What is the correct way to configure AWS Direct connect for access to services such as Amazon S3?

You are implementing AWS Direct Connect. You intend to use AWS public service end points such as Amazon S3, across the AWS Direct Connect link. You want other Internet traffic to use your existing link to an Internet Service Provider. What is the correct way to configure AWS Direct connect...

October 20, 2020 No Comments READ MORE +

Which of the following methods can achieve this?

A company is storing data on Amazon Simple Storage Service (S3). The company's security policy mandates that data is encrypted at rest. Which of the following methods can achieve this? (Choose three.)A . Use Amazon S3 server-side encryption with AWS Key Management Service managed keys.B . Use Amazon S3 server-side...

October 20, 2020 No Comments READ MORE +

Which of the below mentioned services does not provide detailed monitoring with CloudWatch?

A user is trying to understand the detailed CloudWatch monitoring concept. Which of the below mentioned services does not provide detailed monitoring with CloudWatch?A . AWS RDSB . AWS ELBC . AWS Route53D . AWS EMRView AnswerAnswer: D Explanation: CloudWatch is used to monitor AWS as well as the custom...

October 20, 2020 No Comments READ MORE +

The AWS IT infrastructure that AWS provides, complies with the following IT security standards, including:

The AWS IT infrastructure that AWS provides, complies with the following IT security standards, including:A . SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II), SOC 2 and SOC 3B . FISMA, DIACAP, and FedRAMPC . PCI DSS Level 1, ISO 27001, ITAR and FIPS 140-2D . HIPAA, Cloud Security...

October 20, 2020 No Comments READ MORE +

How is AWS readily distinguished from other vendors in the traditional IT computing landscape?

How is AWS readily distinguished from other vendors in the traditional IT computing landscape?A . Experienced. Scalable and elastic. Secure. Cost-effective. ReliableB . Secure. Flexible. Cost-effective. Scalable and elastic. GlobalC . Secure. Flexible. Cost-effective. Scalable and elastic. ExperiencedD . Flexible. Cost-effective. Dynamic. Secure. Experienced.View AnswerAnswer: C

October 19, 2020 No Comments READ MORE +

Dave is the main administrator in Example Corp., and he decides to use paths to help delineate the users in the company and set up a separate administrator group for each path-based division.

Dave is the main administrator in Example Corp., and he decides to use paths to help delineate the users in the company and set up a separate administrator group for each path-based division. Following is a subset of the full list of paths he plans to use: • /marketing •...

October 19, 2020 No Comments READ MORE +

What services could be used to reduce the elaboration time and improve the availability of the solution?

You have a periodic image analysis application that gets some files in input, analyzes them and tor each file writes some data in output to a ten file the number of files in input per day is high and concentrated in a few hours of the day. Currently you have...

October 19, 2020 No Comments READ MORE +

Which approach provides a cost effective scalable mitigation to this kind of attack?

You've been hired to enhance the overall security posture for a very large e-commerce site. They have a well architected multi-tier application running in a VPC that uses ELBs in front of both the web and the app tier with static assets served directly from S3. They are using a...

October 19, 2020 No Comments READ MORE +

What is the best approach to meet your customer’s requirements?

Your customer is willing to consolidate their log streams (access logs, application logs, security logs, etc.) in one single system. Once consolidated, the customer wants to analyze these logs in real time based on heuristics. From time to time, the customer needs to validate heuristics, which requires going back to...

October 19, 2020 No Comments READ MORE +