AWS provides several security capabilities and services to increase privacy and control infrastructure access. Built-in firewalls allow you to create private networks within AWS, and also control network access to your instances and subnets. Identity and access management capabilities enable you to define individual user accounts with permissions across AWS resources. AWS also provides tools and features that enable you to see exactly what’s happening in your AWS environment. In this session, you will gain an understanding of preventive and detective controls at the infrastructure level on AWS. We will cover Identity and Access Management as well as the security aspects of Amazon EC2, Virtual Private Cloud (VPC), Elastic Load Balancing (ELB), and CloudTrail.
[AWS Dev Day] 앱 현대화 | DevOps 개발자가 되기 위한 쿠버네티스 핵심 활용 예제 알아보기 - 정영준 AWS 솔루션즈 아키...Amazon Web Services Korea
쿠버네티스에 어플리케이션을 손쉽게 배포하는 방법은 무엇일까요? 복잡하게 배포된 어플리케이션의 파드들은 어떻게 디버깅하고 로깅해야 할까요? 또한 요즘 자주 이야기 되는 클라우드 네이티브 아키텍처로 설계된 어플리케이션은 어떻게 만들고 배포해야하는 걸까요?삼성전자 무선사업부에서 삼성헬스를 EKS 에 배포한 사례를 살펴보며, 이러한 문제를 어떻게 해결했는지 알아봅니다. 또한 복잡하게만 느껴졌던 쿠버네티스의 어플리케이션 배포와 클라우드 네이티브 아키텍처의 베스트 프렉티스를 EKS 에 어플리케이션을 배포하고, 관리하는 예제를 통하여 간편하게 이해할 수 있게 도와드립니다.
Amazon Elastic Compute Cloud (Amazon EC2) provides resizable compute capacity in the cloud and is often the starting point for your first week using AWS. This session will introduce these concepts, along with the fundamentals of EC2, by employing an agile approach that is made possible by the cloud. Attendees will experience the reality of what a first week on EC2 looks like from the perspective of someone deploying an actual application on EC2. You will follow them as they progress from deploying their entire application from an EC2 AMI on day 1 to more advanced features and patterns available in EC2 by day 5. Throughout the process we will identify cloud best practices that can be applied to your first week on EC2 and beyond.
AWS Security Specialty (SCS-C02) Exam | Study Tips & TricksAdinaCoyle
Click Here---> https://bit.ly/3DFASrH <---Get complete detail on SCS-C02 exam guide to crack Security Specialty. You can collect all information on SCS-C02 tutorial, practice test, books, study material, exam questions, and syllabus. Firm your knowledge on Security Specialty and get ready to crack SCS-C02 certification. Explore all information on SCS-C02 exam with number of questions, passing percentage and time duration to complete test.
AWS provides several security capabilities and services to increase privacy and control infrastructure access. Built-in firewalls allow you to create private networks within AWS, and also control network access to your instances and subnets. Identity and access management capabilities enable you to define individual user accounts with permissions across AWS resources. AWS also provides tools and features that enable you to see exactly what’s happening in your AWS environment. In this session, you will gain an understanding of preventive and detective controls at the infrastructure level on AWS. We will cover Identity and Access Management as well as the security aspects of Amazon EC2, Virtual Private Cloud (VPC), Elastic Load Balancing (ELB), and CloudTrail.
You’re interested in the cloud, and you want to start learning more. In this webcast we will answer the following questions:
• What is Cloud Computing?
• What are the benefits of Cloud Computing?
• What are AWS’s products and what workloads can I run with them?
• Who is using the cloud and what are they using it for?
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Amazon Web Services
The cloud enables users to run workloads more securely than they could in a traditional data center. However, customers are still not sure how to harden their AWS accounts and resources in order to enforce compliance. Consistency around governance can also be a concern when large customers have multiple accounts. In this session, we show you how to use automation, tools, and techniques to harden and audit your AWS account as well as how to leverage AWS Organizations to ensure compliance in your enterprise.
Secure your AWS Account and your Organization's Accounts Amazon Web Services
The cloud enables users to run workloads more securely than they could in a traditional data center. However, customers are still not sure how to harden their AWS accounts and resources in order to enforce compliance. Consistency around governance can also be a concern when large customers have multiple accounts. In this session, we show you how to use automation, tools, and techniques to harden and audit your AWS account as well as how to leverage AWS Organizations to ensure compliance in your enterprise.
This session will start with an overview of the AWS security & compliance programs that enable financial services institutions to create secure workloads as they move to the cloud. We will dive into Financial Services Institutions (FSI) specific security considerations and regional regulations that may need to be considered.
Join us for a live session based on our popular Masterclass series of online events. Amazon EC2 forms the backbone compute platform for hundreds of thousands of AWS customers, but how do you go beyond starting an instance and manually configuring it? In this session, we will take you on a journey starting with the basics of key management and security groups and ending with an explanation of Auto Scaling and how you can use it to match capacity and costs to demand using dynamic policies.
