wayne-c
Forum Replies Created
-
Hi ray712,
Thanks for your inquiry.
A spread placement group can span multiple Availability Zones in the same Region. You can have a maximum of seven running instances per Availability Zone per group.
Reference: Placement groups – Amazon Elastic Compute Cloud
This means that you can deploy the 12 instances in the same region. I hope this helps.
Let us know if you need further assistance. The Tutorials Dojo team is dedicated to help you pass your AWS exam on your first try!
-
Thanks Steve for raising this issue. Please take note that there are two types of metrics:
1. Amazon EC2 CloudWatch metrics ( CPUUtilization, DiskReadBytes, NetworkIn etc..)
2. Auto Scaling Group metrics ( GroupInServiceInstances, GroupPendingInstances etc…)
Let’s look at the piece of documentation that you presented. It says:
“Amazon EC2 Auto Scaling publishes data points to CloudWatch about your Auto Scaling groups. The metrics are available at 1-minute granularity at no additional charge, but you must enable them. By doing this, you get continuous visibility into the operations of your Auto Scaling groups so that you can quickly respond to changes in your workloads. ”
Reference:
https://docs.aws.amazon.com/autoscaling/ec2/userguide/as-instance-monitoring.html
Please take note that this paragraph is referring to the Auto Scaling Group Metrics ( GroupInServiceInstances, GroupPendingInstances etc…) and not the Amazon EC2 CloudWatch metrics ( CPUUtilization, DiskReadBytes, NetworkIn etc..), which is being asked in the scenario.
The Auto Scaling Group metrics are available at 1-minute granularity at no charge, but not its underlying Amazon EC2 instance metrics.
Hope this clarifies.
-
Hi slawoj,
Thanks for the feedback.
AWS KMS generates data keys which are used to encrypt data locally in the AWS service or your application. The data keys are themselves encrypted under a CMK you define. Data keys are not retained or managed by AWS KMS. AWS services encrypt your data and store an encrypted copy of the data key along with the encrypted data. When a service needs to decrypt your data, it requests AWS KMS to decrypt the data key using your CMK. If the user requesting data from the AWS service is authorized to decrypt under your CMK, the AWS service will receive the decrypted data key from AWS KMS. The AWS service then decrypts your data and returns it in plaintext.
Reference: https://aws.amazon.com/kms/faqs/
The data keys are encrypted under a CMK you define in AWS KMS which makes the “Encrypt data in S3 and Glacier using AWS provided encryption services, and store the encryption keys in KMS.” option correct. CMKs are encryption keys since they are used to encrypt the data keys stored in AWS.
Let us know if you need further assistance. The Tutorials Dojo team is dedicated to help you pass your AWS exam on your first try!
Regards,
Wayne @ Tutorials Dojo
-
Hi Akshays,
Thanks for the inquiry.
The main difference between the two questions are the keywords which are:
1. “there are neither private nor alias IP addresses available that you can use in the VPC network”, and
2. “no more IP addresses available that you can use in the SUBNET”.
Having no available addresses in the subnet doesn’t mean there are no available address in the VPC. Which means you can expand the IP range of subnet since there are available addresses in the VPC. Meanwhile, if a VPC does not have available IPs anymore, you’ll need to setup a new VPC network and peer it so that resources in the VPC with fully utilized IPs can communicate to your new resources in the new VPC.
I hope this helps.
Let us know if you need further assistance. The Tutorials Dojo team is dedicated to help you pass your AWS exam on your first try!
Regards,
Wayne @ Tutorials Dojo
-
Hi EJCS,
Thanks for the feedback.
We have updated the scenario and the change will be reflected in our practice tests soon.
Let us know if you need further assistance. The Tutorials Dojo team is dedicated to help you pass your AWS exam on your first try!
Regards,
Wayne @ Tutorials Dojo
-
Hi Jurkinss,
Thank you for sharing your feedback.
Hosting templates in Google Cloud Storage let you to control who has access to the templates because you can set access control options on the respective Cloud Storage bucket or the specific template.
In contrast, hosting your templates on other publicly-accessible URLs requires that you make the templates widely available.
We have updated the explanation for Cloud Source Repositories and the change will be reflected in our practice tests soon.
Let us know if you need further assistance. The Tutorials Dojo team is dedicated to help you pass your AWS exam on your first try!
Regards,
Wayne @ Tutorials Dojo
- This reply was modified 3 years, 2 months ago by wayne-c.
-
Hi Clement,
Thank you for sharing your feedback.
We have updated the scenario and the change will be reflected in our practice tests soon.
Let us know if you need further assistance. The Tutorials Dojo team is dedicated to help you pass your AWS exam on your first try!
Regards,
Wayne @ Tutorials Dojo