Q: 11
A CloudOps engineer needs to control access to groups of Amazon EC2 instances using AWS Systems
Manager Session Manager. Specific tags on the EC2 instances have already been added.
Which additional actions should the CloudOps engineer take to control access? (Select TWO.)
Options
Discussion
A E, saw a similar question on a practice test. IAM policy (A) for users, with tag-based conditions (E).
A and E tbh, had something like this in a mock. You attach the IAM policy to users (A) and scope it to tagged instances via Condition (E). Attaching a role to the instance (B) just lets SSM connect, doesn't control user access directly. Agree?
A and E imo. You need to attach the policy (A) to the users, and that policy should use resource tags in its Condition (E) to scope SSM access. IAM role on the instance doesn’t restrict who can start sessions. Anybody see a reason B would be needed here?
Option B again? AWS always pushing roles everywhere. I'd pick A and B here since roles control access and policies get attached, but now I'm second-guessing since some exam reports say E is needed instead of B.
Be respectful. No spam.
Q: 12
A company that uses AWS Organizations recently implemented AWS Control Tower. The company
now needs to centralize identity management. A CloudOps engineer must federate AWS IAM
Identity Center with an external SAML 2.0 identity provider (IdP) to centrally manage access to all
AWS accounts and cloud applications.
Which prerequisites must the CloudOps engineer have so that the CloudOps engineer can connect to
the external IdP? (Select TWO.)
Options
Discussion
Its A and B, but does the question mean the centralized access is just for AWS accounts or are cloud apps like Salesforce included? That might change what metadata's needed.
Be respectful. No spam.
Q: 13
A company is migrating a legacy application to AWS. The application runs on EC2 instances across
multiple Availability Zones behind an Application Load Balancer (ALB). The target group routing
algorithm is set to weighted random, and the application requires session affinity (sticky sessions).
After deployment, users report random application errors that were not present before migration,
even though target health checks are passing.
Which solution will meet this requirement?
Options
Discussion
Option A is the way to go. Weighted random doesn't work with sticky sessions, so users can get routed to different EC2s mid-session, causing errors. Least outstanding requests works better with session affinity. Pretty sure that's the fix-let me know if anyone's seen otherwise.
B
If the requirement was about handling unusual traffic spikes instead of session affinity, would option B make sense here? Weighted random is a common trap when sticky sessions are needed.
Be respectful. No spam.
Q: 14
Application A runs on Amazon EC2 instances behind a Network Load Balancer (NLB). The EC2
instances are in an Auto Scaling group and are in the same subnet that is associated with the NLB.
Other applications from an on-premises environment cannot communicate with Application A on
port 8080.
To troubleshoot the issue, a CloudOps engineer analyzes the flow logs. The flow logs include the
following records:
ACCEPT from 192.168.0.13:59003 → 172.31.16.139:8080
REJECT from 172.31.16.139:8080 → 192.168.0.13:59003
What is the reason for the rejected traffic?
Options
Discussion
Option B Had something like this in a mock and picked B because I thought the NLB security group might be blocking on-prem traffic, not realizing it's stateless. Not totally sure though, feel free to correct me.
Nah, it's not B. D is right here. The NACLs are stateless so outbound traffic on the ephemeral port (like 59003) also needs to be allowed, or it'll get rejected on return. Security groups wouldn't cause this REJECT for the response, that's a classic NACL issue in AWS. Anyone else see practice questions with this same trick?
B, NLB security group missing rule for on-prem traffic.
Its D, but if return port was covered in the outbound NACL range this wouldn't happen.
Probably D, nice clear scenario for NACL troubleshooting.
Be respectful. No spam.
Q: 15
A CloudOps engineer creates an AWS CloudFormation template to define an application stack that
can be deployed in multiple AWS Regions. The CloudOps engineer also creates an Amazon
CloudWatch dashboard by using the AWS Management Console. Each deployment of the application
requires its own CloudWatch dashboard.
How can the CloudOps engineer automate the creation of the CloudWatch dashboard each time the
application is deployed?
Options
Discussion
B tbh. CloudFormation can create the dashboard each deploy using the exported JSON. No manual steps.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2