Customer Case Study: Land Registry as a Service in the Cloud - AWS PS Summit ...Amazon Web Services
Landgate undertook transform this platform into an as-a-service offering for other land jurisdictions. How was this done? What is the security posture? What is the availability? What was the business impact? And why is it that inspecting Land Title certificates didn't result in people accidentally being shown pictures of Beyoncé. Come find out.
Speaker: James Bromberger, Associate Director & National Cloud Lead - Ajilon.
Level: 300
AWS Summit 2013 | Auckland - Your First Week with Amazon EC2Amazon Web Services
Amazon Elastic Compute Cloud (Amazon EC2) provides resizable compute capacity in the cloud and is often the starting point for your first week using AWS. This session will introduce these concepts, along with the fundamentals of EC2, by employing an agile approach that is made possible by the cloud. Attendees will experience the reality of what a first week on EC2 looks like from the perspective of someone deploying an actual application on EC2. You will follow them as they progress from deploying their entire application from an EC2 AMI on day 1 to more advanced features and patterns available in EC2 by day 5. Throughout the process we will identify cloud best practices that can be applied to your first week on EC2 and beyond.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
More Related Content
Similar to ACP140-Full Length Exam Practice Test.pdf
AWS provides several security capabilities and services to increase privacy and control infrastructure access. Built-in firewalls allow you to create private networks within AWS, and also control network access to your instances and subnets. Identity and access management capabilities enable you to define individual user accounts with permissions across AWS resources. AWS also provides tools and features that enable you to see exactly what’s happening in your AWS environment. In this session, you will gain an understanding of preventive and detective controls at the infrastructure level on AWS. We will cover Identity and Access Management as well as the security aspects of Amazon EC2, Virtual Private Cloud (VPC), Elastic Load Balancing (ELB), and CloudTrail.
[AWS Dev Day] 앱 현대화 | DevOps 개발자가 되기 위한 쿠버네티스 핵심 활용 예제 알아보기 - 정영준 AWS 솔루션즈 아키...Amazon Web Services Korea
쿠버네티스에 어플리케이션을 손쉽게 배포하는 방법은 무엇일까요? 복잡하게 배포된 어플리케이션의 파드들은 어떻게 디버깅하고 로깅해야 할까요? 또한 요즘 자주 이야기 되는 클라우드 네이티브 아키텍처로 설계된 어플리케이션은 어떻게 만들고 배포해야하는 걸까요?삼성전자 무선사업부에서 삼성헬스를 EKS 에 배포한 사례를 살펴보며, 이러한 문제를 어떻게 해결했는지 알아봅니다. 또한 복잡하게만 느껴졌던 쿠버네티스의 어플리케이션 배포와 클라우드 네이티브 아키텍처의 베스트 프렉티스를 EKS 에 어플리케이션을 배포하고, 관리하는 예제를 통하여 간편하게 이해할 수 있게 도와드립니다.
Amazon Elastic Compute Cloud (Amazon EC2) provides resizable compute capacity in the cloud and is often the starting point for your first week using AWS. This session will introduce these concepts, along with the fundamentals of EC2, by employing an agile approach that is made possible by the cloud. Attendees will experience the reality of what a first week on EC2 looks like from the perspective of someone deploying an actual application on EC2. You will follow them as they progress from deploying their entire application from an EC2 AMI on day 1 to more advanced features and patterns available in EC2 by day 5. Throughout the process we will identify cloud best practices that can be applied to your first week on EC2 and beyond.
AWS Security Specialty (SCS-C02) Exam | Study Tips & TricksAdinaCoyle
Click Here---> https://bit.ly/3DFASrH <---Get complete detail on SCS-C02 exam guide to crack Security Specialty. You can collect all information on SCS-C02 tutorial, practice test, books, study material, exam questions, and syllabus. Firm your knowledge on Security Specialty and get ready to crack SCS-C02 certification. Explore all information on SCS-C02 exam with number of questions, passing percentage and time duration to complete test.
AWS provides several security capabilities and services to increase privacy and control infrastructure access. Built-in firewalls allow you to create private networks within AWS, and also control network access to your instances and subnets. Identity and access management capabilities enable you to define individual user accounts with permissions across AWS resources. AWS also provides tools and features that enable you to see exactly what’s happening in your AWS environment. In this session, you will gain an understanding of preventive and detective controls at the infrastructure level on AWS. We will cover Identity and Access Management as well as the security aspects of Amazon EC2, Virtual Private Cloud (VPC), Elastic Load Balancing (ELB), and CloudTrail.
You’re interested in the cloud, and you want to start learning more. In this webcast we will answer the following questions:
• What is Cloud Computing?
• What are the benefits of Cloud Computing?
• What are AWS’s products and what workloads can I run with them?
• Who is using the cloud and what are they using it for?
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Amazon Web Services
The cloud enables users to run workloads more securely than they could in a traditional data center. However, customers are still not sure how to harden their AWS accounts and resources in order to enforce compliance. Consistency around governance can also be a concern when large customers have multiple accounts. In this session, we show you how to use automation, tools, and techniques to harden and audit your AWS account as well as how to leverage AWS Organizations to ensure compliance in your enterprise.
