A user has setup a web application on EC2. The user is generating a log of the application perfo…
A user has setup a web application on EC2. The user is generating a log of the application perfo…
An AWS root account owner is trying to create a policy to access RDS.
An AWS root account owner is trying to create a policy to access RDS.
A user is using a small MySQL RDS DB. The user is experiencing high latency due to the Multi AZ feature. Which
A user is using a small MySQL RDS DB. The user is experiencing high latency due to the Multi AZ feature. Which of the below mentioned options may no…
A user is displaying the CPU utilization, and Network in and Network out CloudWatch metrics data of a single i
A user is displaying the CPU utilization, and Network in and Network out CloudWatch metrics data of a single instance on the same graph. The graph uses one Y-axis for CPU utilization and Network in and another Y-axis for Network…
A user is planning to use AWS services f…
A user is planning to use AWS services f…
A user is planning to schedule a backup for an EBS volume. The user wants security of the snapshot data. How c
A user is planning to schedule a backup for an EBS volume. The user wants security of the snapshot data. How can the user achieve data encryption with a snapshot?
A user has created a public subnet with VPC and launched an EC2 instance within it. The user is trying to dele
A user has created a public subnet with VPC and launched an EC2 instance within it. The user is trying to delete the subnet. What will happen in this scenario?
A user has setup an EBS backed instance and attached 2 EBS volumes to it. The user has setup a Cloud…
A user has setup an EBS backed instance and attached 2 EBS volumes to it. The user has setup a Cloud…
A user has launched an EC2 instance from an instance store backed AMI. The infrastructure team wants to create
A user has launched an EC2 instance from an instance store backed AMI. The infrastructure team wants to create an AMI from the running instance. Which of the below mentioned credentials is not required while creating the AMI?
A user has configured an SSL listener at ELB as well as on the back-end instances. Which of the below mentione
A user has configured an SSL listener at ELB as well as on the back-end instances. Which of the below mentioned statements helps the user understand ELB traffic handling with respect to the SSL listener?