Which AWS service can be used to provide an on-demand, cloud-based contact center?
Which AWS service can be used to provide an on-demand, cloud-based contact center?A . AWS Direct ConnectB . Amazon ConnectC . AWS Support CenterD . AWS Managed ServicesView AnswerAnswer: B Explanation: https://aws.amazon.com/connect/
Which pillar of the AWS Well-Architected Framework does this situation demonstrate?
A system automatically recovers from failure when a company launches its workload on the AWS Cloud services platform. Which pillar of the AWS Well-Architected Framework does this situation demonstrate?A . ReliabilityB . Cost optimizationC . Performance efficiencyD . Operational excellence.View AnswerAnswer: A Explanation: https://aws.amazon.com/blogs/apn/the-6-pillars-of-the-aws-well-architected-framework/ Built around six pillars―operational excellence, security,...
Which AWS service can the company use to meet this goal?
A company wants to secure its consumer web application by using SSL/TLS to encrypt traffic. Which AWS service can the company use to meet this goal?A . AWS WAFB . AWS ShieldC . Amazon VPCD . AWS Certificate Manager (ACM)View AnswerAnswer: D Explanation: To enable HTTPS connections to your website...
Which AWS services can provide this information?
A company runs applications that process credit card information. Auditors have asked if the AWS environment has changed since the previous audit. If the AWS environment has changed, the auditors want to know how it has changed. Which AWS services can provide this information? (Select TWO.)A . AWS ArtifactB ....
Which AWS service meets these requirements?
A company is running and managing its own Docker environment on Amazon EC2 instances. The company wants an alternative to help manage cluster size, scheduling, and environment maintenance. Which AWS service meets these requirements?A . AWS LambdaB . Amazon RDSC . AWS FargateD . Amazon AthenaView AnswerAnswer: C
Which AWS service offers threat detection and continuously monitors for malicious activity and unauthorized behavior in AWS accounts?
Which AWS service offers threat detection and continuously monitors for malicious activity and unauthorized behavior in AWS accounts?A . Amazon MadeB . AWS ConfigC . Amazon GuardDutyD . Amazon InspectorView AnswerAnswer: C
What should the IT team do to accomplish this goal?
A company is considering a migration from on premises to the AWS Cloud. The company’s IT team needs to offload support of the workload. What should the IT team do to accomplish this goal?A . Use AWS Managed Services to provision, run, and support the company infrastructure.B . Build hardware...
Which AWS service will help meet this requirement?
A company is moving its office and must establish an encrypted connection to AWS. Which AWS service will help meet this requirement?A . AWS VPNB . Amazon Route 53C . Amazon API GatewayD . Amazon ConnectView AnswerAnswer: A
Which action can be taken to accomplish this?
A company requires an isolated environment within AWS for security purposes. Which action can be taken to accomplish this?A . Create a separate Availability Zone to host the resources.B . Create a separate VPC to host the resources.C . Create a placement group to host the resources.D . Create an...
Which factor will have the MOST effect on cost?
A company plans to create a data lake that uses Amazon S3. Which factor will have the MOST effect on cost?A . The selection of S3 storage tiersB . Charges to transfer existing data into Amazon S3C . The addition of S3 bucket policiesD . S3 ingest fees for each...