Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

SOA-C01 AWS Certified SysOps Administrator - Associate Questions and Answers

Questions 4

A company wants to icrease the availability and vulnerability of a critical business application. The appliation currently ueses a MySQL database running on an Amazon EC2 instance. The company wants to minimize application changes.

How should the company these requirements?

Options:

A.

Shut down the EC2 instance. Enable multi-AZ replication within the EC2 instance, then restart the instance.

B.

Launch a secondary EC2 instance running MySQL Configure a cron job that backs up the database on the primary EC2 instance and copies it to the secondary instance every 30 minutes.

C.

Migrate the database to an RDS Aurora DB instance and create a Read Replication in another Availability Zone.

D.

Create an Amazon RDS Microsoft SQL DB instance and enable multi-Az replication. Back up the existing data and import in to the new database.

Buy Now
Questions 5

A sysops administrator is reviewing AWS Trusted Advisor warnings and encounters a warning for an S3 bucket policy that has open access permissions. While discussing the issue with the bucket owner, the administrator realizes the S3 bucket is an origin for an Amazon CloudFront web distribution.

Options:

A.

Encrypt the S3 bucket content with Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3).

B.

Create an origin access identity and grant it permissions to read objects in the S3 bucket.

C.

Assign an 1AM user to the CloudFront distribution and whitelist the 1AM user in the S3 bucket policy.

D.

Assign an 1AM role to the CloudFront distribution and whitelist the 1AM role in the S3 bucket policy.

Buy Now
Questions 6

A company is releasing a now static website hosted on Amazon S3. The static website hosting feature was enabled on the bucket and content was uploaded, however, upon navigating to the site, the following error message is received:

403 Forbiddan - Access Denied

What change should be made to fix this error'?

Options:

A.

Add a bucket policy that grants everyone read access to the bucket

B.

Add a bucket policy that grants everyone read access to the bucket objects

C.

Remove the default bucket policy that denies read access to the bucket.

D.

Configure cross origin resource sharing (CORS) on the bucket

Buy Now
Questions 7

An ecommerce site is using Amazon ElastiCache with Memcached to store session state for a web application and to cache frequently used data. For the last month, users have been complaining about performance. The metric data for the Amazon EC2 instances and the Amazon RDS instance appear normal, but the eviction count metrics are high.

What should be done to address this issue and improve performance?

Options:

A.

Scale the cluster by adding additional nodes

B.

Scale the cluster by adding read replicas

C.

Scale the cluster by increasing CPU capacity

D.

Scale the web layer by adding additional EC2 instances

Buy Now
Questions 8

A SysOps administrator set up an Amazon ElastiCache for Memcached cluster for an application During testing, the application expenences increased latency. Amazon CloudWatch metrics (or the Memcached cluster show CPUUtilization is consistently above 95% and FreeableMemory is consistently under 1 MB.

Which aclion will solve the problem?

Options:

A.

Configure ElastiCache automatic scaling for the Memcached cluster. Set the CPU Utilization metric as a scaling trigger above 75% and FreeableMemory below 10 MB.

B.

Configure ElastiCache read replicas for each Memcached node in different Availability Zones to distribute the workload.

C.

Deploy an Application Load Balancer to distribute the workload to Memcached cluster nodes.

D.

Replace the Memcached cluster and select a node type that has a higher CPU and memory.

Buy Now
Questions 9

An application runs on Amazon EC2 instances behind an Application Load Balancer (ALB). The instance in an Auto Scaling group that terminates unhealthy instances. The Auto Scaling group is configured to determine the health status of EC2 instances using both EC2 status checks and ALB checks. The Development team wants to analyze the unhealthy instances before termination.

What should the SysOps Administrator do to accomplish this?

Options:

A.

Configure the ALB health check to restart instances instead of terminating them.

B.

Configure an AWS Lambda function to take a snapshot of all instance before they are terminated.

C.

Implement Amazon CloudWatch Events to capture lifecycle events and trigger an AWS Lambda function for remediation.

D.

Use an Amazon EC2 Auto Scaling lifecycle hook to pause instance termination after the instance has been removed from service.

Buy Now
Questions 10

A company is planning to deploy multiple ecommerce websites across the eu-west-1, ap-east-1, and us-west-1 Regions. The websites consist of Amazon S3 buckets Amazon EC2 instances, Amazon RDS databases and Elastic Load Balancers.

Which method will accomplish the deployment with the LEAST amount of effort?

Options:

A.

Configure deployment automation using AWS OpsWorks

B.

