ExamGecko
Home Home / Amazon / CLF-C02

Amazon CLF-C02 Practice Test - Questions Answers, Page 10

Question list
Search
Search

Related questions











A security engineer wants a single-tenant AWS solution to create, control, and manage their own cryptographic keys to meet regulatory compliance requirements for data security.

Which AWS service should the engineer use?

A.
AWS Key Management Service (AWS KMS)
A.
AWS Key Management Service (AWS KMS)
Answers
B.
AWS Certificate Manager (ACM)
B.
AWS Certificate Manager (ACM)
Answers
C.
AWS CloudHSM
C.
AWS CloudHSM
Answers
D.
AWS Systems Manager
D.
AWS Systems Manager
Answers
Suggested answer: C

Explanation:

The correct answer is C because AWS CloudHSM is an AWS service that enables the security engineer to meet the requirements. AWS CloudHSM is a service that provides customers with dedicated hardware security modules (HSMs) to create, control, and manage their own cryptographic keys in the AWS Cloud. AWS CloudHSM allows customers to meet strict regulatory compliance requirements for data security, such as FIPS 140-2 Level 3, PCI-DSS, and HIPAA. The other options are incorrect because they are not AWS services that enable the security engineer to meet the requirements. AWS Key Management Service (AWS KMS) is a service that provides customers with a fully managed, scalable, and integrated key management system to create and control encryption keys for AWS services and applications. AWS KMS does not provide customers with single-tenant or dedicated HSMs. AWS Certificate Manager (ACM) is a service that provides customers with a simple and secure way to provision, manage, and deploy public and private Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services and internal connected resources. ACM does not provide customers with HSMs or cryptographic keys. AWS Systems Manager is a service that provides customers with a unified user interface to view operational data from multiple AWS services and automate operational tasks across their AWS resources. AWS Systems Manager does not provide customers with HSMs or cryptographic keys.

Reference: AWS CloudHSM FAQs

Which tasks are the responsibility of AWS, according to the AWS shared responsibility model? (Select TWO.)

A.
Patch AWS network devices.
A.
Patch AWS network devices.
Answers
B.
Set user password rules.
B.
Set user password rules.
Answers
C.
Provide physical security for compute resources.
C.
Provide physical security for compute resources.
Answers
D.
Configure security groups.
D.
Configure security groups.
Answers
E.
Patch the operating system of an Amazon EC2 instance.
E.
Patch the operating system of an Amazon EC2 instance.
Answers
Suggested answer: A, C

Explanation:

The correct answers are A and C because patching AWS network devices and providing physical security for compute resources are tasks that are the responsibility of AWS, according to the AWS shared responsibility model. The AWS shared responsibility model is a framework that defines the division of responsibilities between AWS and the customer for security and compliance. AWS is responsible for the security of the cloud, which includes the global infrastructure, such as the regions, availability zones, and edge locations; the hardware, software, networking, and facilities that run the AWS services; and the virtualization layer that separates the customer instances and storage.

The customer is responsible for the security in the cloud, which includes the customer data, the guest operating systems, the applications, the identity and access management, the firewall configuration, and the encryption. The other options are incorrect because they are tasks that are the responsibility of the customer, according to the AWS shared responsibility model. Setting user password rules, configuring security groups, and patching the operating system of an Amazon EC2 instance are all tasks that the customer has to perform to secure their AWS environment. Reference: AWS Shared Responsibility Model

Which AWS service or feature captures information about the network traffic to and from an Amazon EC2 instance?

