Practice Questions for CCP

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which compute hosting model should be accounted for in the Total Cost of Ownership (TCO) when undertaking a cost analysis that allows physical isolation of a customer workload? A. Dedicated Hosts B. Reserved Instances C. On-Demand Instances D. No Upfront Reserved Instances

A Dedicated Hosts Use Dedicated Hosts to launch Amazon EC2 instances on physical servers that are dedicated for your use. Dedicated Host give you additional visibility and control over how instances are placed on a physical server, and you can reliably use the same physical server over time. As a result, Dedicated Hosts enable you to use your existing server-bound software licenses like Windows Server and address corporate compliance and regulatory requirements.

When would you use the Reserved Instance pricing model? A. Your application requires a capacity reservation B. Your application has a steady state usage C. Your application has unpredictable workloads D. Ability to bid on the lowest compute price possible

A and B Your application requirers a capacity reservation Your application has steady state usage

Which of the following statements are true about who can use IAM roles? (Select 3) A. An IAM user in the same AWS account as the role B. AN IAM user in different AWS account than the role C. A web service offered by AWS D. A web service offered by providers other than AWS

A,B,C An IAM user in the same AWS account as the role An IAM user in different AWS Account than the role A web service offered by AWS

Which of the following are characteristics of AZ's? A. Connected through low latency links B. Physically separated C. Data centers housed in the same facility D. Fault tolerant

A,B,D

Which of the following are AWS Security, Identity, and compliance services? A. Secrets Manager B. AWS Trusted advisor C. AWS Key Management Service D. AWS Security Hub E. AWS Organizations

A,C,D AWS Secrets Manager, AWS Key Management Service, AWS Security Hub

All AWS users have access to which AWS Trusted Advisor? A. Core Checks B. All checks C. Cost optimization checks D. Fault tolerance checks

A. Core checks

Which of the following is a suggestion made by an AWS Trusted Advisor? (select two) A. Cost optimization B. Auditing C. Serverless architecture D. Performance E. Scalability

A. Cost optimization and D. Performance Cost optimization, Performance, Security, Fault tolerance, service limits

Which of the following are categories of AWS Trusted Advisor? (Choose Two) A. Fault tolerance B. Instance Usage C. Infrastructure D. Storage Capacity

A. Fault Tolerance and D. Performance

When considering common cloud computing models, which model is Amazon Elastic Compute Cloud (AWS EC2) an example of? A. IaaS B. FaaS C. PaaS D. SaaS

A. IaaS (Infrastructure as a service) Includes the fundamental building blocks that can be rented from AWS AWS manages the infrastructure and provides you a virtual machine that you can use however you'd like to meet your business requirements

Which of the following statement is true of newly created security groups with their default rules? A. New security groups allow only outbound traffic and block all incoming traffic B. New security groups block outbound traffic and allow all incoming traffic C. New security groups allow both incoming and outbound traffic D. New security groups block both incoming and outbound traffic

A. New security groups allow only outbound traffic and block all incoming traffic

Which of the following operational controls do users completely inherit from AWS as part of the AWS shared responsibility model? A. Security management of data center B. Patch management C. Configuration management D. User and access management

A. Security management of data center

Which of the below are TRUE when running a database in an EC2 instance? A. The customer is responsible for updating the database software B. AWS is responsible for updating the guest operating software C. The customer is responsible for managing access to the database D. AWS is responsible for managing access to the database E. The customer is responsible for updating the guest operating system

A. The customer is responsible for updating the database software C. The customer is responsible for managing access to the database E. The customer is responsible for updating the guest operating system

Which of the following are programmatic access types enabling users to interact with AWS services? A. API calls B. AWS SDKs C. AWS CLI D. Python

API calls - IAM users can make API calls for programmatic access to AWS services? AWS SDKs - AWS SDKs allow IAM users to make programmatic API calls AWS services. AWS CLI

When AWS uses tap[e media to perform backups in their data centers, who would be responsible for their safe and secure disposal? A. Third Parties B. Shared Responsibility C. Customer D. AWS

AWS

Which of the following enables you to interact with AWS services using only textual commands? A. AWS management console B. AWS CLI C. AWS SDK D. Amazon API Gateway

AWS CLI - open source tool used for executing tasks in AWS by typing and entering textual commands AWS SDK - allow you to access AWS services from popular programming languages like Java, Python, C#, and many more

An auditor is conducting an audit of your IT operations for compliance. The auditor requests visibility to logs of event history across your AWS based employee expense system infrastructure. Which AWS service will record and provide you the information you need? A. AWS CloudWatch Logs B. AWS CloudTrail C. AWS Systems Manager D. AWS Compliance Manager

AWS CloudTrail

You have been tasked with developing a plan to move applications to AWS and use AWS services to house code, build, and deploy these applications. Which AWS service will allow you to host Git-based repositories? A. AWS CodeBuild B. AWS CodeCommit C. GitHub D. AWS CodeDeploy

AWS CodeCommit

Which of the following AWS services enables you to continuously monitor and record configuration changes of your resources?

