CLF-C02 Practice Test Questions

782 Questions


Topic 1: Exam Pool A

A company is hosting a web application in a Docker container on Amazon EC2. AWS is responsible for which of the following tasks?


A. Scaling the web application and services developed with Docker


B. Provisioning or scheduling containers to run on clusters and maintain their availability


C. Performing hardware maintenance in the AWS facilities that run the AWS Cloud


D. Managing the guest operating system, including updates and security patches





C.
  Performing hardware maintenance in the AWS facilities that run the AWS Cloud

Explanation: AWS is responsible for performing hardware maintenance in the AWS facilities that run the AWS Cloud. This is part of the shared responsibility model, where AWS is responsible for the security of the cloud, and the customer is responsible for security in the cloud. AWS is also responsible for the global infrastructure that runs all of the services offered in the AWS Cloud, including the hardware, software, networking, and facilities that run AWS Cloud services3. The customer is responsible for the guest operating system, including updates and security patches, as well as the web application and services developed with Docker4.

A company needs to migrate all of its development teams to a cloud-based integrated development environment (IDE). Which AWS service should the company use?


A. AWS CodeBuild


B. AWS Cloud9


C. AWS OpsWorks


D. AWS Cloud Development Kit (AWS CDK)





B.
  AWS Cloud9

Explanation: The correct answer is B because AWS Cloud9 is an AWS service that enables users to run their existing custom, nonproduction workloads in the AWS Cloud quickly and cost-effectively. AWS Cloud9 is a cloud-based integrated development environment (IDE) that allows users to write, run, and debug code from a web browser. AWS Cloud9 supports multiple programming languages, such as Python, Java, Node.js, and more. AWS Cloud9 also provides users with a terminal that can access AWS services and resources, such as Amazon EC2 instances, AWS Lambda functions, and AWS CloudFormation stacks. The other options are incorrect because they are not AWS services that enable users to run their existing custom, nonproduction workloads in the AWS Cloud quickly and cost-effectively. AWS CodeBuild is an AWS service that enables users to compile, test, and package their code for deployment. AWS OpsWorks is an AWS service that enables users to configure and manage their applications using Chef or Puppet. AWS Cloud Development Kit (AWS CDK) is an AWS service that enables users to define and provision their cloud infrastructure using familiar programming languages, such as TypeScript, Python, Java, and C#. Reference: AWS Cloud9 FAQs

Which feature of the AWS Cloud gives users the ability to pay based on current needs rather than forecasted needs?


A. AWS Budgets


B. Pay-as-you-go pricing


C. Volume discounts


D. Savings Plans





B.
  Pay-as-you-go pricing

Explanation: Pay-as-you-go pricing is the feature of the AWS Cloud that gives users the ability to pay based on current needs rather than forecasted needs. Pay-as-you-go pricing means that users only pay for the AWS services and resources they use, without any upfront or long-term commitments. This allows users to scale up or down their usage depending on their changing business requirements, and avoid paying for idle or unused capacity. Pay-as-you-go pricing also enables users to benefit from the economies of scale and lower costs of AWS as they grow their business5.

A company wants to manage access and permissions for its third-party software as a service (SaaS) applications. The company wants to use a portal where end users can access assigned AWS accounts and AWS Cloud applications. Which AWS service should the company use to meet these requirements?


A. Amazon Cognito


B. AWS IAM Identity Center (AWS Single Sign-On)


C. AWS Identity and Access Management (IAM)


D. AWS Directory Service for Microsoft Active Directory





B.
  AWS IAM Identity Center (AWS Single Sign-On)

Explanation: AWS IAM Identity Center (AWS Single Sign-On) is the AWS service that the company should use to meet the requirements of managing access and permissions for its third-party SaaS applications. AWS Single Sign-On is a cloud-based service that makes it easy to centrally manage single sign-on (SSO) access to multiple AWS accounts and business applications. You can use AWS Single Sign-On to enable your users to sign in to a user portal with their existing corporate credentials and access all of their assigned accounts and applications from one place4.

A company needs to continuously monitor its environment to analyze network and account activity and identify potential security threats. Which AWS service should the company use to meet these requirements?


