The AWS IT infrastructure that AWS provides, complies with the following IT security standards, including:
The AWS IT infrastructure that AWS provides, complies with the following IT security standards, including:A . SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II), SOC 2 and SOC 3B . FISMA, DIACAP, and FedRAMPC . PCI DSS Level 1, ISO 27001, ITAR and FIPS 140-2D . HIPAA, Cloud Security...
How is AWS readily distinguished from other vendors in the traditional IT computing landscape?
How is AWS readily distinguished from other vendors in the traditional IT computing landscape?A . Experienced. Scalable and elastic. Secure. Cost-effective. ReliableB . Secure. Flexible. Cost-effective. Scalable and elastic. GlobalC . Secure. Flexible. Cost-effective. Scalable and elastic. ExperiencedD . Flexible. Cost-effective. Dynamic. Secure. Experienced.View AnswerAnswer: C
Dave is the main administrator in Example Corp., and he decides to use paths to help delineate the users in the company and set up a separate administrator group for each path-based division.
Dave is the main administrator in Example Corp., and he decides to use paths to help delineate the users in the company and set up a separate administrator group for each path-based division. Following is a subset of the full list of paths he plans to use: • /marketing •...
What services could be used to reduce the elaboration time and improve the availability of the solution?
You have a periodic image analysis application that gets some files in input, analyzes them and tor each file writes some data in output to a ten file the number of files in input per day is high and concentrated in a few hours of the day. Currently you have...
Which approach provides a cost effective scalable mitigation to this kind of attack?
You've been hired to enhance the overall security posture for a very large e-commerce site. They have a well architected multi-tier application running in a VPC that uses ELBs in front of both the web and the app tier with static assets served directly from S3. They are using a...
What is the best approach to meet your customer’s requirements?
Your customer is willing to consolidate their log streams (access logs, application logs, security logs, etc.) in one single system. Once consolidated, the customer wants to analyze these logs in real time based on heuristics. From time to time, the customer needs to validate heuristics, which requires going back to...
You are looking to migrate your Development (Dev) and Test environments to AWS. You have decided to use separate AWS accounts to host each environment. You plan to link each accounts bill to a Master AWS account using Consolidated Billing. To make sure you keep within budget you would like to implement a way for administrators in the Master account to have access to stop, delete and/or terminate resources in both the Dev and Test accounts.
You are looking to migrate your Development (Dev) and Test environments to AWS. You have decided to use separate AWS accounts to host each environment. You plan to link each accounts bill to a Master AWS account using Consolidated Billing. To make sure you keep within budget you would like...
What database implementation would better fit this scenario, keeping costs as low as possible?
You need a persistent and durable storage to trace call activity of an IVR (Interactive Voice Response) system. Call duration is mostly in the 2-3 minutes timeframe. Each traced call can be either active or terminated. An external application needs to know each minute the list of currently active calls....
Which of the following AWS resources do not need to be recreated in the second region?
You would like to create a mirror image of your production environment in another region for disaster recovery purposes. Which of the following AWS resources do not need to be recreated in the second region? (Choose two.)A . Route 53 Record SetsB . IAM RolesC . Elastic IP Addresses (EIP)D...
How should they architect their solution to achieve these goals?
A web company is looking to implement an intrusion detection and prevention system into their deployed VPC. This platform should have the ability to scale to thousands of instances running inside of the VPC. How should they architect their solution to achieve these goals?A . Configure an instance with monitoring...