Which of the below mentioned options does the user need…
A user is launching an instance with EC2. Which of the below mentioned options does the user need to consider before
launching an instance?
Which of the below mentioned functionalities helps achi…
A user wants to achieve High Availability with PostgreSQL DB. Which of the below mentioned functionalities helps achieve
HA?
What will happen in this scenario?
A bucket owner has allowed another account’s IAM users to upload or access objects in his bucket. The IAM user of
Account A is trying to access an object created by the IAM user of account B. What will happen in this scenario?
which of the below mentioned options may be a right fit…
A user is having access to objects of an S3 bucket which is not owned by him. If he is trying to set the objects of that
bucket public, which of the below mentioned options may be a right fit for this action?
Does DynamoDB support in-place atomic updates?
Does DynamoDB support in-place atomic updates?
what is the maximum number of stacks that you can create?
When working with AWS CloudFormation Templates what is the maximum number of stacks that you can create?
What should the user do to ensure that the EC2 instance…
A user has configured a website and launched it using the Apache web server on port 80. The user is using ELB with the
EC2 instances for Load Balancing. What should the user do to ensure that the EC2 instances accept requests only from
ELB?
which of the below mentioned parameters should the user…
To scale up the AWS resources using manual AutoScaling, which of the below mentioned parameters should the user
change?
You specify the queue by its ____.
Regarding Amazon SNS, to send messages to a queue through a topic, you must subscribe the queue to the Amazon
SNS topic. You specify the queue by its ____.
How can Bob change John’s password?
A root AWS account owner has created three IAM users: Bob, John and Michael. Michael is the IAM administrator. Bob
and John are not the superpower users, but users with some pre-defined policies. John does not have access to modify
his password. Thus, he asks Bob to change his password. How can Bob change John’s password?