Want to pass your AWS Certified SysOps Administrator - Associate (SOA-C01) SOA-C01 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
You have two Elastic Compute Cloud (EC2) instances inside a Virtual Private Cloud (VPC) in the same Availability Zone (AZ) but in different subnets. One instance is running a database and the other instance an application that will interface with the database. You want to confirm that they can talk to each other for your application to work properly. Which two things do we need to confirm in the VPC settings so that these EC2 instances can communicate inside the VPC? (Choose two.)
A. A network ACL that allows communication between the two subnets.
B. Both instances are the same instance class and using the same Key-pair.
C. That the default route is set to a NAT instance or internet Gateway (IGW) for them to communicate.
D. Security groups are set to allow the application host to talk to the database on the right port/protocol.
A SysOps Administrator receives a connection timeout error when attempting to connect to an Amazon EC2 instance from a home network using SSH. The Administrator was able to connect to this EC2 instance using from their office network in the past.
What caused the connection to time out?
A. The IAM role associated with the EC2 instance does not allow SSH connections from the home network.
B. The public key used by SSH located on the Administrator's server does not have the required permissions.
C. The route table contains a route that sends 0.0.0.0/0 to the internet gateway for the VPC.
D. The security group is not allowing inbound traffic from the home network on the SSH port.
An enterprise is using federated Security Assertion Markup Language (SAML) to access the AWS Management Console.
How should the SAML assertion mapping be configured?
A. Map the group attribute to an AWS group. The AWS group is assigned IAM policies that govern access to AWS resources.
B. Map the policy attribute to IAM policies the federated user is assigned to. These policies govern access to AWS resources.
C. Map the role attribute to an AWS role. The AWS role is assigned IAM policies that govern access to AWS resources.
D. Map the user attribute to an AWS user. The AWS user is assigned specific IAM policies that govern access to AWS resources.