A customer is deploying an SSL enabled web application to AWS and would like to implement a separation of roles between the EC2 service administrators that are entitled to login to instances as well as making API calls and the security officers who will maintain and have exclusive access to the application’s X.509 certificate that contains the private key.

A customer is deploying an SSL enabled web application to AWS and would like to implement a separation of roles between the EC2 service administrators that are entitled to login to instances as well as making API calls and the security officers who will maintain and have exclusive access to...

September 4, 2020 No Comments READ MORE +

How should they architect their solution to achieve these goals?

A web company is looking to implement an intrusion detection and prevention system into their deployed VPC. This platform should have the ability to scale to thousands of instances running inside of the VPC. How should they architect their solution to achieve these goals?A . Configure an instance with monitoring...

September 3, 2020 No Comments READ MORE +

Which approach provides a cost effective scalable mitigation to this kind of attack?

You've been hired to enhance the overall security posture for a very large e-commerce site. They have a well architected multi-tier application running in a VPC that uses ELBs in front of both the web and the app tier with static assets served directly from S3. They are using a...

September 3, 2020 No Comments READ MORE +

Which architecture outlined below win meet the initial requirements for the collection platform?

Your company is in the process of developing a next generation pet collar that collects biometric information to assist families with promoting healthy lifestyles for their pets. Each collar will push 30kb of biometric data in JSON format every 2 seconds to a collection platform that will process and analyze...

September 2, 2020 No Comments READ MORE +

Which of these options would allow you to encrypt your data at rest?

Your company policies require encryption of sensitive data at rest. You are considering the possible options for protecting data while storing it at rest on an EBS data volume, attached to an EC2 instance. Which of these options would allow you to encrypt your data at rest? (Choose three.)A ....

August 31, 2020 No Comments READ MORE +

Which of the following methods can achieve this?

A company is storing data on Amazon Simple Storage Service (S3). The company's security policy mandates that data is encrypted at rest. Which of the following methods can achieve this? (Choose three.)A . Use Amazon S3 server-side encryption with AWS Key Management Service managed keys.B . Use Amazon S3 server-side...

August 29, 2020 No Comments READ MORE +

Which alternatives should you consider?

You are designing Internet connectivity for your VPC. The Web servers must be available on the Internet. The application must have a highly available architecture. Which alternatives should you consider? (Choose two.)A . Configure a NAT instance in your VPB . Create a default route via the NAT instance and...

August 29, 2020 No Comments READ MORE +

Which is correct?

Your firm has uploaded a large amount of aerial image data to S3. In the past, in your on-premises environment, you used a dedicated group of servers to oaten process this data and used Rabbit MQ - An open source messaging system to get job information to the servers. Once...

August 28, 2020 No Comments READ MORE +

What is the correct way to configure AWS Direct connect for access to services such as Amazon S3?

You are implementing AWS Direct Connect. You intend to use AWS public service end points such as Amazon S3, across the AWS Direct Connect link. You want other Internet traffic to use your existing link to an Internet Service Provider. What is the correct way to configure AWS Direct connect...

August 27, 2020 No Comments READ MORE +