Secure your AWS Account and your Organization's Accounts Amazon Web Services
The cloud enables users to run workloads more securely than they could in a traditional data center. However, customers are still not sure how to harden their AWS accounts and resources in order to enforce compliance. Consistency around governance can also be a concern when large customers have multiple accounts. In this session, we show you how to use automation, tools, and techniques to harden and audit your AWS account as well as how to leverage AWS Organizations to ensure compliance in your enterprise.
This session will start with an overview of the AWS security & compliance programs that enable financial services institutions to create secure workloads as they move to the cloud. We will dive into Financial Services Institutions (FSI) specific security considerations and regional regulations that may need to be considered.
Join us for a live session based on our popular Masterclass series of online events. Amazon EC2 forms the backbone compute platform for hundreds of thousands of AWS customers, but how do you go beyond starting an instance and manually configuring it? In this session, we will take you on a journey starting with the basics of key management and security groups and ending with an explanation of Auto Scaling and how you can use it to match capacity and costs to demand using dynamic policies.
Customer Case Study: Land Registry as a Service in the Cloud - AWS PS Summit ...Amazon Web Services
Landgate undertook transform this platform into an as-a-service offering for other land jurisdictions. How was this done? What is the security posture? What is the availability? What was the business impact? And why is it that inspecting Land Title certificates didn't result in people accidentally being shown pictures of Beyoncé. Come find out.
Speaker: James Bromberger, Associate Director & National Cloud Lead - Ajilon.
Level: 300
AWS Summit 2013 | Auckland - Your First Week with Amazon EC2Amazon Web Services
Amazon Elastic Compute Cloud (Amazon EC2) provides resizable compute capacity in the cloud and is often the starting point for your first week using AWS. This session will introduce these concepts, along with the fundamentals of EC2, by employing an agile approach that is made possible by the cloud. Attendees will experience the reality of what a first week on EC2 looks like from the perspective of someone deploying an actual application on EC2. You will follow them as they progress from deploying their entire application from an EC2 AMI on day 1 to more advanced features and patterns available in EC2 by day 5. Throughout the process we will identify cloud best practices that can be applied to your first week on EC2 and beyond.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
This presentation provides an introduction to quantitative trait loci (QTL) analysis and marker-assisted selection (MAS) in plant breeding. The presentation begins by explaining the type of quantitative traits. The process of QTL analysis, including the use of molecular genetic markers and statistical methods, is discussed. Practical examples demonstrating the power of MAS are provided, such as its use in improving crop traits in plant breeding programs. Overall, this presentation offers a comprehensive overview of these important genomics-based approaches that are transforming modern agriculture.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity Green house effect & Hydrological cycle
Types of Ecosystem
(1) Natural Ecosystem
(2) Artificial Ecosystem
component of ecosystem
Biotic Components
Abiotic Components
Producers
Consumers
Decomposers
Functions of Ecosystem
Types of Biodiversity
Genetic Biodiversity
Species Biodiversity
Ecological Biodiversity
Importance of Biodiversity
Hydrological Cycle
Green House Effect
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2. Q1 - Which of the following AWS service have automated backups
configured by default?
1. Amazon RDS MySQL Database
2. MySQL Database installed on EC2
3. Amazon Batch
4. Amazon Athena
3. Q1 - Which of the following AWS service have automated backups
configured by default?
1. Amazon RDS MySQL Database
2. MySQL Database installed on EC2
3. Amazon Batch
4. Amazon Athena
4. Q2-Which feature of the AWS Cloud helps quickly deliver new functionality
iteratively, thereby minimizing the time to market?
1. Availability Zones
2. Agility
3. Elasticity
4. Enhanced networking
5. Q2-Which feature of the AWS Cloud helps quickly deliver new functionality
iteratively, thereby minimizing the time to market?
1. Availability Zones
2. Agility
3. Elasticity
4. Enhanced networking
6. Q3- Which of the following method should be used to gain programmatic
access to AWS resources from the AWS CLI?
1. IAM Role
2. User ID and Password
3. Security Group
4. Access Key
7. Q3- Which of the following method should be used to gain programmatic
access to AWS resources from the AWS CLI?
1. IAM Role
2. User ID and Password
3. Security Group
4. Access Key
8. Q4-What is the billing system for an EC2 instance running the Amazon
Linux 2 AMI?
1. Per Instance
2. Per Second
3. Per Minute
4. Per Month
9. Q4-What is the billing system for an EC2 instance running the Amazon
Linux 2 AMI?
1. Per Instance
2. Per Second
3. Per Minute
4. Per Month
10. Q5-According to the AWS Shared Responsibility Model, which of the
following fall under the customer responsibilities? (Select TWO.)
1. Setting up encryption on an Amazon S3 bucket
2. Physical security of data center facilities
3. Patching the EC2 Operating System
4. Patching the network infrastructure
11. Q5-According to the AWS Shared Responsibility Model, which of the
following fall under the customer responsibilities? (Select TWO.)
1. Setting up encryption on an Amazon S3 bucket
2. Physical security of data center facilities
3. Patching the EC2 Operating System
4. Patching the network infrastructure
12. Q5-According to the AWS Shared Responsibility Model, which of the
following fall under the customer responsibilities? (Select TWO.)
