PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following is the best method to quickly an…

You are currently hosting multiple applications in a VPC and have logged numerous port scans coming in from a specific
IP address block. Your security team has requested that all access from the offending IP address block be denied tor the
next 24 hours. Which of the following is the best method to quickly and temporarily deny access from the specified IP
address block?

Which of these solutions would you recommend?

You currently operate a web application in the AWS US-East region. The application runs on an
auto- scaled layer of EC2 instances and an RDS Multi-AZ database. Your IT security compliance
officer has tasked you to develop a reliable and durable logging solution to track changes made
to your EC2, IAM, and RDS resources.
The solution must ensure the integrity and confidentiality of your log data.
Which of these solutions would you recommend?

Which approach addresses this requirement?

Your team Is excited about theuse of AWS because now they have access to programmable Infrastructure. You have
been asked to manage your AWS infrastructure In a manner similar to the way you might manage application code. You
want to be able to deploy exact copies of different versions of your infrastructure, stage changes into different
environments, revert back to previous versions, and identify what versions are running at any particular time (development
test QA. production). Which approach addresses this requirement?

What should your server-side application do when a new …

You are designing a photo-sharing mobile app. The application will store all pictures in a single
Amazon S3 bucket.
Users will upload pictures from their mobile device directly to Amazon S3 and will be able to view
and download their own pictures directly from Amazon S3.
You want to configure security to handle potentially millions of users in the most secure manner
possible. What should your server-side application do when a new user registers on the photosharing mobile application?

Which of the following would meet all of these conditions:

An enterprise wants to use a third-party SaaS application. The SaaS application needs to have
access to issue several API commands to discover Amazon EC2 resources running within the
enterprise’s account. The enterprise has internal security policies that require any outside access
to their environment must conform to the principles of least privilege, and there must be controls
in place to ensure that the credentials used by the SaaS vendor cannot be used by any other

third party.
Which of the following would meet all of these conditions:


Page 117 of 354« First...102030...115116117118119...130140150...Last »