Which of the following services allows customers to manage their agreements with aws?

Dashboard gives you a personalized view into the performance and availabilityof the AWS services underlying your AWS resources.The benefits of the AWS personal health dashboard include:**A personalized View of Service Health: Personal Health Dashboard gives you apersonalized view of the status of the AWS services that power yourapplications, enabling you to quickly see when AWS is experiencing issues thatmay impact you. For example, in the event of a lost EBS volume associated withone of your EC2 instances, you would gain quick visibility into the status of thespecific service you are using, helping save precious time troubleshooting todetermine root cause.**Proactive Notifications: The dashboard also provides forward lookingnotifications, and you can set up alerts across multiple channels, including emailand mobile notifications, so you receive timely and relevant information to helpplan for scheduled changes that may affect you. In the event of AWS hardwaremaintenance activities that may impact one of your EC2 instances, for example,you would receive an alert with information to help you plan for, and proactivelyaddress any issues associated with the upcoming change.

  1. Science
  2. Computer Science

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (90)

A company is introducing a new product to their customers, and is expecting a surge in traffic to their web application. As part of their Enterprise Support plan, which of the following provides the company with architectural and scaling guidance?

Infrastructure Event Management

What does the AWS Personal Health Dashboard provide?

View of AWS service health

Troubleshooting guidance to events impacting resources

Which of the following services allows customers to manage their agreements with AWS?

AWS Artifact

A company complains that they are wasting a lot of money on underutilized compute resources in AWS. Which AWS feature should they use to ensure that their applications are automatically adding/removing compute capacity to closely match the required demand?

AWS Auto-scaling

What is the AWS database service that allows you to upload data structured in key-value format?

DynamoDB

Key-value Data

The simplest structure for storing data in a
NoSQL database

What does AWS provide to deploy popular technologies - such as IBM MQ - on AWS with the least amount of effort and time?

AWS Quick Start reference deployments

Which of the following are examples of AWS-Managed Services, where AWS is responsible for the operational and maintenance burdens of running the service? (Choose TWO)

Elastic MapReduce

DynamoDB

You want to run a questionnaire application for only one day (without interruption), which Amazon EC2 purchase option should you use?

On-demand instance

According to the AWS Acceptable Use Policy, which of the following statements is true regarding penetration testing of EC2 instances?

Performed by customers on their own instances without prior auth from AWS

A company has moved to AWS recently. Which of the following would help them ensure that the right security settings are put in place? (Choose two)

Amazon Inspector
(Correct)

Amazon Inspector

Trusted Advisor

A company has an Enterprise Support subscription. They want quick and efficient guidance with their billing and account inquiries. Which of the following should the company use?

AWS Support Concierge

What should you do in order to keep the data on EBS volumes safe? (Choose two)

Ensure EBS data is encrypted at rest

Create EBS snapshots

An organization has a large number of technical employees who operate their AWS Cloud infrastructure. What does AWS provide to help organize them in teams and then assign the appropriate permissions for each team?

IAM Groups

Which of the following S3 storage classes is ideal for data with unpredictable access patterns?

s3 intelligent tiering

The principle "design for failure and nothing will fail" is very important when designing your AWS Cloud architecture. Which of the following would help adhere to this principle? (Choose two)

AZs

ELB

A developer is planning to build a two-tier web application that has a MySQL database layer. Which of the following AWS database services would provide automated backups to his application?

Aurora

You have discovered that some AWS resources are being used in malicious activities that could compromise your data. What should you do?

Contact AWS Abuse team

A company has deployed a new web application on multiple Amazon EC2 instances. Which of the following should they use to ensure that the incoming HTTP traffic is distributed evenly across the instances?

AWS Application Load Balancer

Using Amazon EC2 falls under which of the following cloud computing models?

IaaS

Which of the following enables you to monitor and collect log files from your Amazon EC2 instances?

CloudWatch Logs

What are the connectivity options that can be used to build hybrid cloud architectures? (Choose two)

AWS VPN

AWS Direct Connect

AWS Cloud9

cloud-based integrated development environment (IDE) that lets you write, run, and debug your code with just a browser. It includes a code editor, debugger, and terminal. Cloud9 comes prepackaged with essential tools for popular programming languages, including JavaScript, Python, PHP, and more, so you don't need to install files or configure your development machine to start new projects.

