Which of the below mentioned activities is the user performing with the command given above?
A user runs the command “dd if=/dev/zero of=/dev/xvdfbs=1M” on a fresh blank EBS volume attached to a
Linux instance. Which of the below mentioned activities is the user performing with the command given
above?
How can the user configure this?
A user has created an Auto Scaling group using CLI. The user wants to enable CloudWatch detailed
monitoring for that group. How can the user configure this?
Which of the below mentioned statements is true with respect to this scenario?
A user has created a VPC with a public subnet. The user has terminated all the instances which are part of the
subnet. Which of the below mentioned statements is true with respect to this scenario?
Which of the below mentioned options helps identify the matching cipher at the client side to the ELB cipher l
A user has configured ELB with SSL using a security policy for secure negotiation between the client and load
balancer. The ELB security policy supports various ciphers. Which of the below mentioned options helps
identify the matching cipher at the client side to the ELB cipher list when client is requesting ELB DNS over SSL?
Which of the below mentioned entries is not required for the NAT security group?
A user has created a VPC with public and private subnets. The VPC has CIDR 20.0.0.0/16. The private subnet
uses CIDR 20.0.1.0/24 and the public subnet uses CIDR 20.0.0.0/24. The user is planning to host a web server in
the public subnet (port 80. and a DB server in the private subnet (port 3306.. The user is configuring a security
group of the NAT instance. Which of the below mentioned entries is not required for the NAT security group?
Which of the below mentioned statements is true with respect to the best practice for security in this scenari
A user has created an application which will be hosted on EC2. The application makes calls to DynamoDB to
fetch certain dat
a. The application is using the DynamoDB SDK to connect with from the EC2 instance. Which of the below
mentioned statements is true with respect to the best practice for security in this scenario?
What does this policy statement entitle the user to perform?
An organization (Account ID 123412341234. has attached the below mentioned IAM policy to a user. What
does this policy statement entitle the user to perform?
{
“Version”: “2012-10-17”,
“Statement”: [{
“Sid”: “AllowUsersAllActionsForCredentials”,
“Effect”: “Allow”,
“Action”: [
“iam:*LoginProfile”,
“iam:*AccessKey*”,
“iam:*SigningCertificate*”
],
“Resource”: [“arn:aws:iam:: 123412341234:user/${aws:username}”]
}]
}
Which of the below mentioned parameters is mandatory for the user to include in the request list?
A user has a weighing plant. The user measures the weight of some goods every 5 minutes and sends data to
AWS CloudWatch for monitoring and tracking. Which of the below mentioned parameters is mandatory for the
user to include in the request list?
Please select the correct sequence of steps, both when the cookie is present and when it is not…
A sys admin is trying to understand the sticky session algorithm. Please select the correct sequence of steps,
both when the cookie is present and when it is not, to help the admin understand the implementation of the
sticky session:
ELB inserts the cookie in the response
ELB chooses the instance based on the load balancing algorithm
Check the cookie in the service request
The cookie is found in the request
The cookie is not found in the request
What is the order execution?
An organization has configured Auto Scaling for hosting their application. The system admin wants to
understand the Auto Scaling health check process. If the instance is unhealthy, Auto Scaling launches an
instance and terminates the unhealthy instance. What is the order execution?