Topic 4: Exam Pool D
Which AWS service can a company use to manage encryption keys in the cloud?
A. AWS License Manager
B. AWS Certificate Manager (ACM)
C. AWS CloudHSM
D. AWS Directory Service
Explanation: AWS CloudHSM provides hardware-based key management to manage and protect encryption keys in the AWS Cloud. It allows customers to generate and use their own encryption keys while complying with rigorous security requirements. While AWS Certificate Manager (ACM) manages SSL/TLS certificates, it does not handle encryption keys independently, and AWS License Manager and AWS Directory Service are not designed for managing encryption keys. AWS KMS is also relevant for key management but wasn't listed as an option in this question.
Which AWS service or feature identifies whether an Amazon S3 bucket or an IAM role has been shared with an external entity?
A. AWS Service Catalog
B. AWS Systems Manager
C. AWS IAM Access Analyzer
D. AWS Organizations
Explanation: AWS IAM Access Analyzer is a service that helps you identify the resources in your organization and accounts, such as Amazon S3 buckets or IAM roles, that are shared with an external entity. This lets you identify unintended access to your resources and data, which is a security risk. IAM Access Analyzer uses logic-based reasoning to analyze the resource-based policies in your AWS environment. For each instance of a resource shared outside of your account, IAM Access Analyzer generates a finding. Findings include information about the access and the external principal granted to it345.
At what support level do users receive access to a support concierge?
A. Basic Support
B. Developer Support
C. Business Support
D. Enterprise Support
Explanation: Users receive access to a support concierge at the Enterprise Support level. A support concierge is a team of AWS billing and account experts that specialize in working with enterprise accounts. They can help users with billing and account inquiries, cost optimization, FinOps support, cost analysis, and prioritized answers to billing questions. The support concierge is included as part of the Enterprise Support plan, which also provides access to a Technical Account Manager (TAM), Infrastructure Event Management, AWS Trusted Advisor, and 24/7 technical support.
A company is migrating its workloads to the AWS Cloud. The company must retain full control of patch management for the guest operating systems that host its applications. Which AWS service should the company use to meet these requirements?
A. Amazon DynamoDB
B. Amazon EC2
C. AWS Lambda
D. Amazon RDS
Explanation: Amazon EC2 is the AWS service that the company should use to meet its requirements of retaining full control of patch management for the guest operating systems that host its applications. Amazon EC2 is a service that provides secure, resizable compute capacity in the cloud. Users can launch virtual servers, called instances, that run various operating systems, such as Linux, Windows, macOS, and more. Users have full administrative access to their instances and can install and configure any software, including patches and updates, on their instances. Users are responsible for managing the security and maintenance of their instances, including patching the guest operating system and applications. Users can also use AWS Systems Manager to automate and simplify the patching process for their EC2 instances. AWS Systems Manager is a service that helps users manage their AWS and on-premises resources at scale. Users can use AWS Systems Manager Patch Manager to scan their instances for missing patches, define patch baselines and maintenance windows, and apply patches automatically or manually across their instances. Users can also use AWS Systems Manager to monitor the patch compliance status and patching history of their instances.
A company is migrating its data center to AWS. The company needs an AWS Support plan that provides chat access to a cloud sup engineer 24 hours a day, 7 days a week. The company does not require access to infrastructure event management. What is the MOST cost-effective AWS Support plan that meets these requirements?
A. AWS Enterprise Support
B. AWS Business Support
C. AWS Developer Support
D. AWS Basic Support
Explanation: AWS Business Support is the most cost-effective AWS Support plan that provides chat access to a cloud support engineer 24/7. AWS Business Support also offers phone and email support, as well as a response time of less than one hour for urgent issues. AWS Business Support does not include access to infrastructure event management, which is a feature of AWS Enterprise Support. AWS Enterprise Support is more expensive and provides additional benefits, such as a technical account manager, a support concierge, and a response time of less than 15 minutes for critical issues. AWS Developer Support and AWS Basic Support do not provide chat access to a cloud support engineer. AWS Developer Support provides email support and a response time of less than 12 hours for general guidance issues. AWS Basic Support provides customer service and account support, as well as access to forums and documentation1
Which AWS Cloud service can send alerts to customers if custom spending thresholds are exceeded?
