You have a Linux EC2 web server instance running inside a VPC The instance is in a public subnet and has an EIP associatedwith it so you can connect to It over the Internet via HTTP or SSH The instance was also fully accessible when you last logged invia SSH. and was also serving web requests […]
Your organization’s security policy requires that all privileged users either use frequently rotated passwords or one-time accesscredentials in addition to username/password. Which two of the following options would allow an organization to enforce this policyfor AWS users? Choose 2 answers.
You are creating an Auto Scaling group whose Instances need to insert a custom metric into Cloud Watch. Which method wouldbe the best way to authenticate your Cloud Watch PUT request?
You have set up Individual AWS accounts for each project. You have been asked to make sure your AWS Infrastructure costs donot exceed the budget set per project for each month. Which of the following approaches can help ensure that you do not exceedthe budget each month?
The majority of your Infrastructure is on premises and you have a small footprint on AWS Your company has decided to roll out anew application that is heavily dependent on low latency connectivity to LOAP for authentication Your security policy requiresminimal changes to the company’s existing […]
When preparing for a compliance assessment of your system built inside of AWS. what are three best-practices for you to preparefor an audit? Choose 3 answers.
You are using ElastiCache Memcached to store session state and cache database queries in your infrastructure You notice inCloud Watch that Evictions and Get Misses are Doth very high. What two actions could you take to rectify this? Choose 2 answers.
Your EC2-Based Multi-tier application includes a monitoring instance that periodically makes application -level read only requestsof various application components and if any of those fail more than three times 30 seconds calls Cloud Watch lo fire an alarm,and the alarm notifies your […]
Your company Is moving towards tracking web page users with a small tracking Image loaded on each page Currently you areserving this image out of US-East, but are starting to get concerned about the time It takes to load the image for users on the westcoast. What are the two best ways to speed […]
An organization’s security policy requires multiple copies of all critical data to be replicated across at least a primary and backupdata center. The organization has decided to store some critical data on Amazon S3. Which option should you implement to ensurethis requirement is met?