CLF-C02 Practice Test Questions

782 Questions


Topic 1: Exam Pool A

Which database engine is compatible with Amazon RDS?


A. Apache Cassandra


B. MongoDB


C. Neo4j


D. PostgreSQL





D.
  PostgreSQL

Explanation: Amazon RDS supports six database engines: Amazon Aurora, MySQL, MariaDB, PostgreSQL, Oracle, and SQL Server. Apache Cassandra, MongoDB, and Neo4j are not compatible with Amazon RDS. Therefore, the correct answer is D. You can learn more about Amazon RDS and its supported database engines.

Which AWS network services or features allow Cl DR block notation when providing an IP address range? (Select TWO.)


A. Security groups


B. Amazon Machine Image (AMI)


C. Network access control list (network ACL)


D. AWS Budgets


E. Amazon Elastic Block Store (Amazon EBS)





A.
  Security groups

C.
  Network access control list (network ACL)

Explanation: Security groups and network access control lists (network ACLs) are two AWS network services or features that allow CIDR block notation when providing an IP address range. Security groups act as a firewall for associated Amazon EC2 instances, controlling both inbound and outbound traffic at the instance level. Network ACLs act as a firewall for associated subnets, controlling both inbound and outbound traffic at the subnet level. Both security groups and network ACLs use CIDR block notation to specify the IP address ranges that are allowed or denied.

Which option is an advantage of AWS Cloud computing that minimizes variable costs?


A. High availability


B. Economies of scale


C. Global reach


D. Agility





B.
  Economies of scale

Explanation: Economies of scale is the advantage of AWS Cloud computing that minimizes variable costs. Economies of scale refers to the reduction in the cost per unit as the output increases. AWS Cloud computing leverages economies of scale by providing a large pool of shared resources that can be accessed on demand and paid for as needed. AWS Cloud computing also passes the cost savings to the customers by offering lower prices and discounts. For more information, see Economies of Scale and AWS Pricing.

A retail company is migrating its IT infrastructure applications from on premises to the AWS Cloud. Which costs will the company eliminate with this migration? (Select TWO.)


A. Cost of data center operations


B. Cost of application licensing


C. Cost of marketing campaigns


D. Cost of physical server hardware


E. Cost of network management





A.
  Cost of data center operations

D.
  Cost of physical server hardware

Explanation: The costs that the company will eliminate with this migration are the cost of application licensing and the cost of physical server hardware. The cost of application licensing is the fee that the company has to pay to use the software applications on its onpremises servers. The cost of physical server hardware is the expense that the company has to incur to purchase, maintain, and upgrade the servers and related equipment. By migrating to the AWS Cloud, the company can avoid these costs by using the AWS services and resources that are already licensed and managed by AWS.

A user wants to identify any security group that is allowing unrestricted incoming SSH traffic. Which AWS service can be used to accomplish this goal?


A. Amazon Cognito


B. AWS Shield


C. Amazon Macie


D. AWS Trusted Advisor





D.
  AWS Trusted Advisor

Explanation: The correct answer to the question is D because AWS Trusted Advisor is an AWS service that can be used to accomplish the goal of identifying any security group that is allowing unrestricted incoming SSH traffic. AWS Trusted Advisor is a service that provides customers with recommendations that help them follow AWS best practices. Trusted Advisor evaluates the customer’s AWS environment and identifies ways to optimize their AWS infrastructure, improve security and performance, reduce costs, and monitor service quotas. One of the checks that Trusted Advisor performs is the Security Groups - Specific Ports Unrestricted check, which flags security groups that allow unrestricted access to specific ports, such as port 22 for SSH. Customers can use this check to review and modify their security group rules to restrict SSH access to only authorized sources.

A company recently migrated to the AWS Cloud. The company needs to determine whether its newly imported Amazon EC2 instances are the appropriate size and type. Which AWS services can provide this information to the company? {Select TWO.)


A. AWS Auto Scaling


B. AWS Control Tower


C. AWS Trusted Advisor


D. AWS Compute Optimizer


E. Amazon Forecast





C.
  AWS Trusted Advisor

D.
  AWS Compute Optimizer

Explanation: AWS Trusted Advisor and AWS Compute Optimizer are the AWS services that can provide information to the company about whether its newly imported Amazon EC2 instances are the appropriate size and type. AWS Trusted Advisor is an online tool that provides best practices recommendations in five categories: cost optimization, performance, security, fault tolerance, and service limits. AWS Trusted Advisor can help users identify underutilized or idle EC2 instances, and suggest ways to reduce costs and improve performance. AWS Compute Optimizer is a service that analyzes the configuration and utilization metrics of EC2 instances and delivers recommendations for optimal instance types, sizes, and configurations. AWS Compute Optimizer helps users improve performance, reduce costs, and eliminate underutilized resources.

A company wants to establish a security layer in its VPC that will act as a firewall to control subnet traffic. Which AWS service or feature will meet this requirement?


