exam questions

Exam AWS Certified SysOps Administrator - Associate All Questions

View all questions & answers for the AWS Certified SysOps Administrator - Associate exam

Exam AWS Certified SysOps Administrator - Associate topic 1 question 114 discussion

A SysOps administrator has an AWS CloudFormation template that is used to deploy an encrypted Amazon Machine Image (AMI). The CloudFormation template will be used in a second account so the SysOps administrator copies the encrypted AMI to the second account. When launching the new CloudFormation stack in the second account, it fails.
Which action should the SysOps administrator take to correct the issue?

  • A. Change the AMI permissions to mark the AMI as public.
  • B. Deregister the AMI in the source account.
  • C. Re-encrypt the destination AMI with an AWS Key Management Service (AWS KMS) key from the destination account.
  • D. Update the CloudFormation template with the ID of the AMI in the destination account.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
princajen
Highly Voted 2 years, 7 months ago
Selected Answer: C
C! While launching the instance from a shared encrypted AMI, you can specify a KMS key of your choice. You may also choose cmkSource to encrypt volumes in your account. However, we recommend that you re-encrypt the volumes using a KMS key in the target account. This protects you if the source KMS key is compromised, or if the source account revokes permissions, which could cause you to lose access to any encrypted volumes you created using cmkSource. https://aws.amazon.com/blogs/security/how-to-share-encrypted-amis-across-accounts-to-launch-encrypted-ec2-instances/
upvoted 10 times
TareDHakim
1 year, 3 months ago
thanks for the URL - however, this URL indicates the answer is actually D and NOT C.
upvoted 2 times
...
...
braveheart22
Highly Voted 2 years, 1 month ago
I'm inclined toward D in every sense.
upvoted 7 times
tamng
1 year, 3 months ago
C is correct
upvoted 1 times
...
...
OlehKom
Most Recent 4 months, 1 week ago
Selected Answer: C
D only can be a valid solution if it explicitly says that the 2d has access to the shared AMI and KSM key. Only after that you could update the template with the existing AMI id BUT it’s not explicitly mentioned that the second account has been granted access to the encrypted AMI or the KMS key. Without explicitly granting access, the second account cannot use the AMI. This is why re-encryption in the second account can be a necessary step to ensure smooth deployment, so C
upvoted 1 times
...
numark
5 months ago
Answer is D: When an encrypted Amazon Machine Image (AMI) is copied to another AWS account, it gets a new AMI ID in the destination account. The CloudFormation template in the second account must reference the new AMI ID to successfully launch the stack. Not C: While this step is often part of copying an encrypted AMI between accounts, it does not fix the issue in this scenario. The new AMI in the destination account is already encrypted with a KMS key from the second account. The failure occurs because the CloudFormation template is still referencing the old AMI ID.
upvoted 1 times
...
tsangckl
11 months ago
Selected Answer: D
By copilot The SysOps administrator should take action D. Update the CloudFormation template with the ID of the AMI in the destination account. When an AMI is copied to another account, it gets a new AMI ID. The CloudFormation template in the second account is likely still referencing the AMI ID from the original account, which is causing the stack deployment to fail. By updating the template with the new AMI ID, the stack deployment should proceed without issues. Other options (A, B, C) are not relevant to the issue described.
upvoted 4 times
tsangckl
11 months ago
When you copy an AMI, the copied AMI is encrypted using the same AWS KMS key as the original AMI, by default. If the original AMI is encrypted with a default EBS key, the copied AMI will also be encrypted with a default EBS key, and this key will be unique to the account to which the AMI is copied. Therefore, there’s no need to re-encrypt the AMI in the destination account.vThe issue here is that the CloudFormation template is still referencing the old AMI ID from the source account, which is not recognized in the destination account. Hence, updating the CloudFormation template with the new AMI ID (option D) is the correct action to resolve the issue.
upvoted 3 times
...
...
AgboolaKun
11 months, 1 week ago
Selected Answer: C
Sincerely, any of the C or D could cause the template to fail. However, I will go for C since the emphasis is on encryption and best practice in this situation expects that you re-encrypt the volumes using a KMS key in the destination account.
upvoted 1 times
...
a6a3d55
1 year ago
Selected Answer: D
Even if you reencrypt it will still not work until the AMI ID is changed in the template
upvoted 3 times
...
seetpt
1 year ago
Selected Answer: C
I vote for C
upvoted 1 times
...
stoy123
1 year, 1 month ago
Selected Answer: D
D for sure
upvoted 4 times
...
henro4niger
1 year, 2 months ago
I will go with D. Why do I need to re-encrypt the ami in the second account when I can just update the template with the ami ID of the target account? D is definitely the answer, moreover, C will introduce serious complexity
upvoted 1 times
vivanchyk
1 year, 1 month ago
While it is necessary to update the CloudFormation template with the new AMI ID after copying it to the destination account, this action alone won't solve the encryption key access issue. The failure is likely due to the lack of access to the KMS key, not merely the AMI ID reference When an AMI is encrypted, it is done so using a specific AWS Key Management Service (KMS) key. If you copy an encrypted AMI to another AWS account, the destination account needs appropriate permissions to use the KMS key that encrypted the AMI, or the AMI needs to be re-encrypted with a KMS key that belongs to the destination account.
upvoted 1 times
...
...
xdkonorek2
1 year, 3 months ago
Selected Answer: D
Definitely D Copied AMI already is encrypted by KMS key that is stored in target aws account.
upvoted 2 times
vivanchyk
1 year, 1 month ago
where is it said that "Copied AMI already is encrypted by KMS key that is stored in target aws account." ???
upvoted 1 times
Aamee
7 months, 1 week ago
See this comment by a user above. This is what he said to justify the ans. D selection is correct here: "When you copy an AMI, the copied AMI is encrypted using the same AWS KMS key as the original AMI, by default. If the original AMI is encrypted with a default EBS key, the copied AMI will also be encrypted with a default EBS key, and this key will be unique to the account to which the AMI is copied. "
upvoted 1 times
...
...
...
tamng
1 year, 3 months ago
C not D
upvoted 1 times
...
Hatem08
1 year, 4 months ago
Selected Answer: C
ccccccc
upvoted 2 times
...
alexiscloud
1 year, 5 months ago
Answer is C
upvoted 2 times
...
TwinSpark
1 year, 6 months ago
Selected Answer: D
"Copying a source AMI results in an identical but distinct target AMI with its own unique identifier. You can change or deregister the source AMI with no effect on the target AMI. The reverse is also true." https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/CopyingAMIs.html
upvoted 5 times
...
teo2157
1 year, 6 months ago
Selected Answer: D
It's D based on this post: https://aws.amazon.com/es/blogs/security/how-to-share-encrypted-amis-across-accounts-to-launch-encrypted-ec2-instances/ To launch an AMI that was shared with you, set the AMI ID of the shared AMI in the image-id parameter of Run-Instances API/CLI. Optionally, to re-encrypt the volumes with a custom CMK in your account, you can specify the KmsKeyId in the Block Device Mapping as follows.
upvoted 3 times
...
Bhrino
2 years, 1 month ago
Selected Answer: C
its c because you cannot copy amis from one acount to a different and the destination accounts cannot use the the same key so you'd have to re encrypt it
upvoted 4 times
jipark
1 year, 8 months ago
I agree
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago