Amazon AWS Certified SysOps Administrator - Associate SOA-C01
Prev

There are 439 results

Next
#431 (Accuracy: 100% / 1 votes)
Can you change the security groups associated with the primary network interface (eth0) of an EC2 instance running inside a VPC?
  • A. Yes
  • B. Only if the instance is stopped
  • C. Only when the instance is launched
  • D. No
#432 (Accuracy: 100% / 2 votes)
AWS IAM permissions can be assigned in two ways:
  • A. as role-based or as resource-based.
  • B. as identity-based or as resource-based.
  • C. as security group-based or as key-based.
  • D. as user-based or as key-based.
#433 (Accuracy: 100% / 1 votes)
ABC (with AWS account ID 111122223333) has created 50 IAM users for its organization's employees. What will be the AWS console URL for these associates?
  • A. https://signin.aws.amazon.com/console/111122223333/
  • B. https://111122223333.signin.aws.amazon.com/console/
  • C. https://signin.aws.amazon.com/111122223333/console/
  • D. https://signin.aws.amazon.com/console/
#434 (Accuracy: 100% / 1 votes)
You can configure Amazon CloudFront to deliver access logs per ________ to an Amazon S3 bucket of your choice.
  • A. Edge location
  • B. Distribution
  • C. Geo restriction
  • D. Request
#435 (Accuracy: 100% / 1 votes)
Fill in the blanks: One of the basic characteristics of security groups for your VPC is that you
______ .
  • A. can specify allow rules as well as deny rules
  • B. can neither specify allow rules nor deny rules
  • C. can specify allow rules, but not deny rules
  • D. can specify deny rules, but not allow rules
#436 (Accuracy: 100% / 1 votes)
An IAM group is a:
  • A. group of EC2 machines that gain the permissions specified in the group.
  • B. collection of IAM users.
  • C. guide for IAM users.
  • D. collection of AWS accounts.
#437 (Accuracy: 100% / 2 votes)
What does Amazon IAM provide?
  • A. A mechanism to authorize Internet Access Modularity (IAM)
  • B. A mechanism to authenticate users when accessing Amazon Web Services
  • C. A mechanism to integrate on-premises authentication protocols with the Cloud
  • D. None of the above
#438 (Accuracy: 100% / 1 votes)
A root AWS account owner has created three IAM users: Bob, John and Michael. Michael is the IAM administrator. Bob and John are not the super users, but users with some pre-defined policies. John does not have access to modify his password. Thus, he asks Bob to change his password. How can Bob change
John's password?
  • A. This statement is false. Only Michael can change the password for John
  • B. This is possible if Michael can add Bob to a group which has permissions to modify the IAM passwords
  • C. It is not possible for John to modify his password
  • D. Provided Bob is the manager of John
#439 (Accuracy: 100% / 1 votes)
In the context of AWS Security Best Practices for RDS, if you require encryption or data integrity authentication of data at rest for compliance or other purposes, you can add protection at the _____ using SQL cryptographic functions.
  • A. physical layer
  • B. security layer
  • C. application layer
  • D. data-link layer