Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

SOA-C01 Amazon Web Services AWS Certified SysOps Administrator - Associate Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Amazon Web Services SOA-C01 AWS Certified SysOps Administrator - Associate certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 4
Total 263 questions

A popular auctioning platform requires near-real-time access to dynamic bidding information. The platform must be available at all times The current Amazon RDS instance often reaches 100% CPU utilization during the weekend auction and can no longer be resized. To improve application performance, a sysops administrator is evaluating Amazon ElastiCache and has chosen Redis (cluster mode enabled) instead of Memcached

What are reasons for making this choice? (Select TWO.)

A.

Data partitioning

B.

Multi-threaded processing

C.

Multi-AZ with automatic failover

D.

Multi-region with automatic failover

E.

Online resharding

A SysOps Administrator must remove public IP addresses from all Amazon EC2 Instances to prevent exposure to the internet. However, many corporate applications running on those EC2 instances need to access Amazon S3 buckets. The administrator is tasked with allowing the EC2 instances to continue to access the S3 buckets.

Which solutions can be used? (Select Two).

A.

Deploy a NAT Gateway and configure the route tables according in the VPC where the EC2 instances are running.

B.

Modify the network ACLs with the private IP addresses in the routes to connect to Amazon S3.

C.

Modify the security groups on the EC2 instances with private IP addresses in the routes to connect to Amazon S3.

D.

Set up AWS Direct connect and configure a virtual interface between the EC2 instances and the S3 buckets.

E.

Set up VPC endpoint in the VPC where the EC2 instances are running and configure the routes tables accordingly.

A company uses multiple accounts for its applications. Account A manages the company’s Amazon Route 53 domains and hosted zones. Account B uses a load balancer fronting the company’s web servers.

How can the company use Route 53 to point to the load balancer in the MOST cost-effective and efficient manner?

A.

Create an Amazon EC2 proxy in Account A that forwards requests to Account B.

B.

Create a load balancer in Account A that points to the load balancer in Account B.

C.

Create a CNAME record in Account A pointing to an alias record to the load balancer in Account B.

D.

Create an alias record in Account A pointing to the load balancer in Account B.

A company runs a web application that users access using the domain name www example com The company manages the domain name using Amazon Route 53 The company created an Amazon CloudFront distribution in front of the application and would like www example com to access the application through CloudFront

What is the MOST cost-effective way to achieve this?

A.

Create a CNAME record in Amazon Route 53 that points to the CloudFront distribution URL

B.

Create an ALIAS record in Amazon Route 53 that points to the CloudFront distribution URL

C.

Creole an A record in Amazon Route 53 that points to the public IP address of the web application

D.

Create a PTR record in Amazon Route 53 that points to the public IP address of the web application

A company is concerned about a security vulnerability impacting its Linux operating system.

What should the SysOps Administrator do to alleviate this concern?

A.

Patch the vulnerability with Amazon Inspector.

B.

Provide an AWS Trusted Advisor report showing which Amazon EC2 instances have been patched.

C.

Redeploy the Amazon EC2 instances using AWS CloudFormation.

D.

Patch the Linux operating system using AWS Systems Manager.

A SysOps Administrator needs to create a replica of a company’s existing AWS infrastructure in a new AWS account. Currently, an AWS Service Catalog portfolio is used to create and manage resources.

What is the MOST efficient way to accomplish this?

A.

Create an AWS CloudFormation template to use the AWS Service Catalog portfolio in the new AWS account.

B.

Manually create an AWS Service Catalog portfolio in the new AWS account that duplicates the original portfolio.

C.

Run an AWS Lambda function to create a new AWS Service Catalog portfolio based on the output of the DescribePortfolio API operation.

D.

Share the AWS Service Catalog portfolio with the other AWS accounts and import the portfolio into the other AWS accounts.

A SysOps Administrator is trying to set up an Amazon Route 53 domain namo to route traffic to a website hosted on Amazon S3 The domain name of the website is www anycompany com and the S3 bucket name is anycompany-static After the record set is set up in Route 53, the domain name www anycompany com does not seem to work, and the static website is not displayed in the browser

Which of the following is a cause of this?

A.

The S3 bucket must be configured with Amazon CloudFront first.

B.

The Route 53 record set must have an IAM role that allows access to the S3 bucket

C.

The Route 53 record set must be in the same region as the S3 bucket

D.

The S3 bucket name must match the record sot name in Route 53.

A SysOps Administrator is deploying an Amazon EC2 instance and is using third-party VPN software to route traffic to an on-premises data center Based on the shared responsibility model AWS is responsible for managing which element of this deployment?

A.

Configuring IPsec tunnels for the VPN

B.

Ensuring high availability of the EC2 instance

C.

Ensuring high availability of the VPN connection

D.

Managing the health of the underlying EC2 host

A sysops administrator must monitor a fleet of Amazon EC2 Linux instances with the constraint that no agents be installed. The sysops administrator chooses Amazon CloudWatch as the monitoring tool.

Which metric can be measured given the constraints? (Select Three)

A.

CPU Utilization

B.

Disk Read Operations

C.

Memory Utilization

D.

Network Packets In

E.

Network Packets Dropped

F.

CPU Ready Time

A security audit revealed that the security groups in a VPC have ports 22 and 3389 open to all. introducing a possible threat that instances can be stopped or configurations can be modified. A SysOps administrator needs to automate remediation.

What should the administrator do to meet these requirements?

A.

Create an 1AM managed policy lo deny access to ports 22 and 3389 on any security groups in a VPC.

B.

Define an AWS Config rule and remediation action with AWS Systems Manager automation documents.

C.

Enable AWS Trusted Advisor to remediate public port access.

D.

Use AWS Systems Manager configuration compliance to remediate public port access.

