1. Right Answer: A
Explanation: The below diagram from the AWS(Amazon Web Service) whitepaper shows the best security practise of allocating a role that has access to the S3 bucket Options A,B and D are invalid because using users , groups or access keys is an invalid security practise when giving access to resources from other AWS(Amazon Web Service) resources. For more information on the Security Best practices, please visit the following URL: https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf
2. Right Answer: C
Explanation:
3. Right Answer: D
Explanation: Tags enable you to categorize your AWS(Amazon Web Service) resources in different ways, for example, by purpose, owner, or environment. This is useful when you have many resources of the same type ' you can quickly identify a specific resource based on the tags you've assigned to it. Option A is invalid because this is not a recommended practise Option B is invalid because this is an overhead to maintain this in policies Option C is invalid because the instance type will not resolve the requirement For information on resource tagging, please visit the below URL: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Tags.html
4. Right Answer: D
Explanation: Since here you need to sniff the actual network packets , the ideal approach would be to use a network monitoring tool provided by an AWS(Amazon Web Service) partner. The AWS(Amazon Web Service) documentation mentions the following Multiple AWS(Amazon Web Service) Partner Network members offer virtual firewall appliances that can be deployed as an in-line gateway for inbound or outbound network traffic. Firewall appliances provide additional application-level filtering, deep packet inspection, IPS/IDS, and network threat protection features. Option A and D are invalid because these services cannot be used for packet inspection. Option C is invalid because 'promiscuous mode is not supported in AWS For more information on the security capabilities, please visit the below URL: https://aws.amazon.com/answers/networking/vpc-security-capabilities/
5. Right Answer: B,D,E
Explanation:
Leave a comment