A user wants to securely automate the management and rotation of credentials that are shared between applications, while spending the least amount of time on managing tasks.
Which AWS service or feature can be used to accomplish this?
A. AWS CloudHSM
B. AWS Key Management Service (AWS KMS)
C. AWS Secrets Manager
D. Server-side encryption
#82
(Accuracy: 100% / 1 votes)
Which security service automatically recognizes and classifies sensitive data or intellectual property on AWS?
A. Amazon GuardDuty
B. Amazon Macie
C. Amazon Inspector
D. AWS Shield
#83
(Accuracy: 100% / 2 votes)
Which actions are best practices for an AWS account root user? (Choose two.)
A. Share root user credentials with team members.
B. Create multiple root users for the account, separated by environment.
C. Enable multi-factor authentication (MFA) on the root user.
D. Create an IAM user with administrator privileges for daily administrative tasks, instead of using the root user.
E. Use programmatic access instead of the root user and password.
#84
(Accuracy: 100% / 2 votes)
A company is running a critical workload on an Amazon RDS DB instance. The company needs the DB instance to be highly available with a recovery time of less than 5 minutes.
Which solution will meet these requirements?
A. Create a read replica of the DB instance.
B. Create a template of the DB instance by using AWS CloudFormation.
C. Take frequent snapshots of the DB instance. Store the snapshots in Amazon S3.
D. Modify the DB instance to be a Multi-AZ deployment.
#85
(Accuracy: 91% / 5 votes)
A company needs to transfer data between an Amazon S3 bucket and an on-premises application.
Who is responsible for the security of this data, according to the AWS shared responsibility model?
A. The company
B. AWS
C. Firewall vendor
D. AWS Marketplace partner
#86
(Accuracy: 100% / 1 votes)
Which pillar of the AWS Well-Architected Framework refers to the ability of a system to recover from infrastructure or service disruptions and dynamically acquire computing resources to meet demand?
A. Security
B. Reliability
C. Performance efficiency
D. Cost optimization
#87
(Accuracy: 100% / 3 votes)
A company wants to identify Amazon S3 buckets that are shared with another AWS account.
Which AWS service or feature will meet these requirements?
A. AWS Lake Formation
B. IAM credential report
C. Amazon CloudWatch
D. IAM Access Analyzer
#88
(Accuracy: 100% / 3 votes)
Which AWS service gives users the ability to build interactive business intelligence dashboards that include machine learning insights?
A. Amazon Athena
B. Amazon Kendra
C. Amazon QuickSight
D. Amazon Redshift
#89
(Accuracy: 100% / 2 votes)
Which of the following is an AWS value proposition that describes a user’s ability to scale infrastructure based on demand?
A. Speed of innovation
B. Resource elasticity
C. Decoupled architecture
D. Global deployment
#90
(Accuracy: 100% / 3 votes)
Which action is a security best practice for access to sensitive data that is stored in an Amazon S3 bucket?
A. Enable S3 Cross-Region Replication (CRR) on the S3 bucket.
B. Use IAM roles for applications that require access to the S3 bucket.
C. Configure AWS WAF to prevent unauthorized access to the S3 bucket.
D. Configure Amazon GuardDuty to prevent unauthorized access to the S3 bucket.