What is the BEST method to allow access using current LDAP credentials?
An organization with a large IT department has decided to migrate to AWS With different job functions in the IT department it is not desirable to give all users access to all AWS resources Currently the organization handles access via LDAP group membership What is the BEST method to allow...
Which AWS service will mitigate this issue?
A development team recently deployed a new version of a web application to production. After the release, penetration testing revealed a cross-site scripting vulnerability that could expose user data. Which AWS service will mitigate this issue?A . AWS Shield Standard B. AWS WAF C. Elastic Load Balancing D. Amazon CognitoView...
What is the MOST operationally efficient solution that meets these requirements?
A company asks a SysOps administrator to ensure that AWS CloudTrail files are not tampered with after they are created. Currently, the company uses AWS Identity and Access Management (IAM) to restrict access to specific trails. The company's security team needs the ability to trace the integrity of each file....
What should the SysOps administrator do to meet this requirement?
A company uses an AWS CloudFormation template to provision an Amazon EC2 instance and an Amazon RDS DB instance A SysOps administrator must update the template to ensure that the DB instance is created before the EC2 instance is launched What should the SysOps administrator do to meet this requirement?A...
Which combination of actions should a SysOps administrator take so that the web servers can communicate with the DB instance?
A company website contains a web tier and a database tier on AWS. The web tier consists of Amazon EC2 instances that run in an Auto Scaling group across two Availability Zones. The database tier runs on an Amazon ROS for MySQL Multi-AZ DB instance. The database subnet network ACLs...