MultipleChoice
A security officer wants a list of any potential vulnerabilities in Amazon EC2 security groups. Which AWS service should the officer use?
OptionsMultipleChoice
Which AWS service provides a simple and scalable shared file storage solution for use with Linux-based AWS and on-premises servers?
OptionsMultipleChoice
Using AWS Config to record audit and evaluate changes to AWS resources to enable traceability is an example of which AWS Wed-Architected Framework pillar?
OptionsMultipleChoice
What is an AWS Identity and Access Management (IAM) role?
OptionsMultipleChoice
The AWS Trusted Advisor checks include recommendations regarding which of the following? (Select TWO.)
OptionsMultipleChoice
Which of the following contribute to total cost of ownership of a workload running in the AWS Cloud? (Select TWO)
OptionsMultipleChoice
A company would like to host its MySQL databases on AWS and maintain full control over the operating system, database installation, and configuration. Which AWS service should the company use to host the databases?
OptionsMultipleChoice
Which AWS service provides the ability to quickly run one-time queries on data in Amazon S3?
OptionsMultipleChoice
Which task requires the use of AWS account root account user credentials?
OptionsMultipleChoice
Which of the following are benefits of running a database on Amazon RDS compared to an on-premises database? (Select TWO )
Options