AWS Config

Which of the following AWS services should a client utilize to audit the change management of AWS resources? A. AWS Config B. AWS Trusted Advisor C. Amazon CloudWatch D. Amazon Inspector

AWS Config AWS Config is a service that enables you assess, audit, and evaluate the configurations of your AWS resources. Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations and allows you to automate the evaluation of recorded configurations against desired configurations. With Config, you can review changes in configurations and relationships between AWS resources, dive into detailed resource configuration histories, and determine your overall compliance against the configurations specified in your internal guidelines. This enables you to simplify compliance auditing, security analysis, change management, and operational troubleshooting

Which of the following tools provides a view of the performance and availability of your AWS services based on your requirements? A. AWS Service Health Dashboard B. AWS Systems manager C. AWS Trusted Advisor D. AWS Personal Health Dashboard

AWS Personal Health Dashboard

You are leading a pilot program to try the AWS cloud for 1 of your applications. You have been instructed to provide an estimate of your AWS bill . Which service will allow you to do this by manually entering your planned resources by service? A. AWS Cost Explorer B. AWS Cost and Usage Report C. AWS Pricing Calculator D. AWS CloudTrail

AWS Pricing Calculator

Which of the following AWS services can help you assess the fault tolerance of your AWS environment? A. AWS Inspector B. AWS WAF C. AWS Trusted Advisor D. AWS Shield

AWS Trusted Advisor

Users need to access AWS resources from the command-line interface. Which IAM option can be used for authentication?

Access Keys

Which benefit of cloud computing helps you innovate faster and gives you speed to market?

Agility

Your team need to begin monitoring the applications running in your AWS account by collecting metrics, logs and events. Which AWS service can you use? A. Amazon CloudWatch B. AWS Config C. AWS App Monitoring D. Amazon CloudTrail

Amazon CloudWatch

Which of the following services does the AWS Shield Standard plan provide? A. Post-attack analysis B. Reimburse related Route 53, CloudFront, and ELB DDoS charges C. Assistance with protection from common DDoS attacks D. Network flow monitoring

Assistance with protection from common DDoS attacks Network flow monitoring

Which of the following engines are classified as relational databases? A. DynamoDB B. Redshift C. Aurora D. MariaDB

Aurora and MariaDB

Which of the following statements are true of Amazon Aurora? A. It is compatible with MariaDB B. It is a Relational Database Service (RDS) database C. It can deliver up to five times the throughput of MySQL D. It is compatible with Oracle

B and C It is a relational database service engine developed by Amazon It can deliver up to five times the throughput of MySQL

Which of the following statements are true of Amazon Redshift? A. It is used for transactional systems B. It is designed for storing petabytes of data C. It stores unstructured data D. It is a data warehouse service

B and D It is designed for storing petabytes of data It is a data warehouse service

Which of the following is true of AWS Lambda? A. It triggers charges whether your code is running or not B. It supports several popular programming languages for writing application code C. It is a server less computing platform D. It lets you run code without provisioning or managing servers

B,C,D

Which of the following statements is true of AWS CloudTrail? A. When you create an AWS account, you will have to manually enable CloudTrail B. CloudTrail delivers log files within 15 minutes of account activity C. Log files are encrypted D. With CloudTrail, you can create a trail that either applies to one region or to all regions

B,C,D CloudTrail delivers log files within 15 minutes of account activity Log files are encrypted With CloudTrail, you can create a trail that either applies to one region or to all regions

If you have a new application and you are not sure about future demand, which of the below characteristics of cloud make cloud an ideal place to host it? A. No single point of failure B. Scalability C. Pay as you go D. No upfront payment E. High availability

B,C,D Scalability pay as you go No upfront payment

Which AWS service can identify the person who made the API request when an Amazon EC2 instance is terminated? A. Amazon CloudWatch B. AWS CloudTrail C. AWS X-Ray D. AWS Identity and Access Management