Configure S3 cross-Region replication

C.

Use AWS CloudFormation stack sets to deploy the application

D.

Use AWS Elastic Beanstalk to deploy the application

Buy Now
Questions 11

A company is concerned about its ability to recover from a disaster because all of its Amazon EC2 instances are located in a single Amazon VPC in us-east-1. A second Amazon VPC has been configured in eu-west-1 to act as a backup VPC in case of an outage. Data will be replicated from the primary region to the secondary region. The Information Security team’s compliance requirements specify that all data must be encrypted and must not traverse the public internet.

How should the SysOps Administrator connect the two VPCs while meeting the compliance requirements?

Options:

A.

Configure EC2 instances to act as VPN appliances, then configure route tables.

B.

Configure inter-region VPC peering between the two VPCs, then configure route tables.

C.

Configure NAT gateways in both VPCs, then configure route tables.

D.

Configure an internet gateway in each VPC, and use these as the targets for the VPC route tables.

Buy Now
Questions 12

A SysOps Administrator is trying to set up an Amazon Route 53 domain namo to route traffic to a website hosted on Amazon S3 The domain name of the website is www anycompany com and the S3 bucket name is anycompany-static After the record set is set up in Route 53, the domain name www anycompany com does not seem to work, and the static website is not displayed in the browser

Which of the following is a cause of this?

Options:

A.

The S3 bucket must be configured with Amazon CloudFront first.

B.

The Route 53 record set must have an IAM role that allows access to the S3 bucket

C.

The Route 53 record set must be in the same region as the S3 bucket

D.

The S3 bucket name must match the record sot name in Route 53.

Buy Now
Questions 13

A company must ensure that any objects uploaded to an S3 bucket are encrypted. Which of the following actions will meet this requirement? (Select TWO.)

Options:

A.

implement AWS Shield to protect against unencrypted objects stored in S3 buckets.

B.

Implement Object access control list (ACL) to deny unencrypted objects from being uploaded to the S3 bucket.

C.

Implement Amazon S3 default encryption to make sure that any object being uploaded is encrypted before it is stored.

D.

Implement Amazon Inspector to inspect objects uploaded to the S3 bucket to make sure that they are encrypted.

E.

Implement S3 bucket policies to deny unencrypted objects from being uploaded to the buckets.

Buy Now
Questions 14

A company’s Auditor implemented a compliance requirement that all Amazon S3 buckets must have logging enabled.

How should the SysOps Administrator ensure this compliance requirement is met, while still permitting Developers to create and use new S3 buckets?

Options:

A.

Add AWS CloudTrail logging for the S3 buckets.

B.

Implement IAM policies to allow only the Storage team to create S3 buckets.

C.

Add the AWS Config managed rule S3_BUCKET_LOGGING_ENABLED.

D.

Create an AWS Lambda function to delete the S3 buckets if logging is not turned on.

Buy Now
Questions 15

Which component of an Ethernet frame is used to notify a host that traffic is coming?

Options:

A.

Type field

B.

preamable

C.

Data field

D.

start of frame delimiter

Buy Now
Questions 16

A company is expanding its use of AWS services across its portfolios. The company wants to provision AWS accounts for each team to ensure a separation of business processes for security, compliance, and billing account creation and bootstrapping should be completed in a scalable and efficient way so new accounts are created with a defined baseline and governance guardrails in place. A sysops administrator needs to design a provisioning process that save time and resources.

Which action should be taken to meet these requirements?

Options:

A.

Automate using AWS Elastic Beanstalk to provision the AWS Accounts, set up infrastructure, and integrate with AWS Organizations.

B.

Create bootstrapping scripts in AWS OpsWorks and combine them with AWS CloudFormation templates to provision accounts and infrastructure.

C.

Use AWS config to provision accounts and deploy instances using AWS service catalog.

D.

Use AWS Control Tower to create a template in account factory and use the template to provision new accounts.

Buy Now
Questions 17

A company monitors its account activity using AWS CloudTrail, and is concerned that some log files are being tampered with after the logs have been delivered to the account’s Amazon S3 bucket.

Moving forward, how can the SysOps Administrator confirm that the log files have not been modified after being delivered to the S3 bucket.

Options:

A.

Stream the CloudTrail logs to Amazon CloudWatch to store logs at a secondary location.

B.

Enable log file integrity validation and use digest files to verify the hash value of the log file.

C.

Replicate the S3 log bucket across regions, and encrypt log files with S3 managed keys.

D.

Enable S3 server access logging to track requests made to the log bucket for security audits.

