Q1. A company notices suspicious network activity against an application that is running on a fleet of Amazon EC2 instances. The suspicious activity is coming from a single IP address. Which AWS service should the company use to block access from this IP address?
A.AWS Shield
B. AWS Config
C. Amazon GuardDuty
D. AWS WAF
Correct Answer: D
Q2. A company purchased Amazon EC2 Standard Reserved Instances (Rls) for a workload in the AWS Cloud. The company needs to move part of the workload to an instance family that does not match the instance family of these Standard RIs. How can the company take advantage of the Standard RIs that it no longer needs?
A.Contact the AWS Support team, and ask the team to sell the Standard RIs.
B. Sell the Standard RIs on the Amazon EC2 Reserved Instance Marketplace.
C. Sell the Standard RIs as a third-party seller on the AWS Marketplace.
D. Convert the Standard RIs to Savings Plans.
Correct Answer: B
Q3. A company needs to store infrequently used data for data archives and long-term backups. Which AWS service or storage class will meet these requirements MOST cost-effectively?
A.Amazon FSx for Lustre
B. Amazon Elastic Block Store (Amazon EBS)
C. Amazon Elastic File System (Amazon EFS)
D. Amazon S3 Glacier Flexible Retrieval
Correct Answer: D
Q4. A company is releasing a business-critical application. Before the release, the company needs strategic planning assistance from AWS. During the release, the company needs AWS infrastructure event management and real-time support. What should the company do to meet these requirement?
A.Access AWS Trusted Advisor.
B. Contact the AWS Partner Network (APN).
C. Sign up for AWS Enterprise Support
D. Contact AWS Professional Services.
Correct Answer: C
$ 39
Reviews
There are no reviews yet.