Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Amazon Web Services SOA-C01 Dumps Questions Answers

Page: 1 / 10
Total 263 questions

AWS Certified SysOps Administrator - Associate Questions and Answers

Question 1

A SysOps Administrator is managing a web application that runs on Amazon EC2 instances behind an ELB Application Load Balancer (ALB). The instances run in an EC2 Auto Scaling group. The administrator wants to set an alarm for when all target instances associated with the ALB are unhealthy.

Which condition should be used with the alarm?

Options:

A.

AWS/ApplicationELB HealthyHostCount <= 0

B.

AWS/ApplicationELB UnhealthyHostCount >= 1

C.

AWS/EC2 StatusCheckFailed <= 0

D.

AWS/EC2 StatusCheckFailed >= 1

Buy Now
Question 2

An organization has decided to consolidate storage and move all of its backups and archives to Amazon S3. With all of the data gathered into a hierarchy under a single directory, the organization determines there is 70 TB data that needs to be uploaded. The organization currently has a 150-Mbps connection with 10 people working at the location.

Which service would be the MOST efficient way to transfer this data to Amazon S3?

Options:

A.

AWS Snowball

B.

AWS Direct Connect

C.

AWS Storage Gateway

D.

Amazon S3 Transfer Acceleration

Question 3

A SysOps Administrator has created an Amazon EC2 instance using an AWS CloudFormation template in the us-east-1 Region. The Administrator finds that this template has failed to create an EC2 instance in the uswest-2 Region.

What is one cause for this failure?

Options:

A.

Resources tags defined in the CloudFormation template are specific to the us-east-1 Region.

B.

The Amazon Machine Image (AMI) ID referenced in the CloudFormation template could not be found in the us-west-2 Region.

C.

The cfn-init script did not execute during resource provisioning in the us-west-2 Region.

D.

The IAM user was not created in the specified Region.

Question 4

A sysops administrator is reviewing AWS Trusted Advisor warnings and encounters a warning for an S3 bucket policy that has open access permissions. While discussing the issue with the bucket owner, the administrator realizes the S3 bucket is an origin for an Amazon CloudFront web distribution.

Options:

A.

Encrypt the S3 bucket content with Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3).

B.

Create an origin access identity and grant it permissions to read objects in the S3 bucket.

C.

Assign an 1AM user to the CloudFront distribution and whitelist the 1AM user in the S3 bucket policy.

D.

Assign an 1AM role to the CloudFront distribution and whitelist the 1AM role in the S3 bucket policy.

Question 5

A company’s application stores documents within an Amazon S3 bucket. The application is running on Amazon EC2 in a VPC. A recent change in security requirements states that traffic between the company’s application and the S3 bucket must never leave the Amazon network.

What AWS feature can provide this functionality?

Options:

A.

Security groups

B.

NAT gateways

C.

Virtual private gateway

D.

Gateway VPC endpoints

Question 6

A company is planning to deploy multiple ecommerce websites across the eu-west-1, ap-east-1, and us-west-1 Regions. The websites consist of Amazon S3 buckets Amazon EC2 instances, Amazon RDS databases and Elastic Load Balancers.

Which method will accomplish the deployment with the LEAST amount of effort?

Options:

A.

Configure deployment automation using AWS OpsWorks

B.

Configure S3 cross-Region replication

C.

Use AWS CloudFormation stack sets to deploy the application

D.

Use AWS Elastic Beanstalk to deploy the application

Question 7

A company has mandated the use of multi-factor authentication (MFA) for all 1AM users, and requires users to make all API calls using the CLI. However, users are not prompted to enter MFA tokens, and are able to run CLI commands without MFA. In an attempt to enforce MFA. the company attached an 1AM policy to all users that denies API calls that have not been authenticated with MFA.

What additional step must be taken to ensure that API calls are authenticated using MFA?

Options:

A.

Enable MFA on 1AM roles, and require 1AM users to use role credentials to sign API calls.

B.

Ask the 1AM users to log into the AWS Management Console with MFA before making API calls using the CLI.

C.

Restrict the 1AM users to use of the console, as MFA is not supported for CLI use.

D.

Require users to use temporary credentials from the get-session token command to sign API calls.

Question 8

A company’s website went down for several hours. The root cause was a full disk on one of the company’s Amazon EC2 instances.

Which steps should the SysOps Administrator take to prevent this from happening in this future?

