ExamGecko
Home Home / Amazon / CLF-C01

Amazon CLF-C01 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Related questions











What is an AWS Identity and Access Management (IAM) role?

A.
A user associated with an AWS resource
A.
A user associated with an AWS resource
Answers
B.
A group associated with an AWS resource
B.
A group associated with an AWS resource
Answers
C.
An entity that defines a set of permissions for use with an AWS resource
C.
An entity that defines a set of permissions for use with an AWS resource
Answers
D.
An authentication credential associated with a multi-factor authentication (MFA) token
D.
An authentication credential associated with a multi-factor authentication (MFA) token
Answers
Suggested answer: A

Which tasks require using AWS account root user credentials? (Select TWO.)

A.
Creating an Amazon EC2 key pair
A.
Creating an Amazon EC2 key pair
Answers
B.
Removing an IAM user from the administrators group
B.
Removing an IAM user from the administrators group
Answers
C.
Changing the AWS Support plan
C.
Changing the AWS Support plan
Answers
D.
Creating an Amazon CloudFront key pair
D.
Creating an Amazon CloudFront key pair
Answers
E.
Granting an IAM user full administrative
E.
Granting an IAM user full administrative
Answers
Suggested answer: C, E

A company has deployed several relational databases on Amazon EC2 instances Every month the database software vendor releases new security patches that need to be applied to the databases What is the MOST efficient way to apply the security patches?

A.
Connect to each database instance on a monthly basis and download and apply the necessary security patches from the vendor
A.
Connect to each database instance on a monthly basis and download and apply the necessary security patches from the vendor
Answers
B.
Enable automate patching for the instances using the Amazon RDS console
B.
Enable automate patching for the instances using the Amazon RDS console
Answers
C.
In AWS Config. configure a rule for the instances and the required patch level
C.
In AWS Config. configure a rule for the instances and the required patch level
Answers
D.
Use AWS Systems Manager to automate database patching according to a schedule
D.
Use AWS Systems Manager to automate database patching according to a schedule
Answers
Suggested answer: D

A security officer wants a list of any potential vulnerabilities in Amazon EC2 security groups. Which AWS service should the officer use?

A.
Amazon GuardDuty
A.
Amazon GuardDuty
Answers
B.
AWS Trusted Advisor
B.
AWS Trusted Advisor
Answers
C.
AWS CloudTrail
C.
AWS CloudTrail
Answers
D.
AWS Artifact
D.
AWS Artifact
Answers
Suggested answer: A

Which AWS service provides a simple and scalable shared file storage solution for use with Linuxbased AWS and on-premises servers?

A.
Amazon S3
A.
Amazon S3
Answers
B.
Amazon Glacier
B.
Amazon Glacier
Answers
C.
Amazon EBS
C.
Amazon EBS
Answers
D.
Amazon EFS
D.
Amazon EFS
Answers
Suggested answer: D

Explanation:

Explanation:

Amazon Elastic File System (Amazon EFS) provides a simple, scalable, fully managed elastic NFS file system for use with AWS Cloud services and on-premises resources. It is built to scale on demand to petabytes without disrupting applications, growing and shrinking automatically as you add and remove files, eliminating the need to provision and manage capacity to accommodate growth.

Amazon EFS is designed to provide the throughput, IOPS, and low latency needed for Linux workloads. Throughput and IOPS scale as a file system grows and can burst to higher throughput levels for short periods of time to support the unpredictable performance needs of file workloads.

For the most demanding workloads, Amazon EFS can support performance over 10 GB/sec and up to 500,000 IOPS.

Which Amazon EC2 pricing model is the MOST cost efficient for an uninterruptible workload that runs once a year for 24 hours?

A.
On-Demand Instances
A.
On-Demand Instances
Answers
B.
Reserved Instances
B.
Reserved Instances
Answers
C.
Spot Instances
C.
Spot Instances
Answers
D.
Dedicated Instances
D.
Dedicated Instances
Answers
Suggested answer: A

Explanation:

Explanation:

With On-Demand instances, you pay for compute capacity by the hour or the second depending on which instances you run. No longer-term commitments or upfront payments are needed. You can increase or decrease your compute capacity depending on the demands of your application and only pay the specified per hourly rates for the instance you use

Reference: https://aws.amazon.com/ec2/pricing/

Which of the following is a shared control between the customer and AWS?

A.
Providing a key for Amazon S3 client-side encryption
A.
Providing a key for Amazon S3 client-side encryption
Answers
B.
Configuration of an Amazon EC2 instance
B.
Configuration of an Amazon EC2 instance
Answers
C.
Environmental controls of physical AWS data centers
C.
Environmental controls of physical AWS data centers
Answers
D.
Awareness and training
D.
Awareness and training
Answers
Suggested answer: D

A company must process a large amount of data from social media accounts by making graphical queries with high throughput. Which AWS service will help the company design a cloud architecture that will meet these requirements?

A.
Amazon RDS
A.
Amazon RDS
Answers
B.
Amazon DynamoDB
B.
Amazon DynamoDB
Answers
C.
Amazon Neptune
C.
Amazon Neptune
Answers
D.
Amazon Redshift
D.
Amazon Redshift
Answers
Suggested answer: C

Which AWS service or feature can be used to prevent SQL injection attacks?

A.
Security groups
A.
Security groups
Answers
B.
Network ACLs
B.
Network ACLs
Answers
C.
AWS WAF
C.
AWS WAF
Answers
D.
IAM policy
D.
IAM policy
Answers
Suggested answer: C

Under the AWS shared responsibility model what are the customer's responsibilities? (Select TWO.)

A.
Physical and environmental security
A.
Physical and environmental security
Answers
B.
Physical network devices including firewalls
B.
Physical network devices including firewalls
Answers
C.
Storage device decommissioning
C.
Storage device decommissioning
Answers
D.
Security of data in transit
D.
Security of data in transit
Answers
E.
Data integrity authentication
E.
Data integrity authentication
Answers
Suggested answer: D, E

Explanation:

Explanation:

Total 944 questions
Go to page: of 95