Which of the following AWS services are free to use? (Choose two)

CloudFormation

Auto-scaling

What is the primary storage service used by Amazon RDS DB instances?

Amazon EBS

What is the AWS service that enables you to manage all of your AWS accounts from a single master account?

AWS Organizations

An organization needs to analyze and process a large number of data sets. Which AWS service should they use?

Amazon EMR

Which of the following is equivalent to a user name and password and is used to authenticate your programmatic access to AWS services and APIs?

Access Keys

In your on-premises environment, you can create as many virtual servers as you need from a single template. What can you use to perform the same in AWS?

AMI (Amazon Machine Image)

Ensuring compliance is a key priority for most businesses. Which of the following AWS services will help them achieve this?

CloudTrail

Which of the following procedures will help reduce your Amazon S3 costs?

Use the right combination of storage classes based on different use cases

Which of the following AWS security features is associated with an EC2 instance and functions to filter incoming traffic requests?

Security Groups

You are working on two projects that require completely different network configurations. Which AWS service will allow you to isolate resources and network configurations?

VPC

Which of the following reserved instance payment options result in you paying a discounted hourly rate throughout the duration of the term? (Choose two)

No upfront option

Partial Upfront option

Which AWS service can be used to store and reliably deliver messages across distributed systems?

SQS

"Amazon Simple Email Service" is incorrect. Amazon Simple Email Service (Amazon SES) is a cloud-based email sending service designed to help digital marketers and application developers send marketing, notification, and transactional emails.

Which of the following AWS services is designed with native Multi-AZ fault tolerance in mind? (Choose two)

S3

DynamoDB

A company has created a solution that helps AWS customers improve their architectures on AWS. Which AWS program may support this company?

APN Consulting Partners

What are two advantages of using Cloud Computing over using traditional data centers? (Choose two)

Dist. Infrastructure

Eliminating single points of failure

What is the AWS data warehouse service that supports a high level of query performance on large amounts of datasets?

Redshift

Which of the following will impact the price paid for an EC2 instance? (Choose two)

Instance type

Storage capacity

Which of the following is the most appropriate means for developers to store Docker container images in the AWS Cloud?

Amazon Elastic Container Service (Amazon ECS) is a fully managed container orchestration service. Customers such as Duolingo, Samsung, GE, and Cook Pad use ECS to run their most sensitive and mission critical applications because of its security, reliability, and scalability.

Where to go to display the current status of any AWS service?

Service Health Dashboard

"AWS Personal Health Dashboard" is incorrect. While the Service Health Dashboard displays the general status of AWS services, Personal Health Dashboard gives you a personalized view of the status of the AWS services that power your applications (i.e. not all services), enabling you to quickly see when AWS is experiencing issues that may impact you.

How can ELBs improve the fault tolerance of your application?

Ensuring that only healthy targets receive traffic

What is the minimum level of AWS support that provides 24x7 access to technical support engineers via phone and chat?

Business

Which of the following AWS services scale automatically without your intervention? (Choose two)

Lambda & S3

You have spent a lot of time configuring your newly deployed Amazon EC2 instance. After the demand increases, you decide to provision another EC2 instance with the same configuration and type. How can you achieve this?

Create an AMI

An Amazon Machine Image (AMI) provides the information required to launch an instance, which is a virtual server in the cloud. You must specify an AMI when you launch an instance, and you can launch as many instances from the AMI as you need. You can also launch instances from as many different AMIs as you need.

What can be used to call AWS services from different programming languages?

AWS Software Dev Kit

The AWS SDK can simplify using AWS services in your applications with an API tailored to your programming language or platform. Programming languages supported include Java, .NET, Node.js, PHP, Python, Ruby, Go, and C++.

Which of the following statements best describes the AWS shared controls?

Shared Controls are controls which apply to both the infrastructure layer and customer layers, but in completely separate contexts or perspectives. In a shared control, AWS provides the requirements for the infrastructure and the customer must provide their own control implementation within their use of AWS services. Examples include:
** Patch Management - AWS is responsible for patching the underlying hosts and fixing flaws within the infrastructure, but customers are responsible for patching their guest OS and applications.
** Configuration Management - AWS maintains the configuration of its infrastructure devices, but a customer is responsible for configuring their own guest operating systems, databases, and applications.
** Awareness & Training - AWS trains AWS employees, but a customer must train their own employees.

Which of the following can be used to protect data at rest on Amazon S3? (Choose two)

Permissions and Versioning

What is the AWS tool that can help a company visualize their AWS spending in the last few months?

Cost Explorer

The AWS Billing and Cost Management console includes the Cost Explorer tool for viewing AWS cost data as a graph. The user can filter the graphs using the resource tags. If the company is using Consolidated Billing, it generates a report based on the linked accounts which can help to identify areas that require further inquiry. Using the Cost Explorer, the company can view trends and use them to understand their spending and to predict future costs.

Which AWS support plan would help provide general guidance when you request Architecture Support?

The developer support plan provides general guidance when you request Architecture Support.

What does AWS offer to secure your network? (Choose two)

** AWS has a Built-in firewall that can be used to control traffic to your network.
** You can secure your network by encrypting data in transit across all services.

The other options are incorrect:

"AWS-controlled network access control lists" is incorrect. Network access control lists are customer-controlled NOT AWS-controlled.

Doodle, Inc. has a web application that ultimately stores billions of images and videos. All told, there is almost an exabyte of data stored in Doodle's system. Which of the following AWS services can best transfer the data to AWS?

Snowmobile

AWS Snowmobile is an Exabyte-scale data transfer service used to move extremely large amounts of data to AWS. You can transfer up to 100PB per Snowmobile, a 45-foot long ruggedized shipping container, pulled by a semi-trailer truck. Snowmobile makes it easy to move massive volumes of data to the cloud, including video libraries, image repositories, or even a complete data center migration. At exabyte scale, transferring data with Snowmobile is more secure, fast and cost effective.

Which of the following services help reduce the complexity and time needed to plan your application migration to the AWS Cloud?

WS Application Discovery Service helps systems integrators quickly and reliably plan application migration projects by automatically identifying applications running in on-premises data centers, their associated dependencies, and their performance profiles.

What are AWS' recommendations regarding root access keys?

AWS recommends that you delete your root access keys because you can't restrict permissions for the root user credentials. If you want to manage services that require administrative access create an IAM user, grant administrator access to that user, then use those credentials to interact with AWS.

What is a key benefit of accessing AWS Cloud services through an API?

The Application Programming Interface (API) allows developers to easily work with various AWS services programmatically.

What are the main benefits of using the AWS Service Catalog?

AWS Service Catalog allows organizations to create and manage catalogs of IT services that are approved for use on AWS. These IT services can include everything from virtual machine images, servers, software, and databases to complete multi-tier application architectures. AWS Service Catalog allows you to centrally manage commonly deployed IT services, and helps you achieve consistent governance and meet your compliance requirements, while enabling users to quickly deploy only the approved IT services they need.

You have just hired a skilled sys-admin to join your team. As usual, you have created a new IAM user for him to interact with AWS services. On his first day, you ask him to create snapshots of all existing Amazon EBS volumes and save them in a new Amazon S3 bucket. However, the new member reports back that he is unable to create neither EBS snapshots nor S3 buckets. What might prevent him from doing this simple job?

When a new IAM user is created, that user has NO access to any AWS service. This is called a non-explicit deny. For that user, access must be explicitly allowed via IAM permissions.

non-explicit deny

When a new IAM user is created, that user has NO access to any AWS service. This is called a non-explicit deny. For that user, access must be explicitly allowed via IAM permissions.

An organization starts to perform a TCO analysis to be able to make an informed decision about migrating to AWS. Which of the following should be taken into consideration when performing this analysis? (Choose two)

Weighing the financial considerations of owning and operating a data center facility versus employing a cloud infrastructure requires detailed and careful analysis. In practice, it is not as simple as just measuring potential hardware expense alongside utility pricing for compute and storage resources. The Total Cost of Ownership (TCO) is often the financial metric used to estimate and compare direct and indirect costs of a product or a service. Cooling and power consumption, data center space, data center real estate and Labor IT cost are examples of the indirect costs of a physical data center and should be included in TCO analysis.

