How Can You Secure Data at Rest on an Ebs Volume?
AWS Certified SysOps Ambassador - Associate Questions and Answers (Dumps and Practice Questions)
Question : How tin you lot secure data at remainder on an EBS volume?
1. Encrypt the book using the S3 server-side encryption service.
2. Attach the volume to an example using EC2'south SSL interface.
4. Write the data randomly instead of sequentially.
5. Use an encrypted file system k summit of the EBS volume.
Correct Answer : Get Lastest Questions and Answer :
Caption:
Question : In AWS, which security aspects are the customer'southward responsibility? Cull answers
A. Controlling concrete access to compute resources
B. Patch direction on the EC2 case south operating system
C. Encryption of EBS (Elastic Block Storage) volumes
D. Life-cycle management of IAM credentials
E. Decommissioning storage devices
F. Security Group and ACL (Access Control List) settings
1. A,C,E,F
2. C,D,E,F
3. Access Generally Uused Products past 50000+ Subscribers
4. B,C,E,F
five. B,C,D,F
Right Respond : Get Lastest Questions and Answer :
Question : A .NET awarding that yous manage is running in Elastic Beanstalk. Your developers tell
you they will need access to application log files to debug issues that arise. The
infrastructure volition scale upward and down.
How tin you ensure the developers will be able to access merely the log files?
ane. Access the log files directly from Elastic Beanstalk
two. Enable log file rotation to S3 within the Elastic Beanstalk configuration
3. Admission Mostly Uused Products by 50000+ Subscribers
4. Connect to each Example launched by Rubberband Beanstalk and create a Windows Scheduled task to rotate the log files to S3.
Correct Respond : Become Lastest Questions and Answer :
Exp
Related Questions
Question : How tin can an EBS book that is currently attached to an EC instance be migrated from 1 Availability Zone to another?
ane. Simply create a new volume in the other AZ and specify the original book as the source.
two. Disassemble the volume, then use the ec2-migrate-volume command to move information technology to another AZ.
iii. Admission Mostly Uused Products past 50000+ Subscribers
four. Detach the volume and attach it to another EC2 instance in the other AZ.
Question : Your business is building a new application that volition store its entire customer database on a
RDS MySQL database, and volition have various applications and users that volition query that
data for different purposes.
Big analytics jobs on the database are probable to cause other applications to not be able to
get the query results they need to, before time out. Also, as your data grows, these
analytics jobs will start to take more time, increasing the negative effect on the other
applications.
How practice y'all solve the contention bug between these unlike workloads on the aforementioned
information?
ane. Enable Multi-AZ manner on the RDS example
two. Use ElastiCache to offload the analytics chore data 3. Access Mostly Uused Products by 50000+ Subscribers
4. Run the RDS instance on the largest size possible
Question : You run a spider web awarding with the following components Elastic Load Balancer (ELB),
Web/Application servers, 1 MySQL RDS database with read replicas, and Amazon Uncomplicated
Storage Service (Amazon S3) for static content. Average response time for users is
increasing slowly.
What three CloudWatch RDS metrics volition allow you to identify if the database is the
bottleneck? Choose iii answers
A. The number of outstanding IOs waiting to access the disk.
B. The amount of write latency.
C. The amount of disk space occupied past binary logs on the master.
D. The amount of time a Read Replica DB Example lags behind the source DB Instance
East. The average number of disk I/O operations per 2nd.
one. A,C,D
2. B,C,D 3. Access Generally Uused Products by 50000+ Subscribers
4. A,B,D
5. B,C,East
Question : How tin y'all secure data at residuum on an EBS volume?
ane. Encrypt the volume using the S3 server-side encryption service.
two. Attach the book to an example using EC2's SSL interface.
4. Write the data randomly instead of sequentially.
5. Apply an encrypted file organization thou peak of the EBS volume.
Question : In AWS, which security aspects are the customer's responsibility? Choose answers
A. Controlling physical access to compute resources
B. Patch management on the EC2 instance south operating system
C. Encryption of EBS (Rubberband Cake Storage) volumes
D. Life-bicycle management of IAM credentials
Due east. Decommissioning storage devices
F. Security Group and ACL (Access Control List) settings
ane. A,C,East,F
2. C,D,E,F 3. Access Mostly Uused Products past 50000+ Subscribers
4. B,C,East,F
5. B,C,D,F
Question : A .NET application that you manage is running in Rubberband Beanstalk. Your developers tell
you lot they will need access to application log files to debug problems that arise. The
infrastructure will scale up and down.
How can you ensure the developers will exist able to access only the log files?
one. Access the log files directly from Elastic Beanstalk
two. Enable log file rotation to S3 within the Elastic Beanstalk configuration 3. Access Generally Uused Products past 50000+ Subscribers
iv. Connect to each Instance launched past Elastic Beanstalk and create a Windows Scheduled task to rotate the log files to S3.
Source: http://learn.quicktechie.com/mcq/88-Question--How-can-you-secure-data-at-rest-on-an-EBS-volume.html
0 Response to "How Can You Secure Data at Rest on an Ebs Volume?"
Post a Comment