B. AWS CloudTrail Allows AWS customers to record API calls, sending log files to Amazon S3 buckets for storage

Who is the main point of contact for billing or account questions if a user has an AWS account with an Enterprise-level AWS Support plan? A. Solutions architect B. AWS Concierge Support team C. An AWS Marketplace seller D. AWS Partner Network (APN) partner

B. AWS Concierge Support AWS Support Concierge Included as part of the Enterprise Support plan, the Support Concierge Team are AWS billing and account experts that specialize in working with enterprise accounts

Which of the following is an example of Platform as a Service? A. AWS Lambda B. Elastic Beanstalk C. Amazon S3 D. Amazon Virtual Private Cloud

B. Elastic Beanstalk

When you pay a subscription fee to a hosting company to server your website on an instance you manage, which cloud computing model are you using? A. Function as a service B. Infrastructure as a service C. Platform as a service D. Software as a service

B. Infrastructure as a service IaaS offers building blocks that can be rented when you pay for a web hosting fee you're using IaaS

Which pillar of the AWS Well-Architected Framework is designed on the idea of frequent, minor, reversible changes? A. Reliability B. Operational excellence C. Performance efficiency D. Cost optimization

B. Operational excellence

Which security related duty is AWS accountable for under the AWS shared responsibility model? A. Lifecycle management of IAM credentials B. Physical security of global infrastructure C. Encryption of Amazon EBS volumes D. Firewall configuration

B. Physical security of global infrastructure

According to the AWS shared responsibility model, who is responsible for managing IAM user access and secret keys? A. IAM access and secret keys are static, so there is no need to rotate them. B. The customer is responsible for rotating the keys C. AWS will rotate the keys whenever required D. The AWS Support team will rotate keys when requested by the customer

B. The customer is responsible for rotating keys

A popular company that sells products online just experienced a DDoS attack that consumed all available bandwidth on their network and didn't allow legitimate requests to be processed. Which of the AWS services can the company integrate and combine going forward to prevent future attacks A. GuardDuty B. Web Application Firewall C. AWS Shield D. CloudFront E. Route 53

B. Web Application Firewall C. AWS Shield D. CloudFront E. Route 53

Which benefits can CloudFront bring to your e-commerce website? A. A scalable managed database that integrates seamlessly with Lambda and EC2 B. Increased application availability C. Protection against network and application layer attacks via WAF D. Lower latency for customers of your e-commerce website E. Advanced analytics into customer journeys

B. increased application availability C. Protection against network and application layer attacks via WAF D. Lower latency for customers of your e-commerce website

AWS Trusted Advisor provides checks and recommended actions. Which of the following is not one of those checks? A. Unrestricted access for specific ports on EC2 B. CloudFront content delivery optimization C. Checks to determine if an administrative user is used instead of the root D. Checks for usage more than 80 percent of the service limit

C Checks to determine if an administrative user is used instead of the root

Permissions for which of the following are managed by service control policies? A. Availability Zones B. AWS Regions C. AWS Organizations D. Edge locations

C. AWS Organizations

What is the customer's responsibility while using Amazon RDS? A. Patching and maintenance of the underlying operating system B. Managing automatic backups of the database C. Controlling network access through security groups D. Replacing failed instances in the event of a hardware failure

C. Controlling network access through security groups.

What is one technique to provide unified billing if each department within a firm has its own AWS account? A. Use AWS Budgets on each account to pay only to budget B. Contact AWS Support for monthly bill C. Create an AWS Organization from the payer account and invite the other accounts to join D. Put all invoices into one Amazon Simple Storage Service (S3) bucket, load data into Amazon Redshift, and then run a billing report

C. Create an AWS Organization from the payer account and invite the other accounts to join

What is the customer's obligation while using an AWS managed service under the AWS shared responsibility model? A. Physical security of the data centers B. Server-side encryption C. Customer data D. Operating system patching

C. Customer data

Which cloud architecture design concept is supported by distributing workloads across various Availability Zones? A. Implement automation. B. Design for agility C. Design for failure D. Implement elasticity

C. Design for failure Distribute workload data and resources across multiple Availability Zones (AZ) or where necessary, across AWS Regions. These locations can be as diverse as required

Your design team has recommended the need to distribute incoming traffic across multiple EC2 instances and also across multiple Availability Zones. Which AWS service can accomplish this? A. CloudFront B. CloudFormation C. Elastic Load Balancing D. Auto Scaling