Which services does AWS offer for free? (Choose two)

AWS Identity and Access Management is a feature of your AWS account offered at no additional charge. You will be charged only for use of other AWS services by your Users.
There is no additional charge for AWS Elastic Beanstalk. You pay for AWS resources (e.g. EC2 instances or S3 buckets) you create to store and run your application. You only pay for what you use, as you use it; there are no minimum fees and no upfront commitments.

For testing purposes, a developer has used one Linux instance for 2 hours, 5 minutes and 9 seconds, and one Windows instance for 4 hours, 23 minutes and 7 seconds. How much time will he be billed for?

With per-second billing in EC2 you pay for only what you use. It takes cost of unused minutes and seconds in an hour off of the bill, so you can focus on improving your applications instead of maximizing usage to the hour.
Per-second billing is available for instances launched in Amazon Linux or Ubuntu.
For other instances, each partial instance-hour consumed will be billed as a full hour.
In our case, the developer will be charged for 2 hours, 5 minutes and 9 seconds for the Linux instance, and 5 hours for the Windows instance.

You have developed a document generator application that helps users create and modify PDFs. Which of the following allows you to publish your application?

AWS Serverless Application Repository is used to share solutions with developers or to help your customers quickly understand the value of products and services you sell and support. Anyone with an AWS account can publish a serverless application or application component to the AWS Serverless Application Repository. You can share your published applications within your team, across your organization, or with the community at large. Publicly shared applications must include a link to the application's source code so others can view what the application does and how it works.

Which of the following AWS services uses tiered pricing?

S3

Server-based services include:

Amazon EC2, Amazon RDS, Amazon Redshift and Amazon EMR.

Serverless services include:

AWS Lambda, AWS Fargate, Amazon SNS, Amazon SQS and Amazon DynamoDB.

Which of the following storage classes is most appropriate to be used for a popular e-commerce website with stable access patterns?

S3 Standard offers high durability, availability, and performance object storage for frequently accessed data. Because it delivers low latency and high throughput, S3 Standard is appropriate for a wide variety of use cases, including cloud applications, dynamic websites, content distribution, mobile and gaming applications, and big data analytics.

Which of the following is not an AWS reservation model?

There are no reservations in S3. You pay for what you use.

While the cloud is well-suited for running variable workloads and rapid deployments, many cloud-based workloads display a more predictable pattern. For these stable applications, organizations can achieve significant cost savings by taking advantage of the available reservation models such as EC2 reserved instances, RDS reserved instances, ElastiCache Reserved Nodes, DynamoDB Reserved Capacity and Redshift Reserved Nodes.

A company has infrastructure hosted in an on-premises data center. They currently have an operations team that takes care of ID management. If they decide to migrate to the AWS cloud, which of the following services would help them perform the same role in AWS?

AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. You use IAM to control who is authenticated (signed in) and authorized (has permissions) to use resources.

AWS Federation is incorrect. Federation enables users to access and use AWS resources using their existing corporate credentials.

Which of the following are Amazon EC2 reserved instances types? (Select two)

There are three types of EC2 reserved instances(RIs) that you can choose from based on your applications needs:
1- Standard RIs: These provide the most significant discount (up to 75% off On-Demand) and are best suited for steady-state usage.
2- Convertible RIs: These provide a discount (up to 54% off On-Demand) and the capability to change the attributes of the RI as long as the exchange results in the creation of Reserved Instances of equal or greater value. Like Standard RIs, Convertible RIs are best suited for steady-state usage.
3- Scheduled RIs: These are available to launch within the time windows you reserve. This option allows you to match your capacity reservation to a predictable recurring schedule that only requires a fraction of a day, a week, or a month.

Which of the following strategies helps protect your AWS root account?

Anyone who has root user access keys for your AWS account has unrestricted access to all the resources in your account, including billing information. If you don't already have an access key for your AWS account root user, don't create one unless you absolutely need to. If you do have an access key for your AWS account root user, delete it. If you must keep it, rotate (change) the access key regularly.

What does AWS Cost Explorer provide to help manage your AWS spend?

