A DevOps Engineer is designing a deployment strategy for a web application. The application will use an Auto Scaling group
to launch Amazon EC2 instances using an AMI. The same infrastructure will be deployed in multiple environments
(development, test, and quality assurance). The deployment strategy should meet the following requirements:
Minimize the startup time for the instance
Allow the same AMI to work in multiple environments
Store secrets for multiple environments securelyHow should this be accomplished?
B
You are getting a lot of empty receive requests when using Amazon SQS. This is making a lot of unnecessary network load
on your instances. What can you do to reduce this load?
B
Explanation:
One benefit of long polling with Amazon SQS is the reduction of the number of empty responses, when there are no
messages available to return, in reply to a ReceiveMessage request sent to an Amazon SQS queue. Long polling allows the
Amazon SQS service to wait until a message is available in the queue before sending a response.
Reference:
http://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-longpolling.html
A DevOps team manages an API running on-premises that serves as a backend for an Amazon API Gateway endpoint.
Customers have been complaining about high response latencies, which the development team has verified using the API
Gateway latency metrics in Amazon CloudWatch. To identify the cause, the team needs to collect relevant data without
introducing additional latency. Which actions should be taken to accomplish this? (Choose two.)
C E
Which one of the following is a restriction of AWS EBS Snapshots?
C
Explanation:
Shapshots shared with other users are usable in full by the recipient, including but limited to the ability to base modified
volumes and snapshots.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-modifying-snapshotpermissions.html
A Development team is building more than 40 applications. Each app is a three-tiered web application based on an ELB
Application Load Balancer, Amazon EC2, and Amazon RDS. Because the applications will be used internally, the Security
team wants to allow access to the 40 applications only from the corporate network and block access from external IP
addresses. The corporate network reaches the internet through proxy servers. The proxy servers have 12 proxy IP
addresses that are being changed one or two times per month. The Network Infrastructure team manages the proxy servers;
they upload the file that contains the latest proxy IP addresses into an Amazon S3 bucket. The DevOps Engineer must build
a solution to ensure that the applications are accessible from the corporate network.
Which solution achieves these requirements with MINIMAL impact to application development, MINIMAL operational effort,
and the LOWEST infrastructure cost?
A
A DevOps Engineer is using AWS CodeDeploy across a fleet of Amazon EC2 instances in an EC2 Auto Scaling group. The
associated CodeDeploy deployment group, which is integrated with EC2 Auto Scaling, is configured to perform in-place
deployments with CodeDeployDefault.OneAtATime. During an ongoing new deployment, the Engineer discovers that,
although the overall deployment finished successfully, two out of five instances have the previous application revision
deployed. The other three instances have the newest application revision. What is likely causing this issue?
D
Which of the following is NOT an advantage of Docker's content addressable storage model?
A
Explanation:
Docker 1.10 introduced a new content addressable storage model. This is a completely new way to address image and layer
data on disk. Previously, image and layer data was referenced and stored using a randomly generated UUID. In the new
model this is replaced by a secure content hash. The new model improves security, provides a built-in way to avoid ID
collisions, and guarantees data integrity after pull, push, load, and save operations. It also enables better sharing of layers by
allowing many images to freely share their layers even if they did not come from the same build.
Reference: https://docs.docker.com/engine/userguide/storagedriver/imagesandcontainers/#contentaddressable-storage
Your company operates an application consisting of an AWS CloudFormation stack that contains a load balancer, an Auto
Scaling group of web servers, and an Amazon RDS instance. To save time and costs, you update the current test stack
when testing minor changes, and create a new stack for major changes. As part of the testing procedure of your application,
each version needs to be registered once and only once with a Configuration Management Database (CMDB).
What cost-effective solution should you choose to perform this registration?
B
An education company has a Docker-based application running on multiple Amazon EC2 instances in an Amazon ECS
cluster. When deploying a new version of the application, the Developer, pushes a
new image to a private Docker container registry, and then stops and starts all tasks to ensure that they all have the latest
version of the application. The Developer discovers that new tasks are occasionally running with an old image. How can this
issue be prevented?
A
Explanation:
When a new task starts, the Amazon ECS container agent pulls the latest version of the specified image and tag for the
container to use. However, subsequent updates to a repository image are not propagated to already running tasks.
Reference:
https://docs.aws.amazon.com/en_us/AmazonECS/latest/developerguide/task_definition_paramet ers.html
You are running Amazon CloudTrail on an Amazon S3 bucket and look at your most recent log. You notice that the entries
include the ListThings and CreateThings actions and wonder if your devices have been hacked. Based on these entries,
what service would you be concerned may have been hacked?
B
Explanation:
AWS IoT (Internet of Things) is integrated with CloudTrail to capture API calls from the AWS IoT console or from your code
to the AWS IoT APIs. AWS IoT provides secure, bi-directional communication between Internet-connected things (such as
sensors, actuators, embedded devices, or smart appliances) and the AWS cloud. Using the information collected by
CloudTrail, you can determine the request that was made to AWS IoT, the source IP address from which the request was
made, who made the request, when it was made, and so on.
Reference: http://docs.aws.amazon.com/iot/latest/developerguide/monitoring_overview.html#iot-usingcloudtrail