What will happen in this scenario?
A user has created a VPC with CIDR 20.0.0.0/16. The user has created one subnet with CIDR 20.0.0.0/16 in this VPC.
The user is trying to create another subnet with the same VPC for CIDR 20.0.0.1/24. What will happen in this scenario?
Identify which option will allow you to achieve this goal.
You are looking to migrate your Development (Dev) and Test environments to AWS. You have
decided to use separate AWS accounts to host each environment. You plan to link each
account’s bill to a Master AWS account using Consolidated Billing. To make sure you keep within
budget you would like to implement a way for administrators in the Master account to have
access to stop, delete and/or terminate resources in both the Dev and Test accounts. Identify
which option will allow you to achieve this goal.
Which of the below mentioned entries is required in the…
A user has created a VPC with the public and private subnets using the VPC wizard. The VPC has CIDR 20.0.0.0/16.
The public subnet uses CIDR 20.0.1.0/24. The user is planning to host a web server in the public subnet (port 80) and a
DB server in the private subnet (port 3306). The user is configuring a security group for the public subnet (WebSecGrp)
and the private subnet (DBSecGrp). Which of the below mentioned entries is required in the web server security group
(WebSecGrp)?
Which of the following configurations will support thes…
An AWS customer is deploying an application that is composed of an AutoScaling group of EC2
instances.
The customers security policy requires that every outbound connection from these instances to
any other service within the customers Virtual Private Cloud must be authenticated using a
unique X.509 certificate that contains the specific Instance-id.
In addition, all X.509 certificates must be signed by the customer’s key management service in
order to be trusted for authentication.
Which of the following configurations will support these requirements:
What does this policy define?
A sysadmin has created the below mentioned policy on an S3 bucket named cloudacademy. What does this policy define?
“Statement”: [{
“Sid”: “Stmt1388811069831”,
“Effect”: “Allow”,
“Principal”: { “AWS”: “*”},
“Action”: [ “s3:GetObjectAcl”, “s3:ListBucket”],
“Resource”: [ “arn:aws:s3:::cloudacademy]
}]
What is the maximum write throughput I can provision fo…
What is the maximum write throughput I can provision for a single Dynamic DB table?
Which of the below mentioned CloudWatch endpoint URLs s…
A user has configured an EC2 instance in the US-East-1a zone. The user has enabled detailed monitoring of the instance.
The user is trying to get the data from CloudWatch using a CLI. Which of the below mentioned CloudWatch endpoint
URLs should the user use?
which of the following would allow the application Inst…
An administrator is using Amazon CloudFormation to deploy a three tier web application that
consists of a web tier and application tier that will utilize Amazon DynamoDB for storage.
When creating the CloudFormation template which of the following would allow the application
Instance access to the DynamoDB tables without exposing API credentials?
Which of the below mentioned activities is the user per…
A user runs the command “dd if=/dev/zero of=/dev/xvdfbs=1M” on a fresh blank EBS volume attached to a Linux instance.
Which of the below mentioned activities is the user performing with the command given above?
you need to consider so you can set up a solution that …
Your fortune 500 company has under taken a TCO analysis evaluating the use of Amazon S3
versus acquiring more hardware. The outcome was that all employees would be granted access
to use Amazon S3 for storage of their personal documents.
Which of the following will you need to consider so you can set up a solution that incorporates
single sign-on from your corporate AD or LDAP directory and restricts access for each user to a
designated user folder in a bucket? Choose 3 answers