Options:

A.

Configure Amazon CloudWatch Events to filter and forward AWS Health events for disk space utilization to an Amazon SNS topic to notify the Administrator.

B.

Create an AWS Lambda function to describe the volume status for each EC2 instance. Post a notification to an Amazon SNS topic when a volume status is impaired.

C.

Enable detailed monitoring for the EC2 instances. Create an Amazon CloudWatch alarm to notify the

Administrator when disk space is running low.

D.

Use the Amazon CloudWatch agent on the EC2 instances to collect disk metrics. Create a CloudWatch alarm to notify the Administrator when disk space is running low.

Question 9

An application is running on Amazon EC2 Instances behind an Application Load Balancer (ALB). An operations team wants to be notified in near-teal time when the ALB has issues connecting to backend EC2 instances.

Which solution will meet these requirements with the LEAST amount of effort?

Options:

A.

Configure the ALB to send logs to Amazon S3. Write an AWS Lambda function to process the log files and send an email message to the operations team when the number of requests exceeds the threshold.

B.

Create an Amazon CloudWatch rule to monitor the HealthyHostCount metric and send Amazon Simple Notification Service (Amazon SNS) messages to the operations team when HealthyHostCount is equal to zero.

C.

Create an Amazon CloudWatch rule lo monitor the TargetConnectionErrorCount metric and send Amazon Simple Notification Service (Amazon SNS) messages to the operations team when TargetConnectionErrorCount is greater than 1.

D.

Create an Amazon CloudWatch rule to monitor the HTTPCode_Target_5XX_Count metric and send Amazon Simple Notification Service (Amazon SNS) messages to the operations team when HTTPCode_Target_5XX_Count is greater than zero.

Question 10

A medical imaging company needs lo process large amounts of imaging data in real time using a specific instance type. The company wants to guarantee sufficient resource capacity for 1 year

Which action will meet these requirements in the MOST cost-effective manner?

Options:

A.

Create 1-year On-Demand Capacity Reservations in the specific Availability Zones

B.

Launch Amazon EC2 instances with termination protection enabled

C.

Purchase 1 -year Reserved Instances in the specific Availability Zones

D.

Use a Spot Fleet across multiple Availability Zones

Question 11

A company runs an Amazon RDS MySQL DB instance. Corporate policy requires that a daily backup of the database must be copied to a separate security account.

What is the MOST cost-effective way to meet this requirement?

Options:

A.

Copy an automated RDS snapshot to the security account using the copy-db-snapshot command with the AWS CLI.

B.

Create an RDS MySQL Read Replica for the critical database in the security account, then enable automatic backups for the Read Replica.

C.

Create an RDS snapshot with the AWS CLI create-db-snapshot command, share it with the security account, then create a copy of the shared snapshot in the security account.

D.

Use AWS DMS to replicate data from the critical database to another RDS MySQL instance in the security account, then use an automated backup for the RDS instance.

Question 12

A company wants to icrease the availability and vulnerability of a critical business application. The appliation currently ueses a MySQL database running on an Amazon EC2 instance. The company wants to minimize application changes.

How should the company these requirements?

Options:

A.

Shut down the EC2 instance. Enable multi-AZ replication within the EC2 instance, then restart the instance.

B.

Launch a secondary EC2 instance running MySQL Configure a cron job that backs up the database on the primary EC2 instance and copies it to the secondary instance every 30 minutes.

C.

Migrate the database to an RDS Aurora DB instance and create a Read Replication in another Availability Zone.

D.

Create an Amazon RDS Microsoft SQL DB instance and enable multi-Az replication. Back up the existing data and import in to the new database.

Question 13

A company has adopted a security policy that requires all customer data to be encrypted at rest. Currently, customer data is stored on a central Amazon EFS file system and accessed by a number of different applications from Amazon EC2 instances.

How can the SysOps Administrator ensure that all customer data stored on the EFS file system meets the new requirement?

Options:

A.

Update the EFS file system settings to enable server-side encryption using AES-256.

B.

Create a new encrypted EFS file system and copy the data from the unencrypted EFS file system to the new encrypted EFS file system.

C.

Use AWS CloudHSM to encrypt the files directly before storing them in the EFS file system.

D.

Modify the EFS file system mount options to enable Transport Layer Security (TLS) on each of the EC2 instances.

