A user comes to you and wants access to Amazon CloudWatch but only wants to monitor a specific LoadBalancer. Is it possible to give him access to a specific set of instances or a specific LoadBalancer?
A user comes to you and wants access to Amazon CloudWatch but only wants to monitor a specific LoadBalancer. Is it possible to give him access to a specific set of instances or a specific LoadBalancer?A . No because you can't use IAM to control access to CloudWatch data for specific...
Which Amazon Elastic Compute Cloud feature can you query from within the instance to access instance properties?
Which Amazon Elastic Compute Cloud feature can you query from within the instance to access instance properties?A . Instance user dataB . Resource tagsC . Instance metadataD . Amazon Machine ImageView AnswerAnswer: C
Making your snapshot public shares all snapshot data with everyone. Can the snapshots with AWS Market place product codes be made public?
Making your snapshot public shares all snapshot data with everyone. Can the snapshots with AWS Market place product codes be made public?A . NoB . YesView AnswerAnswer: B
Which service enables AWS customers to manage users and permissions in AWS?
Which service enables AWS customers to manage users and permissions in AWS?A . AWS Access Control Service (ACS}B . AWS Identity and Access Management (lAM}C . AWS Identity Manager (AIM}View AnswerAnswer: B
What is the problem and a valid solution?
You have launched an EC2 instance with four (4) 500GB EBS Provisioned lOPS volumes attached The EC2 Instance Is EBS-Optimized and supports 500 Mbps throughput between EC2 and EBS The two EBS volumes are configured as a single RAID o device, and each Provisioned lOPS volume is provisioned with 4.000 lOPS (4 000 16KB reads...
What should the user do to ensure that the EC2 instances accept requests only from ELB?
A user has configured a website and launched it using the Apache web server on port 80. The user is using ELB with the EC2 instances for Load Balancing. What should the user do to ensure that the EC2 instances accept requests only from ELB?A . Configure the security group of EC2, which...
You're trying to delete an SSL certificate from the IAM certificate store, and you're getting the message "Certificate: <certificate< span="">-id> is being used by CloudFront." Which of the following statements is probably the reason why you are getting this error?</certificate<>
You're trying to delete an SSL certificate from the IAM certificate store, and you're getting the message "Certificate: <certificate< span="">-id> is being used by CloudFront." Which of the following statements is probably the reason why you are getting this error?</certificate<>A . Before you can delete an SSL certificate, you need to either rotate SSL...
Which of the following is correct in regards to those security groups?
A government client needs you to set up secure cryptographic key storage for some of their extremely confidential data. You decide that the AWS CloudHSM is the best service for this. However, there seem to be a few pre-requisites before this can happen, one of those being a security group that has...
How should they architect t heir solution to achieve these goals?
A web company is looking to implement an intrusion detection and prevention system into their deployed VPC. This platform should have the ability to scale to thousands of instances running inside of the VPC, How should they architect t heir solution to achieve these goals?A . Configure an instance with monitoring software and the elastic...
What is an effective method to mitigate this?
You run an ad-supported photo sharing website using 53 to serve photos to visitors of your site. At some point you find out that other sites have been linking to the photos on your site, causing loss to your business. What is an effective method to mitigate this?A . Remove public read access...