A company developed and now runs a memory-intensive application on multiple Amazon EC2 Linux instances. The memory utilization metrics of the EC2 Linux instances must be monitored every minute.

How should the SysOps Administrator publish the memory metrics? (Choose two.)

A.

Enable detailed monitoring on the instance within Amazon CloudWatch

B.

Publish the memory metrics to Amazon CloudWatch Events

C.

Publish the memory metrics using the Amazon CloudWatch agent

D.

Publish the memory metrics using Amazon CloudWatch Logs

E.

Set metrics_collection_interval to 60 seconds

A SysOps administrator is evaluating Amazon Route 53 DNS options to address concerns about high availability tor an on-premises website. The website consists of two servers: a primary active server and a secondary passive server. Route 53 should route traffic to the primary server if the associated health check returns 2xx or 3xx HTTP codes. AH other traffic should be directed to the secondary passive server. The failover record type, set ID, and routing policy have been set appropriately for both primary and secondary servers.

Which next step should be taken to configure Route 53?

A.

Create an A record for each server. Associate the records with the Route 53 HTTP health check.

B.

Create an A record for each server. Associate the records with the Route 53 TCP health check.

C.

Create an alias record for each server with evaluate target health set to yes. Associate the records with the Route 53 HTTP health check.

D.

Create an alias record for each server with evaluate target health set to yes. Associate the records with the Route 53 TCP health check.

Which type routing protocol operates by exchanging the entire routing information?

A.

exterior gateway protocols

B.

link-state protocols

C.

distance-vector protocols

D.

Path-vector protocols

A company requires that all access from on-premises applications to AWS services go over its AWS Direct Connect connection rather than the public internet. How would a SysOps Administrator implement this requirement?

A.

Implement an IAM policy that uses the aws:sourceConnection condition to allow access from the AWS Direct Connect connection ID only

B.

Set up a public virtual interface on the AWS Direct Connect connection

C.

Configure AWS Shield to protect the AWS Management Console from being accessed by IP addresses other than those within the data center ranges

D.

Update all the VPC network ACLs to allow access from the data center IP ranges

A medical imaging company needs lo process large amounts of imaging data in real time using a specific instance type. The company wants to guarantee sufficient resource capacity for 1 year

Which action will meet these requirements in the MOST cost-effective manner?

A.

Create 1-year On-Demand Capacity Reservations in the specific Availability Zones

B.

Launch Amazon EC2 instances with termination protection enabled

C.

Purchase 1 -year Reserved Instances in the specific Availability Zones

D.

Use a Spot Fleet across multiple Availability Zones

A local agency plans to deploy 500 Raspberry Pi devices throughout a city. All the devices need to be managed centrally and their configurations need to be consistent. What is the BEST service for managing these devices?

A.

AWS Config

B.

AWS Systems Manager

C.

Amazon inspector

D.

AWS Service Catalog

A company has centralized all its logs into one Amazon CloudWatch Logs log group. The SysOps Administrator is to alert different teams of any issues relevant to them.

What is the MOST efficient approach to accomplish this?

A.

Write a AWS lambda function that will query the logs every minute and contain the logic of which team to notify on which patterns and issues.

B.

Set up different metric filters for each team based on patterns and alerts. Each alarm will notify the appropriate notification list.

C.

Redesign the aggregation of logs so that each team’s relevant parts are sent to a separate log group, then subscribe each team to its respective log group.

D.

Create an AWS Auto Scaling group of Amazon EC2 instances that will scale based on the amount of ingested log entries. This group will pull streams, look for patterns, and send notifications to relevant teams.

A SysOps administrator maintains several Amazon EC2 instances that do not have access to the public internet. To patch operating systems, the instances should not be reachable from the Public internet.

The administrator deploys a NAT instance, updates the security groups, and configures the appropriate routes within the route table. However, the instances are still unable to reach the internet.

What should be done to resolve the issue?

A.

Assign elastic IP addresses to the instances and create a route from the private subnets to the internet gateway.

B.

Delete the NAT instance and replace it with AWS WAF.

C.

Disable source/destination checks on the NAT instance.

D.

Start/Stop the NAT instance so it is launched on a different host.

A company hosts a multi-tier ecommerce web application on AWS, and has recently been alerted to suspicious application traffic The architecture consists of Amazon EC2 instances deployed across multiple Availability Zones behind an Application Load Balancer (ALB) After examining the server logs, a sysops administrator determines that the suspicious traffic is an attempted SQL injection attack.

What should the sysops administrator do to prevent similar attacks?

A.

Install Amazon Inspector on the EC2 instances and configure a rules package Use the findings reports to identify and block SQL injection attacks.

B.

Modify the security group of the ALB Use the IP addresses from the logs to block the IP addresses where SQL injection originated.

C.

Create an AWS WAF web ACL in front of the ALB. Add an SQL injection rule to the web ACL Associate the web ACL to the ALB

D.

Enable Amazon GuardDuty in the AWS Region Use Amazon CloudWatch Events to trigger an AWS Lambda function response every time an SQL injection finding is discovered

An organization created an Amazon Elastic File System (Amazon EFS) volume with a file system ID of fs-85ba41fc, and it is actively used by 10 Amazon EC2 hosts. The organization has become concerned that the file system is not encrypted?

How can this be resolved?

A.

Enable encryption on each host’s connection to the Amazon EFS volume. Each connection must be recreated for encryption to take effect.

B.

Enable encryption on the existing EFS volume by using the AWS command line interface.

C.

Enable encryption on each host’s local drive. Restart each host to encrypt the drive.

D.

Enable encryption on a newly created volume and copy all data from the original volume. Reconnect each hosts to the new volume.

Page: 1 / 4
Total 263 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved