AWS Certified Cloud Practitioner

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Lina
L
Lina
Community Contributor
Quizzes Created: 1 | Total Attempts: 500
| Attempts: 500
SettingsSettings
Please wait...
  • 1/255 Questions

    AWS. AWS Shield Advanced provides expanded DDoS attack protection for web applications running on which of the following resources? (Select two)

    • AWS CloudFormation
    • AWS Elastic Beanstalk
    • AWS Global Accelerator
    • Amazon API Gateway
    • Amazon Route 53
Please wait...
About This Quiz

This AWS Certified Cloud Practitioner quiz assesses knowledge on AWS services for security, integration, and business process management. It is designed for individuals preparing for AWS certification, focusing on practical scenarios like geographic content restrictions and system integrations.

AWS Certified Cloud Practitioner - Quiz

Quiz Preview

  • 2. 

    AWS. A customer has created a VPC and a subnet within AWS Cloud. Which of the following statements is correct?

    • Both the Amazon Virtual Private Cloud (Amazon VPC) and the subnet span all of the Availability Zones (AZ) in the Region

    • Both the Amazon Virtual Private Cloud (Amazon VPC) and the subnet span only one Availability Zone (AZ) in the Region

    • An Amazon Virtual Private Cloud (Amazon VPC) spans all of the Availability Zones (AZ) in the Region whereas a subnet spans only one Availability Zone (AZ) in the Region

    • A subnet spans all of the Availability Zones (AZ) in the Region whereas an Amazon Virtual Private Cloud (Amazon VPC) spans only one Availability Zone (AZ) in the Region

    Correct Answer
    A. An Amazon Virtual Private Cloud (Amazon VPC) spans all of the Availability Zones (AZ) in the Region whereas a subnet spans only one Availability Zone (AZ) in the Region
    Explanation
    An Amazon Virtual Private Cloud (Amazon VPC) spans all of the Availability Zones (AZ) in the Region whereas a subnet spans only one Availability Zone (AZ) in the Region
    Amazon Virtual Private Cloud (Amazon VPC) is a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including the selection of your IP address range, creation of subnets, and configuration of route tables and network gateways. An Amazon Virtual Private Cloud (Amazon VPC) spans all of the Availability Zones (AZ) in the Region.
    A subnet is a range of IP addresses within your Amazon Virtual Private Cloud (Amazon VPC). A subnet spans only one Availability Zone (AZ) in the Region.

    Rate this question:

  • 3. 

    AWS. Which of the following statements are CORRECT regarding the AWS VPC service? (Select two)

    • A network access control list (network ACL) can have allow rules only

    • A Security Group can have both allow and deny rules

    • A Network Address Translation instance (NAT instance) is managed by AWS

    • A Security Group can have allow rules only

    • A Network Address Translation gateway (NAT gateway) is managed by AWS

    Correct Answer(s)
    A. A Security Group can have allow rules only
    A. A Network Address Translation gateway (NAT gateway) is managed by AWS
    Explanation
    A Security Group can have allow rules only
    A Network Address Translation gateway (NAT gateway) is managed by AWS
    A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. Security groups act at the instance level, not at the subnet level. You can specify allow rules, but not deny rules. You can specify separate rules for inbound and outbound traffic.

    Rate this question:

  • 4. 

    The ico and iflow share the same database?

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The statement "The ico and iflow share the same database" is true. This means that the ico (Initial Coin Offering) and iflow (a term that could refer to a specific software or system) both use the same database to store and retrieve information. This can be beneficial in terms of data consistency and efficiency, as both entities can access and update the same set of data without the need for duplication or synchronization.

    Rate this question:

  • 5. 

    The SuccessFactors (SFSF) adapter supports which message protocols? Note: There are 3 correct answers to this question.

    • EDI

    • OData

    • SOAP

    • SFTP

    • REST

    • Stateless RFC

    Correct Answer(s)
    A. OData
    A. SOAP
    A. REST
    Explanation
    The SuccessFactors (SFSF) adapter supports the oData, SOAP, and REST message protocols. These protocols allow for the exchange of data between different systems and applications. oData is a protocol that enables the creation and consumption of RESTful APIs, while SOAP is a protocol for exchanging structured information in web services. REST is an architectural style that uses HTTP methods to access and manipulate resources. These protocols provide flexibility and compatibility for integrating SuccessFactors with other systems.

    Rate this question:

  • 6. 

    AWS. Which of the following AWS services allows a database to have flexible schema and supports document data models?

    • Amazon Aurora

    • Amazon DynamoDB

    • Amazon Redshift

    • Amazon Relational Database Service (Amazon RDS)

    Correct Answer
    A. Amazon DynamoDB
    Explanation
    Amazon DynamoDB
    Amazon DynamoDB is a NoSQL database that supports key-value and document data models and enables developers to build modern, serverless applications that can start small and scale globally to support petabytes of data and tens of millions of read and write requests per second.
    Amazon DynamoDB supports both key-value and document data models. This enables Amazon DynamoDB to have a flexible schema, so each row can have any number of columns at any point in time. This allows you to easily adapt the tables as your business requirements change, without having to redefine the table schema as you would in relational databases.

    Rate this question:

  • 7. 

    The ... acts as a central point of information for all interfaces.

    • Software component

    • Enterprise Services Repository (ESR)

    • Imported object

    Correct Answer
    A. Enterprise Services Repository (ESR)
    Explanation
    The Enterprise Services Repository (ESR) is a software component that acts as a central point of information for all interfaces. It stores and manages the definitions of all enterprise services, data types, and message types used in an organization. The ESR allows for the easy sharing and reuse of these definitions across different systems and interfaces. It ensures consistency and standardization in the integration landscape by providing a single source of truth for interface definitions.

    Rate this question:

  • 8. 

    AWS. A company wants to have control over creating and using its own keys for encryption on AWS services. Which of the following can be used for this use-case?

    • Customer managed key (CMK)

    • AWS owned key

    • AWS managed key

    • AWS Secrets Manager

    Correct Answer
    A. Customer managed key (CMK)
    Explanation
    Customer managed key (CMK)
    An AWS KMS key is a logical representation of a cryptographic key. A KMS key contains metadata, such as the key ID, key spec, key usage, creation date, description, and key state. Most importantly, it contains a reference to the key material that is used when you perform cryptographic operations with the KMS key.
    The KMS keys that you create are customer managed keys. Customer managed keys are KMS keys in your AWS account that you create, own, and manage. You have full control over these KMS keys, including establishing and maintaining their key policies, IAM policies, and grants, enabling and disabling them, rotating their cryptographic material, adding tags, creating aliases that refer to the KMS keys, and scheduling the KMS keys for deletion.

    Rate this question:

  • 9. 

    The enterprise service repository whitin the software components versions store detailed information about the ... of a software component

    • External Interfaces

    • Internal Interface

    Correct Answer
    A. External Interfaces
    Explanation
    The enterprise service repository within the software components versions store detailed information about the external interfaces of a software component. This means that the repository contains comprehensive documentation and specifications regarding how the software component interacts with external systems or components. It includes information about the protocols, formats, and methods used for communication with external entities. This allows developers and users to understand and utilize the software component's capabilities when integrating it with other systems or components.

    Rate this question:

  • 10. 

    The JAVA component SLD Data supplier is deployed and started for the SAP Netweaver AS Java Server

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The given statement is true because the SLD (System Landscape Directory) Data supplier component in JAVA is deployed and started for the SAP Netweaver AS (Application Server) Java Server. This means that the SLD Data supplier is functioning and providing data to the SLD, which is a central repository for managing system landscapes in SAP environments.

    Rate this question:

  • 11. 

    AWS.  Which of the following is the MOST cost-effective option to purchase an EC2 Reserved Instance (RI)?

    • No upfront payment option with standard 3-years term

    • No upfront payment option with standard 1-year term

    • Partial upfront payment option with standard 3-years term

    • All upfront payment option with the standard 1-year term

    Correct Answer
    A. Partial upfront payment option with standard 3-years term
    Explanation
    Partial upfront payment option with standard 3-years term
    You can use Amazon EC2 Reserved Instances (RI) to reserve capacity and receive a discount on your instance usage compared to running On-Demand instances. The discounted usage price is reserved for the duration of your contract, allowing you to predict compute costs over the term of the Reserved Instance (RI).
    Please review this pricing comparison for EC2 Reserved Instances (RI): 

    Rate this question:

  • 12. 

    What is a perspective in NWDS

    • A perspective is a visual container for a set of views and editors, generally put together to allow the developer easily implement a specific tupe of development component

    • A perspective is a  set of components that allow developers to specific enable a function in the NWDS  

    • A perspective is a java component that allows to develop a custom function, generally put together to allow the developer easily implement a specific tupe of development component  

    • A perspective is an editor that allow to interact directly with source code  

    Correct Answer
    A. A perspective is a visual container for a set of views and editors, generally put together to allow the developer easily implement a specific tupe of development component
    Explanation
    The correct answer explains that a perspective in NWDS is a visual container that contains a set of views and editors. This container is designed to make it easier for developers to implement a specific type of development component.

    Rate this question:

  • 13. 

    AWS. According to the AWS Shared Responsibility Model, which of the following are responsibilities of the customer for Amazon RDS?

    • Applying patches to the underlying OS

    • Applying patches to the Amazon Relational Database Service (Amazon RDS) database

    • Database encryption

    • Managing the underlying server hardware on which Amazon Relational Database Service (Amazon RDS) runs

    Correct Answer
    A. Database encryption
    Explanation
    The correct answer is 1. Creating a process 2. Creating the process steps, represented by activities 3. Importing the business logic of the process steps (tasks, web services, rules). This sequence of steps follows a top-down approach, starting with the overall process creation, then breaking it down into individual steps, and finally importing the necessary business logic for each step.

    Rate this question:

  • 14. 

    AWS. Who can assist with accelerating the migration of legacy contact center infrastructure to AWS? Choose 2

    • AWS Partner Network consulting partners

    • Enterprise Support

    • AWS Professional Services

    • AWS Managed Services

    • Marketplace

    Correct Answer(s)
    A. AWS Partner Network consulting partners
    A. AWS Professional Services
    Explanation
    SOA architecture, which stands for Service-Oriented Architecture, has been around for more than 10 years. It was introduced as a software design approach in the early 2000s and gained popularity in the following years. This architecture style focuses on creating modular and loosely coupled services that can be easily integrated to build complex applications. Therefore, the correct answer is "More than 10 years ago."

    Rate this question:

  • 15. 

    AWS. Which of the following statements are true about AWS Lambda? (Select two)

    • AWS Lambda allows you to install databases on the underlying serverless Operating System

    • AWS Lambda lets you run code without provisioning or managing servers

    • AWS Lambda provides access to the underlying operating system to control its behavior through code

    • AWS Lambda allows you to orchestrate and manage Docker containers to facilitate complex containerized applications on AWS

    • You pay for the compute time you consume for AWS Lambda

    Correct Answer
    A. AWS Lambda lets you run code without provisioning or managing servers
    Explanation
    The exclusive choice is a decision-making construct that allows for only one option to be selected at a time. This implies that it is a binary decision, where the options are either true or false. The datatype that best represents this binary decision is the Boolean datatype, which consists of the values true and false. Therefore, the correct answer is Boolean.

    Rate this question:

  • 16. 

    AWS. Which service allows you to simplify billing by using a single payment method for all your accounts?

    • AWS Cost Explorer

    • AWS Budgets

    • AWS Managed Services

    • AWS Organizations

    Correct Answer
    A. AWS Cost Explorer
    Explanation
    The correct answer is One. This means that only one ESR (Enterprise Services Repository) can be configured per SAP PI (Process Integration) instance. This implies that each instance can only have one repository for managing and storing service interfaces, mappings, and other artifacts. Multiple instances may be required for additional repositories or for scalability purposes, but each individual instance can only have one ESR.

    Rate this question:

  • 17. 

    AWS. Compared to the on-demand instance prices, what is the highest possible discount offered for spot instances?

    • 75

    • 10

    • 90

    • 50

    Correct Answer
    A. 90
    Explanation
    90
    Amazon EC2 spot instances let you take advantage of unused EC2 capacity in the AWS cloud. Spot instances are available at up to a 90% discount compared to the on-demand instance prices. You can use spot instances for various stateless, fault-tolerant, or flexible applications such as big data, containerized workloads, CI/CD, web servers, high-performance computing (HPC), and other test & development workloads.

    Rate this question:

  • 18. 

    Which element you use to create a UI Mask

    • Web dynpro

    • Rich component

    • Visual Mask

    Correct Answer
    A. Web dynpro
    Explanation
    Web Dynpro is the correct answer for creating a UI Mask. Web Dynpro is a technology used in SAP systems to create user interfaces. It allows developers to create interactive and customizable web applications. With Web Dynpro, developers can easily create UI Masks by defining the layout, controls, and behavior of the user interface components. This technology provides a powerful and flexible way to design and develop user-friendly interfaces for SAP applications.