Buy Now
Questions 18

A company’s static website hosted on Amazon S3 was launched recently, and is being used by tens of thousands of users. Subsequently, website users are experiencing 503 service unavailable errors.

Why are these errors occurring?

Options:

A.

The request rate to Amazon S3 is too high.

B.

There is an error with the Amazon RDS database.

C.

The requests to Amazon S3 do not have the proper permissions.

D.

The users are in different geographical region and Amazon Route 53 is restricting access.

Buy Now
Questions 19

A security researcher has published a new Common Vulnerabilities and Exposures (CVE) report that impacts a popular operating system A SysOps Administrator is concerned with the new CVE report and wants to patch the company's systems immediately The Administrator contacts AWS Support and requests the patch be applied to all Amazon EC2 instances

How will AWS respond to this request?

Options:

A.

AWS will apply the patch during the next maintenance window and will provide the Administrator with a report of all patched EC2 instances

B.

AWS will relaunch the EC2 instances with the latest version of the Amazon Machine Image (AMI) and will provide the Administrator with a report of all patched EC2 instances

C.

AWS will research the vulnerability to see if the Administrator's operating system is impacted and will patch the EC2 instances that are affected

D.

AWS will review the shared responsibility model with the Administrator and advise them regarding how to patch the EC2 instances

Buy Now
Questions 20

A company has deployed a NAT instance to allow web servers to obtain software updates from the internet. There latency on the NAT instance as the network grows. A SysOps Administrator needs to reduce latency on the instance in a manner that a efficient, cost effective, and allow for scaling with future demand.

Which action should be taken to accomplish this?

Options:

A.

Add a second NAT instance and place both instance behind a load balancer.

B.

Convert the NAT instance to a larger instance size.

C.

Replace the NAT instance with NAT gateway.

D.

Replace the NAT instance with a virtual private gateway.

Buy Now
Questions 21

A web application runs on Amazon EC2 instances behind an ELB Application Load Balancer. The instances run in an EC2 Auto Scaling group across multiple Availability Zones. Amazon Route 53 is used for DNS and points to the load balancer. A SysOps Administrator has launched a new Auto Scaling group with a new version of the application, and wants to gradually shift traffic to the new version.

How can this be accomplished?

Options:

A.

Create an Auto Scaling target tracking scaling policy to gradually move traffic the old version to the new one

B.

Change the Application Load Balancer to a Network Load Balancer, then add both Auto Scaling groups as targets

C.

Use an Amazon Route 53 weighted routing policy to gradually move traffic from the old version to the new one

D.

Deploy Amazon Redshift to gradually move traffic from the old version to the new one using a set of predefined values

Buy Now
Questions 22

An Applications team has successfully deployed an AWS CloudFormation stack consisting of 30 t2-medium Amazon EC2 instances in the us-west-2 Region. When using the same template to launch a stack in us-east-2, the launch failed and rolled back after launching only 10 EC2 instances.

What is a possible cause of this failure?

Options:

A.

The IAM user did not have privileges to launch the CloudFormation template.

B.

The t2 medium EC2 instance service limit was reached.

C.

An AWS Budgets threshold was breached.

D.

The application’s Amazon Machine Image (AMI) is not available in us-east-2.

Buy Now
Questions 23

A SysOps Administrator is responsible for managing a fleet of Amazon EC2 instances. These EC2 instances upload build artifacts to a third-party service. The third-party service recently implemented stncl IP whitelisting that requires all build uploads to come from a single IP address.

What change should the Systems Administrator make to the existing build fleet to comply with this new requirement?

Options:

A.

Move all of the EC2 instances behind a NAT gateway and provide the gateway IP address to the service.

B.

Move all of the EC2 instances behind an internet gateway and provide the gateway IP address to the service.

C.

Move all of the EC2 instances into a single Availability Zone and provide the Availability Zone IP address to the service.

D.

Move all of the EC2 instances to a peered VPC and provide the VPC IP address to the service.

Buy Now
Questions 24

A local agency plans to deploy 500 Raspberry Pi devices throughout a city. All the devices need to be managed centrally and their configurations need to be consistent. What is the BEST service for managing these devices?

Options:

A.

AWS Config

B.

AWS Systems Manager

C.

Amazon inspector

D.

AWS Service Catalog

Buy Now
Questions 25

A company has a VPC with public and private subnets An Amazon EC2 based application resides in the private subnets and needs to process raw csv files stored in an Amazon S3 bucket A sysops administrator has set up the correct 1AM role with the required permissions for the application to access the S3 bucket, but the application is unable to communicate with the S3 bucket

Which action will solve this problem while adhering to least privilege access?

