CLF-C02 Practice Test Questions

782 Questions


Topic 1: Exam Pool A

A company needs a content delivery network that provides secure delivery of data, videos, applications, and APIs to users globally with low latency and high transfer speeds. Which AWS service meets these requirements?


A. Amazon CloudFront


B. Elastic Load Balancing


C. Amazon S3


D. Amazon Elastic Transcoder





A.
  Amazon CloudFront

Explanation: The correct answer is A because Amazon CloudFront is an AWS service that provides secure delivery of data, videos, applications, and APIs to users globally with low latency and high transfer speeds. Amazon CloudFront is a fast content delivery network (CDN) that integrates with other AWS services, such as Amazon S3, Amazon EC2, AWS Lambda, and AWS Shield. Amazon CloudFront delivers content through a worldwide network of edge locations that are located close to the end users. The other options are incorrect because they are not AWS services that provide secure delivery of data, videos, applications, and APIs to users globally with low latency and high transfer speeds. Elastic Load Balancing is an AWS service that distributes incoming traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses. Amazon S3 is an AWS service that provides object storage for data of any size and type. Amazon Elastic Transcoder is an AWS service that converts media files from their original source format into different formats that will play on various devices.

Company wants to protect its AWS Cloud information, systems, and assets while performing risk assessment and mitigation tasks. Which pillar of the AWS Well-Architected Framework is supported by these goals?


A. Reliability


B. Security


C. Operational excellence


D. Performance efficiency





B.
  Security

Explanation: The pillar of the AWS Well-Architected Framework that is supported by the goals of protecting AWS Cloud information, systems, and assets while performing risk assessment and mitigation tasks is security. Security is the ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies. The security pillar covers topics such as identity and access management, data protection, infrastructure protection, detective controls, incident response, and compliance.

Which task is the responsibility of AWS, according to the AWS shared responsibility model?


A. Set up multi-factor authentication (MFA) for each Workspaces user account.


B. Ensure the environmental safety and security of the AWS infrastructure that hosts Workspaces.


C. Provide security for Workspaces user accounts through AWS Identity and Access Management (IAM).


D. Configure AWS CloudTrail to log API calls and user activity. A company stores data in an Amazon S3 bucket. The company must control who has permission to read, write, or delete objects that the company stores in the S3 bucket.





B.
  Ensure the environmental safety and security of the AWS infrastructure that hosts Workspaces.

Explanation: The correct answer is B because ensuring the environmental safety and security of the AWS infrastructure that hosts Workspaces is the responsibility of AWS, according to the AWS shared responsibility model. The AWS shared responsibility model is a framework that defines the division of responsibilities between AWS and the customer for security and compliance. AWS is responsible for the security of the cloud, which includes the global infrastructure, such as the regions, availability zones, and edge locations; the hardware, software, networking, and facilities that run the AWS services; and the virtualization layer that separates the customer instances and storage. The customer is responsible for the security in the cloud, which includes the customer data, the guest operating systems, the applications, the identity and access management, the firewall configuration, and the encryption. The other options are incorrect because they are the responsibility of the customer, according to the AWS shared responsibility model. Setting up multi-factor authentication (MFA) for each Workspaces user account, providing security for Workspaces user accounts through AWS Identity and Access Management (IAM), configuring AWS CloudTrail to log API calls and user activity, and encrypting data at rest and in transit are all tasks that the customer has to perform to secure their Workspaces environment.

Which AWS service will help a company identify the user who deleted an Amazon EC2 instance yesterday?


A. Amazon CloudWatch


B. AWS Trusted Advisor


C. AWS CloudTrail


D. Amazon Inspector





C.
  AWS CloudTrail

Explanation: The correct answer is C because AWS CloudTrail is a service that will help a company identify the user who deleted an Amazon EC2 instance yesterday. AWS CloudTrail is a service that enables users to track user activity and API usage across their AWS account. AWS CloudTrail records the details of every API call made to AWS services, such as the identity of the caller, the time of the call, the source IP address of the caller, the parameters and responses of the call, and more. Users can use AWS CloudTrail to audit, monitor, and troubleshoot their AWS resources and actions. The other options are incorrect because they are not services that will help a company identify the user who deleted an Amazon EC2 instance yesterday. Amazon CloudWatch is a service that enables users to collect, analyze, and visualize metrics, logs, and events from their AWS resources and applications. AWS Trusted Advisor is a service that provides real-time guidance to help users follow AWS best practices for security, performance, cost optimization, and fault tolerance. Amazon Inspector is a service that helps users find security vulnerabilities and deviations from best practices in their Amazon EC2 instances.

Which AWS service or tool can be used to consolidate payments for a company with multiple AWS accounts?


A. AWS Cost and Usage Report


B. AWS Organizations


C. Cost Explorer


D. AWS Budgets





B.
  AWS Organizations

Explanation: AWS Organizations is an account management service that enables you to consolidate multiple AWS accounts into an organization that you create and centrally manage. AWS Organizations includes consolidated billing and account management capabilities that enable you to better meet the budgetary, security, and compliance needs of your business1.

Which AWS service will help protect applications running on AWS from DDoS attacks?