1. Setting up encryption on an Amazon S3 bucket
2. Physical security of data center facilities
3. Patching the EC2 Operating System
4. Patching the network infrastructure
13. Q6-Which of the following technique is based on CloudWatch metrics and
threshold values?
1. Scheduled Scaling
2. Target Tracking
3. Step Scaling
4. Predictive Scaling
14. Q6-Which of the following technique is based on CloudWatch metrics and
threshold values?
1. Scheduled Scaling
2. Target Tracking
3. Step Scaling
4. Predictive Scaling
15. Q7-What is the amount of data that you can store in Amazon S3?
1. 100 PB
2. 1 PB
3. Virtually Unlimited
4. 1 EB
16. Q7-What is the amount of data that you can store in Amazon S3?
1. 100 PB
2. 1 PB
3. Virtually Unlimited
4. 1 EB
17. Q8-What is a specific benefit of an Enterprise Support plan?
1. Included AWS Cloud Architect
2. Included Technical Account Manager
3. Included AWS Support Analysts
4. Included AWS Technical Support Manager
18. Q8-What is a specific benefit of an Enterprise Support plan?
1. Included AWS Cloud Architect
2. Included Technical Account Manager
3. Included AWS Support Analysts
4. Included AWS Technical Support Manager
19. Q9-Which AWS security tool uses an agent installed in EC2 instances to
check for any vulnerabilities or unexpected deviations in the
application?
1. AWS Macie
2. AWS Glacier
3. AWS Inspector
4. AWS KMS
20. Q9-Which AWS security tool uses an agent installed in EC2 instances to
check for any vulnerabilities or unexpected deviations in the
application?
1. AWS Macie
2. AWS Glacier
3. AWS Inspector
4. AWS KMS
21. Q10-Which of the following AWS feature can be used to capture
information about inbound and outbound IP traffic on network
interfaces in a VPC?
1. VPC Peering
2. VPC Flow Logs
3. Transit Gateway
4. Site to Site VPN
22. Q10-Which of the following AWS feature can be used to capture
information about inbound and outbound IP traffic on network
interfaces in a VPC?
1. VPC Peering
2. VPC Flow Logs
3. Transit Gateway
4. Site to Site VPN
23. Q11-Which AWS service is designed to be used for operational analytics?
1. Amazon Elastic Search
2. Amazon Timestream
3. Amazon DynamoDB
4. Amazon Kinesis
24. Q11-Which AWS service is designed to be used for operational analytics?
1. Amazon Elastic Search
2. Amazon Timestream
3. Amazon DynamoDB
4. Amazon Kinesis
25. Q12-Which service can be used to monitor, store and access log files
generated by EC2 instances and on-premises servers?
1. AWS Organization
2. Amazon CloudWatch Logs
3. Amazon CloudFront
4. AWS Global Accelerator
26. Q12-Which service can be used to monitor, store and access log files
generated by EC2 instances and on-premises servers?
1. AWS Organization
2. Amazon CloudWatch Logs
3. Amazon CloudFront
4. AWS Global Accelerator
27. Q13-Which of the following components can be configured through the
VPC console in AWS? (Select TWO)
1. Endpoint
2. Subnet
3. Security Group
4. Key-Pair
28. Q13-Which of the following components can be configured through the
VPC console in AWS? (Select TWO)
1. Endpoint
2. Subnet
3. Security Group
4. Key-Pair
29. Q14-Which AWS service provides a managed software version control
system?
1. AWS CloudWatch
2. AWS CodeCommit
3. AWS Code Artifact
4. AWS CodeBuild
30. Q14-Which AWS service provides a managed software version control
system?
1. AWS CloudWatch
2. AWS CodeCommit
3. AWS Code Artifact
4. AWS CodeBuild
31. Q15-Which of the following are the benefits of using the AWS Cloud?
(Select TWO)
1. Go global in minutes
2. Fast provisioning of IT resources
3. Zero operational cost
4. No risk of losing any data
32. Q15-Which of the following are the benefits of using the AWS Cloud?
(Select TWO)
1. Go global in minutes
2. Fast provisioning of IT resources
3. Zero operational cost
4. No risk of losing any data
33. Q15-Which of the following are the benefits of using the AWS Cloud?
(Select TWO)
1. Go global in minutes
2. Fast provisioning of IT resources
3. Zero operational cost
4. No risk of losing any data
34. Q16-What are the benefits of using AWS Elastic Load Balancing? (Select
TWO)
1. Reduced capital cost
2. Automation
3. High Availability
4. Elasticity
35. Q16-What are the benefits of using AWS Elastic Load Balancing? (Select
TWO)
1. Reduced capital cost
2. Automation
3. High Availability
4. Elasticity
36. Q16-What are the benefits of using AWS Elastic Load Balancing? (Select
TWO)
1. Reduced capital cost
2. Automation
3. High Availability
4. Elasticity
37. Q17-Which AWS service can be used for assigning a policy to a group?
1. IAM
2. S3
3. EC2
4. CloudFormation
38. Q17-Which AWS service can be used for assigning a policy to a group?
1. IAM
2. S3
3. EC2
4. CloudFormation
39. Q18-Which of the following AWS services offers you compute capabilities?
(Select TWO)
1. AWS Fargate
2. Amazon ECR
3. Amazon SQS
4. AWS Lambda
40. Q18-Which of the following AWS services offers you compute capabilities?
(Select TWO)
1. AWS Fargate
2. Amazon ECR
3. Amazon SQS
4. AWS Lambda
41. Q18-Which of the following AWS services offers you compute capabilities?
(Select TWO)
1. AWS Fargate
2. Amazon ECR
3. Amazon SQS
4. AWS Lambda
42. Q19-Which AWS service allows inbound traffic from the internet to access
a VPC?
