What is the name of the AWS service that allows you to define fine-grained access rights, like who can access resources which resources can be accessed and what the user can do to the resource how resources can be accessed? _______ (give the abbreviation or the full name)
Blog
You can run applications and workloads from a Region closer…
You can run applications and workloads from a Region closer to the end users to _______ latency.
What is true about Regions? Select ALL that apply.
What is true about Regions? Select ALL that apply.
Match the AWS service with its category.
Match the AWS service with its category.
Which of the following are geographic areas that host two or…
Which of the following are geographic areas that host two or more Availability Zones?
In mid-January, a 24-year-old man who is brought to the ER b…
In mid-January, a 24-year-old man who is brought to the ER by ambulance after suffering what co-workers described as a seizure like activity. The patient has been working in an enclosed house, using space heaters to keep him warm. He is drowsy on admission without further seizure-like activity. Further questioning of the family reveals no prior history of seizures in the patient and no family history of seizures. Initial evaluation should include all but one. Select the evaluation item not done in the initial workup.
Which of the following are factors to consider when selectin…
Which of the following are factors to consider when selecting the optimal Region or Regions where you store and use AWS services? Select ALL that apply.
Which of the following are true about Availability Zones (AZ…
Which of the following are true about Availability Zones (AZ)? Select ALL that apply.
Consider this deployment. Who is responsible for maintaining…
Consider this deployment. Who is responsible for maintaining security — AWS or the customer?
Customers who deploy EC2 instances are responsible for manag…
Customers who deploy EC2 instances are responsible for managing the guest operating system (including updates and security patches), any application software installed on the instances, and the configuration of the security groups.