage. AWS Secrets Manager also integrates with other AWS services, such as AWS Lambda, Amazon RDS, and AWS CloudFormation, to simplify the management of secrets across your environment5.

A company wants its Amazon EC2 instances to share the same geographic area but use multiple independent underlying power sources. Which solution achieves this goal?


A. Use EC2 instances in a single Availability Zone. .


B. Use EC2 instances in multiple AWS Regions.


C. Use EC2 instances in multiple Availability Zones in the same AWS Region.


D. Use EC2 instances in the same edge location and the same AWS Region





C.
  Use EC2 instances in multiple Availability Zones in the same AWS Region.

Explanation: The solution that achieves the goal of having Amazon EC2 instances share the same geographic area but use multiple independent underlying power sources is to use EC2 instances in multiple Availability Zones in the same AWS Region. An Availability Zone is a physically isolated location within an AWS Region that has its own power, cooling, and network connectivity. An AWS Region is a geographical area that consists of two or more Availability Zones. By using multiple Availability Zones, users can increase the fault tolerance and resilience of their applications, as well as reduce latency for end users3. Using EC2 instances in a single Availability Zone, multiple AWS Regions, or the same edge location and the same AWS Region would not meet the requirement of having multiple independent power sources.

Which AWS service or feature is associated with a subnet in a VPC and is used to control inbound and outbound traffic?


A. Amazon Inspector


B. Network ACLs


C. AWS Shield


D. VPC Flow Logs





B.
  Network ACLs

Explanation: Network ACLs (network access control lists) are an optional layer of security for your VPC that act as a firewall for controlling traffic in and out of one or more subnets. You can use network ACLs to allow or deny traffic based on protocol, port, or source and destination IP address. Network ACLs are stateless, meaning that they do not track the traffic that flows through them. Therefore, you must create rules for both inbound and outbound traffic.

A user wants to invoke an AWS Lambda function when an Amazon EC2 instance enters the "stopping" state. Which AWS service is appropriate for this use case?


A. Amazon EventBridge


B. AWS Config


C. Amazon Simple Notification Service (Amazon SNS)


D. AWS CloudFormation





A.
  Amazon EventBridge

Explanation: Amazon EventBridge (formerly CloudWatch Events) allows users to respond to changes in the state of AWS resources. It can be configured to invoke an AWS Lambda function when an EC2 instance enters the “stopping” state, providing a serverless way to automate responses to changes in EC2 instance states. AWS Config, SNS, and CloudFormation do not provide direct triggering for specific instance state changes.

An AWS user wants to proactively detect when an instance or account might be compromised or if there are threats from attacks. Which AWS service should the user choose?


A. Amazon GuardDuty


B. AWS WAF


C. AWS Shield


D. Amazon Inspector





A.
  Amazon GuardDuty

Explanation: Amazon GuardDuty is a threat detection service that continuously monitors AWS accounts and workloads for malicious activity and unauthorized behavior to help protect your AWS resources. It uses machine learning, anomaly detection, and integrated threat intelligence to detect when an instance or account might be compromised or if there are threats from attacks.
B. AWS WAF: Incorrect, as it is a web application firewall that protects against common web exploits but does not provide comprehensive threat detection.
C. AWS Shield: Incorrect, as it provides protection against DDoS attacks but does not detect compromises within AWS accounts.
D. Amazon Inspector: Incorrect, as it is a service that helps improve the security and compliance of applications deployed on AWS by assessing for vulnerabilities, not for threat detection.

A company plans to perform a one-time migration of a large dataset with millions of files from its on-premises data center to the AWS Cloud. Which AWS service should the company use for the migration?


A. AWS Database Migration Service (AWS DMS)


B. AWS DataSync


C. AWS Migration Hub


D. AWS Application Migration Service





B.
  AWS DataSync

Explanation: AWS DataSync is designed for large-scale data transfers, especially involving large datasets with millions of files from on-premises to AWS. It provides fast and efficient transfer capabilities, and supports a one-time migration. AWS DMS is specific to databases, while Migration Hub is for tracking migrations, and Application Migration Service is for continuous replication rather than one-time file migrations.


Page 29 out of 69 Pages
Previous