Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Which of the following SSH commands will successfully connect to an EC 2 Amazon Linux instance with an IP address of 5 4 . 7
Which of the following SSH commands will successfully connect to an EC Amazon Linux instance with an IP address of using a key named mykey.pem?
Group of answer choices
ssh i mykey.pem ecuser@
ssh i mykey.pem@
ssh ecuser@mykey.pem:i
echo mykeypem ubuntu@ ssh i
Flag question: Question
Question pts
What is an IAM role?
Group of answer choices
A set of IAM users given permission to access specified AWS resources
Permissions granted a trusted entity over specified AWS resources
Permissions granted an IAM user over specified AWS resources
A set of permissions allowing access to specified AWS resources
Flag question: Question
Question pts
After installing the AWS CommandLine Interface, what should you do before using it to securely manage your AWS resources?
Group of answer choices
Issue the aws configure command.
Issue the aws version command.
Generate a new access key ID and secret access key for the root user.
Reboot.
Flag question: Question
Question pts
Which of the following are options for installing the AWS CLI on Windows Choose two.
Group of answer choices
An AWS software development kit SDK
The MSI installer
The Yum or Aptitude package manager
Using Python and pip
Flag question: Question
Question pts
How can federated identities be incorporated into AWS workflows? Choose two.
Group of answer choices
You can provide users authenticated through a thirdparty identity provider access to backend resources used by your mobile app.
You can use authenticated identities to import external data like email records from Gmail into AWS databases.
You can provide admins authenticated through AWS Microsoft AD with access to a Microsoft SharePoint farm running on AWS.
You can use identities to guide your infrastructure design decisions.
Flag question: Question
Question pts
You want to improve the resilience of your EC web server. Which of the following is the most effective and efficient approach?
Group of answer choices
Launch parallel, autoscaled instances in multiple AWS regions.
Launch parallel, loadbalanced instances in multiple AWS regions.
Launch parallel, loadbalanced instances in multiple availability zones within a single AWS region.
Launch parallel, autoscaled instances in multiple availability zones within a single AWS region.
Flag question: Question
Question pts
Which of the following programming languages are AWS software development kits available for? Choose three.
Group of answer choices
JSON
JavaScript
PHP
Fortran
Java
Flag question: Question
Question pts
What are the most significant architectural benefits of the way AWS designed its regions? Choose two.
Group of answer choices
It can make applications available to end users with lower latency.
It can bring down the price of running.
It can make infrastructure more faulttolerant.
It can make applications more compliant with local regulations.
Flag question: Question
Question pts
Why is it that most AWS resources are tied to a single region?
Group of answer choices
Because security considerations are best served by restricting access to a single physical location
Because spreading them too far afield would introduce latency issues
Because access to any one digital resource must always occur through a single physical gateway
Because those resources are run on a physical device, and that device must live somewhere
Flag question: Question
Question pts
Which of the following would be a valid endpoint your developers could use to access a particular Relational Database Service instance youre running in the Northern Virginia region?
Group of answer choices
rdsamazonaws.com.useast
ecs.euwestamazonaws.com
rdsuseastamazonaws.com
useastamazonaws.com.rds
Flag question: Question
Question pts
Which output format does the AWS CLI support?
Group of answer choices
JavaScript Object Notation JSON
Tabseparated values TSV
None of these
Commaseparated values CSV
Flag question: Question
Question pts
Whats the most efficient method for managing permissions for multiple IAM users?
Group of answer choices
Assign IAM users permissions common to others with similar administration responsibilities.
Create roles based on IAM policies and assign them to IAM users.
Assign users requiring similar permissions to IAM roles.
Assign users requiring similar permissions to IAM groups.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started