Question 14

An organization has developed a new memory-intensive application that is deployed to a large Amazon EC2 Linux fleet. There is concern about potential memory exhaustion, so the Development team wants to monitor memory usage by using Amazon CloudWatch.

What is the MOST efficient way to accomplish this goal?

Options:

A.

Deploy the solution to memory-optimized EC2 instances, and use the CloudWatch MemoryUtilization metric

B.

Enable the Memory Monitoring option by using AWS Config

C.

Install the AWS Systems Manager agent on the applicable EC2 instances to monitor memory

D.

Monitor memory by using a script within the instance, and send it to CloudWatch as a custom metric

Question 15

A company has received a notification in its AWS Personal Health Dashboard that one of its Amazon EBS-backed Amazon EC2 instances is on hardware that is scheduled maintenance The instance runs a critical production workload that must be available during normal business hours

Which steps will ensure that the instance maintenance does not produce an outage?

Options:

A.

Configure an Amazon Lambda function to automatically start the instance if it is stopped

B.

Create an Amazon Machine Image (AMI) of the instance and use the AMI to launch a new instance once the existing instance is retired

C.

Enable termination protection on the EC2 instance

D.

Stop and start the EC2 instance during a maintenance window outside of normal business hours

Question 16

A SysOps Administrator is troubleshooting an AWS CloudFormation template whereby multiple Amazon EC2 instances are being created. The template is working in us-east-1, but it is failing in us-west-2 with the error code:

AMI [ami-12345678] does not exist.

How should the Administrator ensure that the AWS CloudFormation template is working in every region?

Options:

A.

Copy the source region’s Amazon Machine Image (AMI) to the destination region and assign it the same ID.

B.

Edit the AWS CloudFormation template to specify the region code as part of the fully qualified AMI ID.

C.

Edit the AWS CloudFormation template to offer a drop-down list of all AMIs to the user by using the AWS: :EC2: :AMI: :ImageID control.

D.

Modify the AWS CloudFormation template by including the AMI IDs in the “Mappings” section. Refer to the proper mapping within the template for the proper AMI ID.

Question 17

A SysOps Administrator is attempting to use AWS Systems Manager Session Manager to initiate a SSH session with an Amazon EC2 instance running on a custom Linux Amazon Machine Image (AMI) The Administrator cannot find the target instance in the Session Manager console

Which combination of actions with solve this issue? (Select TWO )

Options:

A.

Add Systems Manager permissions to the instance profile

B.

Configure the bucket used by Session Manager logs to allow write access

C.

install Systems Manager Agent on the instance

D.

Modify the instance security group to allow inbound traffic on SSH port 22

E.

Reboot the instance with a new SSH key pair named ssm-user

Question 18

A SysOps Administrator created an AWS CloudFormation template for the first time. The stack failed with a status of ROLLBACK_COMPLETE. The Administrator identified and resolved the template issue causing the failure.

How should the Administrator continue with the stack deployment?

Options:

A.

Delete the failed stack and create a new stack.

B.

Execute a change set on the failed stack.

C.

Perform an update-stack action on the failed stack.

D.

Run a validate-template command.

Question 19

A financial service company is running distributed computing software to manage a fleet of 20 servers for their calculations. There are 2 control nodes and 18 worker nodes to run the calculations. Worker nodes can be automatically started by the control nodes when required. Currently, all nodes are running on demand, and the worker nodes are uses for approximately 4 hours each day.

Which combination of actions will be most cost-effective? (Select Two)

Options:

A.

Use dedicated Hosts for the control nodes.

B.

Use reserved instances for the control nodes.

C.

Use reserved instances for the worker nodes.

D.

Use spot instances for the control nodes and On-demand instances if there is no Spot availability.

E.

Use spot instances for the worker nodes and On-demand instances if there is no spot availability.

Question 20

A company has an application running on a fleet of Microsoft Windows instances. Patches to the operating system need to be applied each month. AWS Systems Manager Patch Manager is used to apply the patches on a schedule.

When the fleet is being patched, customers complain about delayed service responses.

What can be done to ensure patches are deployed with MINIMAL customer impact?

Options:

A.

Change the number of instances patched at any one time to 100%.

B.

Create a snapshot of each server in the fleet using a Systems Manager Automation document before starting the patch process.

C.

Configure the maintenance window to patch 10% of the instance in the patch group at a time.

D.

