Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A company has an Amazon EC2 instance that runs Windows Server 2019. An encrypted Amazon Elastic Block Store (Amazon EBS) volume is attached to the instance as the main boot volume. The company has lost the ability to use Remote Desktop Protocol (RDP) to connect to the instance.

The company needs to back up the instance. Before the backup, a SysOps administrator must change local Windows Firewall settings to fix the RDP connectivity issue.

The SysOps administrator stops the instance.

What should the SysOps administrator do next to regain access to the instance?

A.

Detach the main boot volume from the instance. Disable encryption on the main boot volume. Reattach the main boot volume to the instance. Create a new key pair. Assign the new key pair to the instance Reboot the instance. Connect to the instance by using RDP.

B.

Detach the mam boot volume from the instance. Use Amazon Inspector to reconfigure the Windows Firewall settings to allow RDP connectivity.

C.

Disable encryption for the main boot volume. Use Amazon Inspector to reconfigure the Windows Firewall settings to allow RDP connectivity. Re-enable encryption for the main boot volume.

D.

Detach the main boot volume from the instance. Attach the main boot volume to a working instance that has EC2Rescue installed. Use EC2Rescue to reconfigure the Windows Firewall settings to allow RDP connectivity. Detach the main boot volume from the working instance. Reattach the main boot volume to the initial instance.

The company is experiencing increased message load from the frontend to the backend, causing message loss due to backend capacity limitations.

Options:

A.

Redevelop the backend application as a series of AWS Lambda functions.

B.

Implement an Amazon Kinesis data stream to replace the backend application.

C.

Implement an Application Load Balancer to distribute message traffic across the backend application instances.

D.

Implement an Amazon Simple Queue Service (Amazon SQS) queue between the frontend and backend components.

A company hosts an application on Amazon EC2 instances. The application periodically causes a surge in CPU utilization on the EC2 instances.

A SysOps administrator needs to implement a solution to detect when these surges occur. The solution also must send an email alert to the company's development team.

Which solution will meet these requirements?

A.

Create an Amazon Simple Email Service (Amazon SES) email. Verify the development team's email address. Create an Amazon CloudWatch alarm for the EC2 instances Use the sum of the CPU utilization metric, an upper threshold of 80%. and a period of 15 minutes for the alarm. Link the alarm to the SES email.

B.

Create an Amazon Simple Email Service (Amazon SES) email. Verify the development team's email address. Create an Amazon CloudWatch alarm for the EC2 instances Use the average of the CPU utilization metric, an upper threshold of 80%. and a period of 5 minutes for the alarm. Link the alarm to the SES email.

C.

Create an Amazon Simple Notification Service (Amazon SNS) topic Subscribe the development team's email address to the SNS topic. Create an Amazon CloudWatch alarm for the EC2 instances. Use the sum of the CPU utilization metric, an upper threshold of 80%. and a period of 15 minutes for the alarm. Link the alarm to the SNS topic.

D.

Create an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the development team's email address to the SNS topic. Create an Amazon CloudWatch alarm for the EC2 instances. Use the average of the CPU utilization metric, an upper threshold of 80%. and a period of 5 minutes for the alarm. Link the alarm to the SNS topic

A company has a workload that is sending log data to Amazon CloudWatch Logs. One of the fields includes a measure of application latency. A SysOps administrator needs to monitor the p90 statistic of this field over time.

A.

Create an Amazon CloudWatch Contributor Insights rule on the log data.

B.

Create a metric filter on the log data.

C.

Create a subscription filter on the log data.

D.

Create an Amazon CloudWatch Application Insights rule for the workload.

A company is running an application on a group of Amazon EC2 instances behind an Application Load Balancer The EC2 instances run across three Availability Zones The company needs to provide the customers with a maximum of two static IP addresses for their applications

How should a SysOps administrator meet these requirement?

A.

Add AWS Global Accelerator in front of the Application Load Balancer

B.

Add an internal Network Load Balancer behind the Application Load Balancer

C.

Configure the Application Load Balancer in only two Availability Zones.

D.

Create two Elastic IP addresses and assign them to the Application Load Balancer.

