exam questions

Exam AWS Certified Solutions Architect - Professional SAP-C02 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Professional SAP-C02 exam

Exam AWS Certified Solutions Architect - Professional SAP-C02 topic 1 question 113 discussion

A company is developing and hosting several projects in the AWS Cloud. The projects are developed across multiple AWS accounts under the same organization in AWS Organizations. The company requires the cost for cloud infrastructure to be allocated to the owning project. The team responsible for all of the AWS accounts has discovered that several Amazon EC2 instances are lacking the Project tag used for cost allocation.

Which actions should a solutions architect lake to resolve the problem and prevent it from happening in the future? (Choose three.)

  • A. Create an AWS Config rule in each account to find resources with missing tags.
  • B. Create an SCP in the organization with a deny action for ec2:RunInstances if the Project tag is missing.
  • C. Use Amazon Inspector in the organization to find resources with missing tags.
  • D. Create an IAM policy in each account with a deny action for ec2:RunInstances if the Project tag is missing.
  • E. Create an AWS Config aggregator for the organization to collect a list of EC2 instances with the missing Project tag.
  • F. Use AWS Security Hub to aggregate a list of EC2 instances with the missing Project tag.
Show Suggested Answer Hide Answer
Suggested Answer: ABE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
God_Is_Love
Highly Voted 2 years, 1 month ago
Selected Answer: ABE
If config rule is added (A) it can be seen in AWS Config aggregator (E) Using SCP in as aws organization is used here in question. So, A,B,E
upvoted 7 times
God_Is_Love
2 years, 1 month ago
If there are no organizations used, D can be used to prevent EC2 run instances too, C is for vulnerabilities checking..F for all security issues consolidated..
upvoted 4 times
...
...
OCHT
Highly Voted 2 years ago
Selected Answer: ABE
A. Create an AWS Config rule in each account to find resources with missing tags. By creating an AWS Config rule in each account, you can check if resources are missing tags or have tags that are not conforming to your organization's standards. You can also use AWS Config to automatically remediate non-compliant resources by applying tags. This can help ensure that resources are properly tagged for cost allocation purposes. Here is the AWS Config documentation for creating rules: https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_use-managed-rules.html
upvoted 5 times
OCHT
2 years ago
E. Create an AWS Config aggregator for the organization to collect a list of EC2 instances with the missing Project tag. By creating an AWS Config aggregator, you can collect a list of EC2 instances across multiple accounts in the organization that are missing the required Project tag. This can help you identify instances that need to be tagged properly for cost allocation. Here is the AWS Config documentation for creating aggregators: https://docs.aws.amazon.com/config/latest/developerguide/config-aggregator.html
upvoted 7 times
AWSLord32
1 year, 3 months ago
So what is the point of having A if you have E at an Org level?
upvoted 2 times
fartosh
11 months ago
AWS Config aggregator does not run any rules on its own. Instead, it collects the data from the "source accounts" where AWS Config is enabled. A to get the list of EC2 instances in each account. E to aggregate the lists from all accounts in one place. B to disallow creating non-compliant EC2 instances. See https://docs.aws.amazon.com/config/latest/developerguide/aggregate-data.html.
upvoted 3 times
...
...
...
OCHT
2 years ago
B. Create an SCP in the organization with a deny action for ec2:RunInstances if the Project tag is missing. By creating a Service Control Policy (SCP) in the organization, you can enforce a deny action for EC2 instances that do not have the required Project tag. This can prevent users from launching instances that are not tagged correctly and ensure that new instances are tagged properly for cost allocation. Here is the AWS Organizations documentation for creating SCPs: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html
upvoted 5 times
...
...
amministrazione
Most Recent 7 months, 3 weeks ago
A. Create an AWS Config rule in each account to find resources with missing tags. B. Create an SCP in the organization with a deny action for ec2:RunInstances if the Project tag is missing. E. Create an AWS Config aggregator for the organization to collect a list of EC2 instances with the missing Project tag.
upvoted 1 times
...
gofavad926
1 year, 1 month ago
Selected Answer: ABE
ABE, SCP + Config + Config Aggregator
upvoted 1 times
...
Dgix
1 year, 1 month ago
