ExamGecko
Home Home / Amazon / CLF-C01

Amazon CLF-C01 Practice Test - Questions Answers, Page 32

Question list
Search
Search

List of questions

Search

Related questions











A user wants to identify any security group that is allowing unrestricted incoming SSH traffic Which AWS service can be used to accomplish this goal?

A.
Amazon Cognito
A.
Amazon Cognito
Answers
B.
AWS Shield
B.
AWS Shield
Answers
C.
Amazon Macie
C.
Amazon Macie
Answers
D.
AWS Trusted Advisor
D.
AWS Trusted Advisor
Answers
Suggested answer: D

A solutions architect needs to create a cost estimate for running workloads on AWS. The cost estimate must then be exported tor management review

Which AWS service or feature should be used to accomplish these tasks?

A.
Cost Explorer
A.
Cost Explorer
Answers
B.
Amazon QuickSight
B.
Amazon QuickSight
Answers
C.
AWS Pricing Calculator
C.
AWS Pricing Calculator
Answers
D.
AWS Budgets
D.
AWS Budgets
Answers
Suggested answer: C

Which AWS service automatically handles application health monitoring?

A.
Amazon API Gateway
A.
Amazon API Gateway
Answers
B.
AWS Elastic Beanstalk
B.
AWS Elastic Beanstalk
Answers
C.
AWS Lambda
C.
AWS Lambda
Answers
D.
AWS Config
D.
AWS Config
Answers
Suggested answer: B

Which AWS service gives users the ability to find, buy, and immediately start using third-party software solutions in their AWS environments?

A.
AWS Config
A.
AWS Config
Answers
B.
AWS OpsWorks
B.
AWS OpsWorks
Answers
C.
AWS Systems Manager
C.
AWS Systems Manager
Answers
D.
AWS Marketplace
D.
AWS Marketplace
Answers
Suggested answer: D

Which of the following security resources are supplied by AWS? (Select TWO.)

A.
Trusted Advisor checks
A.
Trusted Advisor checks
Answers
B.
Service intrusion metrics
B.
Service intrusion metrics
Answers
C.
Penetration testing
C.
Penetration testing
Answers
D.
Educational webinars
D.
Educational webinars
Answers
E.
Peer-to-peer file-sharing detection
E.
Peer-to-peer file-sharing detection
Answers
Suggested answer: A, C

Which of the following are benefits of using AWS Trusted Advisor? (Choose two.)

A.
Providing high-performance container orchestration
A.
Providing high-performance container orchestration
Answers
B.
Creating and rotating encryption keys
B.
Creating and rotating encryption keys
Answers
C.
Detecting underutilized resources to save costs
C.
Detecting underutilized resources to save costs
Answers
D.
Improving security by proactively monitoring the AWS environment
D.
Improving security by proactively monitoring the AWS environment
Answers
E.
Implementing enforced tagging across AWS resources
E.
Implementing enforced tagging across AWS resources
Answers
Suggested answer: C, D

Explanation:

Explanation:

Reference: https://aws.amazon.com/about-aws/whats-new/2016/06/aws-support-enables-tagging-capabilitiesfor-trusted-advisor/

A company's information security manager is supervising a move to AWS and wants to ensure that AWS best practices are followed. The manager has concerns about the potential misuse of AWS account root user credentials. Which of the following is an AWS best practice for using the AWS account root user credentials?

A.
Allow only the manager to use the account root user credentials for normal activities
A.
Allow only the manager to use the account root user credentials for normal activities
Answers
B.
Use the account root user credentials only for Amazon EC2 instances from the AWS Free Tier
B.
Use the account root user credentials only for Amazon EC2 instances from the AWS Free Tier
Answers
C.
Use the account root user credentials only when they alone must be used to perform a required function
C.
Use the account root user credentials only when they alone must be used to perform a required function
Answers
D.
Use the account root user credentials only for the creation of private VPC subnets
D.
Use the account root user credentials only for the creation of private VPC subnets
Answers
Suggested answer: C

A company is building a web application and needs to test the application across different mobile devices and desktop browsers Which AWS service should the company use for this testing?

A.
AWS Amplify
A.
AWS Amplify
Answers
B.
AWS AppSync
B.
AWS AppSync
Answers
C.
Amazon Pinpoint
C.
Amazon Pinpoint
Answers
D.
AWS Device Farm
D.
AWS Device Farm
Answers
Suggested answer: D

A company wants to build an application for a new line of business.

According to the AWS Welt-Architected Framework, what design principles should be implemented?

(Select TWO.)

A.
Consolidate multiple AWS accounts into a single account.
A.
Consolidate multiple AWS accounts into a single account.
Answers
B.
Buy and host hardware in the AWS Cloud
B.
Buy and host hardware in the AWS Cloud
Answers
C.
Move on-premises network hardware to VPCs
C.
Move on-premises network hardware to VPCs
Answers
D.
Decouple the AWS Cloud architecture to break up monolithic deployments
D.
Decouple the AWS Cloud architecture to break up monolithic deployments
Answers
E.
Design elasticity into the AWS Cloud design
E.
Design elasticity into the AWS Cloud design
Answers
Suggested answer: A, E

Which actions should a company take to avoid failure in an AWS architecture design? (Select TWO)

A.
Separate Amazon EC2 instances into different Availability Zones.
A.
Separate Amazon EC2 instances into different Availability Zones.
Answers
B.
Enable Alexa for Business for business applications
B.
Enable Alexa for Business for business applications
Answers
C.
Use Amazon Workspaces to reduce the need for operating system patching
C.
Use Amazon Workspaces to reduce the need for operating system patching
Answers
D.
Use AWS Glue to prepare and load failover data
D.
Use AWS Glue to prepare and load failover data
Answers
E.
Enable Amazon S3 Cross-Region Replication
E.
Enable Amazon S3 Cross-Region Replication
Answers
Suggested answer: A, E
Total 944 questions
Go to page: of 95