Logo Passei Direto

Dumps Cafe Amazon Web Services-SAP-C02

Material
Study with thousands of resources!

Text Material Preview

AWS Certified
Solutions Architect -
Professional
Version: Demo
[ Total Questions: 10]
Web: www.dumpscafe.com
Email: support@dumpscafe.com
Amazon Web Services
SAP-C02
https://www.dumpscafe.com
https://www.dumpscafe.com/Braindumps-SAP-C02.html
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any 
suggestions, please feel free to contact us at feedback@dumpscafe.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at and our technical experts will provide support within 24 hours.support@dumpscafe.com
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized 
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Amazon Web Services - SAP-C02Pass Exam
1 of 9Verified Solution - 100% Result
A. 
B. 
C. 
D. 
E. 
A. 
B. 
Category Breakdown
Category Number of Questions
Design Solutions for Organizational Complexity 6
Design for New Solutions 4
TOTAL 10
Question #:1 - [Design Solutions for Organizational Complexity]
A company needs to migrate its on-premises database fleet to Amazon RDS. The company is currently using 
a mixture of Microsoft SQL Server, and Oracle databases. Some of the databases have custom schemas and 
stored procedures.
Which combination of steps should the company take for the migration? (Select TWO.)
Use Migration Evaluator Quick Insights to analyze the source databases and to identify the stored 
procedures that need to be migrated.
Use AWS Application Migration Service to analyze the source databases and to identify the stored 
procedures that need to be migrated.
Use AWS SCT to analyze the source databases for changes that are required.
Use AWS DM5 to migrate the source databases to Amazon RD5.
Use AWS DataSync to migrate the data from the source databases to Amazon RDS.
Answer: C
Question #:2 - [Design for New Solutions]
A company's solutions architect is reviewing a web application that runs on AWS. The application references 
static assets in an Amazon S3 bucket in the us-east-1 Region. The company needs resiliency across multiple 
AWS Regions. The company already has created an S3 bucket in a second Region.
Which solution will meet these requirements with the LEAST operational overhead?
Configure the application to write each object to both S3 buckets. Set up an Amazon Route 53 public 
hosted zone with a record set by using a weighted routing policy for each S3 bucket. Configure the 
application to reference the objects by using the Route 53 DNS name.
Create an AWS Lambda function to copy objects from the S3 bucket in us-east-1 to the S3 bucket in the 
second Region. Invoke the Lambda function each time an object is written to the S3 bucket in us-east-1. 
Set up an Amazon CloudFront distribution with an origin group that contains the two S3 buckets as 
origins.
Amazon Web Services - SAP-C02Pass Exam
2 of 9Verified Solution - 100% Result
C. 
D. 
A. 
B. 
C. 
D. 
Configure replication on the S3 bucket in us-east-1 to replicate objects to the S3 bucket in the second 
Region Set up an Amazon CloudFront distribution with an origin group that contains the two S3 
buckets as origins.
Configure replication on the S3 bucket in us-east-1 to replicate objects to the S3 bucket in the second 
Region. If failover is required, update the application code to load S3 objects from the S3 bucket in the 
second Region.
Answer: C
Explanation
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/high_availability_origin_failover.
html
Question #:3 - [Design Solutions for Organizational Complexity]
A company is building a solution in the AWS Cloud. Thousands or devices will connect to the solution and 
send data. Each device needs to be able to send and receive data in real time over the MQTT protocol. Each 
device must authenticate by using a unique X.509 certificate.
Which solution will meet these requirements with the LEAST operational overhead?
Set up AWS loT Core. For each device, create a corresponding Amazon MQ queue and provision a 
certificate. Connect each device to Amazon MQ.
Create a Network Load Balancer (NLB) and configure it with an AWS Lambda authorizer. Run an 
MQTT broker on Amazon EC2 instances in an Auto Scaling group. Set the Auto Scaling group as the 
target for the NLB. Connect each device to the NLB.
Set up AWS loT Core. For each device, create a corresponding AWS loT thing and provision a 
certificate. Connect each device to AWS loT Core.
Set up an Amazon API Gateway HTTP API and a Network Load Balancer (NLB). Create integration 
between API Gateway and the NLB. Configure a mutual TLS certificate authorizer on the HTTP API. 
Run an MQTT broker on an Amazon EC2 instance that the NLB targets. Connect each device to the 
NLB.
Answer: C
Explanation
This solution requires minimal operational overhead, as it only requires setting up AWS IoT Core and 
creating a thing for each device. (Reference: AWS Certified Solutions Architect - Professional Official 
Amazon Text Book, Page 537)
AWS IoT Core is a fully managed service that enables secure, bi-directional communication between internet-
connected devices and the AWS Cloud. It supports the MQTT protocol and includes built-in device 
Amazon Web Services - SAP-C02Pass Exam
3 of 9Verified Solution - 100% Result
A. 
B. 
C. 
D. 
authentication and access control. By using AWS IoT Core, the company can easily provision and manage the 
X.509 certificates for each device, and connect the devices to the service with minimal operational overhead.
Question #:4 - [Design Solutions for Organizational Complexity]
A company is designing its network configuration in the AWS Cloud. The company uses AWS Organizations 
to manage a multi-account setup. The company has three OUs. Each OU contains more than 100 AWS 
accounts. Each account has a single VPC, and all the VPCs in each OU are in the same AWS Region.
The CIDR ranges for all the AWS accounts do not overlap. The company needs to implement a solution in 
which VPCs in the same OU can communicate with each other but cannot communicatewith VPCs in other 
OUs.
Which solution will meet these requirements with the LEAST operational overhead?
Create an AWS CloudFormation stack set that establishes VPC peering between accounts in each OU. 
Provision the stack set in each OU.
In each OU, create a dedicated networking account that has a single VPC. Share this VPC with all the 
other accounts in the OU by using AWS Resource Access Manager (AWS RAM). Create a VPC 
peering connection between the networking account and each account in the OU.
Provision a transit gateway in an account in each OU. Share the transit gateway across the organization 
by using AWS Resource Access Manager (AWS RAM). Create transit gateway VPC attachments for 
each VPC.
In each OU, create a dedicated networking account that has a single VPC. Establish a VPN connection 
between the networking account and the other accounts in the OU. Use third-party routing software to 
route transitive traffic between the VPCs.
Answer: C
Explanation
Comprehensive and Detailed in Depth Explanation:
C is correct because AWS Transit Gateway is the most scalable and efficient way to interconnect hundreds of 
VPCs. By deploying one transit gateway per OU and sharing it with AWS RAM, each OU can isolate its 
network traffic and maintain internal communication without affecting or exposing other OUs.
References:
AWS Transit Gateway Best Practices
Using RAM with Transit Gateway
Question #:5 - [Design Solutions for Organizational Complexity]
Amazon Web Services - SAP-C02Pass Exam
4 of 9Verified Solution - 100% Result
A. 
B. 
C. 
D. 
A company's public API runs as tasks on Amazon Elastic Container Service (Amazon ECS). The tasksrun on 
AWS Fargate behind an Application Load Balancer (ALB) and are configured with Service Auto Scaling for 
the tasks based on CPU utilization. This service has been running well for several months.
Recently, API performance slowed down and made the application unusable. The company discovered that a 
significant number of SQL injection attacks had occurred against the API and that the API service had scaled 
to its maximum amount.
A solutions architect needs to implement a solution that prevents SQL injection attacks from reaching the 
ECS API service. The solution must allow legitimate traffic through and must maximize operational 
efficiency.
Which solution meets these requirements?
Create a new AWS WAF web ACL to monitor the HTTP requests and HTTPS requests that are 
forwarded to the ALB in front of the ECS tasks.
Create a new AWS WAF Bot Control implementation. Add a rule in the AWS WAF Bot Control 
managed rule group to monitor traffic and allow only legitimate traffic to the ALB in front of the ECS 
tasks.
Create a new AWS WAF web ACL. Add a new rule that blocks requests that match the SQL database 
rule group. Set the web ACL to allow all other traffic that does not match those rules. Attach the web 
ACL to the ALB in front of the ECS tasks.
Create a new AWS WAF web ACL. Create a new empty IP set in AWS WAF. Add a new rule to the 
web ACL to block requests that originate from IP addresses in the new IP set. Create an AWS Lambda 
function that scrapes the API logs for IP addresses that send SQL injection attacks, and add those IP 
addresses to the IP set. Attach the web ACL to the ALB in front of the ECS tasks.
Answer: C
Explanation
The company should create a new AWS WAF web ACL. The company should add a new rule that blocks 
requests that match the SQL database rule group. The company should set the web ACL to allow all other 
traffic that does not match those rules. The company should attach the web ACL to the ALB in front of the 
ECS tasks. This solution will meet the requirements because AWS WAF is a web application firewall that lets 
you monitor and control web requests that are forwarded to your web applications. You can use AWS WAF 
to define customizable web security rules that control which traffic can access your web applications and 
which traffic should be blocked1. By creating a new AWS WAF web ACL, the company can create a 
collection of rules that define the conditions for allowing or blocking web requests. By adding a new rule that 
blocks requests that match the SQL database rule group, the company can prevent SQL injection attacks from 
reaching the ECS API service. The SQL database rule group is a managed rule group provided by AWS that 
contains rules to protect against common SQL injection attack patterns2. By setting the web ACL to allow all 
other traffic that does not match those rules, the company can ensure that legitimate traffic can access the API 
service. By attaching the web ACL to the ALB in front of the ECS tasks, the company can apply the web 
security rules to all requests that are forwarded by the load balancer.
The other options are not correct because:
Amazon Web Services - SAP-C02Pass Exam
5 of 9Verified Solution - 100% Result
A. 
B. 
C. 
D. 
Creating a new AWS WAF Bot Control implementation would not prevent SQL injection attacks from 
reaching the ECS API service. AWS WAF Bot Control is a feature that gives you visibility and control over 
common and pervasive bot traffic that can consume excess resources, skew metrics, cause downtime, or 
perform other undesired activities. However, it does not protect against SQL injection attacks, which are 
malicious attempts to execute unauthorized SQL statements against your database3.
Creating a new AWS WAF web ACL to monitor the HTTP requests and HTTPS requests that are forwarded 
to the ALB in front of the ECS tasks would not prevent SQL injection attacks from reaching the ECS API 
service. Monitoring mode is a feature that enables you to evaluate how your rules would perform without 
actually blocking any requests. However, this mode does not provide any protection against attacks, as it only 
logs and counts requests that match your rules4.
Creating a new AWS WAF web ACL and creating a new empty IP set in AWS WAF would not prevent SQL 
injection attacks from reaching the ECS API service. An IP set is a feature that enables you to specify a list of 
IP addresses or CIDR blocks that you want to allow or block based on their source IP address. However, this 
approach would not be effective or efficient against SQL injection attacks, as it would require constantly 
updating the IP set with new IP addresses of attackers, and it would not block attackers who use proxies or 
VPNs.
References:
https://aws.amazon.com/waf/
https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list.html#sql-injection-rule-
group
https://docs.aws.amazon.com/waf/latest/developerguide/waf-bot-control.html
https://docs.aws.amazon.com/waf/latest/developerguide/web-acl-monitoring-mode.html
https://docs.aws.amazon.com/waf/latest/developerguide/waf-ip-sets.html
Question #:6 - [Design for New Solutions]
A company runs AWS workloads that are integrated with software as a service (SaaS) applications. The 
company needs to analyze the SaaS applications to identify unused licenses. Which solution will meet this 
requirement with the LEAST operational overhead?
Use AWS License Manager automated discovery to retrieve audit logs from the SaaS applications. Use 
Amazon Athena to analyze the data and to identify unused SaaS licenses.
Create an AWS Lambda function to retrieve audit logs from the SaaS applications and to store the data 
in Amazon S3. Use Amazon EMR to analyze the data and to identify unused SaaS licenses.