C. Elastic Load Balancing

An organization needs to run a MySQL relational database on AWS. They plan to hire their own database administrators to manage their databases, including taking backups, using replication, and clustering. Which option provides the customer the control and flexibility needed? A. Use Systems Manager to install the MySQL database directly on prem B. Use the amazon Relational database service (RDS) to launch the MySQL database C. Install the MySQL database directly on an EC2 instance D. Open a case with AWS support to have them assist the database administrators with the installation of the MySQL database

C. Install the MySQL database directly on an EC2 instance

Who is responsible for configuration management under the AWS shared responsibility model? A. It is solely the responsibility of the customer B. It is solely the responsibility of AWS C. It is shared between AWS and the customer D. It is not part of the AWS shared responsibility model

C. It is shared between AWS and the customer AWS maintains the configuration of its infrastructure devices, but a customer is responsible for configuring their own guest operating systems, databases, and applications

Trusted Advisor is classified as what type of AWS services? A. Compute B. Application Integration C. Management & Governance D. Security, Identity, and Compliance

C. Management & Governance

Who is accountable for security and compliance under the AWS shared responsibility model? A. The customer is responsible B. AWS is responsible C. AWS and the customer share responsibility D. AWS shares responsibility

C. Security and Compliance is a shared responsibility between AWS and the customer. This shared model can help relieve the customer's operational burden as AWS operates, manages and controls the components from the host operating system and virtualization layer down the physical security of the facilities in which the service operates

A developer deployed an application that consisted of 1 Lambda function, a DynamoDB table, and a firewall using Web Application Firewall (WAF) via the AWS Command Line Interface. When attempting to access the application's resources via the AWS Management Console, the developer cannot find the Lambda function or DynamoDB table. What could the problem be? A. The developer probably forgot to issue the "save" command when using the CLI. B. The developer probably forgot to assign the appropriate IAM access permissions to themselves before closing the CLI C. The developer is probably in a different region from where the resources were initially deployed D> The default rules in WAF prevent everyone on the internet from accessing the application unless specifically granted

C. The developer is probably in a different region from where the resources were initially deployed

Which of the following AWS services can be used to create billing alarms?

CloudWatch

A customer has a complex multi resource application environment containing multiple EC2 instances, load balancers, S3 buckets, and more. They would like to provision these resources in an automated repeatable manner from environment to environment using infrastructure as code. Which service achieves this? A. AWS Management Console B. Business Support Plan C. AWS Command Line Interface D. CloudFormation

Cloudformation

A software company is looking for a tool to automate their deployments from end to end. Which AWS service can provide this continuous delivery functionality? A. CodeCommit B. CodeDeploy C. CodeBuild D. CodePipeline

CodePipeline

A company has made the decision to migrate its internal on premises data center to the cloud. Who can help the company plan and conduct the migration? A. Marketplace B. Consulting partner from the AWS Partner Network (APN) C. AWS Support D. AWS Infrastructure Event Management

Consulting partner from the AWS Partner Network AWS infrastructure event management

You just had a Data Analyst join the company, and you have been tasked with creating a new IAM user accordingly. Although the user has received all the necessary credentials, she realized that she cannot perform any Amazon RDS actions on the Clients table. Which of the following are possible solutions to this issue? A. Supply the password necessary to log into the AWS console B. Double check the credentials you sent to the user C. Create an identity based policy D. Add the user to the group that has the necessary permission policy E. Create a ticket for the help desk to resolve the issue

D and C Add the user to the group that has the necessary permission policy and create an identity based policy

The CTO of a software company has requested an executive summary detailing the advantages of a potential move to the AWS cloud. What can you say is as an advantage of an RDS database over a traditional database? A. There is much greater access for DBAs B. It is five times faster than traditional databases C. It is much easier to convert to a NoSQL database D. AWS maintains the underlying OS and preforms software patching on the database

D. AWS maintains the underlying OS and preforms software patching on the database RDS is a managed service that makes it easy to launch and manage relational databases. RDS does not provide a lot of value like automated backups and software patching, and freezes you up to focus on your applications

You have recently started using AWS and now need to launch a large number of instances in your VPC. You learn that this number exceeds the service limits for instances in a VPC. What can you do? A. Upgrade your support plan to increase. this service limit B. Use Auto Scaling and the service limit can be exceeded C. There is nothing that can be done. Redesign based on a smaller number of instances D. Contact AWS and request a service limit increase.