Options:

A.

Add a bucket policy to the S3 bucket permitting access from the 1AM role.

B.

Attach an S3 gateway endpoint to the VPC Configure the route table for the private subnet.

C.

Configure the route table to allow the instances on the private subnet access through the internet gateway

D.

Create a NAT gateway in a private subnet and configure the route table for the private subnets.

Buy Now
Questions 26

A SysOps administrator is implementing automated I/O load performance testing as part of lite continuous integraliorVcontinuous delivery (CI'CD) process for an application The application uses an Amazon Elastic Block Store (Amazon E8S) Provisioned IOPS volume for each instance that is restored from a snapshot and requires consistent I/O performance. During the initial tests, the I/O performance results are sporadic. The SysOps administrator must ensure that the tests yield more consistent results.

Which actions could the SysOps administrator take to accomplish this goal? (Select TWO.)

Options:

A.

Restore the EBS volume from the snapshot with fast snapshot restore enabled

B.

Restore the EBS volume from the snapshot using the cold HDD volume type.

C.

Restore the EBS volume from the snapshot and pre-warm the volume by reading all of the blocks.

D.

Restore the EBS volume from the snapshot and configure encryption.

E.

Restore the EBS volume from the snapshot and configure I/O block sizes at random

Buy Now
Questions 27

A serverless application running on AWS Lambda is expected to receive a significant increase in traffic. A SysOps Administrator needs to ensure that the Lambda function is configured to scale so the application can process the increased traffic.

What should the Administrator do to accomplish this?

Options:

A.

Attach additional elastic network interfaces to the Lambda function

B.

Configure AWS Application Auto Scaling based on the Amazon CloudWatch Lambda metric for the number of invocations

C.

Ensure the concurrency limit for the Lambda function is higher than the expected simultaneous function executions

D.

Increase the memory available to the Lambda function

Buy Now
Questions 28

A company backs up data from its data center using a tape gateway on AWS Storage Gateway. The SysOps Administrator needs to reboot the virtual machine running Storage Gateway.

What process will protect data integrity?

Options:

A.

Stop Storage Gateway and reboot the virtual machine, then restart Storage Gateway.

B.

Reboot the virtual machine, then restart Storage Gateway.

C.

Reboot the virtual machine.

D.

Shut down the virtual machine and stop Storage Gateway, then turn on the virtual machine.

Buy Now
Questions 29

A SysOps administrator notices a scale-out event for an Amazon EC2 Auto Scaling group Amazon CloudWatch shows a spike in the RequestCount metric tor the associated Application Load Balancer The administrator would like to know the IP addresses for the source of the requests

Where can the administrator find this information?

Options:

A.

Auto Scaling logs

B.

AWS CloudTrail logs

C.

EC2 instance logs

D.

Elastic Load Balancer access logs

Buy Now
Questions 30

A sysops administrator is implementing SSL for a domain of an internet facing application running behind an Application load balancer (ALB). The administrator decides to use an SSL certificates from Amazon certificate Manager (ACM) to secure it. Upon creating a request for the ALB fully qualified domain name (FQND), it fails, and the error message “Domain not allowed” is displayed.

How can the administrator fix this issue?

Options:

A.

Contact the domain register and ask them to provide the verification required by AWS.

B.

Place a new request with the proper domain name instead of the ALB FQDN.

C.

Select the certificate request in the ACM console and resend the validation email.

D.

Contact AWS support and verify the request by answering security challenge questions.

Buy Now
Questions 31

A popular auctioning platform requires near-real-time access to dynamic bidding information. The platform must be available at all times The current Amazon RDS instance often reaches 100% CPU utilization during the weekend auction and can no longer be resized. To improve application performance, a sysops administrator is evaluating Amazon ElastiCache and has chosen Redis (cluster mode enabled) instead of Memcached

What are reasons for making this choice? (Select TWO.)

Options:

A.

Data partitioning

B.

Multi-threaded processing

C.

Multi-AZ with automatic failover

D.

Multi-region with automatic failover

E.

Online resharding

Buy Now
Questions 32

A company needs to ensure that all IAM users rotate their password on a regular basis.

Which action should be taken to implement this?

Options:

A.

Configure multi-factor authentication for all IAM users.

B.

Deactivate existing users and re-create new users every time a credential rotation is required.

C.

Re-create identity federation with new identity providers every time a credential rotation is required

D.

