Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Andrew, a SysOps engineer working at a company wants to protect their data in transit and at rest. What services could they use to protect their data?
- ebs, elastic load balancing, amazon s3, all of the above - all of the above
- Which service would you use to send alerts based on Amazon Cloud Watch alarms?
- amazon simple notification service
- Which of the following is not one of the five AWS Well-Architected Framework pillars? (Select the best answer)
- Which of the following is not one of the five AWS Well-Architected Framework pillars? (Select the best answer)
- Resiliency
- Failure and change management can be address at which pillar? (select the best answer)
- -Reliability Pillar
- Operational Excellence is supported by three best practices: Prepare, Operate, and Evolve. Which AWS services(s) would best support the best practice of Prepare?
- -AWS Config
- All of the following statements support the best practice of Prepare, EXCEPT for these two responses:
- -Include Feedback loops for procedures to identify areas for improvement
- -Communicate the current operating status of the business through dashboards
- True or False? The best practice of Evolve can be supported through analyzing trends for lessons learned, and performing cross-team retrospective analysis of operations metrics.
- -True
- Which factors should drive operational priorities in relation to the Operational Excellence pillar? (Select three responses)
- -Business Needs
- -Create checklists
- -Metric Analysis
- elvyToday at 11:07 PM
- Which of the following options is used to define the events and procedures that are used within a workload?
- -runbooks
- True or False? To properly support a workload with the Operational Excellence pillar, one needs to continuously experiment and evolve by acting on opportunities to improve because change is constant.
- -True
- A customer decides to classify data into sensitivity levels, and use mechanisms such as encryption and tokenization. Which security design principle is described?
- -Protect data in transit and at rest
- All are AWS services that are key services for security in relation to data protection, Except:
- -Amazon VPC
- True or False? A distributed denial of service (DDOS) attack attempts to make your website or application unavailable to your end users.
- -True
- Which statements describe the responsibilities of the customer as part of the shared responsibility model? Select all that apply
- -AWS API endpoints are hosted on large, internet-scale, world-class infrastructure
- -Evaluate soft limits and request increases ahead of time
- -Front your application with AWS services
- Which AWS Service includes a regularly updated knowledge base of rules that can be mapped to common security standards and vulnerability definitions?
- -AWS Inspector
- What does AWS Inspector use to evaluate an application?
- -Assessments
- What can you request in CloudFront for browsers that do not support Server Name Indications (SNI)?
- -Dedicated IP Custom SSL
- What do you need to do when you configure an Amazon CloudFront distribution to access an Amazon Simple Storage Service (Amazon S3) private bucket? Select three responses.
- -Write the code that generates signed uniform resource locators (URLs)
- -Enable website hosting in the bucket
- -Add trusted signers to your distribution
- How many security groups can you assign to an Amazon Elastic Compute Cloud (EC2) instance?
- -More than one
- Which of the following feature is not included in Load Balancers monitoring? Select all answers that applies.
- -EBS Dignostics
- Which of the following are Elastic Load Balancing use cases?
- -Highly available and fault-tolerant applications
- -Virtual Private Cloud (VPC)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement