A company must migrate 20 TB of data from a data centre to the AWS Cloud within 30 days. The company's network bandwidth is limited to 15 Mbps and cannot exceed 70% utilization. What should a solutions architect do to meet these requirements?

AWS Solution Architect

Quiz
•
Computers
•
University
•
Medium
Priyaadharshini M
Used 11+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
AWS Snowball
AWS DataSyn
AWS S3
AWS Glacier
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A solutions architect must create a highly available bastion host architecture. The solution needs to be resilient within a single AWS Region and should require only minimal effort to maintain. What should the solutions architect do to meet these requirements?
. Create a Network Load Balancer backed by an Auto Scaling group with a UDP listener.
Create a Network Load Balancer backed by a Spot Fleet with instances in a partition placement group
Create a Network Load Balancer backed by the existing servers in different Availability Zones as the target
Create a Network Load Balancer backed by an Auto Scaling group with instances in multiple Availability Zones as the target
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company is running a highly sensitive application on Amazon EC2 backed by an Amazon RDS database Compliance regulations mandate that all personally identifiable information (Pll) be encrypted at rest. Which solution should a solutions architect recommend to meet this requirement with the LEAST amount of changes to the infrastructure?
Deploy AWS Certificate Manager to generate certificates Use the certificates to encrypt the database volume
Deploy AWS CloudHSM, generate encryption keys, and use the customer master key (CMK) to encrypt database volumes
Configure SSL encryption using AWS Key Management Service customer master keys (AWS KMS CMKs) to encrypt database volumes.
Configure Amazon Elastic Block Store (Amazon EBS) encryption and Amazon RDS encryption with AWS Key Management Service (AWS KMS) keys to encrypt instance and database volumes
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company is storing an access key (access key ID and secret access key) in a text file on a custom AMI. The company uses the access key to access DynamoDB tables from instances created from the AMI. The security team has mandated a more secure solution. Which solution will meet the security team’s mandate?
Put the access key in an S3 bucket, and retrieve the access key on boot from the instance.
Pass the access key to the instances through instance user data.
Obtain the access key from a key server launched in a private subnet.
Create an IAM role with permissions to access the table, and launch all instances with the new role.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Company salespeople upload their sales figures daily. A Solutions Architect needs a durable storage solution for these documents that also protects against users accidentally deleting important documents. Which action will protect against unintended user actions?
Store data in an EBS volume and create snapshots once a week.
Store data in an S3 bucket and enable versioning.
Store data in two S3 buckets in different AWS regions.
Store data on EC2 instance storage.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An application saves the logs to an S3 bucket. A user wants to keep the logs for one month for troubleshooting purposes, and then purge the logs. What feature will enable this?
Adding a bucket policy on the S3 bucket.
Configuring lifecycle configuration rules on the S3 bucket.
Creating an IAM policy for the S3 bucket.
Enabling CORS on the S3 bucket.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An organization is building an Amazon Redshift cluster in their shared services VPC. The cluster will host sensitive data. How can the organization control which networks can access the cluster?
Run the cluster in a different VPC and connect through VPC peering.
Create a database user inside the Amazon Redshift cluster only for users on the network.
Define a cluster security group for the cluster that allows access from the allowed networks.
Only allow access to networks that connect with the shared services network via VPN.
Create a free account and access millions of resources
Similar Resources on Quizizz
11 questions
AWS ANALISIS DE DATOS

Quiz
•
University
9 questions
CBD2234 Week 1

Quiz
•
12th Grade - University
10 questions
CIS 533 - Week 4 Quiz

Quiz
•
University
15 questions
AWS EC2

Quiz
•
University
12 questions
Cloud QUIZ

Quiz
•
University - Professi...
14 questions
Preparatorio AWS Certified Solutions Unidad2

Quiz
•
University
15 questions
Arquitectura en la Nube AWS

Quiz
•
University
15 questions
DBMS

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade