Skip to content
Tip 2 Cloud

Free study guides, practices test, sample questions

Primary Navigation Menu
Menu
  • Home
  • About us
  • Contact

study aws cloud (Page 654)

Home » study aws cloud

Which solution meets these requirements?

2025-10-01
By: study aws cloud
In: DOP-C01
With: 1 Comment

A company has an application that runs on 12 Amazon EC2 instances.The instances run in an Amazon EC2 Auto Scaling group across three Availability Zones.On a typical day each EC2 instance has 30% CPU utilization during business hours and 10% CPU utilization after business hours.The CPU utilization increases suddenly in the first few minutes of business hours each day.Other increases in CPU utilization are gradual.A DevOps engineer needs to optimize costs while maintaining or improving the application’s reliability.Which solution meets these requirements?Read More →

Which of the following can the database specialist use to investigate the query plan and analyze the query performance?

2025-10-01
By: study aws cloud
In: DBS-C01
With: 1 Comment

A company is using Amazon DocumentDB (with MongoDB compatibility) to manage its complex documents.Users report that an Amazon DocumentDB cluster takes a long time to return query results.A database specialist must investigate and resolve this issue.Which of the following can the database specialist use to investigate the query plan and analyze the query performance?Read More →

How should the solutions architect reconfigure the architecture to resolve this issue?

2025-10-01
By: study aws cloud
In: SAA-C02
With: 1 Comment

A company runs a web application on Amazon EC2 instances in multiple Availability Zones.The EC2 instances are in private subnets.A solutions architect implements an internet-facing Application Load Balancer (ALB) and specifies the EC2 instances as the target group.However, the internet traffic is not reaching the EC2 instances.How should the solutions architect reconfigure the architecture to resolve this issue?Read More →

Which option meets these requirements with the LEAST operational overhead?

2025-10-01
By: study aws cloud
In: MLS-C01
With: 1 Comment

A data scientist is working on a model to predict a company’s required inventory stock levels.All historical data is stored in .csv files in the company’s data lake on Amazon S3.The dataset consists of approximately 500 GB of data The data scientist wants to use SQL to explore the data before training the model.The company wants to minimize costs.Which option meets these requirements with the LEAST operational overhead?Read More →

Which actions will restore the objects?

2025-10-01
By: study aws cloud
In: SOA-C01
With: 1 Comment

A company recently implemented an Amazon S3 lifecycle rule that accidentally deleted objects from one of its S3 buckets.The bucket has S3 versioning enabled.Which actions will restore the objects? (Choose two.)Read More →

What is the MOST secure way to pass these credentials to the Lambda function?

2025-10-01
By: study aws cloud
In: DVA-C01
With: 1 Comment

A company is using Amazon OpenSearch Service to implement an audit monitoring system.A developer needs to create an AWS CloudFormation custom resource that is associated with an AWS Lambda function to configure the OpenSearch Service domain.The Lambda function must access the OpenSearch Service domain by using OpenSearch Service internal master user credentials.What is the MOST secure way to pass these credentials to the Lambda function?Read More →

Which combination of steps should the security engineer take to gather this information?

2025-10-01
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company has a legacy application that runs on a single Amazon EC2 instance.A security audit shows that the application has been using an IAM access key within its code to access an Amazon S3 bucket that is named DOC-EXAMPLE-BUCKET1 in the same AWS account.This access key pair has the s3:GetObject permission to all objects in only this S3 bucket.The company takes the application offline because the application is not compliant with the company’s security policies for accessing other AWS resources from Amazon EC2.A security engineer validates that AWS CloudTrail is turned on in all AWS Regions.CloudTrail is sending logs to an S3 bucket that is named DOC-EXAMPLE-BUCKET2.This S3 bucket is in the same AWS account as DOC-EXAMPLE-BUCKET1.However, CloudTrail has not been configured to send logs to Amazon CloudWatch Logs.The company wants to know if any objects in DOC-EXAMPLE-BUCKET1 were accessed with the IAM access key in the past 60 days.If any objects were accessed, the company wants to know if any of the objects that are text files (.txt extension) contained personally identifiable information (PII).Which combination of steps should the security engineer take to gather this information? (Choose two.)Read More →

Which strategy should a solutions architect implement?

2025-10-01
By: study aws cloud
In: SAP-C01
With: 1 Comment

A company has several Amazon EC2 instances to both public and private subnets within a VPC that is not connected to the corporate network.A security group associated with the EC2 instances allows the company to use the Windows remote desktop protocol (RDP) over the internet to access the instances.The security team has noticed connection attempts from unknown sources.The company wants to implement a more secure solution to access the EC2 instances.Which strategy should a solutions architect implement?Read More →

Which solution will meet these requirements?

2025-10-01
By: study aws cloud
In: SOA-C02
With: 1 Comment

An application uses an Amazon Aurora MySQL DB cluster that includes one Aurora Replica.The application’s read performance degrades when there are more than 200 user connections.The number of user connections is approximately 180 on a consistent basis.Occasionally, the number of user connections increases rapidly to more than 200.A SysOps administrator must implement a solution that will scale the application automatically as user demand increases or decreases.Which solution will meet these requirements?Read More →

Which solution will meet these requirements?

2025-10-01
By: study aws cloud
In: DOP-C01
With: 1 Comment

A company wants to ensure that their EC2 instances are secure.They want to be notified if any new vulnerabilities are discovered on their instances, and they also want an audit trail of all login activities on the instances.Which solution will meet these requirements?Read More →

Posts pagination

Previous 1 … 653 654 655 … 740 Next

Recent Posts

  • What should a solutions architect do to meet these requirements?
  • What should a solutions architect do to meet these requirements?
  • Which solution will meet these requirements?
  • What should be done to secure the root user?
  • What should the solutions architect do to maximize reliability of the application’s infrastructure?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.