Is there a method in the IAM system to allow or deny ac…
Is there a method in the IAM system to allow or deny access to a specific instance?
Does AWS Direct Connect allow you access to all Availab…
Does AWS Direct Connect allow you access to all Availabilities Zones within a Region?
Which type of Amazon EC2 instances should you use to re…
You have a video transcoding application running on Amazon EC2. Each instance polls a queue to find out
which video should be transcoded, and then runs a transcoding process. If this process is interrupted, the video
will be transcoded by another instance based on the queuing system. You have a large backlog of videos which
need to be transcoded and would like to reduce this backlog by adding more instances. You will need these
instances only until the backlog is reduced. Which type of Amazon EC2 instances should you use to reduce the
backlog in the most cost efficient way?
what happens to the data on the root volume?
When an EC2 instance that is backed by an S3-based AMI is terminated, what happens to the data on the root
volume?
Amazon RDS automated backups and DB Snapshots are curre…
Amazon RDS automated backups and DB Snapshots are currently supported for only the ______ storage
engine
This interface is described by a Web Services Descripti…
The Amazon EC2 web service can be accessed using the _____ web services messaging protocol. This
interface is described by a Web Services Description Language (WSDL) document.
REST or Query requests are HTTP or HTTPS requests that …
REST or Query requests are HTTP or HTTPS requests that use an HTTP verb (such as GET or POST) and a
parameter named Action or Operation that specifies the API you are calling.
Select the set of steps for exposing the snapshot only …
Select the set of steps for exposing the snapshot only to specific AWS accounts
Security groups act like a firewall at the instance lev…
Security groups act like a firewall at the instance level, whereas ____________ are an additional layer of
security that act at the subnet level.
You can use _____ and _____ to help secure the instance…
You can use _____ and _____ to help secure the instances in your VPC.