ExamGecko
Home Home / Amazon / CLF-C01

Amazon CLF-C01 Practice Test - Questions Answers, Page 87

Question list
Search
Search

List of questions

Search

Related questions











Which of the following are characteristics of AWS Regions and Availability Zones? (Select TWO.)

A.
Regions bring AWS services to on-premises facilities.
A.
Regions bring AWS services to on-premises facilities.
Answers
B.
Regions consist of multiple Availability Zones.
B.
Regions consist of multiple Availability Zones.
Answers
C.
An Availability Zone contains several Regions.
C.
An Availability Zone contains several Regions.
Answers
D.
Regions are within 100 km (60 miles) of each other.
D.
Regions are within 100 km (60 miles) of each other.
Answers
E.
Regions are located around the world.
E.
Regions are located around the world.
Answers
Suggested answer: B

Where can AWS users review answers to frequently asked questions about security in the AWS Cloud?

A.
AWS Trusted Advisor
A.
AWS Trusted Advisor
Answers
B.
AWS Knowledge Center
B.
AWS Knowledge Center
Answers
C.
AWS Support Center
C.
AWS Support Center
Answers
D.
AWS Artifact
D.
AWS Artifact
Answers
Suggested answer: B

Explanation:

Explanation: https://aws.amazon.com/premiumsupport/knowledge-center/

Which of the following is an AWS Well-Architected Framework design principle for operational excellence in the AWS Cloud?

A.
Go global in minutes.
A.
Go global in minutes.
Answers
B.
Make frequent, small, reversible changes.
B.
Make frequent, small, reversible changes.
Answers
C.
Implement a strong foundation of identity and access management.
C.
Implement a strong foundation of identity and access management.
Answers
D.
Stop spending money on hardware infrastructure for data center operations.
D.
Stop spending money on hardware infrastructure for data center operations.
Answers
Suggested answer: B

Which AWS services or features provide disaster recovery solutions for Amazon EC2 instances?

(Select TWO.)

A.
EC2 Reserved Instances
A.
EC2 Reserved Instances
Answers
B.
EC2 Amazon Machine Images (AMIs)
B.
EC2 Amazon Machine Images (AMIs)
Answers
C.
Amazon Elastic Block Store (Amazon EBS) snapshots
C.
Amazon Elastic Block Store (Amazon EBS) snapshots
Answers
D.
AWS Shield
D.
AWS Shield
Answers
E.
Amazon GuardDuty
E.
Amazon GuardDuty
Answers
Suggested answer: B, C

Explanation:

Explanation: https://docs.aws.amazon.com/whitepapers/latest/disaster-recovery-workloads-on-aws/disasterrecovery-options-in-the-cloud.html You can back up Amazon EC2 instances used by your workload as Amazon Machine Images (AMIs).

The AMI is created from snapshots of your instance's root volume and any other EBS volumes attached to your instance. You can use this AMI to launch a restored version of the EC2 instance

A company provides Amazon Workspaces to its remote employees. The company wants to prevent employees from using their virtual desktops to visit specific websites that are known to be malicious.

Which AWS service should the company use to meet this requirement?

A.
AWS Shield Advanced
A.
AWS Shield Advanced
Answers
B.
Amazon Route 53
B.
Amazon Route 53
Answers
C.
Amazon GuardDuty
C.
Amazon GuardDuty
Answers
D.
AWS Network Firewall
D.
AWS Network Firewall
Answers
Suggested answer: D

Explanation:

Explanation:

https://aws.amazon.com/blogs/desktop-and-application-streaming/filtering-internet-traffic-fromamazon-workspaces/

AWS Network Firewall extends protection beyond SG- and NACL-levels by protecting at the route level and offering stateless and stateful rules from layers 3 through 7 in the OSI Model. It uses the certificate fully qualified domain name (FQDN) or Server Name Indication (SNI) to determine if a website is allowed for HTTPS traffic. This is a commonly requested security requirement. Reviewing these design examples of AWS Network Firewall will accelerate your migration to Amazon WorkSpaces. AWS Network Firewall is a managed service, with no infrastructure to manage or patch you can simplify operational excellence. Native settings for advanced filtering (including domain name), and network traffic inspection can alert and block traffic related to malware. It also has layer 7 intrusion prevent system (IPS) rules, and the ability to apply TLS fingerprinting to prevent a spoofed IP or FQDN.

A company does not want to rely on elaborate forecasting to determine its usage of compute resources. Instead, the company wants to pay only for the resources that it uses. The company also needs the ability to increase or decrease its resource usage to meet business requirements.

Which pillar of the AWS Well-Architected Framework aligns with these requirements?

A.
Operational excellence
A.
Operational excellence
Answers
B.
Security
B.
Security
Answers
C.
Reliability
C.
Reliability
Answers
D.
Cost optimization
D.
Cost optimization
Answers
Suggested answer: D

Explanation:

Explanation:

Reliability Scale horizontally to increase aggregate workload availability: Replace one large resource with multiple small resources to reduce the impact of a single failure on the overall workload.

Distribute requests across multiple, smaller resources to ensure that they donít share a common point of failure. Stop guessing capacity: A common cause of failure in on-premises workloads is resource saturation, when the demands placed on a workload exceed the capacity of that workload (this is often the objective of denial of service attacks).

Which AWS service should a company use to check for 1AM access keys that have not been rotated recently?

A.
AWSWAF
A.
AWSWAF
Answers
B.
AWS Trusted Advisor
B.
AWS Trusted Advisor
Answers
C.
Amazon Inspector
C.
Amazon Inspector
Answers
D.
AWS Certificate Manager (ACM)
D.
AWS Certificate Manager (ACM)
Answers
Suggested answer: B

Explanation:

Service quotas are the maximum number of resources that you can create in an AWS account. AWS implements quotas to provide highly available and reliable service to all customers, and protects you from unintentional spend. Trusted Advisor will notify you once you reach more than 80% of a service quota. You can then follow recommendations to delete resources or request a quota increase. Explanation:

A company moves a workload to AWS to run on Amazon EC2 instances. The company needs to run the workload in the most cost-effective way. What can the company do to meet this requirement?

A.
Use AWS Key Management Service (AWS KMS).
A.
Use AWS Key Management Service (AWS KMS).
Answers
B.
Use multiple AWS accounts and consolidated billing.
B.
Use multiple AWS accounts and consolidated billing.
Answers
C.
Use AWS CloudFormation to deploy the infrastructure.
C.
Use AWS CloudFormation to deploy the infrastructure.
Answers
D.
Rightsize all the EC2 instances that are used in the deployment.
D.
Rightsize all the EC2 instances that are used in the deployment.
Answers
Suggested answer: D

Which AWS benefit enables users to deploy cloud infrastructure that consists of multiple geographic regions connected by a network with low latency, high throughput, and redundancy?

A.
Economies of scale
A.
Economies of scale
Answers
B.
Security
B.
Security
Answers
C.
Elasticity
C.
Elasticity
Answers
D.
Global reach
D.
Global reach
Answers
Suggested answer: D

A company wants to integrate its online shopping website with social media login credentials. Which AWS service can the company use to make this integration?

A.
AWS Directory Service
A.
AWS Directory Service
Answers
B.
AWS Identity and Access Management (IAM)
B.
AWS Identity and Access Management (IAM)
Answers
C.
Amazon Cognito
C.
Amazon Cognito
Answers
D.
AWS IAM Identity Center (AWS Single Sign-On)
D.
AWS IAM Identity Center (AWS Single Sign-On)
Answers
Suggested answer: C
Total 944 questions
Go to page: of 95