Selected Answer: BE
B and E handle the requirements in a centralised manner, giving least operational overhead, without anything needing to be added. The question is plainly wrongly stated. If three options have to be selected, then A is the least absurd one.
upvoted 3 times
...
8608f25
1 year, 2 months ago
Selected Answer: ABE
A. Create an AWS Config rule in each account to find resources with missing tags.AWS Config can evaluate the configuration of your AWS resources and identify resources that do not comply with specified requirements, such as missing specific tags. This helps in identifying existing resources with the issue. B. Create an SCP in the organization with a deny action for ec2:RunInstances if the Project tag is missing.Service Control Policies (SCPs) can enforce permissions across all accounts in an organization. By creating an SCP that denies launching EC2 instances without the required Project tag, you can prevent the problem from occurring in the future at the organization level. E. Create an AWS Config aggregator for the organization to collect a list of EC2 instances with the missing Project tag.An AWS Config aggregator can aggregate compliance data from multiple accounts and regions. This allows for centralized visibility of instances lacking the required tags, making it easier to address and resolve the issue across the entire organization.
upvoted 2 times
...
AWSLord32
1 year, 3 months ago
Selected Answer: BDE
A is not needed if you have D. Correct answer is BDE.
upvoted 1 times
AWSLord32
1 year, 3 months ago
I meant E, not D
upvoted 1 times
8608f25
1 year, 2 months ago
It is not D. Create an IAM policy in each account with a deny action for ec2:RunInstances if the Project tag is missing. IAM policies do not directly support conditional denies based on tag presence during the resource creation process in the same way SCPs do. This enforcement is better handled at the organization level with SCPs.
upvoted 1 times
...
...
...
career360guru
1 year, 4 months ago
Selected Answer: ABE
Option A, B and E
upvoted 1 times
...
Sandeep_B
1 year, 6 months ago
Selected Answer: ABE
Inspector checks for Vulnerabilities but not the tags.
upvoted 3 times
...
NikkyDicky
1 year, 9 months ago
Selected Answer: ABE
its ABE
upvoted 2 times
...
youngmanaws
2 years ago
A. AWS Config allows you to remediate noncompliant resources that are evaluated by AWS Config Rules. AWS Config applies remediation using AWS Systems Manager Automation documents. These documents define the actions to be performed on noncompliant AWS resources evaluated by AWS Config Rules. You can associate SSM documents by using AWS Management Console or by using APIs. AWS Config provides a set of managed automation documents with remediation actions. You can also create and associate custom automation documents with AWS Config rules. To apply remediation on noncompliant resources, you can either choose the remediation action you want to associate from a prepopulated list or create your own custom remediation actions using SSM documents. AWS Config provides a recommended list of remediation action in the AWS Management Console. In the AWS Management Console, you can either choose to manually or automatically remediate noncompliant resources by associating remediation actions with AWS Config rules. With all remediation actions, you can either choose manual or automatic remediation.
upvoted 3 times
...
mfsec
2 years, 1 month ago
Selected Answer: ABE
ABE is the better choice
upvoted 1 times
...
Damijo
2 years, 1 month ago
what's the value of A and E together- it's either or ? the outcome is the same - thoughts?
upvoted 4 times
AWSLord32
1 year, 3 months ago
Fully agree, BDE
upvoted 1 times
AWSLord32
1 year, 3 months ago
Did some research.. Aggregators provide a read-only view into the source accounts and regions that the aggregator is authorized to view. Aggregators do not provide mutating access into the source account or region. For example, this means that you cannot deploy rules through an aggregator or pull snapshot files from the source account or region through an aggregator. https://docs.aws.amazon.com/config/latest/developerguide/config-concepts.html#multi-account-multi-region-data-aggregation So ABE seems correct
upvoted 2 times
...
...
...
jaysparky
2 years, 2 months ago
ABE makes sense
upvoted 1 times
...
spd
2 years, 2 months ago
Selected Answer: ABE
Config, SCP and IAM policy may not require in each account but it says to select three options so going with ABE
upvoted 1 times
...
Musk
2 years, 2 months ago
Selected Answer: AE
BE makes sense
upvoted 1 times
...
zozza2023
2 years, 2 months ago
Selected Answer: ABE
the best way to deploy config rules accross accounts= SCP
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago