Which approach below provides the least impact to provisioned throughput on the "Product" table?
Which approach below provides the least impact to provisioned throughput on the “Product”
table?
Which DynamoDB limits can be raised by contacting AWS support?
Which DynamoDB limits can be raised by contacting AWS support? Choose 2 answers
Which of the following items are required to allow an application deployed on an EC2 instance to write data to
Which of the following items are required to allow an application deployed on an EC2
instance to write data to a DynamoDB table? Assume that no security Keys are allowed to
be stored on the EC2 instance. Choose 2 answers
Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)?
Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)?
what is the region-specific website endpoint?
An Amazon S3 bucket, “myawsbucket” is configured with website hosting in Tokyo region,
what is the region-specific website endpoint?
Which two approaches can satisfy the objectives?
A corporate web application is deployed within an Amazon VPC, and is connected to the
corporate data center via IPSec VPN. The application must authenticate against the
on-premise LDAP server. Once authenticated, logged-in users can only access an S3
keyspace specific to the user. Which two approaches can satisfy the objectives? Choose 2
answers
You advise them to:
You are providing AWS consulting services for a company developing a new mobile
application that will be leveraging Amazon SNS Mobile Push for push notifications. In order
to send direct notification messages to individual devices each device registration identifier
or token needs to be registered with SNS; however the developers are not sure of the best
way to do this. You advise them to:
What type of block cipher does Amazon S3 offer for server side encryption?
What type of block cipher does Amazon S3 offer for server side encryption?
What is a possible solution to prevent this happening?
You have written an application that uses the Elastic Load Balancing service to spread
traffic to several web servers Your users complain that they are sometimes forced to login
again in the middle of using your application, after they have already togged in. This is not
behavior you have designed. What is a possible solution to prevent this happening?
Which of the following is an example of a good DynamoDB hash key schema for provisioned throughput efficiency?
Which of the following is an example of a good DynamoDB hash key schema for
provisioned throughput efficiency?