1. Right Answer: D
Explanation: The ideal way is to create an IAM role which has the required permissions and then associate it with the Lambda function The AWS(Amazon Web Service) Documentation additionally mentions the following Each Lambda function has an IAM role (execution role) associated with it. You specify the IAM role when you create your Lambda function. Permissions you grant to this role determine what AWS(Amazon Web Service) Lambda can do when it assumes the role. There are two types of permissions that you grant to the IAM role: ? If your Lambda function code accesses other AWS(Amazon Web Service) resources, such as to read an object from an S3 bucket or write logs to CloudWatch Logs, you need to grant permissions for relevant Amazon S3 and CloudWatch actions to the role. ? If the event source is stream-based (Amazon Kinesis Data Streams and DynamoDB streams), AWS(Amazon Web Service) Lambda polls these streams on your behalf. AWS(Amazon Web Service) Lambda needs permissions to poll the stream and read new records on the stream so you need to grant the relevant permissions to this role. Option A is invalid because the VPC endpoint allows access instances in a private subnet to access DynamoDB Option B is invalid because resources policies are present for resources such as S3 and KMS , but not AWS(Amazon Web Service) Lambda Option C is invalid because AWS(Amazon Web Service) Roles should be used and not IAM Users For more information on the Lambda permission model, please visit the below URL https://docs.aws.amazon.com/lambda/latest/dg/intro-permission-model.html
2. Right Answer: B
Explanation: The AWS(Amazon Web Service) Documentation mentions the following ACM is tightly linked with AWS(Amazon Web Service) Certificate Manager Private Certificate Authority. You can use ACM PCA to create a private certificate authority (CA) and then use ACM to issue private certificates. These are SSL/TLS X.509 certificates that identify users, computers, applications, services, servers, and other devices internally. Private certificates cannot be publicly trusted Option A is partially invalid. Windows Server 2016 Certificate Manager can be used but since there is a requirement to 'minimize the work and maintenance, AWS(Amazon Web Service) Certificate Manager should be used Option C and D are invalid because these cannot be used for managing certificates. For more information on ACM, please visit the below URL https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html
3. Right Answer: C
Explanation: The AWS(Amazon Web Service) Documentation states the following Automatic key rotation is disabled by default on customer managed CMKs. When you enable (or re-enable) key rotation, AWS(Amazon Web Service) KMS automatically rotates the CMK 365 days after the enable date and every 365 days thereafter. Option A,B and D are automatically invalid because the default is 365 days For more information on key rotation please visit the below URL https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html
4. Right Answer: C
Explanation: Such a scenario is also given in the AWS(Amazon Web Service) Documentation Option B is invalid because versioning is only to create multiple versions of an object and can help in accidental deletion of objects Option C is invalid because this is used as an extra measure of caution for deletion of objects Option D is invalid because this is used for Cross region replication of objects For more information on Cross Origin Resource sharing, please visit the following url https://docs.aws.amazon.com/AmazonS3/latest/dev/cors.html
5. Right Answer: C,D
Explanation:
Leave a comment