Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam AWS Certified SysOps Administrator - Associate All Questions

View all questions & answers for the AWS Certified SysOps Administrator - Associate exam

Exam AWS Certified SysOps Administrator - Associate topic 1 question 56 discussion

An organization created an Amazon Elastic File System (Amazon EFS) volume with a file system ID of fs-85ba41fc, and it is actively used by 10 Amazon EC2 hosts. The organization has become concerned that the file system is not encrypted.
How can this be resolved?

  • A. Enable encryption on each host's connection to the Amazon EFS volume. Each connection must be recreated for encryption to take effect.
  • B. Enable encryption on the existing EFS volume by using the AWS Command Line Interface.
  • C. Enable encryption on each host's local drive. Restart each host to encrypt the drive.
  • D. Enable encryption on a newly created volume and copy all data from the original volume. Reconnect each host to the new volume.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jkwek
Highly Voted 3 years, 1 month ago
D is correct. https://docs.aws.amazon.com/efs/latest/ug/encryption.html Amazon EFS supports two forms of encryption for file systems, encryption of data in transit and encryption at rest. You can enable encryption of data at rest when creating an Amazon EFS file system. You can enable encryption of data in transit when you mount the file system.
upvoted 18 times
...
rcptryk
Most Recent 9 hours, 18 minutes ago
Selected Answer: D
Encryption at rest can't be modified. https://docs.aws.amazon.com/efs/latest/ug/encryption-at-rest.html#:~:text=You%20can%20create,encrypted%20file%20system.
upvoted 1 times
...
gehadg
2 weeks, 1 day ago
Encryption at Rest: Amazon EFS encryption at rest can only be enabled at the time of creation. It is not possible to enable encryption on an existing EFS file system after it has been created. Therefore, to have an encrypted EFS volume, you must create a new EFS volume with encryption enabled and then migrate the data from the old volume. Other Options: Option A: Encryption on each host’s connection to EFS does not exist as an option. Encryption in transit is handled by EFS using TLS automatically. Option B: There is no command to enable encryption on an existing EFS volume. Option C: Encrypting each host’s local drive does not impact the EFS volume’s encryption state. Correct Answer: D
upvoted 2 times
...
james2033
8 months, 3 weeks ago
Selected Answer: D
A --> encrypt connection --> false. B --> encrypt exist EFS volume (need create new, then migrate to new one) --> false C --> Encrypt each's host local drive --> No, need create new one, then encrypt new one, then migrate --> causes C wrong. D --> It is admited practice with encryption: Create new one, encrypt new one, migrate to that.
upvoted 2 times
...
noahsark
1 year, 10 months ago
Selected Answer: D
Enable encryption on a newly created volume and copy all data from the original volume. Reconnect each host to the new volume. https://aws.amazon.com/premiumsupport/knowledge-center/efs-turn-on-encryption-at-rest/
upvoted 2 times
...
squeeze_talus0y
1 year, 10 months ago
Selected Answer: D
Encryption at rest can't be enabled after the EFS volume has been created.
upvoted 3 times
...
MrMLB
1 year, 11 months ago
Selected Answer: B
B The best solution for resolving this issue is to enable encryption on the existing EFS volume by using the AWS Command Line Interface. This will allow the organization to encrypt the data on the file system without having to recreate any connections or copy any data. Option A involves enabling encryption on each host's connection to the EFS volume, but this would require each connection to be recreated for encryption to take effect. Option C involves enabling encryption on each host's local drive, but this would not encrypt the data on the EFS volume. Option D involves creating a new volume and copying all data from the original volume, but this would be time-consuming and would require each host to be reconnected to the new volume. Enabling encryption on the existing EFS volume using the AWS CLI is the most efficient and effective solution.
upvoted 1 times
noahsark
1 year, 10 months ago
B is wrong. D is correct. Enable encryption on a newly created volume and copy all data from the original volume. Reconnect each host to the new volume. https://aws.amazon.com/premiumsupport/knowledge-center/efs-turn-on-encryption-at-rest/
upvoted 2 times
...
foreverlearner
1 year, 10 months ago
I noticed a few (wrong) answers like this, and they looked like if they were generated by ChatGPT. So I tried it, and it basically gave me the same answer (just slightly longer but most words are exactly the same). Kind of surprised that ChatGPT is wrong, though, as the AWS doc clearly says "Once you create an EFS file system, you cannot change its encryption setting. This means that you cannot modify an unencrypted file system to make it encrypted. Instead, you need to create a new, encrypted file system." (https://docs.aws.amazon.com/efs/latest/ug/encryption-at-rest.html) Kind of fun that, if you tell ChatGPT the right answer, it apologies, it admits it's wrong, and also provides with instructions on how to copy the files :D
upvoted 2 times
...
...
MrMLB
1 year, 11 months ago
B The best solution for resolving this issue is to enable encryption on the existing EFS volume by using the AWS Command Line Interface. This will allow the organization to encrypt the data on the file system without having to recreate any connections or copy any data. Option A involves enabling encryption on each host's connection to the EFS volume, but this would require each connection to be recreated for encryption to take effect. Option C involves enabling encryption on each host's local drive, but this would not encrypt the data on the EFS volume. Option D involves creating a new volume and copying all data from the original volume, but this would be time-consuming and would require each host to be reconnected to the new volume. Enabling encryption on the existing EFS volume using the AWS CLI is the most efficient and effective solution.
upvoted 1 times
noahsark
1 year, 10 months ago
B is wrong. D is correct. Enable encryption on a newly created volume and copy all data from the original volume. Reconnect each host to the new volume. https://aws.amazon.com/premiumsupport/knowledge-center/efs-turn-on-encryption-at-rest/
upvoted 1 times
...
...
michaldavid
1 year, 11 months ago
Selected Answer: D
ddddddddd
upvoted 1 times
...
Masoud11
2 years ago
Selected Answer: D
100% D
upvoted 1 times
...
Starboy
2 years, 1 month ago
D is correct as you can't encrypt after the creation of EFS volume.
upvoted 1 times
...
Finger41
2 years, 5 months ago
Selected Answer: D
D -https://docs.aws.amazon.com/efs/latest/ug/encryption-at-rest.html
upvoted 2 times
...
szl0144
2 years, 10 months ago
vote D
upvoted 1 times
...
nqthien041292
2 years, 12 months ago
Selected Answer: D
Vote D
upvoted 3 times
...
jkwek
3 years, 1 month ago
The reasoning here for answer D is there is no details for existing data encryption. So to play safe, better encrypt then copy data over.
upvoted 3 times
...
RicardoD
3 years, 1 month ago
D is the answer
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...