Which should be your next step in troubleshooting and attempting to get the instance…?
You have a Linux EC2 web server instance running inside a VPC The instance is in a public subnet and has an EIP associated
with it so you can connect to It over the Internet via HTTP or SSH The instance was also fully accessible when you last logged in
via SSH. and was also serving web requests on port 80. Now you are not able to SSH into the host nor does it respond to web
requests on port 80 that were working fine last time you checked You have double-checked that all networking configuration
parameters (security groups route tables, IGWEIP. NACLs etc.) are properly configured (and you haven’t made any changes to
those anyway since you were last able to reach the instance). You look at the EC2 console and notice that system status checks
show “impaired”. Which should be your next step in troubleshooting and attempting to get the instance back to a healthy state so
that you can log in again?
Which two of the following options would allow an organization to enforce this policy for AWS users?
Your organization’s security policy requires that all privileged users either use frequently rotated passwords or one-time access
credentials in addition to username/password. Which two of the following options would allow an organization to enforce this policy
for AWS users? Choose 2 answers.
Which method would be the best way to authenticate your Cloud Watch PUT request?
You are creating an Auto Scaling group whose Instances need to insert a custom metric into Cloud Watch. Which method would
be the best way to authenticate your Cloud Watch PUT request?
Which of the following approaches can help ensure that you do not exceed the budget each month?
You have set up Individual AWS accounts for each project. You have been asked to make sure your AWS Infrastructure costs do
not exceed the budget set per project for each month. Which of the following approaches can help ensure that you do not exceed
the budget each month?
What option would you implement to successfully launch this application1?
The majority of your Infrastructure is on premises and you have a small footprint on AWS Your company has decided to roll out a
new application that is heavily dependent on low latency connectivity to LOAP for authentication Your security policy requires
minimal changes to the company’s existing application user management processes. What option would you implement to
successfully launch this application1?
what are three best-practices for you to prepare for an audit?
When preparing for a compliance assessment of your system built inside of AWS. what are three best-practices for you to prepare
for an audit? Choose 3 answers.
What two actions could you take to rectify this?
You are using ElastiCache Memcached to store session state and cache database queries in your infrastructure You notice in
Cloud Watch that Evictions and Get Misses are Doth very high. What two actions could you take to rectify this? Choose 2 answers.
Which of the following Is a simple way to achieve that goal?
Your EC2-Based Multi-tier application includes a monitoring instance that periodically makes application -level read only requests
of various application components and if any of those fail more than three times 30 seconds calls Cloud Watch lo fire an alarm,
and the alarm notifies your operations team by email and SMS of a possible application health problem. However, you also need
to watch the watcher-the monitoring instance itself-and be notified if it becomes unhealthy. Which of the following Is a simple way
to achieve that goal?
What are the two best ways to speed up serving this image?
Your company Is moving towards tracking web page users with a small tracking Image loaded on each page Currently you are
serving this image out of US-East, but are starting to get concerned about the time It takes to load the image for users on the west
coast. What are the two best ways to speed up serving this image? Choose 2 answers.
Which option should you implement to ensure this requirement is met?
An organization’s security policy requires multiple copies of all critical data to be replicated across at least a primary and backup
data center. The organization has decided to store some critical data on Amazon S3. Which option should you implement to ensure
this requirement is met?