AWS Cost Explorer has an easy-to-use interface that lets you visualize, understand, and manage your AWS costs and usage over time.
Cost Explorer's cost forecast capabilities use machine learning to learn each customer's historical spend patterns and use that information to forecast expected costs. Cost Explorer's forecasting enables you to get a better idea of what your costs and usage may look like in the future, so that you can plan ahead. Forecasting capabilities have been enhanced to support twelve month forecasts (previously forecasts were limited to three months) for multiple cost metrics, including unblended and amortized costs.

Which of the following services gives you access to all AWS auditor-issued reports and certifications?

AWS Artifact is your go-to, central resource for compliance-related information that matters to you. It provides on-demand access to AWS' security and compliance reports and select online agreements. Reports available in AWS Artifact include AWS Service Organization Control (SOC) reports, Payment Card Industry (PCI) reports, and certifications from accreditation bodies across geographies and compliance verticals that validate the implementation and operating effectiveness of AWS security controls. Agreements available in AWS Artifact include the Business Associate Addendum (BAA) and the Nondisclosure Agreement (NDA).
a comperhenAccess all of AWS' auditor issued reports, certifications, accreditations and other third-party attestations.

Which of the following AWS services uses Puppet to automate how EC2 instances are configured?

AWS OpsWorks is a configuration management service that provides managed instances of Chef and Puppet. Chef and Puppet are automation platforms that allow you to use code to automate the configurations of your servers. OpsWorks lets you use Chef and Puppet to automate how servers are configured, deployed, and managed across your Amazon EC2 instances or on-premises compute environments.

Which of the following will affect how much you are charged for storing objects in S3? (Choose two)

S3 pricing is based on four factors:
1- The storage class you have chosen.
2- The total amount of data (in GB) you've stored.
3- Data Transfer Out.
4- Number of Requests.

For Amazon RDS databases, What does AWS perform on your behalf? (Choose two)

In relation to Amazon RDS databases:

AWS is responsible for:
1- Managing the underlying infrastructure and foundation services.
2- Managing the operating system.
3- Database setup.
4- Patching and backups.

The customer is still responsible for:
1- Protecting the data stored in his databases (through encryption and IAM access control).
2- Managing the database settings that are specific to his application.
3- Building the relational schema.
4- Network traffic protection.

Which of the following are factors to consider for Amazon EBS pricing? (Choose two)

Amazon EBS pricing has three factors:
1- Volumes: Volume storage for all EBS volume types is charged by the amount of GB you provision per month, until you release the storage.
2- Snapshots: Snapshot storage is based on the amount of space your data consumes in Amazon S3. Because Amazon EBS does not save empty blocks, it is likely that the snapshot size will be considerably less than your volume size. Copying EBS snapshots is charged based on the volume of data transferred across regions. For the first snapshot of a volume, Amazon EBS saves a full copy of your data to Amazon S3. For each incremental snapshot, only the changed part of your Amazon EBS volume is saved. After the snapshot is copied, standard EBS snapshot charges apply for storage in the destination region.
3- Data transfer: Consider the amount of data transferred out of your application. Inbound data transfer is free, and outbound data transfer charges are tiered.

What are some key advantages of AWS security? (Choose two)

The Benefits of AWS Security include :
1- Keep Your Data Safe: The AWS infrastructure puts strong safeguards in place to help protect your privacy. All data is stored in highly secure AWS data centers.
2- Meet Compliance Requirements: AWS manages dozens of compliance programs in its infrastructure. This means that segments of your compliance have already been completed.
3- Save Money: Cut costs by using AWS data centers. Maintain the highest standard of security without having to manage your own facility.
4- Scale Quickly: Security scales with your AWS Cloud usage. No matter the size of your business, the AWS infrastructure is designed to keep your data safe.

Which of the following would you use to manage your encryption keys in the AWS Cloud? (Choose two)

AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses FIPS 140-2 validated hardware security modules to protect the security of your keys. AWS Key Management Service is integrated with most other AWS services to help you protect the data you store with these services. AWS Key Management Service is also integrated with AWS CloudTrail to provide you with logs of all key usage to help meet your regulatory and compliance needs.

AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud. With CloudHSM, you can manage your own encryption keys using FIPS 140-2 Level 3 validated HSMs. CloudHSM offers you the flexibility to integrate with your applications using industry-standard APIs, such as PKCS#11, Java Cryptography Extensions (JCE), and Microsoft CryptoNG (CNG) libraries.

Which service helps you by collecting important metrics from a running EC2 instance?

Amazon CloudWatch is a monitoring service for AWS cloud resources and the applications you run on AWS. You can use Amazon CloudWatch to collect and track metrics, collect and monitor log files, set alarms, and automatically react to changes in your AWS resources.

Your web application currently faces performance issues and suffers from long delays. Which of the following could help you in this situation?

AWS X-Ray helps you identify performance bottlenecks. X-Ray's service maps let you see relationships between services and resources in your application in real time. You can easily detect where high latencies are occurring, visualize node and edge latency distribution for services, and then drill down into the specific services and paths impacting application performance.

What are some key benefits of using AWS CloudFormation? (Choose two)

The benefits of using AWS CloudFormation include:
1- CloudFormation allows you to model your entire infrastructure in a text file. This template becomes the single source of truth for your infrastructure. This helps you to standardize infrastructure components used across your organization, enabling configuration compliance and faster troubleshooting.
2- AWS CloudFormation provisions your resources in a safe, repeatable manner, allowing you to build and rebuild your infrastructure and applications, without having to perform manual actions or write custom scripts. CloudFormation takes care of determining the right operations to perform when managing your stack, and rolls back changes automatically if errors are detected.
3- Codifying your infrastructure allows you to treat your infrastructure as just code. You can author it with any code editor, check it into a version control system, and review the files with team members before deploying into production.
4- CloudFormation allows you to model and provision, in an automated and secure manner, all the resources needed for your applications across all regions and accounts.

Your company experiences fluctuations in traffic patterns to their e-commerce website when running flash sales. What service can help your company dynamically match the required compute capacity to handle spikes in traffic during flash sales?

AWS Auto Scaling monitors your applications and automatically adjusts capacity to maintain steady, predictable performance at the lowest possible cost. Using AWS Auto Scaling, you maintain optimal application performance and availability, even when workloads are periodic, unpredictable, or continuously changing. When demand spikes, AWS Auto Scaling automatically increases the compute capacity, so you maintain performance. When demand subsides, AWS Auto Scaling automatically decreases the compute capacity, so you pay only for the resources you actually need.

You manage a blog on AWS that has different stages such as development, testing, and production. How can you create a custom console in each stage to view and manage your resources easily?

If you work with multiple resources in multiple stages, you might find it useful to manage all the resources in each stage as a group rather than move from one AWS service to another for each task. Resource Groups help you do just that. By default, the AWS Management Console is organized by AWS service. But with the Resource Groups tool, you can create a custom console that organizes and consolidates information based on your project and the resources that you use.

What can you use to assign permissions to an IAM user?

The policy is a JSON document that consists of:
1- Actions: what actions you will allow. Each AWS service has its own set of actions.
2- Resources: which resources you allow the action on.
3- Effect: what will be the effect when the user requests access—either allow or deny.
4- Conditions - which conditions must be present for the policy to take effect. For example, you might allow access only to the specific S3 buckets if the user is connecting from a specific IP range or has used multi-factor authentication at login.
Note:
Permissions are granted to IAM identities (users, groups, and roles) to determine whether they are authorized to perform an action or not.

Which of the following must an IAM user provide to interact with AWS services using the AWS Command Line Interface (AWS CLI)?

Access Keys

You have discovered that some AWS resources are being used in malicious activities that could compromise your data. What should you do?

Abuse Team

Which of the following are examples of AWS-Managed Services, where AWS is responsible for the operational and maintenance burdens of running the service? (Choose TWO)

Dynamo

Elastic MapReduce

AWS allows users to manage their resources using a web based user interface. What is the name of this interface?

Management Console

Which of the following services allows customers to manage their agreements with AWS?

