ExamGecko
Home Home / Amazon / CLF-C01

Amazon CLF-C01 Practice Test - Questions Answers, Page 67

Question list
Search
Search

List of questions

Search

Related questions











A company stores configuration files in an Amazon S3 bucket. These configuration files must be accessed by applications that are running on Amazon EC2 instances. According to AWS security best practices, how should the company grant permissions to allow the applications to access the S3 bucket?

A.
Use the AWS account root user access keys.
A.
Use the AWS account root user access keys.
Answers
B.
Use the AWS access key ID and the EC2 secret access key.
B.
Use the AWS access key ID and the EC2 secret access key.
Answers
C.
Use an IAM role with the necessary permissions.
C.
Use an IAM role with the necessary permissions.
Answers
D.
Activate multi-factor authentication (MFA) and versioning on the S3 bucket.
D.
Activate multi-factor authentication (MFA) and versioning on the S3 bucket.
Answers
Suggested answer: C

Which task can a company complete by using AWS Organizations?

A.
Track application deployment statuses globally.
A.
Track application deployment statuses globally.
Answers
B.
Remove unused and underutilized AWS resources across all accounts.
B.
Remove unused and underutilized AWS resources across all accounts.
Answers
C.
Activate DDoS protection across all accounts.
C.
Activate DDoS protection across all accounts.
Answers
D.
Share pre-purchased Amazon EC2 resources across accounts.
D.
Share pre-purchased Amazon EC2 resources across accounts.
Answers
Suggested answer: C

Explanation:


Which of the following is an AWS key-value database offering consistent single-digit millisecond performance at any scale?

A.
Amazon RDS
A.
Amazon RDS
Answers
B.
Amazon Aurora
B.
Amazon Aurora
Answers
C.
Amazon DynamoDB
C.
Amazon DynamoDB
Answers
D.
Amazon Redshift
D.
Amazon Redshift
Answers
Suggested answer: B

Who can create and manage access keys for an AWS account root user?

A.
The AWS account owner
A.
The AWS account owner
Answers
B.
An IAM user that has administrator permissions
B.
An IAM user that has administrator permissions
Answers
C.
IAM users within a designated group
C.
IAM users within a designated group
Answers
D.
An IAM user that has the required role
D.
An IAM user that has the required role
Answers
Suggested answer: A

Explanation:

Explanation:

Anyone who has root user credentials for your AWS account has unrestricted access to all the resources in your account, including billing information. When you create access keys, you create the access key ID and secret access key as a set.

A retail company is building a new mobile app. The company is evaluating whether to build the app at an on-premises data center or in the AWS Cloud. Which of the following are benefits of building this app in the AWS Cloud? (Select TWO.)

A.
A large, upfront capital expense and low variable expenses
A.
A large, upfront capital expense and low variable expenses
Answers
B.
Increased speed for trying out new projects
B.
Increased speed for trying out new projects
Answers
C.
Complete control over the physical security of the infrastructure
C.
Complete control over the physical security of the infrastructure
Answers
D.
Flexibility to scale up in minutes as the application becomes popular
D.
Flexibility to scale up in minutes as the application becomes popular
Answers
E.
Ability to pick the specific data centers that will host the application servers
E.
Ability to pick the specific data centers that will host the application servers
Answers
Suggested answer: A, D

A web application is hosted on AWS using an Elastic Load Balancer, multiple Amazon EC2 instances, and Amazon RDS. Which security measures fall under the responsibility of AWS? (Select TWO.)

A.
Running a virus scan on EC2 instances
A.
Running a virus scan on EC2 instances
Answers
B.
Protecting against IP spoofing and packet sniffing
B.
Protecting against IP spoofing and packet sniffing
Answers
C.
Installing the latest security patches on the RDS instance
C.
Installing the latest security patches on the RDS instance
Answers
D.
Encrypting communication between the EC2 instances and the Elastic Load Balancer
D.
Encrypting communication between the EC2 instances and the Elastic Load Balancer
Answers
E.
Configuring a security group and a network access control list (NACL) for EC2 instances
E.
Configuring a security group and a network access control list (NACL) for EC2 instances
Answers
Suggested answer: B, C

Which AWS service can help a company detect an outage of its website servers and redirect users to alternate servers?

A.
Amazon CloudFront
A.
Amazon CloudFront
Answers
B.
Amazon GuardDuty
B.
Amazon GuardDuty
Answers
C.
Amazon Route 53
C.
Amazon Route 53
Answers
D.
AWS Trusted Advisor
D.
AWS Trusted Advisor
Answers
Suggested answer: D

Which of the following are characteristics of a serverless application that runs in the AWS Cloud? (Select TWO.)

A.
Users must manually configure Amazon EC2 instances.
A.
Users must manually configure Amazon EC2 instances.
Answers
B.
Users have a choice of operating systems.
B.
Users have a choice of operating systems.
Answers
C.
The application has built-in fault tolerance.
C.
The application has built-in fault tolerance.
Answers
D.
Users can run Amazon EC2 Spot Instances.
D.
Users can run Amazon EC2 Spot Instances.
Answers
E.
The application can scale based on demand.
E.
The application can scale based on demand.
Answers
Suggested answer: C, E

A company needs to report on events that involve the specific AWS services that the company uses.

Which AWS service or resource can the company use with Amazon CloudWatch to meet this requirement?

A.
Amazon Inspector
A.
Amazon Inspector
Answers
B.
AWS Personal Health Dashboard
B.
AWS Personal Health Dashboard
Answers
C.
AWS Trusted Advisor
C.
AWS Trusted Advisor
Answers
D.
AWS Cloud Trail logs
D.
AWS Cloud Trail logs
Answers
Suggested answer: B

Which of the following are characteristics of AWS WAF? (Select TWO.)

A.
Acts as a firewall that controls inbound and outbound traffic between Amazon EC2 instances
A.
Acts as a firewall that controls inbound and outbound traffic between Amazon EC2 instances
Answers
B.
Acts as a firewall that controls inbound and outbound traffic between subnets
B.
Acts as a firewall that controls inbound and outbound traffic between subnets
Answers
C.
Gives users the ability to block traffic that has specific HTTP headers
C.
Gives users the ability to block traffic that has specific HTTP headers
Answers
D.
Protects websites that are not hosted on AWS
D.
Protects websites that are not hosted on AWS
Answers
E.
Scans Amazon EC2 instances for common vulnerabilities
E.
Scans Amazon EC2 instances for common vulnerabilities
Answers
Suggested answer: B, C

Explanation:

Explanation:

AWS WAF lets you create rules to filter web traffic based on conditions that include IP addresses, HTTP headers and body, or custom URIs. This gives you an additional layer of protection from web attacks that attempt to exploit vulnerabilities in custom or third party web applications. In addition, AWS WAF makes it easy to create rules that block common web exploits like SQL injection and cross site scripting.

AWS WAF allows you to create a centralized set of rules that you can deploy across multiple websites. This means that in an environment with many websites and web applications you can create a single set of rules that you can reuse across applications rather than recreating that rule on every application you want to protect.

Total 944 questions
Go to page: of 95