A) Connect the Active Directory to AWS by using single sign-on and an Active Directory Federation Services (AD FS) with SAML 2.0, and then configure the Identity Provider (IdP) system to use form-based authentication. Build the AD FS portal page with corporate branding, and integrate third-party applications that support SAML 2.0 as required.
B) Create a two-way Forest trust relationship between the on-premises Active Directory and the AWS Directory Service. Set up AWS Single Sign-On with AWS Organizations. Use single sign-on integrations for connections with third-party applications.
C) Configure single sign-on by connecting the on-premises Active Directory using the AWS Directory Service AD Connector. Enable federation to the AWS services and accounts by using the IAM applications and services linking function. Leverage third-party single sign-on as needed.
D) Connect the company's Active Directory to AWS by using AD FS and SAML 2.0. Configure the AD FS claim rule to leverage Regex and a common Active Directory naming convention for the security group to allow federation of all AWS accounts. Leverage third-party single sign-on as needed, and add it to the AD FS server.
Correct Answer
verified
Multiple Choice
A) Task Runner
B) Pipeline definition
C) AWS Direct Connect
D) Amazon Simple Storage Service 9Amazon S3)
Correct Answer
verified
Multiple Choice
A) Use Amazon Route 53 for domain registration and DNS services. Enable DNSSEC for all Route 53 requests. Use AWS Certificate Manager (ACM) to register TLS/SSL certificates for the shopping website, and use Application Load Balancers configured with those TLS/SSL certificates for the site. Use the Server Name Identification extension in all client requests to the site.
B) Register 2048-bit encryption keys from a third-party certificate service. Use a third-party DNS provider that uses the customer managed keys for DNSSec. Upload the keys to ACM, and use ACM to automatically deploy the certificates for secure web services to an EC2 front-end web server fleet by using NGINX. Use the Server Name Identification extension in all client requests to the site.
C) Use Route 53 for domain registration. Register 2048-bit encryption keys from a third-party certificate service. Use a third-party DNS service that supports DNSSEC for DNS requests that use the customer managed keys. Import the customer managed keys to ACM to deploy the certificates to Classic Load Balancers configured with those TLS/SSL certificates for the site. Use the Server Name Identification extension in all clients requests to the site.
D) Use Route 53 for domain registration, and host the company DNS root servers on Amazon EC2 instances running Bind . Enable DNSSEC for DNS requests. Use ACM to register TLS/SSL certificates for the shopping website, and use Application Load Balancers configured with those TLS/SSL certificates for the site. Use the Server Name Identification extension in all client requests to the site. Use Route 53 for domain registration, and host the company DNS root servers on Amazon EC2 instances running Bind . Enable DNSSEC for DNS requests. Use ACM to register TLS/SSL certificates for the shopping website, and use Application Load Balancers configured with those TLS/SSL certificates for the site. Use the Server Name Identification extension in all client requests to the site.
Correct Answer
verified
Multiple Choice
A) block device mapping
B) object mapping
C) batch storage mapping
D) datacenter mapping
Correct Answer
verified
Multiple Choice
A) Apply environment, cost center, and application name tags to all taggable resources.
B) Configure custom budgets and define thresholds using Cost Explorer.
C) Configure AWS Trusted Advisor to obtain weekly emails with cost-saving estimates.
D) Create a portfolio for each business unit and add products to the portfolios using AWS CloudFormation in AWS Service Catalog.
E) Configure a billing alarm in Amazon CloudWatch.
F) Configure SCPs in AWS Organizations to allow services available using AWS.
Correct Answer
verified
Multiple Choice
A) The organization should create each user in a separate region so that they have their own URL to login
B) The organization should create a separate login ID but give the IAM users the same alias so that each one can login with their alias
C) It is not possible to have the same login ID for multiple IAM users of the same account
D) The organization should create various groups and add each user with the same login ID to different groups. The user can login with their own group ID
Correct Answer
verified
Multiple Choice
A) Use AWS Firewall Manage to control the CloudFront distribution security settings. Create a geographical block rule and associate it with Firewall Manager.
B) Associate an AWS WAF web ACL with the CloudFront distribution. Select the managed Amazon IP reputation rule group for the web ACL with a deny action.
C) Use AWS Firewall Manager to control the CloudFront distribution security settings. Select the managed Amazon IP reputation rule group and associate it with Firewall Manager with a deny action.
D) Associate an AWS WAF web ACL with the CloudFront distribution. Create a rule group for the web ACL with a geographical match statement with a deny action.
Correct Answer
verified
Multiple Choice
A) Lower the scale up trigger of your Auto Scaling group to 30% so it scales more aggressively.
B) Add an Amazon ElastiCache caching layer to your application for storing sessions and frequent DB queries
C) Configure Amazon CloudFront dynamic content support to enable caching of re-usable content from your site
D) Switch the Amazon RDS database to the high memory extra large Instance type
E) Set up a second installation in another region, and use the Amazon Route 53 latency-based routing feature to select the right region.
Correct Answer
verified
Multiple Choice
A) True, however, you get lower performance.
B) false
C) true
D) False, you must recreate the replication group to improve performance tuning.
Correct Answer
verified
Multiple Choice
A) Set the S3 access point resource policy to deny the s3:CreateAccessPoint action unless the s3:AccessPointNetworkOrigin condition key evaluates to VPC.
B) Create an SCP at the root level in the organization to deny the s3:CreateAccessPoint action unless the s3:AccessPointNetworkOrigin condition key evaluates to VPC.
C) Use AWS CloudFormation StackSets to create a new IAM policy in each AWS account that allows the s3:CreateAccessPoint action only if the s3:AccessPointNetworkOrigin condition key evaluates to VPC.
D) Set the S3 bucket policy to deny the s3:CreateAccessPoint action unless the s3:AccessPointNetworkOrigin condition key evaluates to VPC.
Correct Answer
verified
Multiple Choice
A) Use OAuth 2 0 to retrieve temporary AWS security credentials to enable your NOC members to sign in to the AWS Management Console.
B) Use web Identity Federation to retrieve AWS temporary security credentials to enable your NOC members to sign in to the AWS Management Console.
C) Use your on-premises SAML 2.0-compliant identity provider (IDP) to grant the NOC members federated access to the AWS Management Console via the AWS single sign-on (SSO) endpoint.
D) Use your on-premises SAML 2.0-compliam identity provider (IDP) to retrieve temporary security credentials to enable NOC members to sign in to the AWS Management Console.
Correct Answer
verified
Multiple Choice
A) Add a business process management application to your Elastic Beanstalk app servers and re-use the ROS database for tracking order status use one of the Elastic Beanstalk instances to send emails to customers.
B) Use SWF with an Auto Scaling group of activity workers and a decider instance in another Auto Scaling group with min/max=1 Use the decider instance to send emails to customers.
C) Use SWF with an Auto Scaling group of activity workers and a decider instance in another Auto Scaling group with min/max=1 use SES to send emails to customers.
D) Use an SQS queue to manage all process tasks Use an Auto Scaling group of EC2 Instances that poll the tasks and execute them. Use SES to send emails to customers.
Correct Answer
verified
Multiple Choice
A) The customer should provide the partner company with their AWS account access keys to log in and perform the required tasks.
B) The customer should create an IAM user and assign the required permissions to the IAM user. The customer should then provide the credentials to the partner company to log in and perform the required tasks.
C) The customer should create an IAM role and assign the required permissions to the IAM role. The partner company should then use the IAM role's Amazon Resource Name (ARN) when requesting access to perform the required tasks.
D) The customer should create an IAM role and assign the required permissions to the IAM role. The partner company should then use the IAM role's Amazon Resource Name (ARN) , including the external ID in the IAM role's trust policy, when requesting access to perform the required tasks.
Correct Answer
verified
Multiple Choice
A) Use CloudFront and an Elastic Load balancer in front of an auto-scaled set of web servers, the web servers will first call the Login With Amazon service to authenticate the user then process the users vote and store the result into a multi-AZ Relational Database Service instance.
B) Use CloudFront and the static website hosting feature of S3 with the Javascript SDK to call the Login With Amazon service to authenticate the user, use IAM Roles to gain permissions to a DynamoDB table to store the users vote.
C) Use CloudFront and an Elastic Load Balancer in front of an auto-scaled set of web servers, the web servers will first call the Login with Amazon service to authenticate the user, the web servers will process the users vote and store the result into a DynamoDB table using IAM Roles for EC2 instances to gain permissions to the DynamoDB table.
D) Use CloudFront and an Elastic Load Balancer in front of an auto-scaled set of web servers, the web servers will first call the Login With Amazon service to authenticate the user, the web servers win process the users vote and store the result into an SQS queue using IAM Roles for EC2 Instances to gain permissions to the SQS queue. A set of application servers will then retrieve the items from the queue and store the result into a DynamoDB table.
Correct Answer
verified
Multiple Choice
A) Deploy a Linux bastion host on the corporate network that has access to all instances in the VPC.
B) Deploy AWS Systems Manager Agent on the EC2 instances. Access the EC2 instances using Session Manager restricting access to users with permission.
C) Deploy a Linux bastion host with an Elastic IP address in the public subnet. Allow access to the bastion host from 0.0.0.0/0.
D) Establish a Site-to-Site VPN connecting the corporate network to the VPC. Update the security groups to allow access from the corporate network only.
Correct Answer
verified
Multiple Choice
A) Configure a job which terminates all instances after 600 minutes
B) It is not possible to terminate instances automatically
C) Configure the CloudWatch action to terminate the instance when the CPU utilization falls below 5%
D) Set up the CloudWatch with Auto Scaling to terminate all the instances
Correct Answer
verified
Multiple Choice
A) 1000
B) 200
C) 2000
D) 500
Correct Answer
verified
Multiple Choice
A) Each subnet spans at least 2 Availability Zones to provide a high-availability environment.
B) Each subnet maps to a single Availability Zone.
C) CIDR block mask of /25 is the smallest range supported.
D) By default, all subnets can route between each other, whether they are private or public.
E) Instances in a private subnet can communicate with the Internet only if they have an Elastic IP.
Correct Answer
verified
Multiple Choice
A) The EBS volume will not be created on the same tenant hardware assigned to the dedicated instance
B) AWS does not allow a dedicated EBS backed instance launch
C) The EBS volume will be created on the same tenant hardware assigned to the dedicated instance
D) The user can specify where the EBS will be created
Correct Answer
verified
Multiple Choice
A) SNS cannot provide data every minute
B) SNS will send data every minute after configuration
C) There is no need to enable since SNS provides data every minute
D) AWS CloudWatch does not support monitoring for SNS
Correct Answer
verified
Showing 301 - 320 of 871
Related Exams