Which of the following components of AWS Data Pipeline …
Which of the following components of AWS Data Pipeline polls for tasks and then performs those
tasks?
which of the following steps do you configure Border Ga…
To get started using AWS Direct Connect, in which of the following steps do you configure Border
Gateway Protocol (BGP)?
Can Provisioned IOPS be used on RDS instances launched …
Can Provisioned IOPS be used on RDS instances launched in a VPC?
Which one of the following solutions should Mike recomm…
Mike is appointed as Cloud Consultant in ExamKiller.com. ExamKiller has the following VPCs setup in the US East Region:
A VPC with CIDR block 10.10.0.0/16, a subnet in that VPC with CIDR block 10.10.1.0/24 A VPC
with CIDR block 10.40.0.0/16, a subnet in that VPC with CIDR block 10.40.1.0/24 ExamKiller.com
is trying to establish network connection between two subnets, a subnet with CIDR block
10.10.1.0/24 and another subnet with CIDR block 10.40.1.0/24. Which one of the following
solutions should Mike recommend to ExamKiller.com?
you need to deploy with this kind of configuration?
You want to use Amazon Redshift and you are planning to deploy dw1.8xlarge nodes. What is
the minimum amount of nodes that you need to deploy with this kind of configuration?
Which of the following AWS services can be used to defi…
Which of the following AWS services can be used to define alarms to trigger on a certain activity,
such as activity success, failure, or delay in AWS Data Pipeline?
you need to use Amazon Cognito to use the Amazon Mobile…
Do you need to use Amazon Cognito to use the Amazon Mobile Analytics service?
What will happen when a user is requesting access from …
A user has set the IAM policy where it denies all requests if a request is not from IP
10.10.10.1/32. The other policy says allow all requests between 5 PM to 7 PM. What will happen
when a user is requesting access from IP 55.109.10.12/32 at 6 PM?
Which of the following statements is probably the reaso…
You’re trying to delete an SSL certificate from the IAM certificate store, and you’re getting the
message “Certificate: <certificate-id> is being used by CloudFront.” Which of the following
statements is probably the reason why you are getting this error?
which of the below mentioned options will help achieve …
An organization is setting up a web application with the JEE stack. The application uses the
JBoss app server and MySQL DB. The application has a logging module which logs all the
activities whenever a business function of the JEE application is called. The logging activity takes
some time due to the large size of the log file. If the application wants to setup a scalable
infrastructure which of the below mentioned options will help achieve this setup?