All Amazon EC2 instances are assigned two IP addresses at launch, out of which one can only be reached from within the Amazon EC2 network?
All Amazon EC2 instances are assigned two IP addresses at launch, out of which one can only be reached from within the Amazon EC2 network?A . Multiple IP addressB . Public IP addressC . Private IP addressD . Elastic I P AddressView AnswerAnswer: C
When an EC2 instance that is backed by an 53-based AMI is terminated, what happens to the data on the root volume?
When an EC2 instance that is backed by an 53-based AMI is terminated, what happens to the data on the root volume?A . Data is automatically saved as an EBS snapshot.B . Data is automatically saved as an EBS volume.C . Data is unavailable until the instance is restarted.D . Data is...
You've created your first load balancer and have registered your EC2 instances with the load balancer. Elastic Load Balancing routinely performs health checks on all the registered EC2 instances and automatically distributes all incoming requests to the DNS name of your load balancer across your registered, healthy EC2 instances. By default, the load balancer uses the ___ protocol for checking the health of your instances.
You've created your first load balancer and have registered your EC2 instances with the load balancer. Elastic Load Balancing routinely performs health checks on all the registered EC2 instances and automatically distributes all incoming requests to the DNS name of your load balancer across your registered, healthy EC2 instances. By default, the load...
Which of the following is not an advantage of ELB over an on-premise load balancer?
Amazon Elastic Load Balancing is used to manage traffic on a fleet of Amazon EC2 instances, distributing traffic to instances across all availability zones within a region. Elastic Load Balancing has all the advantages of an on-premises load balancer, plus several security benefits. Which of the following is not an advantage of...
How should they architect their solution?
A web company is looking to implement an external payment service into their highly available application deployed in a VPC Their application EC2 instances are behind a public lacing ELB Auto scaling is used to add additional instances as traffic increases under normal load the application runs 2 instances in the Auto Scaling group but...
Which statement below is correct in regards to that?
You are using Amazon SES as an email solution but are unsure of what its limitations are. Which statement below is correct in regards to that?A . New Amazon SES users who have received production access can send up to 1,000 emails per 24-hour period, at a maximum rate of 10 emails...
Which are the best approaches to meet these requirements?
Your company is getting ready to do a major public announcement of a social media site on AWS. The website is running on EC2 instances deployed across multiple Availability Zones with a Multi-AZ RDS MySQL Extra Large DB Instance. The site performs a high number of small reads and writes per second and relies...
What does a "Domain" refer to in Amazon SWF?
What does a "Domain" refer to in Amazon SWF?A . A security group in which only tasks inside can communicate with each otherB . A special type of workerC . A collection of related WorkflowsD . The DNS record for the Amazon SWF serviceView AnswerAnswer: C
The SQL Server __ feature is an efficient means of copying data from a source database to your DB Instance. It writes the data that you specify to a data file, such as an ASCII file.
The SQL Server __ feature is an efficient means of copying data from a source database to your DB Instance. It writes the data that you specify to a data file, such as an ASCII file.A . bulk copyB . group copyC . dual copyD . mass copyView AnswerAnswer: A
Which following statement is true in respect to the initial settings that will be applied to this security group if you choose to use the default settings for this group?
Any person or application that interacts with AWS requires security credentials. AWS uses these credentials to identify who is making the call and whether to allow the requested access. You have just set up a VPC network for a client and you are now thinking about the best way to secure this network....