Use AWS AppFabric to ingest audit logs from the SaaS applications into Amazon S3. Use Amazon 
Athena to analyze the data and to identify unused SaaS licenses.
Use AWS App Runner to ingest audit logs from the SaaS applications into Amazon S3. Use Amazon 
EMR to analyze the data and to identify unused SaaS licenses.
Amazon Web Services - SAP-C02Pass Exam
6 of 9Verified Solution - 100% Result
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
Answer: C
Question #:7 - [Design Solutions for Organizational Complexity]
A company has a website that serves many visitors. The company deploys a backend service for the website 
in a primary AWS Region and a disaster recovery (DR) Region.
A single Amazon CloudFront distribution is deployed for the website. The company creates an Amazon Route 
53 record set with health checks and a failover routing policy for the primary Region's backend service. The 
company configures the Route 53 record set as an origin for the CloudFront distribution. The company 
configures another record set that points to the backend service's endpoint in the DR Region as a secondary 
failover record type. The TTL for both record sets is 60 seconds.
Currently, failover takes more than 1 minute. A solutions architect must design a solution that will provide the 
fastest failover time.
Which solution will achieve this goal?
Deploy an additional CloudFront distribution. Create a new Route 53 failover record set with health 
checks for both CloudFront distributions.
Set the TTL to 1 second for the existing Route 53 record sets that are used for the backend service in 
each Region.
Create new record sets for the backend services by using a latency routing policy. Use the record sets as 
an origin in the CloudFront distribution.
Create a CloudFront origin group that includes two origins, one for each backend service Region. 
Configure origin failover as a cache behavior for the CloudFront distribution.
Answer: D
Question #:8 - [Design for New Solutions]
Question:
A company is replicating an application in asecondary Region. The application usesDynamoDBandRDS for 
MySQL. The secondary Region must function independently during adisaster.
Use DynamoDBglobal tables and an RDS read replica.
Use DAX and a read replica.
Use global tables and RDS Multi-AZ with standby in secondary Region.
Use Streams and Lambda to copy data. Use read replica.
Amazon Web Services - SAP-C02Pass Exam
7 of 9Verified Solution - 100% Result
A. 
B. 
C. 
D. 
Answer: A
Explanation
A is correct because:
DynamoDB global tablesallow for multi-Region, active-active usage.
RDS MySQL read replicain another Region supports read workloads and can bepromotedduring disaster to 
act as a standalone DB.
B is incorrect: DAX is a cache, not a replication mechanism.
C is wrong because Multi-AZ doesn’t span Regions.
D is more manual and error-prone.
Reference:https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/GlobalTables.
htmlhttps://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_ReadRepl.html
Question #:9 - [Design Solutions for Organizational Complexity]
A company wants to use AWS IAM Identity Center (AWS Single Sign-On) to manage employee access to 
AWS services. The company uses AWS Organizations to manage its AWS accounts.
Each employee has their own IAM user. Each IAM user is a member of at least one IAM group. Each IAM 
group has an attached policy that allows members to assume
specific roles across the accounts. The roles contain appropriate policies for the expected activities of each 
group of users in each account. All relevant accounts exist inside a single OU.
The company has already created new users and groups in IAM Identity Center to match the permissions that 
exist in IAM.
How should the company use IAM Identity Center to implement the existing permissions?
For each group, create policies in each account. Give the policies the same name in each account. 
Create a new permission set. Add the name of the newpolicies to the permission set. Assign user access 
to the AWS accounts in IAM Identity Center.
For each group, create a new permission set. Attach the relevant existing IAM roles in each account to 
the permission set. Create a new customer managedpolicy that allows the group to assume the roles. 
Assign user access to the AWS accounts in IAM Identity Center.
For each group, create a new permission set. Create policies in each account. Give each policy a unique 
name. Set the path of each policy to match thename of the permission set. Assign user access to the 
AWS accounts in IAM Identity Center.
