What must the developer do to complete these tasks?
A developer needs to write an AWS CloudFormation template on a local machine and deploy a CloudFormation stack to AWS.What must the developer do to complete these tasks?Read More →
A developer needs to write an AWS CloudFormation template on a local machine and deploy a CloudFormation stack to AWS.What must the developer do to complete these tasks?Read More →
A Security Engineer is building a Java application that is running on Amazon EC2.The application communicates with an Amazon RDS instance and authenticates with a user name and password.Which combination of steps can the Engineer take to protect the credentials and minimize downtime when the credentials are rotated? (Choose two.)Read More →
A company ingests and processes streaming market data.The data rate is constant.A nightly process that calculates aggregate statistics is run, and each execution takes about 4 hours to complete.The statistical analysis is not mission critical to the business, and previous data points are picked up on the next execution if a particular run fails.The current architecture uses a pool of Amazon EC2 Reserved Instances with 1-year reservations running full time to ingest and store the streaming data in attached Amazon EBS volumes.On-Demand EC2 instances are launched each night to perform the nightly processing, accessing the stored data from NFS shares on the ingestion servers, and terminating the nightly processing servers when complete.The Reserved Instance reservations are expiring, and the company needs to determine whether to purchase new reservations or implement a new design.Which is the most cost-effective design?Read More →
The security team is concerned because the number of AWS Identity and Access Management (IAM) policies being used in the environment is increasing.The team tasked a SysOps administrator to report on the current number of IAM policies in use and the total available IAM policies.Which AWS service should the administrator use to check how current IAM policy usage compares to current service limits?Read More →
A company wants to use AWS development tools to replace its current bash deployment scripts.The company currently deploys a LAMP application to a group ofAmazon EC2 instances behind an Application Load Balancer (ALB).During the deployments, the company unit tests the committed application, stops and starts services, unregisters and re-registers instances with the load balancer, and updates file permissions.The company wants to maintain the same deployment functionality through the shift to using AWS services.Which solution will meet these requirements?Read More →
A company uses AWS Lambda functions in a private subnet in a VPC to run application logic.The Lambda functions must not have access to the public internet.Additionally, all data communication must remain within the private network.As part of a new requirement, the application logic needs access to an Amazon DynamoDB table.What is the MOST secure way to meet this new requirement?Read More →
A company wants to manage Amazon Machine Images (AMIs).The company currently copies AMIs to the same AWS Region where the AMIs were created.The company needs to design an application that captures AWS API calls and sends alerts whenever the Amazon EC2 CreateImage API operation is called within the company’s account.Which solution will meet these requirements with the LEAST operational overhead?Read More →
An ecommerce company is automating the categorization of its products based on images.A data scientist has trained a computer vision model using the AmazonSageMaker image classification algorithm.The images for each product are classified according to specific product lines.The accuracy of the model is too low when categorizing new products.All of the product images have the same dimensions and are stored within an Amazon S3 bucket.The company wants to improve the model so it can be used for new products as soon as possible.Which steps would improve the accuracy of the solution? (Choose three.)Read More →
The SysOps Administrator must integrate an existing on-premises asymmetrical key management system into an AWS services platform.How can the Administrator meet this requirement?Read More →
A developer wants to expand an application to run in multiple AWS Regions.The developer wants to copy Amazon Machine Images (AMIs) with the latest changes and create a new application slack in the destination Region.According to company requirements, all AMIs must be encrypted in all Regions.However, not all the AMIs that the company uses are encrypted.How can the developer expand the application to run in the destination Region while meeting the encryption requirement?Read More →
© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.