Amazon CLF-C01 Practice Test - Questions Answers, Page 32
List of questions
Question 311

A user wants to identify any security group that is allowing unrestricted incoming SSH traffic Which AWS service can be used to accomplish this goal?
Question 312

A solutions architect needs to create a cost estimate for running workloads on AWS. The cost estimate must then be exported tor management review
Which AWS service or feature should be used to accomplish these tasks?
Question 313

Which AWS service automatically handles application health monitoring?
Question 314

Which AWS service gives users the ability to find, buy, and immediately start using third-party software solutions in their AWS environments?
Question 315

Which of the following security resources are supplied by AWS? (Select TWO.)
Question 316

Which of the following are benefits of using AWS Trusted Advisor? (Choose two.)
Explanation:
Explanation:
Reference: https://aws.amazon.com/about-aws/whats-new/2016/06/aws-support-enables-tagging-capabilitiesfor-trusted-advisor/
Question 317

A company's information security manager is supervising a move to AWS and wants to ensure that AWS best practices are followed. The manager has concerns about the potential misuse of AWS account root user credentials. Which of the following is an AWS best practice for using the AWS account root user credentials?
Question 318

A company is building a web application and needs to test the application across different mobile devices and desktop browsers Which AWS service should the company use for this testing?
Question 319

A company wants to build an application for a new line of business.
According to the AWS Welt-Architected Framework, what design principles should be implemented?
(Select TWO.)
Question 320

Which actions should a company take to avoid failure in an AWS architecture design? (Select TWO)
Question