ExamGecko
Home / Amazon / CLF-C01 / List of questions
Ask Question

Amazon CLF-C01 Practice Test - Questions Answers, Page 67

List of questions

Question 661

Report
Export
Collapse

A company stores configuration files in an Amazon S3 bucket. These configuration files must be accessed by applications that are running on Amazon EC2 instances. According to AWS security best practices, how should the company grant permissions to allow the applications to access the S3 bucket?

Use the AWS account root user access keys.
Use the AWS account root user access keys.
Use the AWS access key ID and the EC2 secret access key.
Use the AWS access key ID and the EC2 secret access key.
Use an IAM role with the necessary permissions.
Use an IAM role with the necessary permissions.
Activate multi-factor authentication (MFA) and versioning on the S3 bucket.
Activate multi-factor authentication (MFA) and versioning on the S3 bucket.
Suggested answer: C
asked 16/09/2024
Lawrence Bargers
32 questions

Question 662

Report
Export
Collapse

Which task can a company complete by using AWS Organizations?

Track application deployment statuses globally.
Track application deployment statuses globally.
Remove unused and underutilized AWS resources across all accounts.
Remove unused and underutilized AWS resources across all accounts.
Activate DDoS protection across all accounts.
Activate DDoS protection across all accounts.
Share pre-purchased Amazon EC2 resources across accounts.
Share pre-purchased Amazon EC2 resources across accounts.
Suggested answer: C

Explanation:


asked 16/09/2024
sushil divate
35 questions

Question 663

Report
Export
Collapse

Which of the following is an AWS key-value database offering consistent single-digit millisecond performance at any scale?

Amazon RDS
Amazon RDS
Amazon Aurora
Amazon Aurora
Amazon DynamoDB
Amazon DynamoDB
Amazon Redshift
Amazon Redshift
Suggested answer: B
asked 16/09/2024
Donovan Rodriguez
31 questions

Question 664

Report
Export
Collapse

Who can create and manage access keys for an AWS account root user?

The AWS account owner
The AWS account owner
An IAM user that has administrator permissions
An IAM user that has administrator permissions
IAM users within a designated group
IAM users within a designated group
An IAM user that has the required role
An IAM user that has the required role
Suggested answer: A

Explanation:

Explanation:

Anyone who has root user credentials for your AWS account has unrestricted access to all the resources in your account, including billing information. When you create access keys, you create the access key ID and secret access key as a set.

asked 16/09/2024
Tarun Sharma
45 questions

Question 665

Report
Export
Collapse

A retail company is building a new mobile app. The company is evaluating whether to build the app at an on-premises data center or in the AWS Cloud. Which of the following are benefits of building this app in the AWS Cloud? (Select TWO.)

A large, upfront capital expense and low variable expenses
A large, upfront capital expense and low variable expenses
Increased speed for trying out new projects
Increased speed for trying out new projects
Complete control over the physical security of the infrastructure
Complete control over the physical security of the infrastructure
Flexibility to scale up in minutes as the application becomes popular
Flexibility to scale up in minutes as the application becomes popular
Ability to pick the specific data centers that will host the application servers
Ability to pick the specific data centers that will host the application servers
Suggested answer: A, D
asked 16/09/2024
Juliet Kihonge
43 questions

Question 666

Report
Export
Collapse

A web application is hosted on AWS using an Elastic Load Balancer, multiple Amazon EC2 instances, and Amazon RDS. Which security measures fall under the responsibility of AWS? (Select TWO.)

Running a virus scan on EC2 instances
Running a virus scan on EC2 instances
Protecting against IP spoofing and packet sniffing
Protecting against IP spoofing and packet sniffing
Installing the latest security patches on the RDS instance
Installing the latest security patches on the RDS instance
Encrypting communication between the EC2 instances and the Elastic Load Balancer
Encrypting communication between the EC2 instances and the Elastic Load Balancer
Configuring a security group and a network access control list (NACL) for EC2 instances
Configuring a security group and a network access control list (NACL) for EC2 instances
Suggested answer: B, C
asked 16/09/2024
Jorge Diaz
35 questions

Question 667

Report
Export
Collapse

Which AWS service can help a company detect an outage of its website servers and redirect users to alternate servers?

Amazon CloudFront
Amazon CloudFront
Amazon GuardDuty
Amazon GuardDuty
Amazon Route 53
Amazon Route 53
AWS Trusted Advisor
AWS Trusted Advisor
Suggested answer: D
asked 16/09/2024
Lethabane Reuben
33 questions

Question 668

Report
Export
Collapse

Which of the following are characteristics of a serverless application that runs in the AWS Cloud? (Select TWO.)

Users must manually configure Amazon EC2 instances.
Users must manually configure Amazon EC2 instances.
Users have a choice of operating systems.
Users have a choice of operating systems.
The application has built-in fault tolerance.
The application has built-in fault tolerance.
Users can run Amazon EC2 Spot Instances.
Users can run Amazon EC2 Spot Instances.
The application can scale based on demand.
The application can scale based on demand.
Suggested answer: C, E
asked 16/09/2024
Jeff Sonola
35 questions

Question 669

Report
Export
Collapse

A company needs to report on events that involve the specific AWS services that the company uses.

Which AWS service or resource can the company use with Amazon CloudWatch to meet this requirement?

Amazon Inspector
Amazon Inspector
AWS Personal Health Dashboard
AWS Personal Health Dashboard
AWS Trusted Advisor
AWS Trusted Advisor
AWS Cloud Trail logs
AWS Cloud Trail logs
Suggested answer: B
asked 16/09/2024
null null
40 questions

Question 670

Report
Export
Collapse

Which of the following are characteristics of AWS WAF? (Select TWO.)

Acts as a firewall that controls inbound and outbound traffic between Amazon EC2 instances
Acts as a firewall that controls inbound and outbound traffic between Amazon EC2 instances
Acts as a firewall that controls inbound and outbound traffic between subnets
Acts as a firewall that controls inbound and outbound traffic between subnets
Gives users the ability to block traffic that has specific HTTP headers
Gives users the ability to block traffic that has specific HTTP headers
Protects websites that are not hosted on AWS
Protects websites that are not hosted on AWS
Scans Amazon EC2 instances for common vulnerabilities
Scans Amazon EC2 instances for common vulnerabilities
Suggested answer: B, C

Explanation:

Explanation:

AWS WAF lets you create rules to filter web traffic based on conditions that include IP addresses, HTTP headers and body, or custom URIs. This gives you an additional layer of protection from web attacks that attempt to exploit vulnerabilities in custom or third party web applications. In addition, AWS WAF makes it easy to create rules that block common web exploits like SQL injection and cross site scripting.

AWS WAF allows you to create a centralized set of rules that you can deploy across multiple websites. This means that in an environment with many websites and web applications you can create a single set of rules that you can reuse across applications rather than recreating that rule on every application you want to protect.

asked 16/09/2024
David Kimovec
33 questions
Total 944 questions
Go to page: of 95
Search