Search Header Logo

lorem ipsum AWS D4 cap.1-2

Authored by Fil Co

Computers, Professional Development

Professional Development

Used 11+ times

lorem ipsum AWS D4 cap.1-2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under a single AWS account, you have set up an Auto Scaling group with a maximum capacity of 50 Amazon Elastic Compute Cloud (Amazon EC2) instances in us-west-2. When you scale out, however, it only increases to 20 Amazon EC2 instances. What is the likely cause?

Auto Scaling has a hard limit of 20 Amazon EC2 instances.

If not specified, the Auto Scaling group maximum capacity defaults to 20 Amazon EC2 instances.

The Auto Scaling group desired capacity is set to 20, so Auto Scaling stopped at 20 Amazon EC2 instances.

You have exceeded the default Amazon EC2 instance limit of 20 per region.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Elastic Load Balancing allows you to distribute traffic across which of the following?

Only within a single Availability Zone

Multiple Availability Zones within a region

Multiple Availability Zones within and between regions

Multiple Availability Zones within and between regions and on-premises virtualized instances running OpenStack Multiple Availability Zones within and between regions and on-premises virtualized instances running OpenStack

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Amazon CloudWatch offers which types of monitoring plans? (Choose 2 answers)

Basic

Detailed

Diagnostic

Precognitive

Retroactive

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

An Amazon Elastic Compute Cloud (Amazon EC2) instance in an Amazon Virtual Private Cloud (Amazon VPC) subnet can send and receive traffic from the Internet when which of the following conditions are met? (Choose 3 answers)

Network Access Control Lists (ACLs) and security group rules disallow all traffic except relevant Internet traffic

Network ACLs and security group rules allow relevant Internet traffic.

Attach an Internet Gateway (IGW) to the Amazon VPC and create a subnet route table to send all non-local traffic to that IGW.

Attach a Virtual Private Gateway (VPG) to the Amazon VPC and create subnet routes to send all non-local traffic to that VPG.

The Amazon EC2 instance has a public IP address or Elastic IP (EIP) address.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

If you launch five Amazon Elastic Compute Cloud (Amazon EC2) instances in an Amazon Virtual Private Cloud (Amazon VPC) without specifying a security group, the instances will be launched into a default security group that provides which of the following? (Choose 3 answers)

The five Amazon EC2 instances can communicate with each other.

The five Amazon EC2 instances cannot communicate with each other.

All inbound traffic will be allowed to the five Amazon EC2 instances.

No inbound traffic will be allowed to the five Amazon EC2 instances.

All outbound traffic will be allowed from the five Amazon EC2 instances.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Your company wants to host its secure web application in AWS. The internal security policies consider any connections to or from the web server as insecure and require application data protection. What approaches should you use to protect data in transit for the application? (Choose 2 answers)

Use BitLocker to encrypt data.

Use HTTPS with server certificate authentication.

Use an AWS Identity and Access Management (IAM) role.

Use Secure Sockets Layer (SSL)/Transport Layer Security (TLS) for database connection.

Use XML for data transfer from client to server. Use XML for data transfer from client to server.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have an application that will run on an Amazon Elastic Compute Cloud (Amazon EC2) instance. The application will make requests to Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB. Using best practices, what type of AWS Identity and Access Management (IAM) identity should you create for your application to access the identified services?

IAM role

IAM user

IAM group

IAM directory

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?