1. Network Access Control List (NaCl)
2. NAT Gateway
3. Internet Gateway
4. Transit Gateway
43. Q19-Which AWS service allows inbound traffic from the internet to access
a VPC?
1. Network Access Control List (NaCl)
2. NAT Gateway
3. Internet Gateway
4. Transit Gateway
44. Q20-How can you reduce operational overhead for a MySQL database?
1. By migrating the database onto an AWS Storage Gateway
2. By migrating the database onto a Docker Container
3. By migrating the database onto an EC2 instance
4. By migrating the database onto an Amazon RDS instance
45. Q20-How can you reduce operational overhead for a MySQL database?
1. By migrating the database onto an AWS Storage Gateway
2. By migrating the database onto a Docker Container
3. By migrating the database onto an EC2 instance
4. By migrating the database onto an Amazon RDS instance
46. Q21-What are the services offered by Amazon Route 53? (Select TWO)
1. Domain Name System (DNS)
2. Data Storage
3. Traffic Flow
4. Caching
47. Q21-What are the services offered by Amazon Route 53? (Select TWO)
1. Domain Name System (DNS)
2. Data Storage
3. Traffic Flow
4. Caching
48. Q21-What are the services offered by Amazon Route 53? (Select TWO)
1. Domain Name System (DNS)
2. Data Storage
3. Traffic Flow
4. Caching
49. Q22-Which of the following service enables hybrid cloud storage between
on-premises and the AWS Cloud?
1. Amazon S3
2. AWS Snow Family
3. AWS Storage Gateway
4. AWS Fargate
50. Q22-Which of the following service enables hybrid cloud storage between
on-premises and the AWS Cloud?
1. Amazon S3
2. AWS Snow Family
3. AWS Storage Gateway
4. AWS Fargate
51. Q23-Which of the following service allows an organization to view
operational data from multiple AWS services through a unified user
interface and automate operational tasks?
1. AWS Service Catalog
2. AWS Systems Manager
3. AWS Organization
4. Trusted Advisors
52. Q23-Which of the following service allows an organization to view
operational data from multiple AWS services through a unified user
interface and automate operational tasks?
1. AWS Service Catalog
2. AWS Systems Manager
3. AWS Organization
4. Trusted Advisors
53. Q24-Which of the following service can be used as a private git repository
in the AWS cloud?
1. CodeCommit
2. CodeDeploy
3. CodePipeline
4. CodeBuild
54. Q24-Which of the following service can be used as a private git repository
in the AWS cloud?
1. CodeCommit
2. CodeDeploy
3. CodePipeline
4. CodeBuild
55. Q25-What are the advantages of Availability Zones in cloud computing?
(Select TWO)
1. With multiple availability zones, the cost is reduced
2. It is connected by a low-latency network
3. It gives unlimited storage capacity
4. It helps in fault isolation
56. Q25-What are the advantages of Availability Zones in cloud computing?
(Select TWO)
1. With multiple availability zones, the cost is reduced.
2. It is connected by a low-latency network
3. It gives unlimited storage capacity.
4. It helps in fault isolation
57. Q25-What are the advantages of Availability Zones in cloud computing?
(Select TWO)
1. With multiple availability zones, the cost is reduced.
2. It is connected by a low-latency network
3. It gives unlimited storage capacity.
4. It helps in fault isolation
58. Q26-Which of the following features offers OS-bypass functionality?
1. EFA
2. ENA
3. VPN
4. VPC
59. Q26-Which of the following features offers OS-bypass functionality?
1. EFA
2. ENA
3. VPN
4. VPC
62. Q28-Which of the following services prohibits you from performing any
penetration testing? (Select TWO)
1. Amazon RDS
2. Distributed Denial of Service (DDoS)
3. Port flooding
4. Amazon EC2 instances
63. Q28-Which of the following services prohibits you from performing any
penetration testing? (Select TWO)
1. Amazon RDS
2. Distributed Denial of Service (DDoS)
3. Port flooding
4. Amazon EC2 instances
64. Q28-Which of the following services prohibits you from performing any
penetration testing? (Select TWO)
1. Amazon RDS
2. Distributed Denial of Service (DDoS)
3. Port flooding
4. Amazon EC2 instances
65. Q29-What are the benefits of deploying a relational database on RDS
instead of EC2 in AWS? (Select TWO)
1. Automatic backup
2. Software patching
3. Zero cost
4. Unlimited storage
66. Q29-What are the benefits of deploying a relational database on RDS
instead of EC2 in AWS? (Select TWO)
1. Automatic backup
2. Software patching
3. Zero cost
4. Unlimited storage
67. Q30-Which of the following service protects your internet-facing web
applications from bot traffic and DDoS attackers?
