ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 394 - SAP-C02 discussion

Report
Export

A company wants to migrate its website from an on-premises data center onto AWS. At the same time, it wants to migrate the website to a containerized microservice-based architecture to improve the availability and cost efficiency. The company's security policy states that privileges and network permissions must be configured according to best practice, using least privilege.

A Solutions Architect must create a containerized architecture that meets the security requirements and has deployed the application to an Amazon ECS cluster.

What steps are required after the deployment to meet the requirements? (Choose two.)

A.
Create tasks using the bridge network mode.
Answers
A.
Create tasks using the bridge network mode.
B.
Create tasks using the awsvpc network mode.
Answers
B.
Create tasks using the awsvpc network mode.
C.
Apply security groups to Amazon EC2 instances, and use IAM roles for EC2 instances to access other resources.
Answers
C.
Apply security groups to Amazon EC2 instances, and use IAM roles for EC2 instances to access other resources.
D.
Apply security groups to the tasks, and pass IAM credentials into the container at launch time to access other resources.
Answers
D.
Apply security groups to the tasks, and pass IAM credentials into the container at launch time to access other resources.
E.
Apply security groups to the tasks, and use IAM roles for tasks to access other resources.
Answers
E.
Apply security groups to the tasks, and use IAM roles for tasks to access other resources.
Suggested answer: B, E

Explanation:

awsvpc network mode

Task networking with the awsvpc network mode

Security groups for your VPC

IAM roles for tasks

Best practices for managing AWS access keys

asked 16/09/2024
Sergey Aleksandrov
50 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first