    Rate this question:

  • 19. 

    Does Parallelism have high memory consumption?

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Parallelism does have high memory consumption because it involves executing multiple tasks simultaneously, which requires allocating memory for each task. This can lead to increased memory usage compared to sequential execution where only one task is executed at a time.

    Rate this question:

  • 20. 

    Which role is used to enable the user to work on tasks and to execute tasks

    • Com.sap-bpem.enduser

    • Com.sap-bpm.enduser

    • Com.enduser

    Correct Answer
    A. Com.sap-bpem.enduser
    Explanation
    The correct answer is com.sap-bpem.enduser. This role is used to enable the user to work on tasks and execute tasks in the SAP Business Process Execution Management (BPEM) system. It provides the necessary permissions and access rights for the user to perform their tasks effectively and efficiently.

    Rate this question:

  • 21. 

    Which of the following basic atomic data types is not providen in the XML schema for context objects in a BPM process

    • Xs:String

    • Xs:Decimal

    • Xs:join

    • Xs:float

    Correct Answer
    A. Xs:join
  • 22. 

    AWS. Which AWS Route 53 routing policy would you use to route traffic to multiple resources and also choose how much traffic is routed to each resource?

    • Simple routing

    • Weighted routing

    • Failover routing

    • Latency-based routing

    Correct Answer
    A. Weighted routing
    Explanation
    Weighted routing
    Amazon Route 53 is a highly available and scalable cloud Domain Name System (DNS) web service. It is designed to give developers and businesses an extremely reliable and cost-effective way to route end users to Internet applications by translating names like www.example.com into the numeric IP addresses like 192.0.2.1 that computers use to connect to each other.
    Weighted routing lets you associate multiple resources with a single domain name (example.com) or subdomain name (acme.example.com) and choose how much traffic is routed to each resource. This can be useful for a variety of purposes, including load balancing and testing new versions of software. To configure weighted routing, you create records that have the same name and type for each of your resources. You assign each record a relative weight that corresponds with how much traffic you want to send to each resource. Amazon Route 53 sends traffic to a resource based on the weight that you assign to the record as a proportion of the total weight for all records in the group.

    Rate this question:

  • 23. 

    AWS. Which cost management tool allows you to see the most detailed inframtion about your AWS bill?

    • CloudWatch billing alarm

    • AWS Cost and Usage Reports

    • AWS Budgets

    • AWS Cost Explorer

    Correct Answer
    A. AWS Cost and Usage Reports
    Explanation
    A boundary event is used to handle exceptional situations that may occur during the runtime of a process flow. It allows for the interruption or diversion of the normal flow of the process when certain conditions are met. This can include things like errors, timeouts, or other unexpected events. By using a boundary event, the process can be adapted and adjusted to handle these exceptional situations and ensure that the flow continues smoothly.

    Rate this question:

  • 24. 

    AWS. Which AWS Trusted Advisor real-time guidance recommendations are available for AWS Basic Support and AWS Developer Support customers? Choose 3

    • Amazon S3 bucket permissions

    • Service limit checks

    • Security Groups - Specific Ports Unrestricted

    • AWS CloudTrail service down

    Correct Answer(s)
    A. Amazon S3 bucket permissions
    A. Service limit checks
    A. Security Groups - Specific Ports Unrestricted
    Explanation
    FCAServerThreadCount is the parameter that allows processing a large amount of concurrent users. By increasing the value of FCAServerThreadCount, the server can allocate more threads to handle incoming user requests simultaneously. This parameter determines the maximum number of threads that the server can create to handle user connections, thus enabling efficient processing of a large number of concurrent users.

    Rate this question:

  • 25. 

    AWS. Which of the following is an AWS database service?

    • Amazon Redshift

    • AWS Storage Gateway

    • AWS Database Migration Service (AWS DMS)

    • AWS Glue

    Correct Answer
    A. Amazon Redshift
    Explanation
    Amazon Redshift
    Amazon Redshift is a fully-managed petabyte-scale cloud-based data warehouse product designed for large scale data set storage and analysis.

    Rate this question:

  • 26. 

    AWS. Which AWS service should be used when you want to run container applications, but want to avoid the operational overhead of scaling, patching, securing, and managing servers?

