Which of the following are use cases for Amazon DynamoDB?
Which of the following are use cases for Amazon DynamoDB? (Choose three)
Which of the following options would enable an equivale…
A US-based company is expanding their web presence into Europe. The company wants to extend their AWS
infrastructure from Northern Virginia (us-east-1) into the Dublin (eu-west-1) region. Which of the following
options would enable an equivalent experience for users on both continents?
Which of the following approaches would protect the sen…
An existing application stores sensitive information on a non-boot Amazon EBS data volume attached to an
Amazon Elastic Compute Cloud instance. Which of the following approaches would protect the sensitive data
on an Amazon EBS volume?
Which of the following approaches provides the lowest c…
Which of the following approaches provides the lowest cost for Amazon Elastic Block Store snapshots while
giving you the ability to fully restore data?
What additional step is required to allow access from t…
You manually launch a NAT AMI in a public subnet. The network is properly configured. Security groups and
network access control lists are property configured. Instances in a private subnet can access the NAT. The
NAT can access the Internet. However, private instances cannot access the Internet. What additional step is
required to allow access from the private instances?
what type of Amazon Machine Image (AMI)?
A t2.medium EC2 instance type must be launched with what type of Amazon Machine Image (AMI)?
Which configuration provides the solution for the compa…
A company is deploying a new two-tier web application in AWS. The company has limited staff and requires
high availability, and the application requires complex queries and table joins. Which configuration provides the
solution for the company’s requirements?
Which of the following are true regarding encrypted Ama…
Which of the following are true regarding encrypted Amazon Elastic Block Store (EBS) volumes? (Choose two.)
Which configuration should be used to ensure mat AWS cr…
A company is building software on AWS that requires access to various AWS services. Which configuration
should be used to ensure mat AWS credentials (i.e., Access Key ID/Secret Access Key combination) are not
compromised?
Which of the following services natively encrypts data …
Which of the following services natively encrypts data at rest within an AWS region? (Choose two.)