A.
VPC Reachability Analyzer
A.
VPC Reachability Analyzer
Answers
B.
Amazon Athena
B.
Amazon Athena
Answers
C.
VPC Flow Logs
C.
VPC Flow Logs
Answers
D.
AWS X-Ray
D.
AWS X-Ray
Answers
Suggested answer: C

Explanation:

The correct answer is C because VPC Flow Logs is an AWS service or feature that captures information about the network traffic to and from an Amazon EC2 instance. VPC Flow Logs is a feature that enables customers to capture information about the IP traffic going to and from network interfaces in their VPC. VPC Flow Logs can help customers to monitor and troubleshoot connectivity issues, such as traffic not reaching an instance or traffic being rejected by a security group. The other options are incorrect because they are not AWS services or features that capture information about the network traffic to and from an Amazon EC2 instance. VPC Reachability Analyzer is an AWS service or feature that enables customers to perform connectivity testing between resources in their VPC and identify configuration issues that prevent connectivity. Amazon Athena is an AWS service that enables customers to query data stored in Amazon S3 using standard SQL. AWS X-Ray is an AWS service that enables customers to analyze and debug distributed applications, such as those built using a microservices architecture. Reference: VPC Flow Logs

Which of the following are pillars of the AWS Well-Architected Framework? (Select TWO.)

A.
Availability
A.
Availability
Answers
B.
Reliability
B.
Reliability
Answers
C.
Scalability
C.
Scalability
Answers
D.
Responsive design
D.
Responsive design
Answers
E.
Operational excellence
E.
Operational excellence
Answers
Suggested answer: B, E

Explanation:

The correct answers to the questions are B and E because reliability and operational excellence are pillars of the AWS Well-Architected Framework. The AWS Well-Architected Framework is a set of best practices and guidelines for designing and operating reliable, secure, efficient, and cost-effective systems in the cloud. The AWS Well-Architected Framework consists of five pillars: operational excellence, security, reliability, performance efficiency, and cost optimization. Each pillar has a set of design principles that describe the characteristics of a well-architected system. Reliability is the pillar that focuses on the ability of a system to recover from failures and meet business and customer demand. Operational excellence is the pillar that focuses on the ability of a system to run and monitor processes that support business outcomes and continually improve. The other options are incorrect because they are not pillars of the AWS Well-Architected Framework. Availability, scalability, and responsive design are important aspects of cloud architecture, but they are not separate pillars in the framework. Availability and scalability are related to the reliability and performance efficiency pillars, while responsive design is related to the customer experience and user interface. Reference: AWS Well-Architected Framework

Which tasks are customer responsibilities according to the AWS shared responsibility model? (Select TWO.)

A.
Determine application dependencies with operating systems.
A.
Determine application dependencies with operating systems.
Answers
B.
Provide user access with AWS Identity and Access Management (1AM).
B.
Provide user access with AWS Identity and Access Management (1AM).
Answers
C.
Secure the data center in an Availability Zone.
C.
Secure the data center in an Availability Zone.
Answers
D.
Patch the hypervisor.
D.
Patch the hypervisor.
Answers
E.
Provide network availability in Availability Zones.
E.
Provide network availability in Availability Zones.
Answers
Suggested answer: B

Explanation:

The correct answer to the question is B because providing user access with AWS Identity and Access Management (IAM) is a customer responsibility according to the AWS shared responsibility model.

The AWS shared responsibility model is a framework that defines the division of responsibilities between AWS and the customer for security and compliance. AWS is responsible for the security of the cloud, which includes the global infrastructure, such as the regions, availability zones, and edge locations; the hardware, software, networking, and facilities that run the AWS services; and the virtualization layer that separates the customer instances and storage. The customer is responsible for the security in the cloud, which includes the customer data, the guest operating systems, the applications, the identity and access management, the firewall configuration, and the encryption.

IAM is an AWS service that enables customers to manage access and permissions to AWS resources and services. Customers are responsible for creating and managing IAM users, groups, roles, and policies, and ensuring that they follow the principle of least privilege. Reference: AWS Shared Responsibility Model

A user wants to identify any security group that is allowing unrestricted incoming SSH traffic.

Which AWS service can be used to accomplish this goal?

