What are best practices to protect your network? (Select two)
Blog
A group of consultants require access to an EC2 instance fro…
A group of consultants require access to an EC2 instance from the internet, for 3 consecutive days each week, The instance is shut down the rest of the week, the Virtual Private Cloud (VPC) has internet access. How should you assign an IPv4 address to the instance to give the consultant access?
Which statement regarding client-side encryption is true?
Which statement regarding client-side encryption is true?
The principle of least privilege can best be enforced with t…
The principle of least privilege can best be enforced with the AWS tool called
Which statement about logging and log file is true?
Which statement about logging and log file is true?
Which AWS services does AWS identity and Access Management (…
Which AWS services does AWS identity and Access Management (IAM) rely on to provide temporary security credentials for Rolex.
An administrator wants to run continuous assessment checks i…
An administrator wants to run continuous assessment checks in their resources. The purpose is to verify that these resources comply with their own security Policies, industry best practices, and compliance standards. Which AWS service would meet their need?
A solution architect is developing a process for handling se…
A solution architect is developing a process for handling server failures. Which process most closely follows Amazon Web Services (AWS) best practices.
Load balancers are used to step up and down the capacity (co…
Load balancers are used to step up and down the capacity (concurrent servers) and reliability of applications that are dependent on Internet.
Security and compliance are shared responsibilities between…
Security and compliance are shared responsibilities between AWS and the customer. What is an AWS responsibility?