A SysOps administrator is notified that an Amazon EC2 instance has stopped responding The AWS Management Console indicates that the system status checks are failing What should the administrator do first to resolve this issue?

A.

Reboot the EC2 instance so it can be launched on a new host

B.

Stop and then start the EC2 instance so that it can be launched on a new host

C.

Terminate the EC2 instance and relaunch it

D.

View the AWS CloudTrail log to investigate what changed on the EC2 instance

A company is running a flash sale on its website. The website is hosted on burstable performance Amazon EC2 instances in an Auto Scaling group. The Auto Scaling group is configured to launch instances when the CPU utilization is above 70%.

A couple of hours into the sale, users report slow load times and error messages for refused connections. A SysOps administrator reviews Amazon CloudWatch metrics and notices that the CPU utilization is at 20% across the entire fleet of instances.

The SysOps administrator must restore the website's functionality without making changes to the network infrastructure.

Which solution will meet these requirements?

A.

Activate unlimited mode for the instances in the Auto Scaling group.

B.

Implement an Amazon CloudFront distribution to offload the traffic from the Auto Scaling group.

C.

Move the website to a different AWS Region that is closer to the users.

D.

Reduce the desired size of the Auto Scaling group to artificially increase CPU average utilization.

A SysOps administrator maintains the security and compliance of a company's AWS account. To ensure the company's Amazon EC2 instances are following company policy, a SysOps administrator wants to terminate any EC2 instance that do not contain a department tag. Noncompliant resources must be terminated in near real time.

Which solution will meet these requirements?

A.

Create an AWS Config rule with the required-tags managed rule to identify noncompliant resources. Configure automatic remediation to run the AWS-TerminateEC2lnstance automation runbook to terminate noncompliant resources.

B.

Create a new Amazon EventBridge rule to monitor when new EC2 instances are created. Send the event to an Simple Notification Service (Amazon SNS) topic for automatic remediation.

C.

Ensure all users who can create EC2 instances also have the permissions to use the ec2:CreateTags and ec2:DescribeTags actions. Change the instance's shutdown behavior to terminate.

D.

Ensure AWS Systems Manager Compliance is configured to manage the EC2 instances. Call the AWS-StopEC2lnstances automation runbook to stop noncompliant resources.

A SysOps administrator needs to implement a solution to create backups of an Amazon DynamoDB table. The solution must perform the backups automatically every 24 hours and must move the backups to cold storage after 30 days. The solution also must encrypt the backups by using an AWS Key Management Service (AWS KMS) key that has a customizable key policy.

Which solution will meet these requirements?

A.

Configure a DynamoDB table backup job that has a schedule period of 24 hours. Configure the backup job to move backups to cold storage after 30 days. Create a customer managed KMS key. Configure the backup job to use the customer managed KMS key.

B.

Configure a DynamoDB table backup job that has a schedule period of 24 hours. Configure the backup jewto move backups to cold storage after 30 days. Configure the backup job to use the AWS managed KMS key for DynamoDB.

C.

Configure AWS Backup for DynamoDB. Create an AWS Backup vault. Create an AWS Backup plan that includes the DynamoDB table with a cold storage lifecyde policy set to 30 days. Create a customer managed KMS key. Configure the AWS Backup vault to use the customer managed KMS key.

D.

Configure AWS Backup for DynamoDB. Create an AWS Backup vault that includes a cold storage lifecyde policy set to 30 days. Create an AWS Backup plan that includes the DynamoDB table. Configure the AWS Backup vault to use the AWS managed KMS key for DynamoDB.

A SysOps administrator is optimizing the cost of a workload. The workload is running in multiple AWS Regions and is using AWS Lambda with Amazon EC2 On-Demand Instances for the compute. The overall usage is predictable. The amount of compute that is consumed in each Region varies, depending on the users' locations.

Which approach should the SysOps administrator use to optimize this workload?

A.

Purchase Compute Savings Plans based on the usage during the past 30 days

B.

Purchase Convertible Reserved Instances by calculating the usage baseline.

C.

Purchase EC2 Instance Savings Plane based on the usage during the past 30 days

D.

Purchase Standard Reserved Instances by calculating the usage baseline.