A.
Amazon Cognito
A.
Amazon Cognito
Answers
B.
AWS Shield
B.
AWS Shield
Answers
C.
Amazon Macie
C.
Amazon Macie
Answers
D.
AWS Trusted Advisor
D.
AWS Trusted Advisor
Answers
Suggested answer: D

Explanation:

The correct answer to the question is D because AWS Trusted Advisor is an AWS service that can be used to accomplish the goal of identifying any security group that is allowing unrestricted incoming SSH traffic. AWS Trusted Advisor is a service that provides customers with recommendations that help them follow AWS best practices. Trusted Advisor evaluates the customer's AWS environment and identifies ways to optimize their AWS infrastructure, improve security and performance, reduce costs, and monitor service quotas. One of the checks that Trusted Advisor performs is the Security Groups - Specific Ports Unrestricted check, which flags security groups that allow unrestricted access to specific ports, such as port 22 for SSH. Customers can use this check to review and modify their security group rules to restrict SSH access to only authorized sources. Reference: Security Groups -Specific Ports Unrestricted

Which AWS feature or resource is a deployable Amazon EC2 instance template that is prepackaged with software and security requirements?

A.
Amazon Elastic Block Store (Amazon EBS) volume
A.
Amazon Elastic Block Store (Amazon EBS) volume
Answers
B.
AWS CloudFormation template
B.
AWS CloudFormation template
Answers
C.
Amazon Elastic Block Store (Amazon EBS) snapshot
C.
Amazon Elastic Block Store (Amazon EBS) snapshot
Answers
D.
Amazon Machine Image (AMI)
D.
Amazon Machine Image (AMI)
Answers
Suggested answer: D

Explanation:

: An Amazon Machine Image (AMI) is a deployable Amazon EC2 instance template that is prepackaged with software and security requirements. It provides the information required to launch an instance, which is a virtual server in the cloud. You can use an AMI to launch as many instances as you need. You can also create your own custom AMIs or use AMIs shared by other AWS users1.

Which AWS service is a highly available and scalable DNS web service?

A.
Amazon VPC
A.
Amazon VPC
Answers
B.
Amazon CloudFront
B.
Amazon CloudFront
Answers
C.
Amazon Route 53
C.
Amazon Route 53
Answers
D.
Amazon Connect
D.
Amazon Connect
Answers
Suggested answer: C

Explanation:

Amazon Route 53 is a highly available and scalable DNS web service. It is designed to give developers and businesses an extremely reliable and cost-effective way to route end users to Internet applications by translating domain names into the numeric IP addresses that computers use to connect to each other2. Amazon Route 53 also offers other features such as health checks, traffic management, domain name registration, and DNSSEC3.

Which of the following is a characteristic of the AWS account root user?

A.
The root user is the only user that can be configured with multi-factor authentication (MFA).
A.
The root user is the only user that can be configured with multi-factor authentication (MFA).
Answers
B.
The root user is the only user that can access the AWS Management Console.
B.
The root user is the only user that can access the AWS Management Console.
Answers
C.
The root user is the first sign-in identity that is available when an AWS account is created.
C.
The root user is the first sign-in identity that is available when an AWS account is created.
Answers
D.
The root user has a password that cannot be changed.
D.
The root user has a password that cannot be changed.
Answers
Suggested answer: C

Explanation:

The AWS account root user is the first sign-in identity that is available when an AWS account is created. It has complete access to all AWS services and resources in the account. The root user email address and password are the same credentials that are used to sign in to the AWS Management Console4. The root user should be used only to perform a few account and service management tasks. For day-to-day tasks, it is recommended to use AWS Identity and Access Management (IAM) users or roles instead.

Which AWS service provides the ability to host a NoSQL database in the AWS Cloud?

A.
Amazon Aurora
A.
Amazon Aurora
Answers
B.
Amazon DynamoDB
B.
Amazon DynamoDB
Answers
C.
Amazon RDS
C.
Amazon RDS
Answers
D.
Amazon Redshift
D.
Amazon Redshift
Answers
Suggested answer: B

Explanation:

Amazon DynamoDB is a fully managed NoSQL database service that provides fast and predictable performance with seamless scalability. It supports both key-value and document data models, and allows you to create tables that can store and retrieve any amount of data, and serve any level of request traffic. You can also use DynamoDB Streams to capture data modification events in DynamoDB tables.

Total 789 questions
Go to page: of 79