    • AWS Lambda

    • Amazon Elastic Container Service (Amazon ECS) - EC2 launch type

    • Amazon Elastic Compute Cloud (Amazon EC2)

    • Amazon Elastic Container Service (Amazon ECS) - Fargate launch type Overall explanation

    Correct Answer
    A. Amazon Elastic Container Service (Amazon ECS) - Fargate launch type Overall explanation
    Explanation
    Amazon Elastic Container Service (Amazon ECS) - Fargate launch type
    AWS Fargate is a serverless compute engine for containers. It works with both Amazon Elastic Container Service (Amazon ECS) and Amazon Elastic Kubernetes Service (Amazon EKS). AWS Fargate makes it easy for you to focus on building your applications. AWS Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design. AWS Fargate allocates the right amount of compute, eliminating the need to choose instances and scale cluster capacity. You only pay for the resources required to run your containers, so there is no over-provisioning and paying for additional servers. AWS Fargate runs each task or pod in its kernel providing the tasks and pods their own isolated compute environment. This enables your application to have workload isolation and improved security by design.

    Rate this question:

  • 27. 

    You choose ... on the System Landscape Directory (SLD) initial screen to display the products and the software components along with their version. Choose the correct answer.

    • Software Catalog

    • Technical Systems

    • Business Systems

    Correct Answer
    A. Software Catalog
    Explanation
    On the System Landscape Directory (SLD) initial screen, you would choose the "Software Catalog" option to display the products and software components along with their version. The Software Catalog provides a comprehensive list of all the software products and components that are available in the system landscape. It allows users to view and manage the software inventory, including details such as version numbers, release dates, and dependencies. By selecting the Software Catalog, users can easily access and track the various software assets within the system landscape.

    Rate this question:

  • 28. 

    AWS. Which of the following usage will always be free even after the 12-month free tier plan has expired?

    • 750 hours of elastic load balancing

    • 750 hours of Amazon EC2 compute capacity

    • 1 million AWS Lambda requests per month

    • 5.000 images processed by Amazon Rekognition

    Correct Answer
    A. 750 hours of elastic load balancing
    Explanation
    When data is transferred between two systems, the sender is responsible for sending the data out of its system, hence it uses the outbound interface. On the other hand, the receiver is responsible for receiving the data into its system, so it uses the inbound interface. Therefore, the correct answer is "Sender outbound, receiver inbound."

    Rate this question:

  • 29. 

    You can import external XML files into the message mapping as structure templates. Determine whether this statement is true or false.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    In message mapping, it is possible to import external XML files as structure templates. This allows for easier mapping of data between different systems or formats. By importing the XML files, the structure and elements of the file can be used as a reference for mapping the data in the message. Therefore, the statement is true.

    Rate this question:

  • 30. 

    If when you try to import a business system from the sld, the systems are not listed, what you must to do

    • Clear the SLD Cache

    • Associate a technical system to the business system

    • Asociate the software components and products

    • Register the systems in the SLD

    Correct Answer
    A. Clear the SLD Cache
    Explanation
    When you try to import a business system from the SLD (System Landscape Directory) and the systems are not listed, clearing the SLD cache can help resolve the issue. Clearing the cache will refresh the data in the SLD and ensure that the systems are listed correctly.

    Rate this question:

  • 31. 

    AWS. What are the advantages that AWS Cloud offers over a traditional on-premises IT infrastructure? (Select two)

    • Make a capacity decision before deploying an application, to reduce costs

    • Trade capital expense for variable expense

    • Eliminate guessing on your infrastructure capacity needs

    • Provide lower latency to applications by maintaining servers on-premises

    Correct Answer(s)
    A. Trade capital expense for variable expense
    A. Eliminate guessing on your infrastructure capacity needs
    Explanation
    Trade capital expense for variable expense
    In a traditional on-premises environment, you have to invest heavily in data centers and servers before you know how you’re going to use them. With Cloud Computing, you can pay only when you consume computing resources, and pay only for how much you consume.
    Eliminate guessing on your infrastructure capacity needs
    When you make a capacity decision before deploying an application, you often end up either sitting on expensive idle resources or dealing with limited capacity. With Cloud Computing, these problems go away. You can access as much or as little capacity as you need, and scale up and down as required with only a few minutes’ notice. You can Stop guessing capacity.

    Rate this question:

  • 32. 

    AWS. Which of the following is a best practice for securing access to your AWS account?