1. AWS CloudTrail
2. AWS EMR
3. AWS WAF
4. AWS Shield Advanced
68. Q30-Which of the following service protects your internet-facing web
applications from bot traffic and DDoS attackers?
1. AWS CloudTrail
2. AWS EMR
3. AWS WAF
4. AWS Shield Advanced
69. Q31-Which AWS service is used as an instrumentation solution for all cloud
applications?
1. AWS HSM
2. Amazon Batch
3. AWS X-Ray
4. Amazon QLDB
70. Q31-Which AWS service is used as an instrumentation solution for all cloud
applications?
1. AWS HSM
2. Amazon Batch
3. AWS X-Ray
4. Amazon QLDB
71. Q32-Which of the following EC2 pricing models allows the customers to use
existing server-bound software licenses?
1. Dedicated Hosts
2. Reserved Instances
3. Spot Instances
4. On-demand Instances
72. Q32-Which of the following EC2 pricing models allows the customers to use
existing server-bound software licenses?
1. Dedicated Hosts
2. Reserved Instances
3. Spot Instances
4. On-demand Instances
73. Q33-Which of the following AWS service is used to host a static website?
1. S3
2. Lambda
3. Aurora
4. Blockchain
74. Q33-Which of the following AWS service is used to host a static website?
1. S3
2. Lambda
3. Aurora
4. Blockchain
75. Q34-Which of the following service can be used to track the activity of
users on AWS?
1. AWS CloudTrail
2. Amazon Elastic Cache
3. Amazon Beanstalk
4. AWS Cloud Watch
76. Q34-Which of the following service can be used to track the activity of
users on AWS?
1. AWS CloudTrail
2. Amazon Elastic Cache
3. Amazon Beanstalk
4. AWS Cloud Watch
77. Q35-Which of the following AWS service is used to run a Red Hat operating
system upon which you will install custom software?
1. AWS DynamoDB
2. AWS Lambda
3. AWS S3
4. AWS EC2
78. Q35-Which of the following AWS service is used to run a Red Hat operating
system upon which you will install custom software?
1. AWS DynamoDB
2. AWS Lambda
3. AWS S3
4. AWS EC2
79. Q36-Which of the following should be used to improve the security of your
AWS Management Console? (Select TWO)
1. Strong password policies
2. IAM Roles
3. MFA
4. AWS Key Management Service
80. Q36-Which of the following should be used to improve the security of your
AWS Management Console? (Select TWO)
1. Strong password policies
2. IAM Roles
3. MFA
4. AWS Key Management Service
81. Q36-Which of the following should be used to improve the security of your
AWS Management Console? (Select TWO)
1. Strong password policies
2. IAM Roles
3. MFA
4. AWS Key Management Service
82. Q37-Which of the following is a popular configuration management service
for Chef and Puppet?
1. AWS Config
2. AWS Organization
3. AWS CDK
4. AWS OpsWorks
83. Q37-Which of the following is a popular configuration management service
for Chef and Puppet?
1. AWS Config
2. AWS Organization
3. AWS CDK
4. AWS OpsWorks
84. Q38-Which of the following AWS service is used to manage configuration
versions?
1. Trusted Advisors
2. AWS Config
3. AWS Systems Manager
4. AWS Cloud Watch
85. Q38-Which of the following AWS service is used to manage configuration
versions?
1. Trusted Advisors
2. AWS Config
3. AWS Systems Manager
4. AWS Cloud Watch
86. Q39-Who is responsible for configuring and performing backups
when you require a point-in-time recovery for an Amazon
DynamoDB table?
1. The customer is responsible for configuring, and AWS is responsible for
performing backups
2. AWS is responsible for both configuring and performing backups.
3. The customer is responsible for both configuring and performing
backups
4. AWS is responsible for configuring, and the user is responsible for
performing backups.
87. Q39-Who is responsible for configuring and performing backups
when you require a point-in-time recovery for an Amazon
DynamoDB table?
1. The customer is responsible for configuring, and AWS is responsible for
performing backups
2. AWS is responsible for both configuring and performing backups.
3. The customer is responsible for both configuring and performing
backups
4. AWS is responsible for configuring, and the user is responsible for
performing backups.
88. Q40-Which of the following resource can be used to access security and
compliance reports in AWS?
1. AWS System Manager
2. AWS Artifacts
3. AWS Service Health Dashboard
4. AWS Service Catalog
89. Q40-Which of the following resource can be used to access security and
compliance reports in AWS?
