· 6 years ago · Feb 28, 2020, 04:34 AM
1Andrew, a SysOps engineer working at a company wants to protect their data in transit and at rest. What services could they use to protect their data?
2ebs, elastic load balancing, amazon s3, all of the above - all of the above
3Which service would you use to send alerts based on Amazon Cloud Watch alarms?
4amazon simple notification service
5Which of the following is not one of the five AWS Well-Architected Framework pillars? (Select the best answer)
6Which of the following is not one of the five AWS Well-Architected Framework pillars? (Select the best answer)
7Resiliency
8Failure and change management can be address at which pillar? (select the best answer)
9-Reliability Pillar
10Operational Excellence is supported by three best practices: Prepare, Operate, and Evolve. Which AWS services(s) would best support the best practice of Prepare?
11-AWS Config
12All of the following statements support the best practice of Prepare, EXCEPT for these two responses:
13-Include Feedback loops for procedures to identify areas for improvement
14-Communicate the current operating status of the business through dashboards
15True or False? The best practice of Evolve can be supported through analyzing trends for lessons learned, and performing cross-team retrospective analysis of operations metrics.
16-True
17Which factors should drive operational priorities in relation to the Operational Excellence pillar? (Select three responses)
18-Business Needs
19-Create checklists
20-Metric Analysis
21elvyToday at 11:07 PM
22Which of the following options is used to define the events and procedures that are used within a workload?
23-runbooks
24True or False? To properly support a workload with the Operational Excellence pillar, one needs to continuously experiment and evolve by acting on opportunities to improve because change is constant.
25-True
26A customer decides to classify data into sensitivity levels, and use mechanisms such as encryption and tokenization. Which security design principle is described?
27-Protect data in transit and at rest
28All are AWS services that are key services for security in relation to data protection, Except:
29-Amazon VPC
30True or False? A distributed denial of service (DDOS) attack attempts to make your website or application unavailable to your end users.
31-True
32Which statements describe the responsibilities of the customer as part of the shared responsibility model? Select all that apply
33-AWS API endpoints are hosted on large, internet-scale, world-class infrastructure
34-Evaluate soft limits and request increases ahead of time
35-Front your application with AWS services
36Which AWS Service includes a regularly updated knowledge base of rules that can be mapped to common security standards and vulnerability definitions?
37-AWS Inspector
38What does AWS Inspector use to evaluate an application?
39-Assessments
40What can you request in CloudFront for browsers that do not support Server Name Indications (SNI)?
41-Dedicated IP Custom SSL
42What do you need to do when you configure an Amazon CloudFront distribution to access an Amazon Simple Storage Service (Amazon S3) private bucket? Select three responses.
43-Write the code that generates signed uniform resource locators (URLs)
44-Enable website hosting in the bucket
45-Add trusted signers to your distribution
46How many security groups can you assign to an Amazon Elastic Compute Cloud (EC2) instance?
47-More than one
48Which of the following feature is not included in Load Balancers monitoring? Select all answers that applies.
49-EBS Dignostics
50Which of the following are Elastic Load Balancing use cases?
51-Highly available and fault-tolerant applications
52-Virtual Private Cloud (VPC)