A) Restore a snapshot from the production cluster into test clusters
B) Create logical dumps of the production cluster and restore them into new test clusters
C) Use database cloning to create clones of the production cluster
D) Add an additional read replica to the production cluster and use that node for testing
Correct Answer
verified
Multiple Choice
A) After a database crash, Aurora needed to replay the redo log from the last database checkpoint
B) The client-side application is caching the DNS data and its TTL is set too high
C) After failover, the Aurora DB cluster needs time to warm up before accepting client connections
D) There were no active Aurora Replicas in the Aurora DB cluster
Correct Answer
verified
Multiple Choice
A) Amazon DynamoDB with on-demand capacity mode
B) Amazon Aurora with one writer node and an Aurora Replica with the parallel query feature enabled
C) Amazon DynamoDB with provisioned capacity mode with 5,000 write capacity units (WCUs) and 10,000 read capacity units (RCUs)
D) Amazon Aurora with one writer node and two cross-Region Aurora Replicas
Correct Answer
verified
Multiple Choice
A) Stop the DB cluster and analyze how the website responds
B) Use Aurora fault injection to crash the master DB instance
C) Remove the DB cluster endpoint to simulate a master DB instance failure
D) Use Aurora Backtrack to crash the DB cluster
Correct Answer
verified
Multiple Choice
A) Amazon DocumentDB
B) Amazon RDS Multi-AZ deployment
C) Amazon DynamoDB global table
D) Amazon Aurora Global Database
Correct Answer
verified
Multiple Choice
A) Migrate the workloads from Amazon RDS for MySQL to Amazon DynamoDB
B) Enable cross-Region read replicas and direct read traffic to then when Amazon RDS is down
C) Enable a read replicas and direct read traffic to it when Amazon RDS is down
D) Enable an Amazon RDS for MySQL Multi-AZ configuration
Correct Answer
verified
Multiple Choice
A) Use the AWS Schema Conversion Tool (AWS SCT) to convert the source database schema. Then restore the converted schema to the target Aurora DB cluster.
B) Use Oracle's Data Pump tool to export a copy of the source database schema and manually edit the schema in a text editor to make it compatible with Aurora.
C) Create an AWS DMS task to migrate data from the Oracle database to the Aurora DB cluster. Select the migration type to replicate ongoing changes to keep the source and target databases in sync until the company is ready to move all user traffic to the Aurora DB cluster.
D) Create an AWS DMS task to migrate data from the Oracle database to the Aurora DB cluster. Once the initial load is complete, create an AWS Kinesis Data Firehose stream to perform change data capture (CDC) until the company is ready to move all user traffic to the Aurora DB cluster.
E) Create an AWS Glue job and related resources to migrate data from the Oracle database to the Aurora DB cluster. Once the initial load is complete, create an AWS DMS task to perform change data capture (CDC) until the company is ready to move all user traffic to the Aurora DB cluster.
Correct Answer
verified
Multiple Choice
A) Create an Aurora PostgreSQL DB cluster. Set up replication from the source RDS for PostgreSQL DB instance using AWS DMS to the target DB cluster.
B) Use the pg_dump and pg_restore utilities to extract and restore the RDS for PostgreSQL DB instance to the Aurora PostgreSQL DB cluster.
C) Create a database snapshot of the RDS for PostgreSQL DB instance and use this snapshot to create the Aurora PostgreSQL DB cluster.
D) Migrate data from the RDS for PostgreSQL DB instance to an Aurora PostgreSQL DB cluster using an Aurora Replica. Promote the replica during the cutover.
Correct Answer
verified
Multiple Choice
A) Disable Transparent Data Encryption (TDE) on the RDS SQL Server DB instance.
B) Modify the RDS SQL Server DB instance to use the directory for Windows authentication. Create appropriate new logins.
C) Use the AWS Management Console to create an AWS Managed Microsoft AD. Create a trust relationship with the corporate AD.
D) Stop the RDS SQL Server DB instance, modify it to use the directory for Windows authentication, and start it again. Create appropriate new logins.
E) Use the AWS Management Console to create an AD Connector. Create a trust relationship with the corporate AD.
F) Configure the AWS Managed Microsoft AD domain controller Security Group.
Correct Answer
verified
Multiple Choice
A) Use the AWS CLI to schedule a manual snapshot of the DB cluster. Restore the snapshot to a new DB cluster using the AWS CLI.
B) Create a dump file from the DB cluster. Load the dump file into a new DB cluster.
C) Schedule a job to create a clone of the DB cluster at the end of the overnight batch process.
D) Set up a new daily AWS DMS task that will use cloning and change data capture (CDC) on the DB cluster to copy the data to a new DB cluster. Set up a time for the AWS DMS stream to stop when the new cluster is current.
Correct Answer
verified
Multiple Choice
A) The scaling of Aurora storage cannot catch up with the data loading. The Database Specialist needs to modify the workload to load the data slowly.
B) The scaling of Aurora storage cannot catch up with the data loading. The Database Specialist needs to enable Aurora storage scaling.
C) The local storage used to store temporary tables is full. The Database Specialist needs to scale up the instance.
D) The local storage used to store temporary tables is full. The Database Specialist needs to enable local storage scaling.
Correct Answer
verified
Multiple Choice
A) Restart the DB cluster to apply the SSL change.
B) Instruct the Data Analysts to download the root certificate and use the SSL certificate on the connection string to connect.
C) Add explicit mappings between the Data Analysts' IP addresses and the instance in the security group assigned to the DB cluster.
D) Modify the Data Analysts' local client firewall to allow network traffic to AWS.
