Systems applying the cloud architecture principle of elasticity will
Systems applying the cloud architecture principle of elasticity will
Who has control of the data in an AWS account?
Who has control of the data in an AWS account?
The main benefit of decoupling an application is to:
The main benefit of decoupling an application is to:
What AWS feature enables a user to manage services through a web-based user interface?
What AWS feature enables a user to manage services through a web-based user interface?
A disaster recovery strategy on AWS should be based on launching infrastructure in a separate:
A disaster recovery strategy on AWS should be based on launching infrastructure in a separate:
How can the AWS Management Console be secured against unauthorized access?
How can the AWS Management Console be secured against unauthorized access?
Which of the following is a fully managed N0SQL database service available with AWS.
Which of the following is a fully managed N0SQL database service available with AWS.
What is the value of having AWS Cloud services accessible through an Application Programming Interface (API)?
What is the value of having AWS Cloud services accessible through an Application Programming Interface (API)?
A company is planning to use AWS to host critical resources. Most of their systems are business critical and
need to have response times less than 15 minutes. Which of the following support plans should they consider?
A company is planning to use AWS to host critical resources. Most of their systems are business critical and
need to have response times less than 15 minutes. Which of the following support plans should they consider?
Which aws service is used to as a global content delivery network (CDN) service in AWS?
Which aws service is used to as a global content delivery network (CDN) service in AWS?
Which of the following examples supports AWS’s Architecting for the Cloud best practice principle: “design for failure and nothing will fail”?
Which of the following examples supports AWS’s Architecting for the Cloud best practice principle: “design for failure and nothing will fail”?
Which of the following can be used to protect EC2 Instances hosted in AWS. Choose 2 answers from the
Which of the following can be used to protect EC2 Instances hosted in AWS. Choose 2 answers from the
Which of the following is a benefit of Amazon Elastic Compute Cloud (Amazon EC2) over physical servers?
Which of the following is a benefit of Amazon Elastic Compute Cloud (Amazon EC2) over physical servers?
Which of the following in the AWS Support plans gives access to a Support Concierge
Which of the following in the AWS Support plans gives access to a Support Concierge
Which AWS service provides infrastructure security optimization recommendations?
Which AWS service provides infrastructure security optimization recommendations?
You are currently hosting an infrastructure and most of the EC2 instances are near 90 - 100% utilized.
What is the type of EC2 instances you would utilize to ensure costs are minimized?
You are currently hosting an infrastructure and most of the EC2 instances are near 90 - 100% utilized.
What is the type of EC2 instances you would utilize to ensure costs are minimized?
Which AWS Cloud service is used to turn on Multi-Factor Authentication (MFA)?
Which AWS Cloud service is used to turn on Multi-Factor Authentication (MFA)?
Which service allows for the collection and tracking of metrics for AWS services?
Which service allows for the collection and tracking of metrics for AWS services?
Which AWS services can be used to store files? Choose 2 answers from the options given below
Which AWS services can be used to store files? Choose 2 answers from the options given below
Which service allows an administrator to create and modify AWS user permissions?
Which service allows an administrator to create and modify AWS user permissions?
Which of the following is a benefit of running an application across two Availability Zones?
Which of the following is a benefit of running an application across two Availability Zones?
As per the AWS Acceptable Use Policy, penetration testing of EC2 instances:
As per the AWS Acceptable Use Policy, penetration testing of EC2 instances:
What best describes the “Principal of Least Privilege”?
What best describes the “Principal of Least Privilege”?
Which of the following services uses AWS edge locations?
Which of the following services uses AWS edge locations?
The Trusted Advisor service provides insight regarding which four categories of an AWS account?
The Trusted Advisor service provides insight regarding which four categories of an AWS account?
-
-
-
-
A company needs to know which user was responsible for terminating several critical Amazon Elastic Compute
Cloud (Amazon ECZ) Instances. Where can the customer find this information?
A company needs to know which user was responsible for terminating several critical Amazon Elastic Compute
Cloud (Amazon ECZ) Instances. Where can the customer find this information?
Which of the below mentioned services can be used to host virtual servers in the AWS Cloud?
Which of the below mentioned services can be used to host virtual servers in the AWS Cloud?
Where can a customer go to get more detail about Amazon Elastic Compute Cloud (Amazon EC2) billing activity that took place 3 month ago?
Where can a customer go to get more detail about Amazon Elastic Compute Cloud (Amazon EC2) billing activity that took place 3 month ago?
You work for a company that is planning on using the AWS EC2 service. They currently create golden images of their deployed Operating system.
Which of the following correspond to a golden image in AWS.
You work for a company that is planning on using the AWS EC2 service. They currently create golden images of their deployed Operating system.
Which of the following correspond to a golden image in AWS.
Which of the following security requirements are managed by AWS customers?
Which of the following security requirements are managed by AWS customers?
A company wants to store data that is not frequently accessed. What is the best and cost efficient solution that
A company wants to store data that is not frequently accessed. What is the best and cost efficient solution that
Which of the following is the responsibility of the AWS customer according to the Shared Security Model?
Which of the following is the responsibility of the AWS customer according to the Shared Security Model?
Which AWS service automates infrastructure provisioning and administrative tasks for an analytical data warehouse?
Which AWS service automates infrastructure provisioning and administrative tasks for an analytical data warehouse?
Amazon Elastic Compute Cloud (Amazon EC2) Spot instances are appropriate for which of the following workloads?
Amazon Elastic Compute Cloud (Amazon EC2) Spot instances are appropriate for which of the following workloads?
Which of the following is a factor when calculating Total Cost of Ownership (TCO) for the AWS Cloud?
Which of the following is a factor when calculating Total Cost of Ownership (TCO) for the AWS Cloud?
Which tool can display the distribution of AWS spending?
Which tool can display the distribution of AWS spending?
A company is deploying a two-tier, highly available web application to AWS. Which service provides durable
storage for static content while utilizing lower Overall CPU resources for the web tier?
A company is deploying a two-tier, highly available web application to AWS. Which service provides durable
storage for static content while utilizing lower Overall CPU resources for the web tier?
What is the ability provided by AWS to enable fast, easy, and secure transfers of files over long distances
What is the ability provided by AWS to enable fast, easy, and secure transfers of files over long distances
Which service should an administrator use to register a new domain name with AWS?
Which service should an administrator use to register a new domain name with AWS?
You are developing and planning on deployment an application onto the AWS Cloud. This application needs to be PCI Compliance. Which of the below steps would you carry out to ensure the compliance is met for the application.
You are developing and planning on deployment an application onto the AWS Cloud. This application needs to be PCI Compliance. Which of the below steps would you carry out to ensure the compliance is met for the application.