Exam Name: | AWS Certified SysOps Administrator - Associate (SOA-C02) | ||
Exam Code: | SOA-C02 Dumps | ||
Vendor: | Amazon Web Services | Certification: | AWS Certified Associate |
Questions: | 528 Q&A's | Shared By: | selena |
A company is deploying a third-party unit testing solution that is delivered as an Amazon EC2 Amazon Machine Image (AMI). The company is deploying the testing solution on On-Demand Instances. The company wants to use an additional three Spot Instances when the Spot Instance prices drop to a specific threshold. A minimum of three instances are required at all times to operate the testing solution. A SysOps administrator must implement high availability for the architecture. Which solution will meet these requirements with the LEAST management overhead?
A company has a non-production application that runs on an Amazon EC2 instance. The Amazon CloudWatch agent is installed on the EC2 instance. The application includes a process that randomly overuses temporary disk space and fills disks to 100% capacity. A SysOps administrator needs to automate a reboot of the EC2 instance after the disks reach 100% capacity. Which solution will meet this requirement in the MOST operationally efficient way?
A company's AWS accounts are in an organization in AWS Organizations. The organization has all features enabled.
The accounts use Amazon EC2 instances to host applications. The company manages the EC2 instances manually by using the AWS Management Console. The company applies updates to the EC2 instances by using an SSH connection to each EC2 instance.
The company needs a solution that uses AWS Systems Manager to manage all the organization's current and future EC2 instances. The latest version of Systems Manager Agent (SSM Agent) is running on the EC2 instances.
Which solution will meet these requirements?
A company requires that all IAM user accounts that have not been used for 90 days or more must have their access keys and passwords immediately disabled A SysOps administrator must automate the process of disabling unused keys using the MOST operationally efficient method.
How should the SysOps administrator implement this solution?