1. Your company has created an AWS(Amazon Web Service) Direct Connect connection. A virtual private gateway is attached to a VPC. Around 111 routes are being advertised on from On-premise. A private VIF Is being created to the VPGW. But the Virtual Interface Is always showing as down. What needs to be done to ensure the Interface comes back up.
A) Ensure that a VPN connection Is also in place for the tunnel to become active.
B) Ensure less routes are being advertised.
C) Ensure that static routes are put in place
D) Ensure that the P sec configuration is correct
2. Your company has many remote branch offices that need to connect with your AWS(Amazon Web Service) VPC. Which of the following can help achieve this connectivity in an easy manner?
A) VPC Peering
B) AWS Direct Connect with a Public VIF
C) VPN Cloud hub
D) AWS Direct Connect with a Private VIF
3. A company has an application that needs to be moved to an AWS(Amazon Web Service) VPC network. This application is based on multicast and needs to be moved with the least amount of effort. What can be done to fulfill this requirement?
A) Consider creating an overlay network between EC2 Instances and then port the application.
B) Create EC2 Instances in the subnet and then migrate the application on to the EC2 Instance.
C) The application needs to be changed to support uni cast before moving it to AWS.
D) Consider enabling encryption on the underlying EBS volumes which will be used to support the EC2
4. When creating an AWS(Amazon Web Service) workspace , which of the following is required for the creation of the workspace?
A) A User directory
B) A VPC with a private and public subnet
C) A NAT Instance on the customer side
D) An AWS(Amazon Web Service) Direct Connect connection
5. Your company has the following setup in AWS(Amazon Web Service) a. A set of EC2 Instances hosting a web application b. An application load balancer placed in front of the EC2 Instances There seems to be a set of malicious requests coming from a set of IP addresses. Which of the following can be used to protect against these requests?
A) Use Security Groups to block the IP addresses
B) Use AWS(Amazon Web Service) Inspector to block the IP addresses
C) Use AWS(Amazon Web Service) WAF to block the PP addresses
D) Use VPC Flow Logs to block the lP addresses
Write a public review