Moving forward, how can the SysOps administrator confirm that the log files have not been modified after being delivered to the S3 bucket?

A company monitors its account activity using AWS CloudTrail. and is concerned that some log files are being tampered with after the logs have been delivered to the account's Amazon S3 bucket. Moving forward, how can the SysOps administrator confirm that the log files have not been modified after being...

February 13, 2025 No Comments READ MORE +

How can this be accomplished?

An errant process is known to use an entire processor and run at 100% A SysOps administrator wants to automate restarting the instance once the problem occurs for more than 2 minutes How can this be accomplished?A . Create an Amazon CloudWatch alarm for the Amazon EC2 instance with basic...

February 11, 2025 No Comments READ MORE +

Which combination of actions should a SysOps administrator take so that the web servers can communicate with the DB instance?

A company website contains a web tier and a database tier on AWS. The web tier consists of Amazon EC2 instances that run in an Auto Scaling group across two Availability Zones. The database tier runs on an Amazon ROS for MySQL Multi-AZ DB instance. The database subnet network ACLs...

February 10, 2025 No Comments READ MORE +

Which action should a SysOps administrator take to improve the performance of the file system?

A company is using Amazon Elastic File System (Amazon EFS) to share a file system among several Amazon EC2 instances. As usage increases, users report that file retrieval from the EFS file system is slower than normal. Which action should a SysOps administrator take to improve the performance of the...

February 10, 2025 No Comments READ MORE +

How should the administrator implement this process?

A SysOps administrator is building a process for sharing Amazon RDS database snapshots between different accounts associated with different business units within the same company. All data must be encrypted at rest. How should the administrator implement this process?A . Write a script to download the encrypted snapshot, decrypt it...

February 10, 2025 No Comments READ MORE +

Which solution will meet this requirement In the MOST operationally efficient manner?

A SysOps administrator must create a solution that automatically shuts down any Amazon EC2 instances that have less than 10% average CPU utilization for 60 minutes or more. Which solution will meet this requirement In the MOST operationally efficient manner?A . Implement a cron job on each EC2 instance to...

February 10, 2025 No Comments READ MORE +

Which of the following must be configured on the Sysops administrator's machine so that kubect1 can communicate with the cluster API server?

A Sysops administrator creates an Amazon Elastic Kubernetes Service (Amazon EKS) cluster that uses AWS Fargate. The cluster is deployed successfully. The Sysops administrator needs to manage the cluster by using the kubect1 command line tool. Which of the following must be configured on the Sysops administrator's machine so that...

February 8, 2025 No Comments READ MORE +

Why would this template fail to deploy?

A SysOps administrator has an AWS CloudFormation template of the company's existing infrastructure in us-west-2. The administrator attempts to use the template to launch a new stack in eu-west-1, but the stack only partially deploys, receives an error message, and then rolls back. Why would this template fail to deploy?...

February 8, 2025 No Comments READ MORE +

What change should be made to alleviate the performance problem?

A SysOps administrator is responsible for a legacy. CPU-heavy application. The application can only be scaled vertically Currently, the application is deployed on a single t2 large Amazon EC2 instance The system is showing 90% CPU usage and significant performance latency after a few minutes What change should be made...

February 7, 2025 No Comments READ MORE +

Which solution will securely share the AMI with the other AWS accounts?

A company's SysOps administrator has created an Amazon EC2 instance with custom software that will be used as a template for all new EC2 instances across multiple AWS accounts. The Amazon Elastic Block Store (Amazon EBS) volumes that are attached to the EC2 instance are encrypted with AWS managed keys....

February 6, 2025 No Comments READ MORE +