    • Configuring the AWS CLI on your local machine

    • 3-Factor Authentication (3FA)

    • Multi-Factor Authentication (MFA)

    • Deleting your root user

    Correct Answer
    A. Configuring the AWS CLI on your local machine
    Explanation
    The Enterprise Service Repository (ESR) within the software component version stores detailed information about the external interfaces of a software component. This means that the ESR keeps track of the various interfaces that the software component has with external systems or services. These interfaces can include APIs, web services, or any other means of communication between the software component and external entities. By storing this information in the ESR, developers and system administrators can easily access and manage the external interfaces of the software component.

    Rate this question:

  • 33. 

    AWS. Which of the following options can be used to access and manage all AWS services (Select three)?

    • AWS Secrets Manager

    • AWS Management Console

    • AWS Systems Manager

    • AWS Software Development Kit (SDK)

    • Amazon API Gateway

    • AWS Command Line Interface (AWS CLI)

    Correct Answer(s)
    A. AWS Management Console
    A. AWS Software Development Kit (SDK)
    A. AWS Command Line Interface (AWS CLI)
    Explanation
    AWS services can be accessed in three different ways:
    AWS Management Console
    This is a simple web interface for accessing AWS services.
    AWS Command Line Interface (AWS CLI)
    You can access AWS services from the command line and automate service management with scripts.
    AWS Software Development Kit (SDK)
    You can also access via AWS SDK that provides language-specific abstracted APIs for AWS services.

    Rate this question:

  • 34. 

    When you use an exclusive gateway must to use a default gate?

    • True

    • False

    Correct Answer
    A. True
    Explanation
    When using an exclusive gateway, it is necessary to use a default gate. This is because an exclusive gateway is used to create mutually exclusive paths in a process flow, where only one path can be taken based on certain conditions. However, if none of the conditions are met, a default path is required to handle such cases and ensure that the process flow can continue. Therefore, it is true that when using an exclusive gateway, a default gate must be used.

    Rate this question:

  • 35. 

    AWS. A data analytics company is running a proprietary batch analytics application on AWS and wants to use a storage service which would be accessed by hundreds of EC2 instances simultaneously to append data to existing files. As a Cloud Practitioner, which AWS service would you suggest for this use-case?

    • Amazon Elastic Block Store (Amazon EBS)

    • Amazon Elastic File System (Amazon EFS)

    • Amazon Simple Storage Service (Amazon S3)

    Correct Answer
    A. Amazon Elastic File System (Amazon EFS)
    Explanation
    Amazon Elastic File System (Amazon EFS)
    Amazon EFS is a file storage service for use with Amazon EC2. Amazon EFS provides a file system interface, file system access semantics, and concurrently-accessible storage for up to thousands of Amazon EC2 instances. Amazon EFS uses the Network File System protocol.

    Rate this question:

  • 36. 

    AWS. Which AWS Service can be used to mitigate a Distributed Denial of Service (DDoS) attack?

    • AWS Shield

    • AWS Key Management Service (AWS KMS)

    • AWS Systems Manager

    • Amazon CloudWatch

    Correct Answer
    A. AWS Shield
    Explanation
    AWS Shield
    AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection. There are two tiers of AWS Shield - Standard and Advanced.
    All AWS customers benefit from the automatic protections of AWS Shield Standard, at no additional charge. AWS Shield Standard defends against most common, frequently occurring network and transport layer DDoS attacks that target your web site or applications. When you use AWS Shield Standard with Amazon CloudFront and Amazon Route 53, you receive comprehensive availability protection against all known infrastructure (Layer 3 and 4) attacks.
    For higher levels of protection against attacks targeting your applications running on Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing (ELB), Amazon CloudFront, AWS Global Accelerator and Amazon Route 53 resources, you can subscribe to AWS Shield Advanced. In addition to the network and transport layer protections that come with Standard, AWS Shield Advanced provides additional detection and mitigation against large and sophisticated DDoS attacks, near real-time visibility into attacks, and integration with AWS WAF, a web application firewall.

    Rate this question:

  • 37. 

    Which types of patterns can you use to create an Iflow

    • Message Translator

    • Point to Point

    • Recipient List

    • Multiple point to end

    Correct Answer(s)
    A. Message Translator
    A. Point to Point
    A. Recipient List
    Explanation
    The correct answer includes three types of patterns that can be used to create an Iflow: Message Translator, Point to Point, and Recipient List. These patterns are commonly used in integration scenarios to transform messages, establish direct communication between two endpoints, and route messages to multiple recipients respectively. By using these patterns, developers can design Iflows that efficiently handle data transformation, communication, and distribution in an integration landscape.

