1. A company wants to outsource their IT network. However, they want to maintain control over their networking resources, to include selecting IP address ranges, creating subnets, and configuring route tables and network gateways. Which AWS service would provide these abilities? a. Amazon S3 b. Amazon VPC c. AWS CloudTrail d. Amazon Cognito 2. Which of the following can be performed within a VPC (select all that apply): a. create security groups b. create VPNs c. manage networks in the VPC d. configure IP address ranges 3. A cloud security administrator wants to protect data in transit. Which practice would best accomplish this? a. Separate workloads by using separate accounts. b. Identify the data within your workload. c. Automate identification and classification of the data. d. Use Secure Sockets Layer (SSL) endpoints over Transport Layer Security (TLS). This method is known as HTTPS. 4. A company set up a virtual private cloud (VPC) with public subnets and route tables. The company wants to be able to use the internet to access information from Amazon EC2 instances in the VPC. Which VPC component would allow communication between instances in their VPC and the internet? a. Subnet route table b. Virtual private network (VPN) c. AWS Direct Connect d. Internet gateway 5. An administrator wants to increase security by creating an environment where traffic to and from Amazon EC2 instances can be controlled in a stateful manner. Which security feature would meet their needs? a. Subnets b. Network access control lists (ACLs) c. Security groups d. Elastic Load Balancing (ELB)
1. A company wants to outsource their IT network. However, they want to maintain control over their networking resources, to include selecting IP address ranges, creating subnets, and configuring route tables and network gateways. Which AWS service would provide these abilities?
a. Amazon S3
b. Amazon VPC
c. AWS CloudTrail
d. Amazon Cognito
2. Which of the following can be performed within a VPC (select all that apply):
a. create security groups
b. create VPNs
c. manage networks in the VPC
d. configure IP address ranges
3. A cloud security administrator wants to protect data in transit. Which practice would best accomplish this?
a. Separate workloads by using separate accounts.
b. Identify the data within your workload.
c. Automate identification and classification of the data.
d. Use Secure Sockets Layer (SSL) endpoints over Transport Layer Security (TLS). This method is known as HTTPS.
4. A company set up a virtual private cloud (VPC) with public subnets and route tables. The company wants to be able to use the internet to access information from Amazon EC2 instances in the VPC. Which VPC component would allow communication between instances in their VPC and the internet?
a. Subnet route table
b. Virtual private network (VPN)
c. AWS Direct Connect
d. Internet gateway
5. An administrator wants to increase security by creating an environment where traffic to and from Amazon EC2 instances can be controlled in a stateful manner. Which security feature would meet their needs?
a. Subnets
b. Network access control lists (ACLs)
c. Security groups
d. Elastic Load Balancing (ELB)
Trending now
This is a popular solution!
Step by step
Solved in 5 steps