45A user has configured ELB with SSL using a security policy for secure negotiation between the client and loa
45A user has configured ELB with SSL using a security policy for secure negotiation between the client and load balancer. Which of the below mentioned security policies is supported by ELB?
A user has granted read/write permission…
A user has granted read/write permission…
A user has configured an ELB to distribute the traffic…
A user has configured an ELB to distribute the traffic…
A user has launched an EC2 instance store backed insta…
A user has launched an EC2 instance store backed insta…
A user runs the command -dd if=/dev/zero of=/dev/xvdfbs=1M- on a fresh blank EBS volume attached to a Linux in
A user runs the command -dd if=/dev/zero of=/dev/xvdfbs=1M- on a fresh blank EBS volume attached to a Linux instance. Which of the below mentioned activities is the user performing with the command given above?
A user has created an Auto Scaling group using CLI. The user wants to enable CloudWatch detailed monitoring fo
A user has created an Auto Scaling group using CLI. The user wants to enable CloudWatch detailed monitoring for that group. How…
A user has created a VPC with a public subnet. The user has terminated all the instances which are part of the
A user has created a VPC with a public subnet. The user has terminated all the instances which are part of the subnet. Which of the below mentioned statements is true with respect to this scenario?
A user has configured ELB with SSL using a security policy for secure negotiation between the client and load
A user has configured ELB with SSL using a security policy for secure negotiation between the client and load balancer. The ELB security policy supports various ciphers. Which of the below mentioned options helps identify the matching cipher at the client side…
A user has created a VPC with public and private subnets. The VPC has CIDR 20.0.0.0/16. The private subnet use
A user has created a VPC with public and private subnets. The VPC has CIDR 20.0.0.0/16. The private subnet uses CIDR 20.0.1.0/24 and the public subnet uses CIDR 20.0.0.0/24. The user is planning to host a web server in the public subnet…
A user has created an application which will be hosted on EC2. The application makes calls to DynamoDB to fetc
A user has created an application which will be hosted on EC2. The application makes calls to DynamoDB to fetch certain data. The application is using the DynamoDB…