Create a patched Amazon Machine Image (AMI). Configure the maintenance window option to deploy the patched AMI on only 10% of the fleet at a time.

Question 21

A company has attached the following policy to an IAM user.

What of the following actions are allowed for the IAM user?

Options:

A.

Amazon RDS DescribeDBInstances action in the us-east-1 Region

B.

Amazon S3 PutObject operation in a bucket named testbucket

C.

Amazon EC2 DescribeInstances action in the us-east-1 Region

D.

Amazon EC2 AttachNetworkInterface action in the eu-west-1 Region

Question 22

A company has deployed a NAT instance to allow web servers to obtain software updates from the internet. There latency on the NAT instance as the network grows. A SysOps Administrator needs to reduce latency on the instance in a manner that a efficient, cost effective, and allow for scaling with future demand.

Which action should be taken to accomplish this?

Options:

A.

Add a second NAT instance and place both instance behind a load balancer.

B.

Convert the NAT instance to a larger instance size.

C.

Replace the NAT instance with NAT gateway.

D.

Replace the NAT instance with a virtual private gateway.

Question 23

A SysOps Administrator needs to retrieve a file from the GLACIER storage class of Amazon S3. the Administrator wants to receive an amazon SNS notification when the file is available for access.

What action should be taken to accomplish this?

Options:

A.

Create an Amazon CloudWatch Events for file restoration from Amazon S3 Glacier using the GlacierJobDescrbption API and send the event to an SNS topic the administrator has subscribed to.

B.

Create an AWS Lambda function that perform a HEAD request on the object being restored and checks the storage class of the object. Then send a notification to an SNS topic the administrator has subscribed to when the storage class changes to STANDARD.

C.

Enable an Amazon S3 event notification for the s3: ObjectCreated : Post event that a sends notification to an SNS topic the administrator has subscribed.

D.

Enable S3 event notification for the S3: ObjectRestore: Completed event that sends a notification to an SNS topic the Administrator has subscribed to.

Question 24

A Development team is designing an application that processes sensitive information within a hybrid deployment. The team needs to ensure the application data is protected both in transit and at rest.

Which combination of actions should be taken to accomplish this? (Choose two.)

Options:

A.

Use a VPN to set up a tunnel between the on-premises data center and the AWS resources

B.

Use AWS Certificate Manager to create TLS/SSL certificates

C.

Use AWS CloudHSM to encrypt the data

D.

Use AWS KMS to create TLS/SSL certificates

E.

Use AWS KMS to manage the encryption keys used for data encryption

Question 25

A company needs to deploy a web application on two Amazon EC2 instances behind an Application Load Balancer (ALB). Two EC2 instances will also be deployed to host the database. The infrastructure needs to be designed across Availability Zones for high availability and must limit public access to the instances as much as possible.

How should this be achieved within a VPC?

Options:

A.

Create one public subnet for the Application Load Balancer, one public subnet for the servers, and private subnet for the database servers.

B.

Create one public subnets for the Application Load Balancer, two private subnets for the web servers, and two private subnets for the database servers.

C.

Create two public subnets for the Application Load Balancer, two public subnets for the web servers, and two public subnets for the database servers.

D.

Create two public subnets for the Application Load Balancer, two public subnets for the web servers, and two public subnets for the database servers.

Question 26

An ecommerce site is using Amazon ElastiCache with Memcached to store session state for a web application and to cache frequently used data. For the last month, users have been complaining about performance. The metric data for the Amazon EC2 instances and the Amazon RDS instance appear normal, but the eviction count metrics are high.

What should be done to address this issue and improve performance?

Options:

A.

Scale the cluster by adding additional nodes

B.

Scale the cluster by adding read replicas

C.

Scale the cluster by increasing CPU capacity

D.

Scale the web layer by adding additional EC2 instances

Question 27

A company has a multi-tier web application. In the web tier, all the servers are in private subnets inside a VPC. The development team wants to make changes to the application that requires access to Amazon S3.

What should be done to accomplish this?

Options:

A.

Create a customer gateway to connect to Amazon S3 Modify the route table of the private subnets to use the customer gateway

B.

Create a gateway VPC endpoint for Amazon S3 Modify the route table of the private subnets to use the gateway VPC endpoint.

C.

Create a NAT gateway in the private subnets. Modify the route table of the subnets to use the NAT gateway.

D.

Create an S3 bucket policy to allow connections from the private subnets. Modify the route table.

Question 28

A SysOps Administrator is maintaining an application that runs on Amazon EC2 instances behind an application Load Balancer (ALB). Users are reporting errors when attempting to launch the application. The administrator notices an increase in the httpcode_ELS_5xx_Count Amazon CloudWatch metric for the load balancer.

What is the possible cause for this increase?

Options:

A.

The ALB Is associated with private subnets within the VPC.

B.

The ALB received a request from a client, but the client closed the connection.

C.

The ALB security group is not configured to allow inbound traffic from the users.

D.

The ALB target group does not contain healthy EC2 instances.

Question 29

A SysOps administrator notices a scale-out event for an Amazon EC2 Auto Scaling group Amazon CloudWatch shows a spike in the RequestCount metric tor the associated Application Load Balancer The administrator would like to know the IP addresses for the source of the requests

Where can the administrator find this information?

Options:

A.

Auto Scaling logs

B.

AWS CloudTrail logs

C.

EC2 instance logs

D.

Elastic Load Balancer access logs

Question 30

An application is being developed that will be served across a fleet of Amazon EC2 instances, which require a consistent view of persistent data. Items stored vary in size from 1 KB lo 300MB; the items are read frequently, created occasionally, and often require partial changes without conflict. The data store is not expected to grow beyond 2TB. and items will be expired according to age and content type.

Which AWS service solution meets these requirements?

Options:

A.

Amazon S3 buckets with lifecycle policies to delete old objects

B.

Amazon ROS PostgreSQL and a job that deletes rows based on age and file type columns.

C.

Amazon EFS and a scheduled process to delete files based on age and extension.

D.

An EC2 instance store synced on boot from a central Amazon EBS-backed instance.

Question 31

An application running on Amazon EC2 allows users to launch batch jobs for data analysis. The jobs are run asynchronously, and the user is notified when they are complete. While multiple jobs can run concurrently, a user’s request need not be fulfilled for up to 24 hours. To run a job, the application launches an additional EC2 instance that performs all the analytics calculations. A job takes between 75 and 110 minutes to complete and cannot be interrupted.

What is the MOST cost-effective way to run this workload?

Options:

A.

Run the application on On-Demand EC2 instances. Run the jobs on Spot Instances with a specified duration.

B.

Run the application on Reserved Instance EC2 instances. Run the jobs on AWS Lambda.

C.

Run the application on On-Demand EC2 instances. Run the jobs on On-Demand EC2 instances.

D.

Run the application on Reserved instance EC2 instances. Run the jobs on Spot Instances with a specified duration.

Question 32

A SysOps Administrator noticed that the cache hit ratio for an Amazon CloudFront distribution is less than 10%. Which collection of configuration changes will increase the cache hit ratio for the distribution? (Select two.)

Options:

A.

Ensure that only required cookies, query strings, and headers are forwarded in the Cache Behavior Settings

B.

Change the Viewer Protocol Policy to use HTTPS only

C.

Configure the distribution to use presigned cookies and URLs to restrict access to the distribution

D.

Enable automatic compression of objects in the Cache Behavior Settings

E.

Increase the CloudFront time to live (TTL) settings in the Cache Behavior Settings.

Question 33

The Security team has decided that there will be no public internet access to HTTP (TCP port 80) because if it is moving to HTTPS for all incoming web traffic. The team has asked a SysOps Administrator to provide a report on any security groups that are not compliant.

What should the SysOps Administrator do to provide near real-time compliance reporting?

Options:

A.

Enable AWS Trusted Advisor and show the Security team that the Security Groups unrestricted access check will alarm.

B.

Schedule an AWS Lambda function to run hourly to scan and evaluate all security groups, and send a report to the Security team.

C.

Use AWS Config to enable the restricted-common-ports rule, and add port 80 to the parameters.

D.

Use Amazon Inspector to evaluate the security groups during scans, and send the completed reports to the Security team.

Question 34

A SysOps Administrator has configured a CloudWatch agent to send custom metrics to Amazon CloudWatch and is now assembling a CloudWatch dashboard to display these metrics.

What steps should be the Administrator take to complete this task?

Options:

A.

Select the AWS Namespace, filter by metric name, then add to the dashboard.

B.

Add a text widget, select the appropriate metric from the custom namespace, then add to the dashboard.

C.