Set up a password policy to enable password of expiration for IAM users.

Buy Now
Questions 33

A SysOps Administrator noticed that the cache hit ratio for an Amazon CloudFront distribution is less than 10%. Which collection of configuration changes will increase the cache hit ratio for the distribution? (Select two.)

Options:

A.

Ensure that only required cookies, query strings, and headers are forwarded in the Cache Behavior Settings

B.

Change the Viewer Protocol Policy to use HTTPS only

C.

Configure the distribution to use presigned cookies and URLs to restrict access to the distribution

D.

Enable automatic compression of objects in the Cache Behavior Settings

E.

Increase the CloudFront time to live (TTL) settings in the Cache Behavior Settings.

Buy Now
Questions 34

After launching a new Amazon EC2 instance from a Microsoft Windows 2012 Amazon Machine Image (AMI), the SysOps Administrator is unable to connect to the instance using Remote Desktop Protocol (RDP). The instance is also unreachable. As part of troubleshooting, the Administrator deploys a second instance from a different AMI using the same configuration and is able to connect to the instance.

What should be the next logical step in troubleshooting the first instance?

Options:

A.

Use AWS Trusted Advisor to gather operating system log files for analysis.

B.

Use VPC Flow Logs to gather operating system log files for analysis.

C.

Use EC2Rescue to gather operating system log files for analysis.

D.

Use Amazon metrics using Amazon CloudWatch Logs.

Buy Now
Questions 35

A company has enabled AWS CloudTrail to monitor all actions across its AWS infrastructure The company would now like to add functionality to validate the file integrity of the collected AWS CloudTrail logs

How should the SysOps Administrator implement this requirement?

Options:

A.

Enable log file integrity validation in AWS Config

B.

Enable log file integrity validation in Amazon CloudTrail

C.

Use the Amazon Inspector log file integrity feature

D.

Use AWS KMS to perform log file integrity validation in Amazon CloudTrail

Buy Now
Questions 36

A SysOps Administrator is maintaining a web application using an Amazon Cloud Front web distribution, an Application Load Balancer (ALB), Amazon RDS, and Amazon EC2 in a VPC. All services have services have logging enabled. The Administrator needs to investigate HTTP Layer 7 status codes from the web application.

Which log source contain the status codes? (Select TWO.)

Options:

A.

VPC Flow Logs

B.

AWS CloudTrail logs

C.

ALB access logs

D.

ClodFront access logs

E.

RDS logs

Buy Now
Questions 37

A company has several AWS accounts and has set up consolidated billing through AWS Organizations. The total monthly bill has been increasing over several months, and a SysOps administrator has been asked to determine what is causing this increase.

What is the Most comprehensive tool that will accomplish this task?

Options:

A.

AWS Cost Explorer

B.

AWS Trusted Advisor

C.

Cost allocation tags

D.

Resource groups

Buy Now
Questions 38

A SysOps Administrator has an AWS CloudFormation template of the company’s existing infrastructure in us-west-2. The Administrator attempts to use the template to launch a new stack in eu-west-1, but the stack only partially deploys, receives an error message, and then rolls back.

Why would this template fail to deploy? (Choose two.)

Options:

A.

The template referenced an IAM user that is not available in eu-west-1

B.

The template referenced an Amazon Machine Image (AMI) that is not available in eu-west-1

C.

The template did not have the proper level of permissions to deploy the resources

D.

The template requested services that do not exist in eu-west-1

E.

CloudFormation templates can be used only to update existing services

Buy Now
Questions 39

A company wants to increase the availability and durability of a critical business application. The application currently uses a MySQL database running on an Amazon EC2 instance. The company wants to minimize application changes.

How should the company meet these requirements?

Options:

A.

Shut down the EC2 instance. Enable multi-AZ replication within the EC2 instance, then restart the instance.

B.

Launch a secondary EC2 instance running MySQL. Configure a cron job that backs up the database on the primary EC2 instance and copies it to the secondary instance every 30 minutes.

C.

Migrate the database to an Amazon RDS Aurora DB instance and create a Read Replica in another Availability Zone.

D.

Create an Amazon RDS Microsoft SQL DB instance and enable multi-AZ replication. Back up the existing data and import it into the new database.

Buy Now
Exam Code: SOA-C01
Exam Name: AWS Certified SysOps Administrator - Associate
Last Update: Jul 1, 2025
Questions: 263

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now SOA-C01 testing engine

PDF (Q&A)

$36.75  $104.99
buy now SOA-C01 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 04 Jul 2025