Which of the below mentioned credentials is not required while creating the AMI?
A user has launched an EC2 instance from an instance store backed AMI. The infrastructure team wants to create an AMI from the running instance. Which of the below mentioned credentials is not required while creating the AMI?A . AWS account IDC . 509 certificate and private keyD . AWS...
Which of the below mentioned options is not the right option to grant permission for S3?
A root AWS account owner is trying to understand various options to set the permission to AWS S3. Which of the below mentioned options is not the right option to grant permission for S3?A . User Access PolicyB . S3 Object Access PolicyC . S3 Bucket Access PolicyD . S3...
If you want to launch Amazon Elastic Compute Cloud (EC2) Instances and assign each Instance a predetermined private IP address you should:
If you want to launch Amazon Elastic Compute Cloud (EC2) Instances and assign each Instance a predetermined private IP address you should:A . Assign a group or sequential Elastic IP address to the instancesB . Launch the instances in a Placement GroupC . Launch the instances in the Amazon virtual...
Which of the below mentioned options cannot be used to grant ACL on the object using the authorized predefined group?
A root account owner is trying to understand the S3 bucket ACL. Which of the below mentioned options cannot be used to grant ACL on the object using the authorized predefined group?A . Authenticated user groupB . All users groupC . Log Delivery GroupD . Canonical user groupView AnswerAnswer: D...
What will happen in this case for the RI pricing?
An organization has added 3 of his AWS accounts to consolidated billing. One of the AWS accounts has purchased a Reserved Instance (RI. of a small instance size in the US-East-1a zone. All other AWS accounts are running instances of a small size in the same zone. What will happen...
If the user is supplying his own keys for encryption (SSE-C), what is recommended to the user for the purpose of security?
A user has enabled versioning on an S3 bucket. The user is using server side encryption for data at rest. If the user is supplying his own keys for encryption (SSE-C), what is recommended to the user for the purpose of security?A . The user should not use his own...
Which of the below mentioned CloudWatch endpoint URLs should the user use?
A user has configured an EC2 instance in the US-East-1a zone. The user has enabled detailed monitoring of the instance. The user is trying to get the data from CloudWatch using a CLI. Which of the below mentioned CloudWatch endpoint URLs should the user use?A . monitoring.us-east-1.amazonaws.comB . monitoring.us-east-1-a.amazonaws.comC ....
Which of the below mentioned event categories is not supported by RDS for this snapshot source type?
A user is planning to setup notifications on the RDS DB for a snapshot. Which of the below mentioned event categories is not supported by RDS for this snapshot source type?A . BackupB . CreationC . DeletionD . RestorationView AnswerAnswer: A Explanation: Amazon RDS uses the Amazon Simple Notification Service...
What will Auto Scaling do in this scenario?
A user has configured Auto Scaling with the minimum capacity as 2 and the desired capacity as 2. The user is trying to terminate one of the existing instance with the command: What will Auto Scaling do in this scenario?A . Terminates the instance and does not launch a new...
If the user has not specified the draining time, how long will ELB allow inflight requests traffic to continue?
A user has setup connection draining with ELB to allow in-flight requests to continue while the instance is being deregistered through Auto Scaling. If the user has not specified the draining time, how long will ELB allow inflight requests traffic to continue?A . 600 secondsB . 3600 secondsC . 300...