Add the OU to the accounts configuration in IAM Identity Center. For each group, create policies in 
each account. Create a new permission set. Add the newpolicies to the permission set as customer 
Amazon Web Services - SAP-C02Pass Exam
8 of 9Verified Solution - 100% Result
A. 
B. 
C. 
D. 
managed policies. Attach each new policy to the correct account in the account configuration in IAM 
IdentityCenter.
Answer: B
Explanation
The correct answer is B. This option uses IAM Identity Center to create permission sets that map to the 
existing IAM roles in each account. This way, the company can leverage the existing policies and roles that 
are already configured for the expected activities of each group of users in each account. The company also 
needs to create a customer managed policy that allows the group to assume the roles and attach it to 
thepermission set. This policy grants the necessary permissions for IAM Identity Center to assume the roles 
on behalf of the users. Finally, the company can assign user access to the AWS accounts in IAM Identity 
Center, which will automatically create IAM users and groups in each account based on the permission sets.
Option A is incorrect because it requires creating new policies in each account and giving them the same 
name. This is not necessary and adds complexity and overhead. The company can use the existing IAM roles 
and policies that are already configured for each account.
Option C is incorrect because it requires creating new policies in each account and giving them unique names. 
This is also not necessary and adds complexity and overhead. The company can use the existing IAM roles 
and policies that are already configured for each account.
Option D is incorrect because it requires adding the OU to the accounts configuration in IAM Identity Center. 
This is not supported by IAM Identity Center, which only allows adding individual accounts or all accounts in 
an organization.
Reference: AWS Single Sign-On Permission Sets
Question #:10 - [Design for New Solutions]
A company is running a three-tier web application in an on-premises data center. The frontend is a PHP 
application that is served by an Apache web server. The middle tier is a monolithic Java SE application. The 
storage tier is a 60 TB PostgreSQL database.
The three-tier web application recently crashed and became unresponsive. The database also reached capacity 
because of read operations. The company wants to migrate to AWS to resolve these issues and improve 
scalability,
Which combination of steps will meet these requirements with the LEAST development effort? (Select 
THREE.)
Configure an Auto Scaling group of Amazon EC2 instances behind an Application Load Balancer to 
host the web server. Use Amazon EFS for the frontend static assets.
Host the static single-page application on Amazon S3. Use an Amazon CloudFront distribution to serve 
the application.
Create a Docker container to run the Java SE application. Use AWS Fargate to host the container.
Amazon Web Services - SAP-C02Pass Exam
9 of 9Verified Solution - 100% Result
D. 
E. 
F. 
Create an AWS Elastic Beanstalk environment for Java to host the Java SE application.
Migrate the PostgreSQL database to an Amazon EC2 instance that is larger than the on-
premisesPostgreSQL database.
Use AWS DMS to replatform the PostgreSQL database to an Amazon Aurora PostgreSQL database. 
Use Aurora Auto Scaling for read replicas.
Answer: A D F
About dumpscafe.com
dumpscafe.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam 
Questions, Study Guides, Practice Tests.
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially 
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
View list of all certification exams: All vendors
 
 
 
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses 
listed below.
Sales: sales@dumpscafe.com
Feedback: feedback@dumpscafe.com
Support: support@dumpscafe.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24 
hours.
https://www.dumpscafe.com
https://www.dumpscafe.com/allproducts.html
https://www.dumpscafe.com/Microsoft-exams.html
https://www.dumpscafe.com/Cisco-exams.html
https://www.dumpscafe.com/Citrix-exams.html
https://www.dumpscafe.com/CompTIA-exams.html
https://www.dumpscafe.com/EMC-exams.html
https://www.dumpscafe.com/ISC-exams.html
https://www.dumpscafe.com/Checkpoint-exams.html
https://www.dumpscafe.com/Juniper-exams.html
https://www.dumpscafe.com/Apple-exams.html
https://www.dumpscafe.com/Oracle-exams.html
https://www.dumpscafe.com/Symantec-exams.html
https://www.dumpscafe.com/VMware-exams.html
mailto:sales@dumpscafe.com
mailto:feedback@dumpscafe.com
mailto:support@dumpscafe.com