Which of the below mentioned statements is true with respect to the best practice for security in this scenari
A user has created an application which will be hosted on EC2. The application makes calls to
DynamoDB to fetch certain data. The application is using the DynamoDB SDK to connect with
from the EC2 instance. Which of the below mentioned statements is true with respect to the best
practice for security in this scenario?
What does this policy statement entitle the user to perform?
An organization (Account ID 123412341234. has attached the below mentioned IAM policy to a
user. What does this policy statement entitle the user to perform?
{
“Version”: “2012-10-17”,
“Statement”: [{
“Sid”: “AllowUsersAllActionsForCredentials”,
“Effect”: “Allow”,
“Action”: [
“iam:*LoginProfile”,
“iam:*AccessKey*”,
“iam:*SigningCertificate*”
],
“Resource”: [“arn:aws:iam:: 123412341234:user/${aws:username}”]
}]
}
Which of the below mentioned parameters is mandatory for the user to include in the request list?
A user has a weighing plant. The user measures the weight of some goods every 5 minutes and
sends data to AWS CloudWatch for monitoring and tracking. Which of the below mentioned
parameters is mandatory for the user to include in the request list?
Please select the correct sequence of steps…
A sys admin is trying to understand the sticky session algorithm. Please select the correct
sequence of steps, both when the cookie is present and when it is not, to help the admin
understand the implementation of the sticky session:
ELB inserts the cookie in the response
ELB chooses the instance based on the load balancing algorithm
Check the cookie in the service request
The cookie is found in the request
The cookie is not found in the request
What is the order execution?
An organization has configured Auto Scaling for hosting their application. The system admin wants
to
understand the Auto Scaling health check process. If the instance is unhealthy, Auto Scaling
launches an
instance and terminates the unhealthy instance. What is the order execution?
Which of the below mentioned options can be a possible reason for rejection?
A user is trying to connect to a running EC2 instance using SSH. However, the user gets an
Unprotected
Private Key File error. Which of the below mentioned options can be a possible reason for
rejection?
Which of the below mentioned options does not affect the IOPS of the volume?
A user has provisioned 2000 IOPS to the EBS volume. The application hosted on that EBS is
experiencing less IOPS than provisioned. Which of the below mentioned options does not affect
the IOPS of the volume?
How can the user achieve this?
A storage admin wants to encrypt all the objects stored in S3 using server side encryption. The
user does not want to use the AES 256 encryption key provided by S3. How can the user achieve
this?
Will AWS create the volume?
A user is trying to create a PIOPS EBS volume with 8 GB size and 200 IOPS. Will AWS create the
volume?
Which of the below mentioned events may force to take the DB instance offline during the maintenance window?
A user has scheduled the maintenance window of an RDS DB on Monday at 3 AM. Which of the
below
mentioned events may force to take the DB instance offline during the maintenance window?