A. AWS Artifact


B. Amazon Macie


C. AWS Identity and Access Management (IAM)


D. Amazon GuardDuty





D.
  Amazon GuardDuty

Explanation: Amazon GuardDuty is a service that provides intelligent threat detection and continuous monitoring for the AWS environment. It analyzes network and account activity using machine learning and threat intelligence to identify potential security threats, such as unauthorized access, compromised credentials, malicious hosts, and reconnaissance activities. It also generates detailed and actionable findings that can be viewed on the AWS Management Console or sent to other AWS services, such as Amazon CloudWatch Events and AWS Lambda, for further analysis or remediation. Amazon GuardDuty OverviewAWS Certified Cloud Practitioner - aws.amazon.com

A company is reviewing its operating policies. Which policy complies with guidance in the security pillar of the AWS Well-Architected Framework?


A. Ensure that employees have access to all company data.


B. Expand employees' permissions as they gain more experience.


C. Grant all privileges and access to all users.


D. Apply security requirements at all layers of a process.





D.
  Apply security requirements at all layers of a process.

Explanation: Applying security requirements at all layers of a process is a policy that complies with guidance in the security pillar of the AWS Well-Architected Framework. The security pillar of the AWS Well-Architected Framework provides best practices for securing the user’s data and systems in the AWS Cloud. One of the design principles of the security pillar is to apply security at all layers, which means that the user should implement defense-in-depth strategies and avoid relying on a single security mechanism. For example, the user should use multiple security controls, such as encryption, firewalls, identity and access management, and logging and monitoring, to protect their data and resources at different layers.

A company has two AWS accounts in an organization in AWS Organizations for consolidated billing. All of the company's AWS resources are hosted in one AWS Region. Account A has purchased five Amazon EC2 Standard Reserved Instances (RIs) and has four EC2 instances running. Account B has not purchased any RIs and also has four EC2 instances running. Which statement is true regarding pricing for these eight instances?


A. The eight instances will be charged as regular instances.


B. Four instances will be charged as RIs, and four will be charged as regular instances.


C. Five instances will be charged as RIs, and three will be charged as regular instances.


D. The eight instances will be charged as RIs.





B.
  Four instances will be charged as RIs, and four will be charged as regular instances.

Explanation: The statement that is true regarding pricing for these eight instances is: four instances will be charged as RIs, and four will be charged as regular instances. Amazon EC2 Reserved Instances (RIs) are a pricing model that allows users to reserve EC2 instances for a specific term and benefit from discounted hourly rates and capacity reservation. RIs are purchased for a specific AWS Region, and can be shared across multiple accounts in an organization in AWS Organizations for consolidated billing. However, RIs are applied on a first-come, first-served basis, and there is no guarantee that all instances in the organization will be charged at the RI rate. In this case, Account A has purchased five RIs and has four instances running, so all four instances will be charged at the RI rate. Account B has not purchased any RIs and also has four instances running, so all four instances will be charged at the regular rate. The remaining RI in Account A will not be applied to any instance in Account B, and will be wasted.

A company's information security manager is supervising a move to AWS and wants to ensure that AWS best practices are followed. The manager has concerns about the potential misuse of AWS account root user credentials. Which of the following is an AWS best practice for using the AWS account root user credentials?


A. Allow only the manager to use the account root user credentials for normal activities.


B. Use the account root user credentials only for Amazon EC2 instances from the AWS Free Tier.


C. Use the account root user credentials only when they alone must be used to perform a required function.


D. Use the account root user credentials only for the creation of private VPC subnets.





C.
  Use the account root user credentials only when they alone must be used to perform a required function.

Explanation: The AWS best practice for using the AWS account root user credentials is to use them only when they alone must be used to perform a required function. The AWS account root user credentials have full access to all the resources in the account, and therefore pose a security risk if compromised or misused. You should create individual IAM users with the minimum necessary permissions for everyday tasks, and use AWS Organizations to manage multiple accounts. You should also enable multi-factor authentication (MFA) and rotate the password for the root user regularly. Some of the functions that require the root user credentials are changing the account name, closing the account, changing the support plan, and restoring an IAM user’s access.

