Skip to content

Tip 2 Cloud

Free study guides, practices test, sample questions

Primary Navigation Menu
Menu
  • Home
  • About us
  • Contact

Which solution will meet these requirements with the LEAST management overhead?

2026-03-30
By: study aws cloud
In: SOA-C02
With: 2 Comments

A company is expanding globally and needs to back up data on Amazon Elastic Block Store (Amazon EBS) volumes to a different AWS Region.Most of the EBS volumes that store the data are encrypted, but some of the EBS volumes are unencrypted.The company needs the backup data from all the EBS volumes to be encrypted.Which solution will meet these requirements with the LEAST management overhead?Read More →

Which solution meets these requirements?

2026-03-30
By: study aws cloud
In: SAP-C01
With: 2 Comments

A company runs a software-as-a-service (SaaS) application on AWS.The application consists of AWS Lambda functions and an Amazon RDS for MySQL Multi-AZ database.During market events, the application has a much higher workload than normal.Users notice slow response times during the peak periods because of many database connections.The company needs to improve the scalable performance and availability of the database.Which solution meets these requirements?Read More →

Which combination of steps should the security team take so that the automation can capture EC2 forensic evidence in all AWS accounts in the organization?

2026-03-30
By: study aws cloud
In: SCS-C01
With: 2 Comments

A company has an organization in AWS Organizations.The company’s security team is developing automation to capture Amazon EC2 forensic evidence within any AWS account in the organization.The company has encrypted the Amazon Elastic Block Store (Amazon EBS) volumes of all the EC2 instances in the organization by default by using the AWS managed key.The automation consists of AWS Lambda functions and AWS Step Functions state machines.The automation assumes an IAM role in the target AWS account.The automation takes snapshots of suspicious EC2 instances and assigns permissions to allow the security team’s account to copy the snapshots.The security team has an AWS Key Management Service (AWS KMS) key to encrypt the snapshots.During testing, the automation fails to copy the snapshots into the security team’s AWS account.Which combination of steps should the security team take so that the automation can capture EC2 forensic evidence in all AWS accounts in the organization? (Choose three.)Read More →

Which solution will meet these requirements with the LEAST implementation effort?

2026-03-30
By: study aws cloud
In: SAA-C03
With: 2 Comments

A company hosts an ecommerce application that stores all data in a single Amazon RDS for MySQL DB instance that is fully managed by AWS.The company needs to mitigate the risk of a single point of failure.Which solution will meet these requirements with the LEAST implementation effort?Read More →

Which steps should the solutions architect take to design an appropriate solution?

2026-03-30
By: study aws cloud
In: SAP-C02
With: 2 Comments

A company is hosting a three-tier web application in an on-premises environment.Due to a recent surge in traffic that resulted in downtime and a significant financial impact, company management has ordered that the application be moved to AWS.The application is written in .NET and has a dependency on a MySQL database.A solutions architect must design a scalable and highly available solution to meet the demand of 200,000 daily users.Which steps should the solutions architect take to design an appropriate solution?Read More →

Which combination of actions should the developer take to log the LARGEST amount of AWS API operational information without exposing the PII?

2026-03-30
By: study aws cloud
In: DVA-C01
With: 2 Comments

A company is building a cloud solution to analyze customer demographic data.The data includes personally identifiable information (PII) such as full names, street addresses, and financial records.A developer is configuring a source Amazon DynamoDB table with a DynamoDB stream.The developer is writing an AWS Lambda function that will ingest the demographic data from the DynamoDB stream.perform analytics, and write results to a separate DynamoDB table.The application must log important AWS API workflow events for monitoring purposes, but the application must expose the PII.Which combination of actions should the developer take to log the LARGEST amount of AWS API operational information without exposing the PII? (Choose two.)Read More →

Which option is a common stakeholder role for the AWS Cloud Adoption Framework (AWS CAF) platform perspective?

2026-03-30
By: study aws cloud
In: CLF-C01
With: 2 Comments

Which option is a common stakeholder role for the AWS Cloud Adoption Framework (AWS CAF) platform perspective?Read More →

When the IAM user logs in to the S3 console, which actions can he perform?

2026-03-30
By: study aws cloud
In: SOA-C01
With: 2 Comments

A root account owner has given full access of his S3 bucket to one of the IAM users using the bucket ACL.When the IAM user logs in to the S3 console, which actions can he perform?Read More →

Which model is MOST likely to provide the best results in Amazon SageMaker?

2026-03-30
By: study aws cloud
In: MLS-C01
With: 2 Comments

A city wants to monitor its air quality to address the consequences of air pollution.A Machine Learning Specialist needs to forecast the air quality in parts per million of contaminates for the next 2 days in the city.As this is a prototype, only daily data from the last year is available.Which model is MOST likely to provide the best results in Amazon SageMaker?Read More →

Which action should the solutions architect take?

2026-03-30
By: study aws cloud
In: SAA-C02
With: 2 Comments

A solutions architect is creating a new Amazon CloudFront distribution for an application.Some of the information submitted by users is sensitive.The application uses HTTPS but needs another layer of security.The sensitive information should be protected throughout the entire application stack, and access to the information should be restricted to certain applications.Which action should the solutions architect take?Read More →

Posts pagination

Previous 1 … 262 263 264 … 740 Next

Recent Posts

  • Which of the below mentioned statements helps the user disable connection draining on the ELB?
  • What change should the SysOps Administrator make to the company’s existing AWS setup to achieve this result?
  • How can the user configure this?
  • How can the user achieve DR?
  • What two actions could you take to rectify this?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2026. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.