A user working in the Amazon EC2 console increased the size of an Amazon Elastic Block Store(Amazon EBS) volume attached to an Amazon EC2 Windows instance. The change is not reflected in the file system.What should a CloudOps engineer do to resolve this issue?
Answer(s): A
When an Amazon EBS volume is resized, the new storage capacity is immediately available to the attached EC2 instance. However, EBS does not automatically extend the file system. The CloudOps engineer must manually extend the file system within the operating system to utilize the additional space.AWS documentation for EC2 and EBS specifies:"After you increase the size of an EBS volume, use file systemspecific tools to extend the file system so that the operating system can use the new storage capacity."On Windows instances, this can be achieved through Disk Management or diskpart commands. On Linux systems, utilities such as growpart and resize2fs are used.Options B and C do not modify file system metadata and are ineffective. Option D unnecessarily replaces the volume, which adds risk and downtime. Thus, Option A aligns with the Monitoring and Performance Optimization practices of AWS CloudOps by properly extending the file system to recognize the new capacity.
· AWS Certified CloudOps Engineer Associate (SOA-C03) Exam Guide Domain 1· Amazon EBS Modifying EBS Volumes· Amazon EC2 User Guide Extending a File System After Resizing a Volume · AWS Well-Architected Framework Performance Efficiency Pillar
Optimization]A company has a workload that is sending log data to Amazon CloudWatch Logs. One of the fields includes a measure of application latency. A CloudOps engineer needs to monitor the p90 statistic of this field over time.What should the CloudOps engineer do to meet this requirement?
Answer(s): B
To analyze and visualize custom statistics such as the p90 latency (90th percentile), a CloudWatch metric must be generated from the log data. The correct method is to create a metric filter that extracts the latency value from each log event and publishes it as a CloudWatch metric. Once the metric is published, percentile statistics (p90, p95, etc.) can be displayed in CloudWatch dashboards or alarms.AWS documentation states:"You can use metric filters to extract numerical fields from log events and publish them as metrics in CloudWatch. CloudWatch supports percentile statistics such as p90 and p95 for these metrics."Contributor Insights (Option A) is for analyzing frequent contributors, not numeric distributions. Subscription filters (Option C) are used for log streaming, and Application Insights (Option D)provides monitoring of application health but not custom p90 statistics. Hence, Option B is the CloudOps-aligned, minimal-overhead solution for percentile latency monitoring.
· AWS Certified CloudOps Engineer Associate (SOA-C03) Exam Guide Domain 1: Monitoring and Logging· Amazon CloudWatch Logs Metric Filters· AWS Well-Architected Framework Operational Excellence Pillar
A company is running an application on premises and wants to use AWS for data backup. All of the data must be available locally. The backup application can write only to block-based storage that is compatible with the Portable Operating System Interface (POSIX).Which backup solution will meet these requirements?
Answer(s): D
The Storage Gateway service enables hybrid cloud backup by presenting local block storage that synchronizes with AWS cloud storage. For scenarios where all data must remain available locally while still backed up to AWS, the correct mode is gateway-stored volumes.AWS documentation defines:"Use stored volumes if you want to keep all your data locally while asynchronously backing up point- in-time snapshots to Amazon S3 for durable storage."These volumes expose an iSCSI interface compatible with POSIX file systems, allowing direct use by on-premises backup software.Gateway-cached volumes (Option C) store primary data in AWS with limited local cache, violating the "all data must be available locally" requirement. Options A and B are object-based storage solutions, not compatible with POSIX or block-based backup applications.Therefore, Option D fully satisfies CloudOps reliability and continuity best practices by ensuring local availability, cloud durability, and POSIX compatibility for backups.
· AWS Certified CloudOps Engineer Associate (SOA-C03) Exam Guide Domain 2: Reliability and Business Continuity· AWS Storage Gateway User Guide Stored Volumes Overview· AWS Well-Architected Framework Reliability Pillar· AWS Hybrid Cloud Storage Best Practices
A CloudOps engineer needs to control access to groups of Amazon EC2 instances using AWS Systems Manager Session Manager. Specific tags on the EC2 instances have already been added.Which additional actions should the CloudOps engineer take to control access? (Select TWO.)
Answer(s): A,E
AWS Systems Manager Session Manager allows secure, auditable instance access without SSH keys or inbound ports. To control access based on instance tags, CloudOps best practices require two configurations:Attach an IAM policy to users or groups granting ssm:StartSession, ssm:DescribeInstanceInformation, and ssm:DescribeSessions.Include a Condition element in the IAM policy referencing instance tags, such as Condition:{"StringEquals": {"ssm:resourceTag/Environment": "Production"}}.This ensures users can start sessions only with instances that have matching tags, providing fine- grained access control.AWS CloudOps documentation under Security and Compliance states:"Use IAM policies with resource tags in the Condition element to restrict which managed instances users can access using Session Manager."Options B and D incorrectly suggest attaching roles or service accounts that are not relevant to user- level access control. Option C (placement groups) pertains to networking and performance, not access management. Therefore, A and E together provide tag-based, least-privilege access as required.
· AWS Certified CloudOps Engineer Associate (SOA-C03) Exam Guide Domain 4: Security and Compliance· AWS Systems Manager User Guide Controlling Access to Session Manager Using Tags· AWS IAM Policy Reference Condition Keys for AWS Systems Manager· AWS Well-Architected Framework Security Pillar
A global gaming company is preparing to launch a new game on AWS. The game runs in multiple AWS Regions on a fleet of Amazon EC2 instances. The instances are in an Auto Scaling group behind an Application Load Balancer (ALB) in each Region. The company plans to use Amazon Route 53 for DNS services. The DNS configuration must direct users to the Region that is closest to them and must provide automated failover.Which combination of steps should a CloudOps engineer take to configure Route 53 to meet these requirements? (Select TWO.)