1. AWS System Manager
2. AWS Artifacts
3. AWS Service Health Dashboard
4. AWS Service Catalog
90. Q41-Which of the following are the pillars of AWS Well-Architected
Framework? (Select TWO)
1. Elasticity and Scalability
2. Operational Excellence
3. Performance Efficiency
4. Data Consistency
91. Q41-Which of the following are the pillars of AWS Well-Architected
Framework? (Select TWO)
1. Elasticity and Scalability
2. Operational Excellence
3. Performance Efficiency
4. Data Consistency
92. Q42-What is the scope of AWS VPC?
1. Spans across all availability zones within a region
2. Spans across only one specified availability zone
3. Spans across all availability zones in all regions
4. Spans across all the regions
93. Q42-What is the scope of AWS VPC?
1. Spans across all availability zones within a region
2. Spans across only one specified availability zone
3. Spans across all availability zones in all regions
4. Spans across all the regions
94. Q43-How can you protect your data from a regional disaster in Amazon S3?
1. Use Lifecycle rules
2. Use Cross-Region Replication (CRR)
3. Use Intelligent-Tiering Archive configurations
4. Use bucket policy
95. Q43-How can you protect your data from a regional disaster in Amazon S3?
1. Use Lifecycle rules
2. Use Cross-Region Replication (CRR)
3. Use Intelligent-Tiering Archive configurations
4. Use bucket policy
96. Q44-Which of the following AWS service can be used to run Docker
containers?
1. AWS S3
2. AWS Fargate
3. AWS Snow Family
4. Amazon API Gateway
97. Q44-Which of the following AWS service can be used to run Docker
containers?
1. AWS S3
2. AWS Fargate
3. AWS Snow Family
4. Amazon API Gateway
98. Q45-How is using fully managed services beneficial compared to deploying
third-party software in Amazon EC2?
1. Automated backup
2. Reduced capital overhead
3. Automated deployment of infrastructure using code
4. Reduced operational overhead
99. Q45-How is using fully managed services beneficial compared to deploying
third-party software in Amazon EC2?
1. Automated backup
2. Reduced capital overhead
3. Automated deployment of infrastructure using code
4. Reduced operational overhead
100. Q46-Which of the following is a benefit of the AWS pricing model?
1. By providing a promotional offer of 50% every year
2. Eliminate all the resources after 50 days.
3. Reduce the cost of maintaining idle resources
4. Eliminate idle resources
101. Q46-Which of the following is a benefit of the AWS pricing model?
1. By providing a promotional offer of 50% every year
2. Eliminate all the resources after 50 days.
3. Reduce the cost of maintaining idle resources
4. Eliminate idle resources
102. Q47-Which AWS service is used to create a billing alarm?
1. AWS CloudWatch
2. AWS CloudFormation
3. AWS CloudFront
4. AWS Systems Manager
103. Q47-Which AWS service is used to create a billing alarm?
1. AWS CloudWatch
2. AWS CloudFormation
3. AWS CloudFront
4. AWS Systems Manager
104. Q48-Which of the following AWS service will assist in lowering the latency
and also improving the transfer speed for global users? (Select TWO)
1. AWS Global Accelerator
2. Amazon CloudFront
3. Amazon Beanstalk
4. Amazon Lightsail
105. Q48-Which of the following AWS service will assist in lowering the latency
and also improving the transfer speed for global users? (Select TWO)
1. AWS Global Accelerator
2. Amazon CloudFront
3. Amazon Beanstalk
4. Amazon Lightsail
106. Q49- Which service can be used to send automated notifications to
HTTP endpoints?
1. Amazon EKS
2. Amazon KMS
3. Amazon SNS
4. Amazon Lambda
107. Q49- Which service can be used to send automated notifications to
HTTP endpoints?
1. Amazon EKS
2. Amazon KMS
3. Amazon SNS
4. Amazon Lambda
108. Q50-Which of the following services allows you to store files on AWS?
(Select TWO.)
1. Amazon EBS
2. Amazon SNS
3. Amazon EFS
4. Amazon EC2
109. Q50-Which of the following services allows you to store files on AWS?
(Select TWO.)
1. Amazon EBS
2. Amazon SNS
3. Amazon EFS
4. Amazon EC2
110. Q51-Which of the following AWS service provides native support for ACID
transactions?
1. Amazon QuickSight
2. Amazon EMR
3. Amazon DynamoDB
4. Amazon DMS
111. Q51-Which of the following AWS service provides native support for ACID
transactions?
1. Amazon QuickSight
2. Amazon EMR
3. Amazon DynamoDB
4. Amazon DMS
112. Q52-Which technology helps us in adjusting compute capacity to meet
changes in demand?
1. Load Balancer
2. Auto Scaling
3. Trusted Advisors
4. Containers
113. Q52-Which technology helps us in adjusting compute capacity to meet
changes in demand?
1. Load Balancer
2. Auto Scaling
3. Trusted Advisors
4. Containers
114. Q53-Which of the following statement is incorrect regarding AWS
Certificate Manager?
1. It removes the time-consuming manual process of purchasing, uploading,
and renewing SSL/TLS certificates.
2. They are free of charge if you are using them with Elastic Load Balancer
3. These certificates are permanent
4. You can issue as many certificates as you want
115. Q53-Which of the following statement is incorrect regarding AWS
Certificate Manager?
1. It removes the time-consuming manual process of purchasing, uploading,
and renewing SSL/TLS certificates.