A. AWS Budgets
B. AWS Cost Explorer
C. AWS Cost Allocation Tags
D. AWS Organizations
Explanation: AWS Budgets is a service that allows you to set custom budgets for your AWS costs and usage, and receive alerts via email or Amazon SNS notifications if you exceed or are forecasted to exceed your budgeted amount1. You can create budgets based on different dimensions, such as service, linked account, tag, or purchase option, and define various types of alerts, such as actual, forecasted, or RI utilization alerts2. You can also configure custom actions to automatically execute remediation tasks or workflows when a budget threshold is breached3. AWS Budgets is the only service among the options that can send alerts to customers if custom spending thresholds are exceeded. The other options are not AWS services that provide this functionality.
A company has a client that uses an Amazon RDS database. The client requests Information about operating system-level upgrades on the AWS resources that host the RDS database. The company employs a third-party provider to monitor the RDS database. Who is responsible for upgrading the operating systems for Amazon RDS under the AWS shared responsibility model?
A. The client
B. The company
C. AWS
D. The third-party provider
Explanation: Under the AWS shared responsibility model, AWS is responsible for managing the underlying infrastructure, including operating system-level updates on managed services like Amazon RDS. Customers are responsible for managing the database instance and configurations, but AWS handles OS updates for the infrastructure supporting RDS.
A company wants to quickly implement a continuous integration/continuous delivery (CI/CD) pipeline. Which AWS service will meet this requirement?
A. AWS Config
B. Amazon Cognito
C. AWS DataSync
D. AWS CodeStar
Explanation: AWS CodeStar is a service that enables you to quickly develop, build, and deploy applications on AWS. It provides a unified user interface for managing your application lifecycle, including code repositories, build pipelines, deployments, and project dashboards. AWS CodeStar also integrates with other AWS services, such as AWS CodeCommit, AWS CodeBuild, AWS CodeDeploy, and AWS CodePipeline, to create a complete CI/CD pipeline for your application12.
Which AWS service provides on-premises applications with low-latency access to data that is stored in the AWS Cloud?
A. Amazon CloudFront
B. AWS Storage Gateway
C. AWS Backup
D. AWS DataSync
Explanation: AWS Storage Gateway provides on-premises applications with low-latency access to data stored in AWS by caching frequently accessed data locally. It seamlessly integrates on-premises environments with cloud storage, enabling hybrid storage solutions. AWS DataSync is for data transfer, CloudFront is a content delivery network, and AWS Backup is for backup management, not low-latency access.
Which AWS service can a company use to visually design and build serverless applications?
A. AWS Lambda
B. AWS Batch
C. AWS Application Composer
D. AWS App Runner
Explanation: AWS Application Composer is a service that allows users to visually design and build serverless applications. Users can drag and drop components, such as AWS Lambda functions, Amazon API Gateway endpoints, Amazon DynamoDB tables, and Amazon S3 buckets, to create a serverless application architecture. Users can also configure the properties, permissions, and dependencies of each component, and deploy the application to their AWS account with a few clicks. AWS Application Composer simplifies the design and configuration of serverless applications, and reduces the need to write code or use AWS CloudFormation templates.
Which tool should a developer use lo integrate AWS service features directly into an application?
A. AWS Software Development Kit
B. AWS CodeDeploy
C. AWS Lambda
D. AWS Batch
Explanation: AWS Software Development Kit (SDK) is a set of platform-specific tools for developers that let them integrate AWS service features directly into their applications. AWS SDKs provide libraries, code samples, documentation, and other resources to help developers write code that interacts with AWS APIs. AWS SDKs support various programming languages, such as Java, Python, Ruby, .NET, Node.js, Go, and more. AWS SDKs make it easier for developers to access AWS services, such as Amazon S3, Amazon EC2, Amazon DynamoDB, AWS Lambda, and more, from their applications. AWS SDKs also handle tasks such as authentication, error handling, retries, and data serialization, so developers can focus on their application logic.
Which guidelines are best practices for using AWS Identity and Access Management (1AM)? (Select TWO.)
A. Share access keys.
B. Create individual 1AM users.
C. Use inline policies instead of customer managed policies.
D. Grant maximum privileges to 1AM users.
E. Use groups to assign permissions to 1AM users.
Explanation: Best practices for using AWS Identity and Access Management (IAM)
include:
B. Create individual IAM users: Each user should have their own IAM credentials
to ensure accountability, control, and traceability. Sharing credentials can lead to
security risks and difficulty in auditing.
E. Use groups to assign permissions to IAM users: Assigning permissions through
IAM groups simplifies permission management. You can assign the necessary
permissions to the group, and then add or remove users from the group as
needed, rather than managing permissions for each user individually.
Why other options are not suitable:
Why other options are not suitable:
Why other options are not suitable:
| Page 30 out of 69 Pages |
| Previous |