Which of the below mentioned statements is true with respect to this scenario?
A user has created a VPC with a public subnet. The user has terminated all the instances which
are part of the subnet. Which of the below mentioned statements is true with respect to this
scenario?
Which of the below mentioned options helps identify the matching cipher at the client side to the ELB cipher l
A user has configured ELB with SSL using a security policy for secure negotiation between the
client and load balancer. The ELB security policy supports various ciphers. Which of the below
mentioned options helps identify the matching cipher at the client side to the ELB cipher list when
client is requesting ELB DNS over SSL?
Which of the below mentioned entries is not required for the NAT security group?
A user has created a VPC with public and private subnets. The VPC has CIDR 20.0.0.0/16. The
private subnet uses CIDR 20.0.1.0/24 and the public subnet uses CIDR 20.0.0.0/24. The user is
planning to host a web server in the public subnet (port 80. and a DB server in the private subnet
(port 3306.. The user is configuring a security group of the NAT instance. Which of the below
mentioned entries is not required for the NAT security group?
Which of the below mentioned statements is true with respect to the best practice for security in this scenari
A user has created an application which will be hosted on EC2. The application makes calls to
DynamoDB to fetch certain data. The application is using the DynamoDB SDK to connect with
from the EC2 instance. Which of the below mentioned statements is true with respect to the best
practice for security in this scenario?
What does this policy statement entitle the user to perform?
An organization (Account ID 123412341234. has attached the below mentioned IAM policy to a
user. What does this policy statement entitle the user to perform?
{
“Version”: “2012-10-17”,
“Statement”: [{
“Sid”: “AllowUsersAllActionsForCredentials”,
“Effect”: “Allow”,
“Action”: [
“iam:*LoginProfile”,
“iam:*AccessKey*”,
“iam:*SigningCertificate*”
],
“Resource”: [“arn:aws:iam:: 123412341234:user/${aws:username}”]
}]
}
Please select the correct sequence of steps…
A sys admin is trying to understand the sticky session algorithm. Please select the correct
sequence of steps, both when the cookie is present and when it is not, to help the admin
understand the implementation of the sticky session:
ELB inserts the cookie in the response
ELB chooses the instance based on the load balancing algorithm
Check the cookie in the service request
The cookie is found in the request
The cookie is not found in the request
Which of the below mentioned parameters is mandatory for the user to include in the request list?
A user has a weighing plant. The user measures the weight of some goods every 5 minutes and
sends data to AWS CloudWatch for monitoring and tracking. Which of the below mentioned
parameters is mandatory for the user to include in the request list?
What is the order execution?
An organization has configured Auto Scaling for hosting their application. The system admin wants
to
understand the Auto Scaling health check process. If the instance is unhealthy, Auto Scaling
launches an
instance and terminates the unhealthy instance. What is the order execution?
Which of the below mentioned options can be a possible reason for rejection?
A user is trying to connect to a running EC2 instance using SSH. However, the user gets an
Unprotected
Private Key File error. Which of the below mentioned options can be a possible reason for
rejection?
Which of the below mentioned options does not affect the IOPS of the volume?
A user has provisioned 2000 IOPS to the EBS volume. The application hosted on that EBS is
experiencing less IOPS than provisioned. Which of the below mentioned options does not affect
the IOPS of the volume?