Which of the below mentioned options is a recommended option for this case?
A user is having data generated randomly based on a certain event. The user wants to upload that data to
CloudWatch. It may happen that event may not have data generated for some period due to andomness.
Which of the below mentioned options is a recommended option for this case?
What will CloudWatch do in this case?
A user is sending the data to CloudWatch using the CloudWatch API. The user is sending data 90 minutes in the
future. What will CloudWatch do in this case?
How can the user perform this activity?
A user wants to upload a complete folder to AWS S3 using the S3 Management console. How can the user
perform this activity?
Which of the below mentioned AWS RDS logs cannot be viewed from the console for MySQL?
Which of the below mentioned AWS RDS logs cannot be viewed from the console for MySQL?
What can be the possible reason for this?
A user has launched an EBS backed EC2 instance in the US-East-1a region. The user stopped the instance and
started it back after 20 days. AWS throws up an ‘InsufficientInstanceCapacity’ error. What can be the possible
reason for this?
Which of the below mentioned statements is true in this scenario?
A user has created a VPC with public and private subnets using the VPC wizard. Which of the below
mentioned statements is true in this scenario?
Which of the below mentioned IAM policy statements allows the user to have access to the AWS usage report page
The CFO of a company wants to allow one of his employees to view only the AWS usage report page. Which of
the below mentioned IAM policy statements allows the user to have access to the AWS usage report page?
How can the organization achieve this?
An organization has created 10 IAM users. The organization wants each of the IAM users to have access to a
separate DyanmoDB table. All the users are added to the same group and the organization wants to setup a
group level policy for this. How can the organization achieve this?
What will ELB do in this scenario?
A user has configured an HTTPS listener on an ELB. The user has not configured any security policy which can
help to negotiate SSL between the client and ELB. What will ELB do in this scenario?
Which of the below mentioned limitations does not hold true for Cloudformation?
A user is creating a Cloudformation stack. Which of the below mentioned limitations does not hold true for
Cloudformation?