Select the appropriate widget and metrics from the custom namespace, then add to the dashboard.

D.

Open the CloudWatch console, from the CloudWatch Events, add all custom metrics.

Question 35

A company is managing a website with a global user base hosted on Amazon EC2 with an Application Load Balancer (ALB). To reduce the load on the web servers, a SysOps administrator configures an Amazon CloudFront distribution with the ALB as the origin After a week of monitoring the solution, the administrator notices that requests are still being served by the ALB and there is no change in the web server load.

What are possible causes tor this problem? (Select TWO.)

Options:

A.

CloudFront does not have the ALB configured as the origin access identity.

B.

The DNS is still pointing to the ALB instead of the CloudFront distribution.

C.

The ALB security group is not permitting inbound traffic from CloudFront.

D.

The default, minimum, and maximum Time to Live (TTL) are set to 0 seconds on the CloudFront distribution.

E.

The target groups associated with the ALB are configured for sticky sessions.

Question 36

A company is using AWS Storage Gateway to create block storage volumes and mount them as Internet Small Computer Systems Interlace (iSCSI) devices from on-premise! servers As the Storage Gateway has taken on several new projects some of the Development teams report that the performance of the iSCSI drives has degraded. When checking the Amazon CloudWatch metrics a SysOps Administrator notices that the cachePercentUsed metric is below 60% and the cachePercentUsed metric is above 90%.

What steps should the Administrator take to increase Storage Gateway performance?

Options:

A.

Change the default block size for the Storage Gateway from 64 KB to 128 KB 256 KB or 512 KB to improve I/O performance

B.

Create a larger disk for the cached volume. In the AWS Management Console. edit the local disks then select the new disk as the cached volume

C.

Ensure that the physical disks for the Storage Gateway are in a RAID 1 configuration to allow higher throughput

D.

Take point in time snapshots of all the volumes in Storage Gateway flush the cache completely then restore the volumes from the clean snapshots

Question 37

A company has a web application that runs both on-premises and on Amazon EC2 instances. Over time both the on-premises servers and EC2 instances begin crashing A sysops administrator suspects a memory leak in the application and wants a unified method to monitor memory utilization over time.

How can the Administrator track both the EC2 memory utilization and on-premises server memory utilization over time?

Options:

A.

Write a script or use a third-party application to report memory utilization for both EC2 instances and on-premises servers

B.

Use Amazon CloudWatch agent for both Amazon EC2 instances and on-premises servers to report MemoryUtilization metrics to CloudWatch and set a CloudWatch alarm for notifications

C.

Use CloudWatch agent for Amazon EC2 instances to report memory utilization to CloudWatch and set CloudWatch alarms for notifications. Use a third-party application for the on-premises servers

D.

Configure a load balancer to route traffic to both on-premises servers and EC2 instances then use CloudWatch as the unified view of the metrics for the load balancer

Question 38

The Security team at AnyCompany discovers that some employees have been using individual AWS accounts that are not under the control of AnyCompany. The team has requested that those individual accounts be linked to the central organization using AWS Organizations.

Which action should a SysOps Administrator take to accomplish this?

Options:

A.

Add each existing account to the central organization using AWS IAM.

B.

Create a new organization in each account and join them to the central organization.

C.

Log in to each existing account an add them to the central organization.

D.

Send each existing account an invitation from the central organization.

D18912E1457D5D1DDCBD40AB3BF70D5D

Question 39

A company's application infrastructure was deployed using AWS CloudFormation and is composed of Amazon EC2 instances behind an Application Load Balancer. The instances run an EC2 Auto Scaling group across multiple Availability Zones. When releasing a new version of the application, the update deployment must avoid DNS changes and allow rollback.

Which solution should a sysops administrator use to meet the deployment requirements for this new release?

Options:

A.

Configure the Auto Scaling group to use lifecycle hooks. Deploy now instances with the new application version. Complete the lifecycle hook action once healthy.

B.

Create a new Amazon Machine Image (AMI) containing the updated code. Create a launch configuration with the AMI. Update Auto Scaling group to use the new lauch configuration.

C.

Deploy a second CloudFormation stack. Wait for the application to be available Cut over to the new Application Load Balancer

D.

Modify the CloudFormation template to use an AutoScalingReplacingUpdate policy. Update the stack. Perform a second update with the new release

Page: 1 / 10
Total 263 questions