Artifact

Sets with similar terms

AWS Cloud Practitioner - Sample Exams 1, 2, 3, & 4

205 terms

jeffwindsor

AWS Cloud Practitioner

101 terms

abramsse

AWS Cloud Essentials

62 terms

tiffla92

Cloud Essestials CLO-001

120 terms

Chennai_King

Sets found in the same folder

Cloud Practitioner #6

65 terms

mettityl000

AWS - Practice Exam #1

65 terms

takaj98

AWS Quiz 4

65 terms

shane1233323

AWS Practitioner Exam - Security

6 terms

fusion10

Other sets by this creator

ASA - Derek

11 terms

derekglenwilde

Recent AWS Concepts

103 terms

derekglenwilde

Trusted Advisor

5 terms

derekglenwilde

Serverless Computing

2 terms

derekglenwilde

Verified questions

COMPUTER SCIENCE

On a roulette wheel, the pockets are numbered from 0 to 36. The colors of the pockets are as follows: $$ \begin{matrix} \text{• Pocket 0 is green.}\\ \text{• For pockets 1 through 10, the odd-numbered pockets are red and the even-numbered } \text{pockets are black.}\\ \text{• For pockets 11 through 18, the odd-numbered pockets are black and the even-numbered } \text{pockets are red.}\\ \text{• For pockets 19 through 28, the odd-numbered pockets are red and the even-numbered } \text{pockets are black.}\\ \text{• For pockets 29 through 36, the odd-numbered pockets are black and the even-numbered } \text{pockets are red.}\\ \end{matrix} $$ Write a program that asks the user to enter a pocket number and displays whether the pocket is green, red, or black. The program should display an error message if the user enters a number that is outside the range of 0 through 36.

Verified answer

COMPUTER SCIENCE

Write a program that first asks the user to type in today’s price of one dollar in Japanese yen, then reads U.S. dollar values and converts each to Japanese yen. Use 0 as the sentinel value to denote the end of dollar inputs. Then the program reads a sequence of yen amounts and converts them to dollars. The second sequence is terminated by another zero value.

Verified answer

COMPUTER SCIENCE

Show how to compute the length of an LCS using only 2 · min(m, n) entries in the c table plus O(1) additional space. Then show how to do the same thing, but using min(m, n) entries plus O(1) additional space.

Verified answer

COMPUTER SCIENCE

What is the purpose of interrupts? How does an interrupt differ from a trap? Can traps be generated intentionally by a user program? If so, for what purpose?

Verified answer

Recommended textbook solutions

Which of the following services allows customers to manage their agreements with aws?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which of the following services allows customers to manage their agreements with aws?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

Which of the following services allows customers to manage their agreements with aws?

Introduction to the Theory of Computation

3rd EditionMichael Sipser

389 solutions

Which of the following services allows customers to manage their agreements with aws?

Starting Out with Python

4th EditionTony Gaddis

629 solutions

Other Quizlet sets

MDL240 Lab 2 Assessment

16 terms

MsBrucellaPLUS

Exercise Science Chapter 8

20 terms

Dric4565

Management 240 Final Exam

40 terms

maddygallll

Animal Phys Quiz #3

93 terms

Mackenzie_Kalchik

Related questions

QUESTION

The term "promiscuous mode" refers to configuring a network interface to read all frames that are broadcast on the network segment.

4 answers

QUESTION

What advantage does Amazon get by creating its own branded products?

15 answers

QUESTION

Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query?

15 answers

QUESTION

How is it possible for every bit of data to be delivered reliably?

2 answers

Which AWS service offers on demand access to AWS security and compliance reports?

AWS Artifact is your go-to, central resource for compliance-related information that matters to you. It provides on-demand access to AWS' security and compliance reports and select online agreements.

Which AWS service can be used to meet the compliance requirements?

AWS KMS is integrated with AWS CloudTrail to provide you with logs of all key usage to help meet your regulatory and compliance needs.

What is AWS artifact and AWS config?

AWS Config collects data from multiple regions and multiple accounts through the use of an aggregator. AWS Artifact allows for agreements to be accepted on behalf of member accounts within an organization, even as new reports or accounts are added.

What is the purpose of the service Organisation controls SOC found on AWS artifact?

AWS System and Organization Controls (SOC) Reports are independent third-party examination reports that demonstrate how AWS achieves key compliance controls and objectives. The purpose of these reports is to help you and your auditors understand the AWS controls established to support operations and compliance.