1. Right Answer: D
Explanation: The below diagram shows how a WAF sandwich is created. It's the concept of placing the Ec2 instance which hosts the WAF software in between 2 elastic load balancers. Option A,B and C are incorrect since the EC2 Instance with the WAF software needs to be placed in an Autoscaling Group For more information on a WAF sandwich please refer to the below link https://www.cloudaxis.com/2016/11/21/waf-sandwich/
2. Right Answer: C,D
Explanation: Tags enable you to categorize your AWS(Amazon Web Service) resources in different ways, for example, by purpose, owner, or environment. This is useful when you have many resources of the same type ' you can quickly identify a specific resource based on the tags you've assigned to it. Each tag consists of a key and an optional value, both of which you define Options C and D are incorrect since tagging the IAM Policy will not resolve the issue For more information on tagging aws resources please refer to the below url http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Tags.html
3. Right Answer: D
Explanation: This is mentioned in the AWS(Amazon Web Service) Documentation Amazon Redshift uses a four-tier, key-based architecture for encryption. The architecture consists of data encryption keys, a database key, a cluster key, and a master key. Data encryption keys encrypt data blocks in the cluster. Each data block is assigned a randomly-generated AES-256 key. These keys are encrypted by using the database key for the cluster. The database key encrypts data encryption keys in the cluster. The database key is a randomly-generated AES-256 key. It is stored on disk in a separate network from the Amazon Redshift cluster and passed to the cluster across a secure channel. The cluster key encrypts the database key for the Amazon Redshift cluster. Option B is incorrect because the master key encrypts the cluster key and not the database key Option C is incorrect because the master key encrypts the cluster key and not the data encryption keys Option D is incorrect because the master key encrypts the cluster key only For more information on how keys are used in Redshift, please visit the following URL: https://docs.aws.amazon.com/kms/latest/developerguide/services-redshift.html
4. Right Answer: A,C
Explanation: EBS encryption can also be enabled when the volume is created and not for existing volumes. One can use existing tools for OS level encryption. Options C and D are invalid because volumes cannot be encrypted from AWS(Amazon Web Service) after they have been created For more information on the Security Best practices, please visit the following URL: https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf
5. Right Answer: A
Explanation: The AWS(Amazon Web Service) Documentation mentions the following You can use groups to create a collection of users in a user pool, which is often done to set the permissions for those users. For example, you can create separate groups for users who are readers, contributors, and editors of your website and app. Option A is incorrect since you need to create cognito groups and not endpoints Options C and D are incorrect since these would be overheads when you can use AWS(Amazon Web Service) Cognito For more information on AWS(Amazon Web Service) Cognito user groups please refer to the below link https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-user-groups.html
Leave a comment