Which of the following can limit Amazon Storage Service (Amazon S3) bucket access to specific users?
Which of the following can limit Amazon Storage Service (Amazon S3) bucket access to specific users?A . A public and private key-pairB . Amazon InspectorC . AWS Identity and Access Management (IAM) policiesD . Security GroupsView AnswerAnswer: C
Which AWS service allows companies to connect an Amazon VPC to an on-premises data center?
Which AWS service allows companies to connect an Amazon VPC to an on-premises data center?A . AWS VPNB . Amazon RedshiftC . API GatewayD . Amazon Direct ConnectView AnswerAnswer: A
Which AWS service of feature can be used to monitor CPU usage?
Which AWS service of feature can be used to monitor CPU usage?A . AWS CloudTrailB . VPC Flow LogsC . Amazon CloudWatchD . AWSConfigView AnswerAnswer: C
Which task is AWS responsible for in the shared responsibility model for security and compliance?
Which task is AWS responsible for in the shared responsibility model for security and compliance?A . Granting access to individuals and servicesB . Encrypting data in transitC . Updating Amazon EC2 host firmwareD . Updating operating systemsView AnswerAnswer: C
Which of the following security-related actions are available at no cost?
Which of the following security-related actions are available at no cost?A . Calling AWS SupportB . Contacting AWS Professional Services to request a workshopC . Accessing forums, blogs, and whitepapersD . Attending AWS classes at a local universityView AnswerAnswer: C
Which storage service can be used as a low-cost option for hosting static websites?
Which storage service can be used as a low-cost option for hosting static websites?A . Amazon GlacierB . Amazon DynamoDBC . Amazon Elastic File System (Amazon EFS)D . Amazon Simple Storage Service (Amazon S3)View AnswerAnswer: D
According to the AWS shared responsibility model what is the sole responsibility of AWS?
According to the AWS shared responsibility model what is the sole responsibility of AWS?A . Application securityB . Edge location managementC . Patch managementD . Client-side dataView AnswerAnswer: B
Which of the following are pillars of the AWS Well-Architected Framework? (Select TWO)
Which of the following are pillars of the AWS Well-Architected Framework? (Select TWO)A . Multiple Availability ZonesB . Performance efficiencyC . SecurityD . Encryption usageE . High availabilityView AnswerAnswer: C,E
Which AWS service identifies security groups that allow unrestricted access to a user's AWS resources?
Which AWS service identifies security groups that allow unrestricted access to a user's AWS resources?A . AWS Trusted AdvisorB . Amazon InspectorC . Amazon CloudWatchD . AWS CloudTrailView AnswerAnswer: A
Which design principles for cloud architecture are recommended when re-architecting a large monolithic application? (Select TWO.)
Which design principles for cloud architecture are recommended when re-architecting a large monolithic application? (Select TWO.)A . Use manual monitoring.B . Use fixed servers.C . Implement loose coupling.D . Rely on individual components.E . Design for scalability.View AnswerAnswer: C,E Explanation: https://www.architech.ca/re-architect-applications/