Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Amazon Web Services AWS Certified Foundational CLF-C02 Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 161-180 out of questions
Questions # 161:

Which AWS service gives users the ability to discover and protect sensitive data that is stored in Amazon S3 buckets?

Options:

A.

Amazon Macie


B.

Amazon Detective


C.

Amazon GuardDuty


D.

AWS I AM Access Analyzer


Expert Solution
Questions # 162:

Which option is a perspective that includes foundational capabilities of the AWS Cloud Adoption Framework (AWS CAF)?

Options:

A.

Sustainability


B.

Operations


C.

Performance efficiency


D.

Reliability


Expert Solution
Questions # 163:

Which tasks are the customer's responsibility, according to the AWS shared responsibility model? (Select TWO.)

Options:

A.

Establish the global infrastructure.


B.

Perform client-side data encryption.


C.

Configure 1AM credentials.


D.

Secure edge locations.


E.

Patch Amazon RDS DB instances.


Expert Solution
Questions # 164:

Which of the following is a fully managed graph database service on AWS?

Options:

A.

Amazon Aurora


B.

Amazon FSx


C.

Amazon DynamoDB


D.

Amazon Neptune


Expert Solution
Questions # 165:

A company wants to automatically add and remove Amazon EC2 instances. The company wants the EC2 instances to adjust to varying workloads dynamically.

Which service or feature will meet these requirements?

Options:

A.

Amazon DynamoDB


B.

Amazon EC2 Spot Instances


C.

AWS Snow Family


D.

Amazon EC2 Auto Scaling


Expert Solution
Questions # 166:

A company has a compute workload that is steady, predictable, and uninterruptible.

Which Amazon EC2 instance purchasing options meet these requirements MOST cost-effectively? (Select TWO.)

Options:

A.

On-Demand Instances


B.

Reserved Instances


C.

Spot Instances


D.

Saving Plans


E.

Dedicated Hosts


Expert Solution
Questions # 167:

Which AWS Cloud design principle is a company using when the company implements AWS CloudTrail?

Options:

A.

Activate traceability.


B.

Use serverless compute architectures.


C.

Perform operations as code.


D.

Go global in minutes.


Expert Solution
Questions # 168:

A user wants to allow applications running on an Amazon EC2 instance to make calls to other AWS services. The access granted must be secure. Which AWS service or feature should be used?

Options:

A.

Security groups


B.

AWS Firewall Manager


C.

IAM roles


D.

IAM user SSH keys


Expert Solution
Questions # 169:

A company wants a cost-effective option when running its applications in an Amazon EC2 instance for short time periods. The applications can be interrupted.

Which EC2 instance type will meet these requirements?

Options:

A.

Spot Instances


B.

On-Demand Instances


C.

Reserved Instances


D.

Dedicated Instances


Expert Solution
Questions # 170:

Which AWS service or resource provides answers to the most frequently askedsecurity-related questions that AWS receives from its users'?

Options:

A.

AWS Artifact


B.

Amazon Connect


C.

AWS Chatbot


D.

AWS Knowledge Center


Expert Solution
Questions # 171:

Which task is the customer's responsibility, according to the AWS shared responsibility model?

Options:

A.

Maintain the security of the AWS Cloud.


B.

Configure firewalls and networks.


C.

Patch the operating system of Amazon RDS instances.


D.

Implement physical and environmental controls.


Expert Solution
Questions # 172:

Which programming languages does AWS Cloud Development Kit (AWS CDK) currently support? (Select TWO.)

Options:

A.

Python


B.

Swift


C.

TypeScript


D.

Ruby


E.

PHP


Expert Solution
Questions # 173:

A company is using Amazon DynamoDB.

Which task is the company's responsibility, according to the AWS shared responsibility model?

Options:

A.

Patch the operating system


B.

Provision hosts


C.

Manage database access permissions.


D.

Secure the operating system


Expert Solution
Questions # 174:

A company wants durable storage for static content and infinitely scalable data storage infrastructure at the lowest cost.

Which AWS service should the company choose?

Options:

A.

Amazon Elastic Block Store (Amazon EBS)


B.

Amazon S3


C.

AWS Storage Gateway


D.

Amazon Elastic File System (Amazon EFS)


Expert Solution
Questions # 175:

A developer needs to maintain a development environment infrastructure and a production environment infrastructure in a repeatable fashion Which AWS service should the developer use to meet these requirements?

Options:

A.

AWS Ground Station


B.

AWS Shield


C.

AWS loT Device Defender


D.

AWS CloudFormation


Expert Solution
Questions # 176:

A company Is designing its AWS workloads so that components can be updated regularly and so that changes can be made in small, reversible increments.

Which pillar of the AWS Well-Architected Framework does this design support?

Options:

A.

Security


B.

Performance efficiency


C.

Operational excellence


D.

Reliability


Expert Solution
Questions # 177:

Which AWS service can run a managed PostgreSQL database that provides online transaction processing (OLTP)?

Options:

A.

Amazon DynamoDB


B.

Amazon Athena


C.

Amazon RDS


D.

Amazon EMR


Expert Solution
Questions # 178:

A company wants to provision and manage its AWS infrastructure by using the common programming languages TypeScript, Python, Java, and .NET. Which h AWS service will meet this requirement?

Options:

A.

AWS CodeBuild


B.

AWS CloudFormation


C.

AWSCLI


D.

AWS Cloud Development Kit (AWS CDK)


Expert Solution
Questions # 179:

Which pricing model will interrupt a running Amazon EC2 instance if capacity becomes temporarily unavailable?

Options:

A.

On-Demand Instances


B.

Standard Reserved Instances


C.

Spot Instances


D.

Convertible Reserved Instances


Expert Solution
Questions # 180:

Using AWS Identity and Access Management (IAM) to grant access only to the resources needed to perform a task is a concept known as:

Options:

A.

restricted access.


B.

as-needed access.


C.

least privilege access.


D.

token access.


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 161-180 out of questions