D. Contact AWS and request a service limit service. Use the limits page in the Amazon EC2 console to request an increase in the limits for resources provided by Amazon EC2 or Amazon VPC on a per Region basis

What is raised when a business deploys web servers across several AWS Regions? A. Coupling B. Availability C. Security D. Durability

D. Durability AWS measures durability as a percentage. For example, the S3 Standard Tier is designed for 99.99999999999% durability

To install a PCI-compliant workload on AWS, which of the following tasks is required? A. Use any AWS service and implement PCI controls at the application layer B. Use an AWS service that is in scope for PCI compliance and raise an AWS support ticket to enable PCI compliance at the application layer C. Use any AWS service and raise an AWS support ticket to enable PCI compliance at that service D. Use an AWS service that is in scope for PCI compliance and apply PCI controls at the application layer

D. Use an AWS service that is in scope for PCI compliance and apply PCI controls at the application layer

Upon which of these measurements is AWS Lambda pricing based? A. Cost of the Lambda functions execution role in AWS IAM B. Data transfer C. Number of requests D. Duration and memory

Data transfer, number of requests, duration and memory

ElastiCache is an example of what type of AWS Services?

Database - ElastiCache is an in-memory cache service used to improve database performance, this means that it saves your most common queries for quicker data retrieval rather than retrieving directly from your database. As a result, it is classified as an AWS database service

Which of the following support plans features access to Enhanced Technical Support via email only during business hours? A. Enterprise B. Basic C. Business D. Developer

Developer

Which services can host a MariaDB database? A. EC2 B. DynamoDB C. Aurora D. RDS

EC2, and RDS EC2 for complete control of a database, you can install the database software directly on an EC2 instance RDS supports several popular engines: Amazon Aurora, PostgreSQL, MySQL, MariaDB, Oracle Database, and SQL Server

Which AWS service is specifically designed to assist you in processing large datasets?

EMR

You have a read-heavy application workload resulting in I/O-intensive Amazon RDS database queries. Which service is most suitable to improve performance? A. DynamoDB B. Redshift C. Elasticache D. DAX

Elasticache

In AWS, you can stop or terminate instances when not in use. Which of the following concepts describes this capability?

Elasticity

Which benefit of cloud computing allows you to avoid planning ahead of time for how much capacity you need?

Elasticity

Which of the following best describes the ability to scale computing resources out or in easily, while only paying for the resources used? A. Elasticity B. Scalability C. High availability

Elasticity

Which of the following does Amazon ensure will happen when paying for AWS on an as needed basis? A. Enabling the full elasticity of business operations B. Redirecting focus to innovation and invention C. Spending more money in the long term D. Spending less money in the long term E. Reducing procurement complexity

Enabling the full elasticity of business operations Redirecting focus to innovation and invention Reducing procurement complexity

Which term refers to the Identity and Access Management resource objects that AWS uses for authentication? A. Identities B. Entities C. Principal D. Resources

Entities IAM entities = users and roles that are created and used for authentication

You are using your corporate directory to grant your users access to AWS services. What is this called? A. User group access B. Role based access C. MFA D. Federated access

Federated access Federated access is when you use an external directory such as your corporate one, to grant users in that directory access to AWS resources

Which of the following is an example of security in the AWS Cloud under the AWS shared responsibility model? A. Managing edge locations B. Physical security C. Firewall configuration D. Global infrastructure

Firewall Configurations

Which of the following best describes a system that is always online - without the need for human intervention

Highly Available

VMware Cloud on AWS allows companies to migrate and extend their on prem VMware vSphere-based environments to AWS cloud using Amazon EC2. Which of the following choices accurately classifies this deployment model? A. Cloud B. Hybrid C. Shared services D. On Prem

Hybrid

Which of the following AWS services controls authentication and authorization within an AWS account

IAM

You are working with IAM and need to attach policies to users, groups, and roles. Which of the following will you be attaching these policies to? A. Entities B. Identities C. Principals D. Resources

Identities

What of the following is a critical design concept for architecting cloud applications? A. Use the largest instance possible B. Provision capacity for peak load C. Use the Scrum development process D. Implement elasticity

Implement elasticity Cloud services main proposition is to provide elasticity through horizontal scaling. It's already there. As for using largest instance possible, it is not a design principle that helps cloud applications in anyway. Scrum development process is not related to architecting. Therefore, a key principle is to provision your application for on demand capacity. Peak loads is something that cloud applications experience everyday. Peak load management should be necessary part of cloud application design principle.