2. They are free of charge if you are using them with Elastic Load Balancer
3. These certificates are permanent
4. You can issue as many certificates as you want
116. Q54-Which of the following service uses SCP to manage permissions?
1. AWS Config
2. AWS Lambda
3. AWS Organizations
4. AWS EC2
117. Q54-Which of the following service uses SCP to manage permissions?
1. AWS Config
2. AWS Lambda
3. AWS Organizations
4. AWS EC2
118. Q55-Which of the following is the best IAM practices? (Select TWO)
1. Use service accounts
2. Grant least privilege
3. Use policies for applications and users outside the account
4. Use customer-managed policies instead of inline policies
119. Q55-Which of the following is the best IAM practices? (Select TWO)
1. Use service accounts
2. Grant least privilege
3. Use policies for applications and users outside the account
4. Use customer-managed policies instead of inline policies
120. Q55-Which of the following is the best IAM practices? (Select TWO)
1. Use service accounts
2. Grant least privilege
3. Use policies for applications and users outside the account
4. Use customer-managed policies instead of inline policies
121. Q56-Which AWS support plans provide 24x7 access to customer service?
1. Developer.
2. Business
3. Enterprise
4. All plans
122. Q56-Which AWS support plans provide 24x7 access to customer service?
1. Developer.
2. Business
3. Enterprise
4. All plans
123. Q57-How can you describe the function of Amazon CloudHSM?
1. It acts as a firewall against DDoS.
2. It applies protection techniques against a malware
3. It is used to generate, use and manage encryption keys in the cloud
4. It acts as an interface between the user and the computer
124. Q57-How can you describe the function of Amazon CloudHSM?
1. It acts as a firewall against DDoS.
2. It applies protection techniques against a malware
3. It is used to generate, use and manage encryption keys in the cloud
4. It acts as an interface between the user and the computer
125. Q58-Which of the following is the best tool for developing a new
application and integrating the features of AWS services directly into
the application?
1. AWS CodeCommit
2. AWS SDK
3. AWS App Runner
4. AWS HSM
126. Q58-Which of the following is the best tool for developing a new
application and integrating the features of AWS services directly into
the application?
1. AWS CodeCommit
2. AWS SDK
3. AWS App Runner
4. AWS HSM
127. Q59-Which of the following virtualization technology is offered by
AWS EC2?
1. Storage Virtualization
2. Platform Virtualization
3. Hardware Virtualization
4. Software Virtualization
128. Q59-Which of the following virtualization technology is offered by
AWS EC2?
1. Storage Virtualization
2. Platform Virtualization
3. Hardware Virtualization
4. Software Virtualization
129. Q60- Which of the following services will notify the users if they need to
increase the service limit for an EC2 instance?
1. Trusted Advisors
2. System Managers
3. Service Catalog
4. Personal Health Dashboard
130. Q60- Which of the following services will notify the users if they need to
increase the service limit for an EC2 instance?
1. Trusted Advisors
2. System Managers
3. Service Catalog
4. Personal Health Dashboard
131. Q61-How can you transfer hundreds of terabytes of data from your on-
premise data center to Amazon S3?
1. Using S3 Replication
2. Using AWS Snow Family
3. Using Docker Containers
4. Using AWS Cloud Watch
132. Q61-How can you transfer hundreds of terabytes of data from your on-
premise data center to Amazon S3?
1. Using S3 Replication
2. Using AWS Snow Family
3. Using Docker Containers
4. Using AWS Cloud Watch
133. Q62-Which of the following AWS service provides DevOps management
and integration?
1. AWS CodeStar
2. AWS CodeGuru
3. AWS Cloud9
4. AWS CodePipeline
134. Q62-Which of the following AWS service provides DevOps management
and integration?
1. AWS CodeStar
2. AWS CodeGuru
3. AWS Cloud9
4. AWS CodePipeline
135. Q63-Which of the following service is a fully managed container registry
that makes it easy to store, manage, share, and deploy your container
images?
1. Amazon EKS Distro
2. Amazon App Runner
3. AWS Glue
4. Amazon ECR
136. Q63-Which of the following service is a fully managed container registry
that makes it easy to store, manage, share, and deploy your container
images?
1. Amazon EKS Distro
2. Amazon App Runner
3. AWS Glue
4. Amazon ECR
137. Q64-How can we allow an application running on an EC2 instance to
securely store data in an S3 bucket without providing long-term
credentials?
1. Using Bucket Permissions
2. Using IAM role
3. Using User Groups
4. Using Cross-Region Replication (CRR)
138. Q64-How can we allow an application running on an EC2 instance to
securely store data in an S3 bucket without providing long-term
credentials?
1. Using Bucket Permissions
2. Using IAM role
3. Using User Groups
4. Using Cross-Region Replication (CRR)
139. Q65-Where can resource be launched when configuring Amazon EC2 Auto
Scaling?
1. Multiple availability zones within a region
2. Multiple availability zones within multiple regions
3. Only in one single availability zone
4. Everywhere, there is no constraint
140. Q65-Where can resource be launched when configuring Amazon EC2 Auto
Scaling?
1. Multiple availability zones within a region
2. Multiple availability zones within multiple regions
3. Only in one single availability zone
4. Everywhere, there is no constraint