Correct Answer
verified
Multiple Choice
A) Use Amazon RDS automated snapshots and use AWS Lambda to copy the snapshot into another Region
B) Use Amazon RDS automated snapshots every 6 hours and use Amazon S3 cross-Region replication to copy the snapshot into another Region
C) Create an AWS Lambda function to take an Amazon RDS snapshot every 6 hours and use a second Lambda function to copy the snapshot into another Region
D) Create a cross-Region read replica for Amazon RDS in another Region and take an automated snapshot of the read replica
Correct Answer
verified
Multiple Choice
A) Create an Amazon Cloudwatch Events rule with the operations that need to be tracked on Amazon RDS. Create an AWS Lambda function to act on these rules and write the output to the tracking systems.
B) Create an AWS Lambda function to trigger on AWS CloudTrail API calls. Filter on specific RDS API calls and write the output to the tracking systems.
C) Create RDS event subscriptions. Have the tracking systems subscribe to specific RDS event system notifications.
D) Write RDS logs to Amazon Kinesis Data Firehose. Create an AWS Lambda function to act on these rules and write the output to the tracking systems.
Correct Answer
verified
Multiple Choice
A) Create an Amazon CloudWatch Events event to send a notification using Amazon SNS on every API call logged in AWS CloudTrail.
B) Subscribe to an RDS event subscription and configure it to use an Amazon SNS topic to send notifications.
C) Use Amazon SES to send notifications based on configured Amazon CloudWatch Events events.
D) Configure Amazon CloudWatch alarms on various metrics, such as FreeStorageSpace for the RDS instance.
E) Enable email notifications for AWS Trusted Advisor.
Correct Answer
verified
Multiple Choice
A) Create a second security group on the EC2 instances. Add an outbound rule to allow traffic from the ElastiCache cluster security group.
B) Delete the ElastiCache security group. Add an interface VPC endpoint to enable the EC2 instances to connect to the ElastiCache cluster.
C) Modify the ElastiCache security group by adding outbound rules that allow traffic to VPC_B's CIDR blocks from the ElastiCache cluster.
D) Modify the ElastiCache security group by adding an inbound rule that allows traffic from the EC2 instances' security group to the ElastiCache cluster.
Correct Answer
verified
Multiple Choice
A) Use an Amazon RDS DB instance deployed in the us-east-1 Region with a read replica instance in the ap-northeast-1 Region. Create an Amazon ElastiCache cluster in the ap-northeast-1 Region to cache application data from the replica to generate the dashboards.
B) Use an Amazon DynamoDB global table in the us-east-1 Region with replication into the ap-northeast-1 Region. Use Amazon QuickSight for displaying dashboard results.
C) Use an Amazon RDS for MySQL DB instance deployed in the us-east-1 Region with a read replica instance in the ap-northeast-1 Region. Have the dashboard application read from the read replica.
D) Use an Amazon Aurora global database. Deploy the writer instance in the us-east-1 Region and the replica in the ap-northeast-1 Region. Have the dashboard application read from the replica ap-northeast-1 Region.
Correct Answer
verified
Multiple Choice
A) Create a new KMS customer master key in the source Region. Switch to the destination Region, enable Amazon Redshift cross-Region snapshots, and use the KMS key of the source Region.
B) Create a new IAM role with access to the KMS key. Enable Amazon Redshift cross-Region replication using the new IAM role, and use the KMS key of the source Region.
C) Enable Amazon Redshift cross-Region snapshots in the source Region, and create a snapshot copy grant and use a KMS key in the destination Region.
D) Create a new KMS customer master key in the destination Region and create a new IAM role with access to the new KMS key. Enable Amazon Redshift cross-Region replication in the source Region and use the KMS key of the destination Region.
Correct Answer
verified
Multiple Choice
A) Create the database with the MasterUserName and MasterUserPassword properties set to the default values. Then, create the secret with the user name and password set to the same default values. Add a Secret Target Attachment resource with the SecretId and TargetId properties set to the Amazon Resource Names (ARNs) of the secret and the database. Finally, update the secret's password value with a randomly generated string set by the GenerateSecretString property.
B) Add a Mapping property from the database Amazon Resource Name (ARN) to the secret ARN. Then, create the secret with a chosen user name and a randomly generated password set by the GenerateSecretString property. Add the database with the MasterUserName and MasterUserPassword properties set to the user name of the secret.
C) Add a resource of type AWS::SecretsManager::Secret and specify the GenerateSecretString property. Then, define the database user name in the SecureStringTemplate template. Create a resource for the database and reference the secret string for the MasterUserName and MasterUserPassword properties. Then, add a resource of type AWS::SecretsManagerSecretTargetAttachment with the SecretId and TargetId properties set to the Amazon Resource Names (ARNs) of the secret and the database.
D) Create the secret with a chosen user name and a randomly generated password set by the GenerateSecretString property. Add an SecretTargetAttachment resource with the SecretId property set to the Amazon Resource Name (ARN) of the secret and the TargetId property set to a parameter value matching the desired database ARN. Then, create a database with the MasterUserName and MasterUserPassword properties set to the previously created values in the secret.
Correct Answer
verified
Multiple Choice
A) Stop the DB instance and modify it to enable encryption. Apply this setting immediately without waiting for the next scheduled RDS maintenance window.
B) Stop the DB instance and create an encrypted snapshot. Restore the encrypted snapshot to a new encrypted DB instance. Delete the original DB instance, and update the applications to point to the new encrypted DB instance.
C) Stop the DB instance and create a snapshot. Copy the snapshot into another encrypted snapshot. Restore the encrypted snapshot to a new encrypted DB instance. Delete the original DB instance, and update the applications to point to the new encrypted DB instance.
D) Create an encrypted read replica of the DB instance. Promote the read replica to master. Delete the original DB instance, and update the applications to point to the new encrypted DB instance.
Correct Answer
verified
Showing 121 - 140 of 156
Related Exams