
AWS ACF Módulo 9 - Arquitetura de nuvem
Authored by Joao Alencar
Computers, Professional Development
Professional Development
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which AWS service provides infrastructure security optimization recommendations?
AWs Application Programming Interface (API)
Reserved Instances
AWS Trusted Advisor
Amazon Elastic Compute Cloud (Amazon EC2) SpotFleet
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
The Trusted Advisor service provides insight regarding which five categories of an AWS account?
Security, fault tolerance, high availability, connectivity and service limits.
Security, access control, high availability, performance and service limits.
Performance, cost optimization, security, fault tolerance and service limits.
Performance, cost optimization, access control, connectivity and service limits.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
An administrator is looking to run their cloud infrastructure along best practice guidelines by leveraging on Amazon Inspector and AWS Trusted Advisor services. Which of the following statements correctly describe how this can be done? (Select TWO)
Running Amazon Inspector service to probe and protect infrastructure from threats regularly
Adhering to recommendations given in the main pillars of AWS Trusted Advisor, which are cost optimization, security, performance, fault-tolerance and service limits.
Regularly running Amazon Inspector Service on EC2 instances to get a concise list of security vulnerabilities and exposures to attack.
AWS Trusted Advisor will highlight pending tasks to be resolved in only performance and cost optimization best practices whilst Amazon Inspector will alert the administrator of security vulnerabilites.
Amazon Inspector will highlight pending tasks to be resolved in only performance and cost optimization best practices whilst AWS Trusted Advisor will alert the administrator of security vulnerabilities.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a disaster recovery deployment technique?
Pilot Light
Warm Standy
Single Site
Multi Site
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following disaster recovery deployment mechanisms that has the highest downtime?
Pilot Light
Warm Standby
Multi Site
Backup and Restore
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are planning to server a web application on the AWS Platform by using EC2 instances. Which of the below principles would you adopt to ensure that even if some of the EC2 Instance crashes, you still have a working application?
Using a scalable system
Using an elastic system
Using a regional system
Using a fault tolerance system
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Based on the AWS Well-Architected Framework, how should a start-up company with a dynamic AWS environment manage its users and resources securely without affecting the cost? Select TWO.
Create multiple unique IAM users with administrator access for each functional group of the company.
Use of AWS CloudFront template versions and revision controls to keep track of the dynamic configuration changes.
Use of AWS Organizations with respective OUs that differentiate billing across the company's functions.
Implement the most stringent security measures on the VPC-edge rather than on the resource hosts.
Provisioning of resources and compute security capacity that accommodates future growth.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?