What will happen in this case?
An AWS account owner has setup multiple IAM users. One IAM user only has CloudWatch access. He has setup
the alarm action which stops the EC2 instances when the CPU utilization is below the threshold limit. What will
happen in this case?
during this period?
A user has configured ELB with Auto Scaling. The user suspended the Auto Scaling terminate process only for a
while. What will happen to the availability zone rebalancing process (AZRebalance. during this period?
Which of the below mentioned statements is true with respect to the best practice for security in this scenari
A user has created a mobile application which makes calls to DynamoDB to fetch certain dat
a. The application is using the DynamoDB SDK and root account access/secret access key to connect to
DynamoDB from mobile. Which of the below mentioned statements is true with respect to the best practice
for security in this scenario?
The user came to know that this RDS DB does not use the AWS technology, but uses server mirroring to achieve H
A user is configuring the Multi AZ feature of an RDS DB. The user came to know that this RDS DB does not use
the AWS technology, but uses server mirroring to achieve H
How can the user configure this?
A user is receiving a notification from the RDS DB whenever there is a change in the DB security group. The
user does not want to receive these notifications for only a month. Thus, he does not want to delete the
notification. How can the user configure this?
How can the user create the second subnet?
A user has created a VPC with CIDR 20.0.0.0/16. The user has created one subnet with CIDR 20.0.0.0/16 by
mistake. The user is trying to create another subnet of CIDR 20.0.0.1/24. How can the user create the second
subnet?
Which of the below mentioned entries is required in the web server security group (WebSecGrp.?
A user has created a VPC with the public and private subnets using the VPC wizard. The VPC has CIDR
20.0.0.0/16. The public subnet uses CIDR 20.0.1.0/24. The user is planning to host a web server in the public
subnet (port 80. and a DB server in the private subnet (port 3306.. The user is configuring a security group for
the public subnet (WebSecGrp. and the private subnet (DBSecGrp.. Which of the below mentioned entries is
required in the web server security group (WebSecGrp.?
Which of the below mentioned services provides detailed monitoring with CloudWatch without charging the user e
A user is trying to understand the detailed CloudWatch monitoring concept. Which of the below mentioned
services provides detailed monitoring with CloudWatch without charging the user extra?
Which of the below mentioned is not a valid namespace for the AWS services?
A user is trying to understand the CloudWatch metrics for the AWS services. It is required that the user should
first understand the namespace for the AWS services. Which of the below mentioned is not a valid namespace
for the AWS services?
Which parameter is not required while making a call for SSE-C?
A system admin is planning to encrypt all objects being uploaded to S3 from an application. The system admin
does not want to implement his own encryption algorithm; instead he is planning to use server side encryption
by supplying his own key (SSE-C.. Which parameter is not required while making a call for SSE-C?