    Rate this question:

  • 38. 

    AWS. Which of the following statement is correct for a Security Group and a Network Access Control List (Network ACL)?

    • Security Group acts as a firewall at the Availability Zone (AZ) level whereas Network Access Control List (Network ACL) acts as a firewall at the VPC level

    • Security Group acts as a firewall at the VPC level whereas Network Access Control List (Network ACL) acts as a firewall at the Availability Zone (AZ) level

    • Security Group acts as a firewall at the instance level whereas Network Access Control List (Network ACL) acts as a firewall at the subnet level

    • Security Group acts as a firewall at the subnet level whereas Network Access Control List (Network ACL) acts as a firewall at the instance level

    Correct Answer
    A. Security Group acts as a firewall at the instance level whereas Network Access Control List (Network ACL) acts as a firewall at the subnet level
    Explanation
    Security Group acts as a firewall at the instance level whereas Network Access Control List (Network ACL) acts as a firewall at the subnet level
    A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. When you launch an instance in a VPC, you can assign up to five security groups to the instance. Security groups act at the instance level, not the subnet level. A network access control list (network ACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets (i.e. it works at subnet level).

    Rate this question:

  • 39. 

    A web service description language file is an XML to describe service interfaces

    • True

    • False

    Correct Answer
    A. True
    Explanation
    A web service description language file is indeed an XML file that is used to describe the interfaces of a web service. It provides a standardized way to define the operations, inputs, and outputs of the service, allowing different systems to communicate and interact with each other. This XML file serves as a contract between the service provider and the service consumer, ensuring that both parties understand and agree on the structure and behavior of the web service.

    Rate this question:

  • 40. 

    AWS. A retail company has multiple AWS accounts for each of its departments. Which of the following AWS services can be used to set up consolidated billing and a single payment method for these AWS accounts?

    • AWS Budgets

    • AWS Cost Explorer

    • AWS Organizations

    • AWS Secrets Manager

    Correct Answer
    A. AWS Organizations
    Explanation
    AWS Organizations
    AWS Organizations helps you to centrally manage billing; control access, compliance, and security; and share resources across your AWS accounts. Using AWS Organizations, you can automate account creation, create groups of accounts to reflect your business needs, and apply policies for these groups for governance. You can also simplify billing by setting up a single payment method for all of your AWS accounts. AWS Organizations is available to all AWS customers at no additional charge.

    Rate this question:

  • 41. 

    AWS. An intern at an IT company provisioned a Linux based On-demand EC2 instance with per-second billing but terminated it within 30 seconds as he wanted to provision another instance type. What is the duration for which the instance would be charged?

    • 600 seconds

    • 30 seconds

    • 300 seconds

    • 60 seconds

    Correct Answer
    A. 60 seconds
    Explanation
    60 seconds
    There is a one-minute minimum charge for Linux based EC2 instances, so this is the correct option.

    Rate this question:

  • 42. 

    AWS. Which of the following is a geographic area containing multiple Availability Zone (AZs)?

    • Global zone

    • Region

    • Edge location

    • Data center

    Correct Answer
    A. Region
    Explanation
    The PIMON Monitor displays WS messages using the SOAP message protocol and XI messages using the XI message protocol 3.x.

    Rate this question:

  • 43. 

    The aggregator pattern is a statefull filter that is used in cases when a subsequent message process is contingent upon the sucessful processing of multiple input messages

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The explanation for the given correct answer is that the aggregator pattern is indeed a stateful filter used when the processing of multiple input messages is required for a subsequent message to be processed successfully. This pattern is commonly used in scenarios where data needs to be collected and combined from multiple sources before further processing can take place. The aggregator pattern helps in managing and coordinating the flow of messages, ensuring that all necessary inputs are received and processed before proceeding with the next step.

    Rate this question:

  • 44. 

    You configure the sender RFC adapter to convert RFC calls from a sender to XML messages. What is the purpose of the program ID RFC adapter parameter?

    • The program ID binds abstract sender/receiver initerfaces for correlation whit integration processes

    • The program ID uniquely identifies the RFC sender communication channel in the configured application server Gateway

    • The program ID uniquely indentifies proxy classes for services interfaces

    • The program ID uniquely indentifies outbound proxies

    Correct Answer
    A. The program ID uniquely identifies the RFC sender communication channel in the configured application server Gateway
    Explanation
    The program ID parameter in the sender RFC adapter is used to uniquely identify the RFC sender communication channel in the configured application server Gateway. This allows for proper routing and communication between the sender and receiver interfaces, ensuring that the correct integration processes are correlated and executed.

