Which combination of steps will enable multi-factor authentication (MFA) on an AWS account? (Select TWO.)
Which combination of steps will enable multi-factor authentication (MFA) on an AWS account? (Select TWO.)A . Contact AWS Support to initiate MFA activation.B . Activate AWS Shield on an MFA-compatible device.C . Acquire an MFA-compatible device.D . Activate the MFA device by using Amazon GuardDuty.E . Activate the MFA device...
Which pillar of the AWS Well-Architected Framework focuses on the ability to run workloads effectively, gain insight into operations, and continuously improve supporting processes and procedures?
Which pillar of the AWS Well-Architected Framework focuses on the ability to run workloads effectively, gain insight into operations, and continuously improve supporting processes and procedures?A . Cost optimizationB . ReliabilityC . Operational excellenceD . Performance efficiencyView AnswerAnswer: C Explanation: The AWS Well-Architected Framework is a set of best practices...
Which benefit is included with an AWS Enterprise Support plan?
Which benefit is included with an AWS Enterprise Support plan?A . AWS Partner Network (APN) support at no costB . Designated support from an AWS technical account manager (TAM)C . On-site support from AWS engineersD . AWS managed compliance as code with AWS ConfigView AnswerAnswer: B Explanation: AWS offers different...
Which tasks require use of the AWS account root user? (Select TWO.)
Which tasks require use of the AWS account root user? (Select TWO.)A . Changing an AWS Support planB . Modifying an Amazon EC2 instance typeC . Grouping resources in AWS Systems ManagerD . Running applications in Amazon Elastic Kubernetes Service (Amazon EKS)E . Closing an AWS accountView AnswerAnswer: A,E
Elasticity in the AWS Cloud refers to which of the following? (Select TWO.)
Elasticity in the AWS Cloud refers to which of the following? (Select TWO.)A . How quickly an Amazon EC2 instance can be restartedB . The ability to right size resources as demand shiftsC . The maximum amount of RAM an Amazon EC2 instance can useD . The pay-as-you-go billing modelE...
Which AWS service can be used to accomplish this goal?
A user wants to identify any security group that is allowing unrestricted incoming SSH traffic. Which AWS service can be used to accomplish this goal?A . Amazon CognitoB . AWS ShieldC . Amazon MacieD . AWS Trusted AdvisorView AnswerAnswer: D Explanation: The correct answer to the question is D because...
Which of the following are advantages of moving to the AWS Cloud? (Select TWO.)
Which of the following are advantages of moving to the AWS Cloud? (Select TWO.)A . The ability to turn over the responsibility for all security to AWS.B . The ability to use the pay-as-you-go model.C . The ability to have full control over the physical infrastructure.D . No longer having...
Which best practice for cost governance does this example show?
Which best practice for cost governance does this example show?A . Resource controlsB . Cost allocationC . Architecture optimizationD . Tagging enforcementView AnswerAnswer: C Explanation: Architecture optimization is the best practice for cost governance that this example shows. Architecture optimization is the process of designing and implementing AWS solutions that...
Which of the following are characteristics of a serverless application that runs in the AWS Cloud? (Select TWO.)
Which of the following are characteristics of a serverless application that runs in the AWS Cloud? (Select TWO.)A . Users must manually configure Amazon EC2 instances.B . Users have a choice of operating systems.C . The application has built-in fault tolerance.D . Users can run Amazon EC2 Spot Instances.E ....
What does the company need to do to expand into the second Region?
A company wants to expand from one AWS Region into a second AWS Region. What does the company need to do to expand into the second Region?A . Contact an AWS account manager to sign a new contract.B . Move an Availability Zone to the second Region.C . Begin to...