Amazon CLF-C01 Practice Test - Questions Answers, Page 88
List of questions
Related questions
A company wants to improve its security and audit posture by limiting Amazon EC2 inbound access.
What should the company use to access instances remotely instead of opening inbound SSH ports and managing SSH keys?
An application that is hosted on Amazon EC2 has a steady and consistent workload. The application will operate for at least 1 year. What is the MOST cost-effective instance purchasing option to meet these requirements?
A company is building a business intelligence solution using Amazon Redshift. The company wants to use an AWS service to create interactive dashboards and not pay any upfront costs for it. Which service should the company use?
Which AWS service is a cloud security posture management (CSPM) service that aggregates alerts from various AWS services and partner products in a standardized format?
A company needs an AWS design solution for a distributed system. The system's components need to be set up so that one system component cannot negatively impact another component. Which AWS architectural best practice will meet this requirement?
A company is building AWS architecture to deliver real-time data feeds from an on-premises data center into an application that runs on AWS. The company needs a consistent network connection with minimal latency. What should the company use to connect the application and the data center to meet these requirements?
Which characteristic of the AWS Cloud helps users eliminate underutilized CPU capacity?
A company wants the ability to accommodate peak application usage without purchasing equipment for on-premises data centers. Which AWS Cloud benefit is the company seeking?
Which AWS services use cloud-native storage that provides replication across multiple Availability Zones by default? (Choose two.)
A company has a serverless application that includes an Amazon API Gateway API, an AWS Lambda function, and an Amazon DynamoDB database. Which AWS service can the company use to trace user requests as they move through the application's components?
Question