    Rate this question:

  • 45. 

    Identify the basic interfaces patterns available. Choose the correct answer.

    • Stateless and stateful communications

    • Stateful and Tentative Update & Confirm/Compensate (TUCC)

    • Stateless and Tentative Update & Confirm/Compensate (TUCC)

    Correct Answer
    A. Stateless and stateful communications
    Explanation
    The basic interface patterns available are stateless and stateful communications. Stateless communication refers to a type of communication where each request from the client to the server is independent and does not rely on any previous requests. Stateful communication, on the other hand, maintains a session or state between the client and the server, allowing the server to remember information about the client across multiple requests.

    Rate this question:

  • 46. 

    AWS. A unicorn startup is building an analytics application with support for a speech-based interface. The application will accept speech-based input from users and then convey results via speech. As a Cloud Practitioner, which solution would you recommend for the given use-case?

    • Use Amazon Polly to convert speech to text for downstream analysis. Then use Amazon Transcribe to convey the text results via speech

    • Use Amazon Translate to convert speech to text for downstream analysis. Then use Amazon Polly to convey the text results via speechg

    • Use Amazon Polly to convert speech to text for downstream analysis. Then use Amazon Translate to convey the text results via speech

    • Use Amazon Transcribe to convert speech to text for downstream analysis. Then use Amazon Polly to convey the text results via speech

    Correct Answer
    A. Use Amazon Transcribe to convert speech to text for downstream analysis. Then use Amazon Polly to convey the text results via speech
    Explanation
    Use Amazon Transcribe to convert speech to text for downstream analysis. Then use Amazon Polly to convey the text results via speech
    You can use Amazon Transcribe to add speech-to-text capability to your applications. Amazon Transcribe uses a deep learning process called automatic speech recognition (ASR) to convert speech to text quickly and accurately. Amazon Transcribe can be used to transcribe customer service calls, to automate closed captioning and subtitling, and to generate metadata for media assets.

    Rate this question:

  • 47. 

    AWS. Which of the following AWS services is essential for implementing security of resources in AWS Cloud?

    • Amazon CloudWatch

    • AWS Shield

    • AWS Web Application Firewall (AWS WAF)

    • AWS Identity and Access Management (IAM)

    Correct Answer
    A. AWS Identity and Access Management (IAM)
    Explanation
    AWS Identity and Access Management (IAM)
    AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. IAM enables security best practices by allowing you to grant unique security credentials to users and groups to specify which AWS service APIs and resources they can access. These features make IAM an important service for the overall security of AWS resources in your account. IAM is secure by default; users have no access to AWS resources until permissions are explicitly granted.

    Rate this question:

  • 48. 

    Does business systems require underline Technical systems?

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Business systems often rely on underlying technical systems to function effectively. These technical systems can include hardware, software, networks, databases, and other technological components. Without these technical systems, businesses may struggle to perform tasks efficiently, communicate with customers and partners, store and analyze data, and automate processes. Therefore, it is true that business systems require underlying technical systems to operate smoothly and achieve their goals.

    Rate this question:

  • 49. 

    AWS.   Which AWS service can be used to store, manage, and deploy Docker container images?

    • AWS Lambda

    • Amazon Elastic Container Registry (Amazon ECR)

    • Amazon Elastic Compute Cloud (Amazon EC2)

    • Amazon Elastic Container Service (Amazon ECS)

    Correct Answer
    A. Amazon Elastic Container Registry (Amazon ECR)
    Explanation
    Amazon Elastic Container Registry (Amazon ECR) - Amazon Elastic Container Registry (Amazon ECR) can be used to store, manage, and deploy Docker container images. Amazon Elastic Container Registry (Amazon ECR) eliminates the need to operate your container repositories. You can then pull your docker images from Amazon Elastic Container Registry (Amazon ECR) and run those on Amazon Elastic Container Service (Amazon ECS).
    Please see this schematic diagram to understand how Amazon Elastic Container Registry

    Rate this question:

Quiz Review Timeline (Updated): Oct 29, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 29, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 08, 2019
    Quiz Created by
    Lina
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.