A. Routing tables


B. Network access control lists (network ACLs)


C. Security groups


D. Amazon GuardDuty





C.
  Security groups

Explanation: Security groups are the service or feature that meets the requirement of establishing a security layer in a VPC that will act as a firewall to control subnet traffic. Security groups are stateful firewalls that control the inbound and outbound traffic at the instance level. You can assign one or more security groups to each instance in a VPC, and specify the rules that allow or deny traffic based on the protocol, port, and source or destination. Security groups are associated with network interfaces, and therefore apply to all the instances in the subnets that use those network interfaces. Routing tables are used to direct traffic between subnets and gateways, not to filter traffic. Network ACLs are stateless firewalls that control the inbound and outbound traffic at the subnet level, but they are less granular and more cumbersome to manage than security groups. Amazon GuardDuty is a threat detection service that monitors your AWS account and workloads for malicious or unauthorized activity, not a firewall service.

Which of the following are advantages of moving to the AWS Cloud? (Select TWO.)


A. The ability to turn over the responsibility for all security to AWS.


B. The ability to use the pay-as-you-go model.


C. The ability to have full control over the physical infrastructure.


D. No longer having to guess what capacity will be required.


E. No longer worrying about users access controls.





B.
  The ability to use the pay-as-you-go model.

D.
  No longer having to guess what capacity will be required.

Explanation: The advantages of moving to the AWS Cloud are the ability to use the pay-as-you-go model and no longer having to guess what capacity will be required. The pay-as you- go model allows the user to pay only for the resources they use, without any upfront or long-term commitments. This reduces the cost and risk of over-provisioning or under provisioning resources. No longer having to guess what capacity will be required means that the user can scale their resources up or down according to the demand, without wasting money on idle resources or losing customers due to insufficient capacity4.

Which task is the responsibility of a company that is using Amazon RDS?


A. Provision the underlying infrastructure.


B. Create IAM policies to control administrative access to the service.


C. Install the cables to connect the hardware for compute and storage.


D. Install and patch the RDS operating system.





B.
  Create IAM policies to control administrative access to the service.

Explanation: The correct answer is B because AWS IAM policies can be used to control administrative access to the Amazon RDS service. The other options are incorrect because they are the responsibilities of AWS, not the company that is using Amazon RDS. AWS manages the provisioning, cabling, installation, and patching of the underlying infrastructure for Amazon RDS.

Which AWS features will meet these requirements? (Select TWO.)


A. Security groups


B. Network ACLs


C. S3 bucket policies


D. IAM user policies


E. S3 bucket versioning





C.
  S3 bucket policies

D.
  IAM user policies

Explanation: The correct answers are C and D because S3 bucket policies and IAM user policies are AWS features that will meet the requirements. S3 bucket policies are access policies that can be attached to Amazon S3 buckets to grant or deny permissions to the bucket and the objects it contains. S3 bucket policies can be used to control who has permission to read, write, or delete objects that the company stores in the S3 bucket. IAM user policies are access policies that can be attached to IAM users to grant or deny permissions to AWS resources and actions. IAM user policies can be used to control who has permission to read, write, or delete objects that the company stores in the S3 bucket. The other options are incorrect because they are not AWS features that will meet the requirements. Security groups and network ACLs are AWS features that act as firewalls to control inbound and outbound traffic to and from Amazon EC2 instances and subnets. Security groups and network ACLs do not control who has permission to read, write, or delete objects that the company stores in the S3 bucket. S3 bucket versioning is an AWS feature that enables users to keep multiple versions of the same object in the same bucket. S3 bucket versioning can be used to recover from accidental overwrites or deletions of objects, but it does not control who has permission to read, write, or delete objects that the company stores in the S3 bucket. Reference: Using Bucket Policies and User Policies, Security Groups for Your VPC, Network ACLs, [Using Versioning]

Which AWS service or feature can be used to estimate costs before deployment?


A. AWS Free Tier


B. AWS Pricing Calculator


C. AWS Billing and Cost Management


D. AWS Cost and Usage Report





B.
  AWS Pricing Calculator

Explanation: AWS Pricing Calculator can be used to estimate costs before deployment. AWS Pricing Calculator is a tool that helps the user to compare the cost of AWS services for different use cases and configurations. The user can create estimates for various AWS services, such as Amazon EC2, Amazon S3, Amazon RDS, and more. The user can also adjust the parameters, such as region, instance type, storage size, and duration, to see how they affect the cost. AWS Pricing Calculator provides a detailed breakdown of the estimated cost, as well as a summary of the key drivers of the cost.

An auditor needs to find out whether a specific AWS service is compliant with specific compliance frameworks. Which AWS service will provide this information?


A. AWS Artifact


B. AWS Trusted Advisor


C. Amazon GuardDuty


D. AWS Certificate Manager (ACM)





A.
  AWS Artifact

Explanation: AWS Artifact is the service that will provide the information about whether a specific AWS service is compliant with specific compliance frameworks. AWS Artifact is a self-service portal that allows you to access, review, and download AWS security and compliance reports and agreements. You can use AWS Artifact to verify the compliance status of AWS services across various regions and compliance programs, such as ISO, PCI, SOC, FedRAMP, HIPAA, and more12.


Page 8 out of 66 Pages
Previous