Answer(s): A,D
The combination of geoproximity routing and DNS failover health checks provides global low-latency routing with high availability.Geoproximity routing in Route 53 routes users to the AWS Region closest to their geographic location, optimizing latency. For automatic failover, Route 53 health checks can monitor CloudWatch alarms tied to the health of the ALB in each Region. When a Region becomes unhealthy, Route 53 reroutes traffic to the next available Region automatically.AWS documentation states:"Use geoproximity routing to direct users to resources based on geographic location, and configure health checks to provide DNS failover for high availability."Option B incorrectly monitors EC2 instances directly, which is not efficient at scale. Option C uses private IPs, which cannot be globally health-checked. Option E (simple routing) does not support geographic or failover routing. Hence, A and D together meet both the proximity and failover requirements.
· AWS Certified CloudOps Engineer Associate (SOA-C03) Exam Guide Domain 5: Networking and Content Delivery· Amazon Route 53 Developer Guide Geoproximity Routing and DNS Failover· AWS Well-Architected Framework Reliability Pillar· Amazon CloudWatch Alarms Integration with Route 53 Health Checks
A company requires the rotation of administrative credentials for production workloads on a regular basis. A CloudOps engineer must implement this policy for an Amazon RDS DB instance's master user password.Which solution will meet this requirement with the LEAST operational effort?
AWS Secrets Manager natively supports credential management and automatic rotation for Amazon RDS master user passwords. When a secret is associated with an RDS instance, Secrets Manager automatically updates the password both in the secret and on the database, without downtime or manual scripting.AWS documentation confirms:"AWS Secrets Manager can automatically rotate the master user password for Amazon RDS databases. Rotation is fully managed and integrated, requiring no custom code or maintenance."Option A introduces unnecessary Lambda automation. Option B and C use Parameter Store, which does not provide direct RDS password rotation. Therefore, Option D achieves secure, automatic credential rotation with least operational effort, fully aligned with CloudOps security automation principles.
· AWS Certified CloudOps Engineer Associate (SOA-C03) Exam Guide Domain 4: Security and Compliance· AWS Secrets Manager Rotating Secrets for Amazon RDS· AWS Well-Architected Framework Security Pillar· Amazon RDS User Guide Managing Master User Passwords
A company has a microservice that runs on a set of Amazon EC2 instances. The EC2 instances run behind an Application Load Balancer (ALB).A CloudOps engineer must use Amazon Route 53 to create a record that maps the ALB URL to example.com.Which type of record will meet this requirement?
Answer(s): C
An alias record is the recommended Route 53 record type to map domain names (e.g., example.com) to AWS-managed resources such as an Application Load Balancer. Alias records are extension types of A or AAAA records that support AWS resources directly, providing automatic DNS integration and no additional query costs.AWS documentation states:"Use alias records to map your domain or subdomain to an AWS resource such as an Application Load Balancer, CloudFront distribution, or S3 website endpoint."A and AAAA records are used for static IP addresses, not load balancers. CNAME records cannot be used at the root domain (e.g., example.com). Thus, Option C is correct as it meets CloudOps networking best practices for scalable, managed DNS resolution to ALBs.
· AWS Certified CloudOps Engineer Associate (SOA-C03) Exam Guide Domain 5: Networking and Content Delivery· Amazon Route 53 Developer Guide Alias Records· AWS Well-Architected Framework Reliability and Performance Efficiency Pillars· Elastic Load Balancing Integrating with Route 53
Application A runs on Amazon EC2 instances behind a Network Load Balancer (NLB). The EC2 instances are in an Auto Scaling group and are in the same subnet that is associated with the NLB. Other applications from an on-premises environment cannot communicate with Application A on port 8080.To troubleshoot the issue, a CloudOps engineer analyzes the flow logs. The flow logs include the following records:ACCEPT from 192.168.0.13:59003 172.31.16.139:8080REJECT from 172.31.16.139:8080 192.168.0.13:59003What is the reason for the rejected traffic?
Comprehensive and Detailed Explanation From Exact Extract of AWS CloudOps Doocuments:VPC Flow Logs show the request arriving and being ACCEPTed on dstport 8080 and the corresponding response being REJECTed on the return path to the client's ephemeral port (59003). AWS networking guidance states that security groups are stateful (return traffic is automatically allowed) while network ACLs are stateless and require explicit inbound and outbound rules for both directions. CloudOps operational guidance for VPC networking further notes that when you allow an inbound request (for example, TCP 8080) through a subnet's network ACL, you must also allow the outbound ephemeral port range (typically 102465535) for the response traffic; otherwise, the return packets are dropped and appear as REJECT in flow logs. The observed pattern--request accepted to 8080, response rejected to 59003--matches a missing outbound ephemeral-range allow on the subnet's NACL. Therefore, the cause is the subnet NACL, not security groups or on-premises ACLs. The remediation is to add an outbound ALLOW rule on the NACL for the appropriate ephemeral TCP port range back to the on-premises CIDR (and the corresponding inbound rule if asymmetric).
· AWS Certified CloudOps Engineer Associate (SOA-C03) Exam Guide Networking and Content Delivery· Amazon VPC Network ACLs (stateless behavior and rule requirements)· Amazon VPC Security Groups (stateful return traffic)· VPC Flow Logs Record fields, ACCEPT/REJECT analysis
Share your comments for Amazon SOA-C03 exam with other users:
tomAws 7/18/2023 5:05:00 AM
nice questions