What is the MOST secure way to achieve this?
A Developer needs temporary access to resources in a second account. What is the MOST secure way to achieve this?A . Use the Amazon Cognito user pools to get short-lived credentials for the second account.B . Create a dedicated IAM access key for the second account, and send it by...
What steps have to be executed to perform the monitoring?
A Developer needs to use AWS X-Ray to monitor an application that is deployed on EC2 instances. What steps have to be executed to perform the monitoring?A . Deploy the X-Ray SDK with the application and use X-Ray annotation.B . Install the X-Ray daemon and instrument the application code.C ....
What is the possible cause for the issue?
A static website is hosted in an Amazon S3 bucket. Several HTML pages on the site use JavaScript to download images from another Amazon S3 bucket. These images are not displayed when users browse the site. What is the possible cause for the issue?A . The referenced Amazon S3 bucket...
Which method would be the MOST secure way to authenticate a CloudWatch PUT request?
A Developer is creating an Auto Scaling group whose instances need to publish a custom metric to Amazon CloudWatch. Which method would be the MOST secure way to authenticate a CloudWatch PUT request?A . Create an IAM user with PutMetricData permission and put the user credentials in a private repository;...
Which field, when used as the partition key, would result in the MOST consistent performance using DynamoDB?
A Developer is working on an application that tracks hundreds of millions of product reviews in an Amazon DynamoDB table. The records include the data elements shown in the table: Which field, when used as the partition key, would result in the MOST consistent performance using DynamoDB?A . starRatingB ....
Instead of creating distinct policies for each team member, what approach can be used to make this policy snippet generic for all team members?
A development team consists of 10 team members. Similar to a home directory for each team member, the manager wants to grant access to user-specific folders in an Amazon S3 bucket. For the team member with the username “TeamMemberX”, the snippet of the IAM policy looks like this: Instead of...
Which of the following AWS service can be used to meet these requirements?
A company needs to encrypt data at rest, but it wants to leverage an AWS managed service using its own master key. Which of the following AWS service can be used to meet these requirements?A . SSE with Amazon S3B . SSE with AWS KMSC . Client-side encryptionD . AWS...
What should the Developer do to improve performance?
A Developer has implemented a Lambda function that needs to add new customers to an RDS database that is expected to run hundreds of times per hour. The Lambda function is configured to use 512MB of RAM and is based on the following pseudo code: After testing the Lambda function,...
How can these requirements be met?
A company wants to implement a continuous integration for its workloads on AWS. The company wants to trigger unit test in its pipeline for commits-on its code repository, and wants to be notified of failure events in the pipeline. How can these requirements be met?A . Store the source code...
Assuming the SQS queue is configured with the default VisibilityTimeout value, what is the BEST way, upon receiving a message, to ensure that no other instances can retrieve a message that has already been processed or is currently being processed?
An application takes 40 seconds to process instructions received in an Amazon SQS message. Assuming the SQS queue is configured with the default VisibilityTimeout value, what is the BEST way, upon receiving a message, to ensure that no other instances can retrieve a message that has already been processed or...