Topic 3: Exam Pool C
A company needs to store infrequently used data for data archives and long-term backups. A company needs a history report about how its Amazon EC2 instances were modified last month.
Which AWS service can be used to meet this requirement?
A. AWS Service Catalog
B. AWS Config
C. Amazon CloudWatch
Explanation:
AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources. AWS Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations. AWS Config can also track changes to your EC2 instances over time and provide a history report of the modifications. AWS Service Catalog, Amazon CloudWatch, and AWS Artifact are not the best services to meet this requirement. AWS Service Catalog is a service that allows you to create and manage catalogs of IT services that are approved for use on AWS. Amazon CloudWatch is a service that monitors your AWS resources and applications and provides metrics, alarms, dashboards, and logs. AWS Artifact is a service that provides on-demand access to AWS security and compliance reports and online agreements
A company wants to migrate its server-based applications to the AWS Cloud. The company wants to determine the total cost of ownership for its compute resources that will be hosted on the AWS Cloud. Which combination of AWS services or tools will meet these requirements?
A. AWS Pricing Calculator
B. Migration Evaluator
C. AWS Support Center
D. AWS Application Discovery Service
E. AWS Database Migration Service (AWS DMS)
Explanation:
AWS Pricing Calculator and AWS Application Discovery Service are the best combination of AWS services or tools to meet the requirements of determining the total cost of ownership for compute resources that will be hosted on the AWS Cloud. AWS Pricing Calculator is a tool that enables you to estimate the cost of using AWS services based on your usage scenarios and requirements. You can use AWS Pricing Calculator to compare the costs of running your applications on-premises or on AWS, and to optimize your AWS spending. AWS Application Discovery Service is a service that helps you plan your migration to the AWS Cloud by collecting and analyzing information about your on-premises servers, applications, and dependencies. You can use AWS Application Discovery Service to identify the inventory of your on-premises infrastructure, group servers by applications, and estimate the performance and resource utilization of your applications45
A company runs a legacy workload in an on-premises data center. The company wants to migrate the workload to AWS. The company does not want to make any changes to the workload. Which migration strategy should the company use?
A. Repurchase
B. Replatform
C. Rehost
D. Refactor
Explanation:
The Rehost migration strategy, often referred to as “lift-and-shift,” involves moving applications to the cloud with minimal or no modifications. This approach is suitable when a company wants to migrate legacy workloads to AWS without altering them. Other strategies, such as Repurchase, Replatform, and Refactor, involve making changes to the application or adopting different services, which is not aligned with the requirement to avoid modifications.
Which option is a customer responsibility when using Amazon DynamoDB under the AWS Shared Responsibility Model?
A. Physical security of DynamoDB
B. Patching of DynamoDB
C. Access to DynamoDB tables
D. Encryption of data at rest in DynamoDB
Explanation:
According to the AWS Shared Responsibility Model, AWS is responsible for the security of the cloud, while the customer is responsible for the security in the cloud. This means that AWS is responsible for protecting the infrastructure that runs AWS services, such as DynamoDB, while the customer is responsible for properly configuring the security of the provided service. For abstracted services, such as DynamoDB, the customer is primarily responsible for managing their data, classifying their assets, and using IAM tools to apply the appropriate permissions12.
Therefore, the customer is responsible for controlling the access to DynamoDB tables, such as by creating IAM policies, roles, and users, and using encryption and authentication mechanisms3. References:
Shared Responsibility Model - Amazon Web Services (AWS)
Security and compliance in Amazon DynamoDB - Amazon DynamoDB
What is Shared Responsibility Model? - Check Point Software
A systems administrator created a new 1AM user for a developer and assigned the user an access key instead of a user name and password. What is the access key used for?
A. To access the AWS account as the AWS account root user
B. To access the AWS account through the AWS Management Console
C. To access the AWS account through a CLI
D. To access all of a company's AWS accounts
Explanation:
An access key is a pair of long-term credentials that consists of an access key ID and a secret access key. An access key is used to sign programmatic requests to the AWS CLI or AWS API (directly or using the AWS SDK). An access key allows a user to access the AWS account through a CLI, which is a tool that enables users to interact with AWS services using commands in a terminal or a script12.
The other options are not correct, because:
To access the AWS account as the AWS account root user, a user needs the email address and password associated with the account. The root user has complete access to all AWS resources and services in the account. However, it is not recommended to use the root user for everyday tasks3.
To access the AWS account through the AWS Management Console, a user needs a user name and password. The console is a web-based interface that allows users to manage their AWS resources and services using a graphical user interface4.
To access all of a company’s AWS accounts, a user needs to use AWS Organizations, which is a service that enables users to centrally manage and govern multiple AWS accounts. AWS Organizations allows users to create groups of accounts and apply policies to them5.
References:
Managing access keys for IAM users - AWS Identity and Access Management
What Is the AWS Command Line Interface? - AWS Command Line Interface
AWS account root user - AWS Identity and Access Management
What Is the AWS Management Console? - AWS Management Console
What Is AWS Organizations? - AWS Organizations
Page 4 out of 157 Pages |
Previous |