The AWS IT infrastructure that AWS provides, complies with the following IT security standards, including:

The AWS IT infrastructure that AWS provides, complies with the following IT security standards, including:A . SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II), SOC 2 and SOC 3B . FISMA, DIACAP, and FedRAMPC . PCI DSS Level 1, ISO 27001, ITAR and FIPS 140-2D . HIPAA, Cloud Security...

October 20, 2020 No Comments READ MORE +

How is AWS readily distinguished from other vendors in the traditional IT computing landscape?

How is AWS readily distinguished from other vendors in the traditional IT computing landscape?A . Experienced. Scalable and elastic. Secure. Cost-effective. ReliableB . Secure. Flexible. Cost-effective. Scalable and elastic. GlobalC . Secure. Flexible. Cost-effective. Scalable and elastic. ExperiencedD . Flexible. Cost-effective. Dynamic. Secure. Experienced.View AnswerAnswer: C

October 19, 2020 No Comments READ MORE +

Dave is the main administrator in Example Corp., and he decides to use paths to help delineate the users in the company and set up a separate administrator group for each path-based division.

Dave is the main administrator in Example Corp., and he decides to use paths to help delineate the users in the company and set up a separate administrator group for each path-based division. Following is a subset of the full list of paths he plans to use: • /marketing •...

October 19, 2020 No Comments READ MORE +

What services could be used to reduce the elaboration time and improve the availability of the solution?

You have a periodic image analysis application that gets some files in input, analyzes them and tor each file writes some data in output to a ten file the number of files in input per day is high and concentrated in a few hours of the day. Currently you have...

October 19, 2020 No Comments READ MORE +

Which approach provides a cost effective scalable mitigation to this kind of attack?

You've been hired to enhance the overall security posture for a very large e-commerce site. They have a well architected multi-tier application running in a VPC that uses ELBs in front of both the web and the app tier with static assets served directly from S3. They are using a...

October 19, 2020 No Comments READ MORE +

What is the best approach to meet your customer’s requirements?

Your customer is willing to consolidate their log streams (access logs, application logs, security logs, etc.) in one single system. Once consolidated, the customer wants to analyze these logs in real time based on heuristics. From time to time, the customer needs to validate heuristics, which requires going back to...

October 19, 2020 No Comments READ MORE +

What database implementation would better fit this scenario, keeping costs as low as possible?

You need a persistent and durable storage to trace call activity of an IVR (Interactive Voice Response) system. Call duration is mostly in the 2-3 minutes timeframe. Each traced call can be either active or terminated. An external application needs to know each minute the list of currently active calls....

October 19, 2020 No Comments READ MORE +

Which of the following AWS resources do not need to be recreated in the second region?

You would like to create a mirror image of your production environment in another region for disaster recovery purposes. Which of the following AWS resources do not need to be recreated in the second region? (Choose two.)A . Route 53 Record SetsB . IAM RolesC . Elastic IP Addresses (EIP)D...

October 19, 2020 No Comments READ MORE +

How should they architect their solution to achieve these goals?

A web company is looking to implement an intrusion detection and prevention system into their deployed VPC. This platform should have the ability to scale to thousands of instances running inside of the VPC. How should they architect their solution to achieve these goals?A . Configure an instance with monitoring...

October 19, 2020 No Comments READ MORE +