- All Exams Instant Download
Which of the following options would you consider for configuring the web server infrastructure?
You are designing an SSL/TLS solution that requires HTTPS clients to be authenticated by the Web server using client certificate authentication. The solution must be resilient. Which of the following options would you consider for configuring the web server infrastructure? (Choose two.)A . Configure ELB with TCP listeners on TCP/443....
The following are AWS Storage services? (Choose two.)
The following are AWS Storage services? (Choose two.)A . AWS Relational Database Service (AWS RDS)B . AWS ElastiCacheC . AWS GlacierD . AWS Import/ExportView AnswerAnswer: CD
You are running a successful multitier web application on AWS and your marketing department has asked you to add a reporting tier to the application. The reporting tier will aggregate and publish status reports every 30 minutes from user-generated information that is being stored in your web application s database. You are currently running a Multi-AZ RDS MySQL instance for the database tier. You also have implemented Elasticache as a database caching layer between the application tier and database tier.
You are running a successful multitier web application on AWS and your marketing department has asked you to add a reporting tier to the application. The reporting tier will aggregate and publish status reports every 30 minutes from user-generated information that is being stored in your web application s database....
Select the correct set of options. These are the initial settings for the default security group:
Select the correct set of options. These are the initial settings for the default security group:A . Allow no inbound traffic, Allow all outbound traffic and Allow instances associated with this security group to talk to each otherB . Allow all inbound traffic, Allow no outbound traffic and Allow instances...
You control access to S3 buckets and objects with:
You control access to S3 buckets and objects with:A . Identity and Access Management (IAM) Policies.B . Access Control Lists (ACLs).C . Bucket Policies.D . All of the aboveView AnswerAnswer: D
How should the application use AWS credentials to access the S3 bucket securely?
You have an application running on an EC2 instance which will allow users to download files from a private S3 bucket using a pre-signed URL. Before generating the URL, the application should verify the existence of the file in S3. How should the application use AWS credentials to access the...
Which option below will meet the needs for your NOC members?
Your company has recently extended its datacenter into a VPC on AWS to add burst computing capacity as needed Members of your Network Operations Center need to be able to go to the AWS Management Console and administer Amazon EC2 instances as necessary. You don't want to create new IAM...
What architecture would allow you to automate the existing process using a hybrid approach and ensure that the architecture can support the evolution of processes over time?
Your company produces customer commissioned one-of-a-kind skiing helmets combining nigh fashion with custom technical enhancements Customers can show off their Individuality on the ski slopes and have access to head-up-displays. GPS rear-view cams and any other technical innovation they wish to embed in the helmet. The current manufacturing process is...
Which of these solutions would you recommend?
You currently operate a web application. In the AWS US-East region. The application runs on an auto-scaled layer of EC2 instances and an RDS Multi-AZ database. Your IT security compliance officer has tasked you to develop a reliable and durable logging solution to track changes made to your EC2.IAM And...
Which design would you choose to meet these requirements?
An International company has deployed a multi-tier web application that relies on DynamoDB in a single region. For regulatory reasons they need disaster recovery capability in a separate region with a Recovery Time Objective of 2 hours and a Recovery Point Objective of 24 hours. They should synchronize their data...