Which of the following are AWS Cloud design principles? (Select TWO.)


A. Pay for compute resources in advance.


B. Make data-driven decisions to determine cloud architectural design.


C. Emphasize manual processes to allow for changes.


D. Test systems at production scale.


E. Refine operational procedures infrequently.





B.
  Make data-driven decisions to determine cloud architectural design.

D.
  Test systems at production scale.

Explanation: The correct answers are B and D because making data-driven decisions to determine cloud architectural design and testing systems at production scale are AWS Cloud design principles. Making data-driven decisions to determine cloud architectural design means that users should collect and analyze data from their AWS resources and applications to optimize their performance, availability, security, and cost. Testing systems at production scale means that users should simulate real-world scenarios and load conditions to validate the functionality, reliability, and scalability of their systems. The other options are incorrect because they are not AWS Cloud design principles. Paying for compute resources in advance means that users have to invest heavily in data centers and servers before they know how they will use them. This is not a cloud design principle, but rather a traditional IT model. Emphasizing manual processes to allow for changes means that users have to rely on human intervention and coordination to perform operational tasks and updates. This is not a cloud design principle, but rather a source of inefficiency and error. Refining operational procedures infrequently means that users have to stick to the same methods and practices without adapting to the changing needs and feedback. This is not a cloud design principle, but rather a hindrance to innovation and improvement.

A company has a social media platform in which users upload and share photos with other users. The company wants to identify and remove inappropriate photos. The company has no machine learning (ML) scientists and must build this detection capability with no ML expertise. Which AWS service should the company use to build this capability?


A. Amazon SageMaker


B. Amazon Extract


C. Amazon Recognition


D. Amazon Comprehend





C.
  Amazon Recognition

Explanation: Amazon Recognition is the AWS service that the company should use to build the capability of identifying and removing inappropriate photos. Amazon Recognition is a service that uses deep learning technology to analyze images and videos for various purposes, such as face detection, object recognition, text extraction, and content moderation. Amazon Recognition can help users detect unsafe or inappropriate content in images and videos, such as nudity, violence, or drugs, and provide confidence scores for each label. Amazon Recognition does not require any machine learning expertise, and users can easily integrate it with other AWS services.

A newly created IAM user has no IAM policy attached. What will happen when the user logs in and attempts to view the AWS resources in the account?


A. All AWS services will be read-only access by default.


B. Access to all AWS resources will be denied.


C. Access to the AWS billing services will be allowed.


D. Access to AWS resources will be allowed through the AWS CLL





B.
  Access to all AWS resources will be denied.

Explanation: Access to all AWS resources will be denied if a newly created IAM user has no IAM policy attached and logs in and attempts to view the AWS resources in the account. IAM policies are the way to grant permissions to IAM users, groups, and roles to access and manage AWS resources. By default, IAM users have no permissions, unless they are explicitly granted by an IAM policy. Therefore, a newly created IAM user without any IAM policy attached will not be able to view or perform any actions on the AWS resources in the account. Access to the AWS billing services and AWS CLI will also be denied, unless the user has the necessary permissions.

What does the Amazon S3 Intelligent-Tiering storage class offer?


A. Payment flexibility by reserving storage capacity


B. Long-term retention of data by copying the data to an encrypted Amazon Elastic Block Store (Amazon EBS) volume


C. Automatic cost savings by moving objects between tiers based on access pattern changes


D. Secure, durable, and lowest cost storage for data archival





C.
  Automatic cost savings by moving objects between tiers based on access pattern changes

Explanation: The Amazon S3 Intelligent-Tiering storage class offers automatic cost savings by moving objects between tiers based on access pattern changes. This storage class is designed for data with unknown or changing access patterns. It has two access tiers: frequent access and infrequent access. Objects are stored in the frequent access tier by default, and are moved to the infrequent access tier after 30 consecutive days of no access. If an object in the infrequent access tier is accessed, it is moved back to the frequent access tier. There are no retrieval fees in S3 Intelligent-Tiering, and no additional tiering fees when objects are moved between access tiers within the S3 Intelligent-Tiering storage class1.


Page 5 out of 66 Pages
Previous