A developer is trying to programmatically retrieve information from an EC2 instance such as public keys, IP address, and Instance ID. From where can this information be retrieved? A. CloudWatch Logs B. Instance snapshot C. Instance Metadata D. Instance user data

Instance Metadata

You need to execute code in response to a specific change to your S3 bucket. Which of the following compute services should you choose to execute your code? A. Lambda B. EC2 C. Lightsail D. Elastic Beanstalk

Lambda, lambda is event driven and a change to a S3 bucket would be an event that lambda could respond to

Which of the following compute services is ideal if you need to run a simple website or a simple e commerce application? A. EC2 B. Lambda C. Elastic Beanstalk D. Lightsail

Lightsail

Which pillar of the AWS Well-Architected Framework is supported by the design philosophy of performing operations as code? A. Performance efficiency B. Operational excellence C. Reliability D. Security

Operational Excellence

A company would like to automate the configuration of its servers and deploy code to servers in the cloud and on prem. Which service meets the requirement? A. CodeBuild B. CodeDeploy C. Elastic Beanstalk D. OpsWorks

OpsWorks

Which of the following is a shared control between a client and AWS under the shared responsibility model? A. Physical controls B. Patch management C. Zone security D. Data center auditing

Patch management: AWS is responsible for patching and fixing flaws within the infrastructure but customers are responsible for patching their guest OS and applications

A company runs workloads in the cloud with unknown and dynamic user demand. Which usage features make the cloud cost effective for this type of workload? A. Reliability B. Shared security model C. Pay as you go D. On demand E. Performance efficiency

Pay as you go On demand

When you access tools provided to build a storefront application that runs on another company's server, which cloud computing model are you using? A. Software as a service B. Platform as a service C. Infrastructure as a service D. Function as a service

Platform as a service

Which of the following engines are classified as relational databases on AWS? A. DynamoDB B. PostgreSQL C. Oracle D. Redshift E. MySQL

PostgreSQL Oracle MySQL

A company has a large number of S3 buckets and need to manage and automate tasks on these buckets at one time. Which AWS feature can do this? A. Tagging B. Resource groups C. IAM groups D. IAM

Resource groups You can use resource groups to organize your AWS resources. Resource groups make it easier to manage and automate tasks on large numbers of resources at one time.

A systems ability to grow to accommodate an increase in demands of which cloud concept?

Scalability

This service allows a user to rotate, manage, and retrieve secrets

Secrets manager

You need to set up a virtual firewall for your EC2 instance. Which would you use?

Security Group

A healthcare company has nightly batch jobs that can afford to be interrupted. Which EC2 pricing model can meet this need and provide great savings by using a supply and demand model? A. Standard Reserved Instances B. On-Demand C. Spot instances D. Scheduled Reserved Instances

Spot Instances

Your development uses 4 On-Demand EC2 instances. Your QA team has 5 reserved instances, only 3 of which are being used. Assuming all AWS accounts are under a single AWS Organization, how will the development team's instances be billed? A. All the Dev team's instances will be billed at the Reserved Instance rate. B. The pricing for the Reserved Instances will shift from QA to Dev C. The Dev team will be billed for 2 instances at On-Demand prices and 2 instances at the Reserved Instances price D. All the Dev team's instances will be billed at the On-Demand rate

The Dev team will be billed for 2 instances at On-Demand prices and 2 instances at the Reserved Instance price

You have been tasked with going in to the AWS company account and getting information on saving money, improving system performance and reliability, and closing security gaps. Which tool can you use to get this information? A. Trusted Advisor B. AWS Cost and Usage Report C. CloudWatch D. AWS Inspector

Trusted Advisor

You've been tasked with assessing your AWS infrastructure in terms of cost optimization. Which of the following AWS services would help with this task? A. CloudTrail B. AWS Personal Health Dashboard C. Trusted Advisor D. AWS Systems Manager

Trusted Advisor

You want streamlined access management for your AWS administrators by assigning them a pre defined set of permissions based on their job role. Which options below are the best way to approach this? A. Use IAM policies B. Use IAM groups C. Use IAM roles D. Use Organizations

Use IAM policies and IAM groups


Kaugnay na mga set ng pag-aaral

Mean, Median, Range, Mode, Outlier, Quartiles

View Set

Algebra 2: Equations: Point Slope Part 1

View Set

Chapter 11 Quiz: Mixed Questions

View Set

3. Market Indexes and Benchmarks

View Set

Intro to Networks Midterm Study (Module 1-3)

View Set