AWS Dev Assoc. 10

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following bucket names are invalid? Choose 2 correct answer from the options below

1) Example_com 2) example.com- (example-com is OK)

What are the 2 ways in which you can get data into S3-Standard IA? Choose 2 answers from the options below.

1) Put request by changing the x-amz-storage-class header 2) Use lifecycle policies

What are the different types of storage classes in S3? Choose 2 answers from the options below

1) RRS 2) Glacier

Which of the following are invalid sections in AWS Cloudformation template. Choose 2 answers from the options below

1) Services 2) Declarations

Is there a limit on the number of subnets that can be created per VPC? Choose an answer from the options below.

200

What HTP response code indicates that an AWS REST API call resulted in a redirection? Choose an answer from the options below

300

What is the default setting of connection draining in ELB. Choose an answer from the options below.

300

In Cloudformation what is the limit to the number of parameters in the template? Choose an answer from the options below

60

Which of the following is NOT a S3 REST API operation?

Write Object

What is the VPC that is created for your AWS account for the first time. Choose an answer from the options below.

Default VPC

Can you have the same bucket names in 2 regions in AWS?

False

Is there a limit to the size of a table in DynamoDB?. Choose the correct answer from the options below

False

How can you ensure maximum protection of preserved versions in S3? Choose one answer from the options below.

MFA Delete

When using the Ref function in CloudFormation, what do we get back if we pass in the logical ID of an AWS::EC2::EIP object? Choose the correct answer from the options below

The instance public IP

Can SWF workflows be managed across availability zones?

True

Does S3 Infrequent Access storage provide the same performance as standard storage?

True

You have been requested to ensure that for your application all data in EBS is secured at rest. How can you achieve this? Choose an answer from the options below

Use an encrypted file system on top of the EBS volume.


Conjuntos de estudio relacionados

Chapter 13 - Presidents and Prime Ministers

View Set

Chapter 5 study guide General psychology Test

View Set

HESI RN MENTAL HEALTH HESI REVIEW - MULTIPLE CHOICE

View Set