A. Amazon GuardDuty


B. AWS WAF


C. AWS Shield


D. Amazon Inspector





C.
  AWS Shield

Explanation: AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection3.

Which of the following are customer responsibilities under the AWS shared responsibility model? (Select TWO.)


A. Physical security of AWS facilities


B. Configuration of security groups


C. Encryption of customer data on AWS


D. Management of AWS Lambda infrastructure


E. Management of network throughput of each AWS Region





B.
  Configuration of security groups

C.
  Encryption of customer data on AWS

Explanation: The AWS shared responsibility model describes how AWS and the customer share responsibility for security and compliance of the AWS environment. AWS is responsible for the security of the cloud, which includes the physical security of AWS facilities, the infrastructure, hardware, software, and networking that run AWS services. The customer is responsible for security in the cloud, which includes the configuration of security groups, the encryption of customer data on AWS, the management of AWS Lambda infrastructure, and the management of network throughput of each AWS Region.

Which of the following is available to a company that has an AWS Business Support plan?


A. AWS Support concierge


B. AWS DDoS Response Team (DRT)


C. AWS technical account manager (TAM)


D. AWS Health API





D.
  AWS Health API

Explanation: AWS Health API is available to a company that has an AWS Business Support plan. The AWS Health API provides programmatic access to the AWS Health information that is presented in the AWS Personal Health Dashboard. The AWS Health API can help users get timely and personalized information about events that can affect the availability and performance of their AWS resources, such as scheduled maintenance, network issues, or service disruptions. The AWS Health API can also integrate with other AWS services, such as Amazon CloudWatch Events and AWS Lambda, to enable automated actions and notifications. AWS Health API OverviewAWS Support Plans

What can a user accomplish using AWS CloudTrail?


A. Generate an IAM user credentials report.


B. Record API calls made to AWS services.


C. Assess the compliance of AWS resource configurations with policies and guidelines.


D. Ensure that Amazon EC2 instances are patched with the latest security updates. A company uses Amazon Workspaces.





B.
  Record API calls made to AWS services.

Explanation: AWS CloudTrail is an AWS service that enables users to accomplish the task of recording API calls made to AWS services. AWS CloudTrail is a service that tracks user activity and API usage across the AWS account. AWS CloudTrail records the details of every API call made to AWS services, such as the identity of the caller, the time of the call, the source IP address of the caller, the parameters and responses of the call, and more. Users can use AWS CloudTrail to audit, monitor, and troubleshoot their AWS resources and actions. The other options are incorrect because they are not tasks that users can accomplish using AWS CloudTrail. Generating an IAM user credentials report is a task that users can accomplish using IAM, which is an AWS service that enables users to manage access and permissions to AWS resources and services. Assessing the compliance of AWS resource configurations with policies and guidelines is a task that users can accomplish using AWS Config, which is an AWS service that enables users to assess, audit, and evaluate the configurations of their AWS resources. Ensuring that Amazon EC2 instances are patched with the latest security updates is a task that users can accomplish using AWS Systems Manager, which is an AWS service that enables users to automate operational tasks, manage configuration and compliance, and monitor system health and performance.

Using Amazon Elastic Container Service (Amazon ECS) to break down a monolithic architecture into microservices is an example of:


A. a loosely coupled architecture.


B. a tightly coupled architecture.


C. a stateless architecture.


D. a stateful architecture.





A.
  a loosely coupled architecture.

Explanation: Using Amazon Elastic Container Service (Amazon ECS) to break down a monolithic architecture into microservices is an example of a loosely coupled architecture. A loosely coupled architecture is one where the components are independent and can communicate with each other through well-defined interfaces. This allows for greater scalability, flexibility, and resilience. A tightly coupled architecture is one where the components are interdependent and rely on each other for functionality. This can lead to increased complexity, fragility, and difficulty in changing or scaling the system. Amazon ECS Overview AWS Well-Architected Framework

Which AWS service can report how AWS resource configurations have changed over time?


A. AWS CloudTrail


B. Amazon CloudWatch


C. AWS Config


D. Amazon Inspector





C.
  AWS Config

Explanation: AWS Config is a service that enables users to assess, audit, and evaluate the configurations of AWS resources. It continuously monitors and records the configuration changes of the resources and evaluates them against desired configurations and best practices. It also provides a detailed view of the resource configuration history and relationships, as well as compliance reports and notifications. AWS Config can help users maintain consistent and secure configurations, troubleshoot issues, and simplify compliance auditing. AWS Config OverviewAWS Certified Cloud Practitioner - aws.amazon.com

A company needs to configure rules to identify threats and protect applications from malicious network access. Which AWS service should the company use to meet these requirements?


A. AWS Identity and Access Management (IAM)


B. Amazon QuickSight


C. AWS WAF


D. Amazon Detective





C.
  AWS WAF

Explanation: AWS WAF is the AWS service that the company should use to configure rules to identify threats and protect applications from malicious network access. AWS WAF is a web application firewall that helps to filter, monitor, and block malicious web requests based on customizable rules. AWS WAF can be integrated with other AWS services, such as Amazon CloudFront, Amazon API Gateway, and Application Load Balancer. For more information, see What is AWS WAF? and How AWS WAF Works.


Page 14 out of 66 Pages
Previous