Which of the below mentioned statements is true with respect to the best practice for security in this scenari
A user has created an application which will be hosted on EC2. The application makes calls to DynamoDB to
fetch certain dat
a. The application is using the DynamoDB SDK to connect with from the EC2 instance. Which of the below
mentioned statements is true with respect to the best practice for security in this scenario?
What does this policy statement entitle the user to perform?
An organization (Account ID 123412341234. has attached the below mentioned IAM policy to a user. What
does this policy statement entitle the user to perform?
{
“Version”: “2012-10-17”,
“Statement”: [{
“Sid”: “AllowUsersAllActionsForCredentials”,
“Effect”: “Allow”,
“Action”: [
“iam:*LoginProfile”,
“iam:*AccessKey*”,
“iam:*SigningCertificate*”
],
“Resource”: [“arn:aws:iam:: 123412341234:user/${aws:username}”]
}]
}
Please select the correct sequence of steps, both when the cookie is present and when it is not…
A sys admin is trying to understand the sticky session algorithm. Please select the correct sequence of steps,
both when the cookie is present and when it is not, to help the admin understand the implementation of the
sticky session:
ELB inserts the cookie in the response
ELB chooses the instance based on the load balancing algorithm
Check the cookie in the service request
The cookie is found in the request
The cookie is not found in the request
Which of the below mentioned parameters is mandatory for the user to include in the request list?
A user has a weighing plant. The user measures the weight of some goods every 5 minutes and sends data to
AWS CloudWatch for monitoring and tracking. Which of the below mentioned parameters is mandatory for the
user to include in the request list?
What is the order execution?
An organization has configured Auto Scaling for hosting their application. The system admin wants to
understand the Auto Scaling health check process. If the instance is unhealthy, Auto Scaling launches an
instance and terminates the unhealthy instance. What is the order execution?
Which of the below mentioned options can be a possible reason for rejection?
A user is trying to connect to a running EC2 instance using SSH. However, the user gets an Unprotected
Private Key File error. Which of the below mentioned options can be a possible reason for rejection?
Which of the below mentioned options does not affect the IOPS of the volume?
A user has provisioned 2000 IOPS to the EBS volume. The application hosted on that EBS is experiencing less
IOPS than provisioned. Which of the below mentioned options does not affect the IOPS of the volume?
How can the user achieve this?
A storage admin wants to encrypt all the objects stored in S3 using server side encryption. The user does not
want to use the AES 256 encryption key provided by S3. How can the user achieve this?
Will AWS create the volume?
A user is trying to create a PIOPS EBS volume with 8 GB size and 200 IOPS. Will AWS create the volume?
Which of the below mentioned events may force to take the DB instance offline during the maintenance window?
A user has scheduled the maintenance window of an RDS DB on Monday at 3 AM. Which of the below
mentioned events may force to take the DB instance offline during the maintenance window?