1. Right Answer: A
Explanation: Amazon Cloud alarm watch shows one measure over time as users and fill specifies one or more actions based on the value of the metric with respect to a given threshold over several periods of time. Alarms call for actions supported state changes. There are three states of alarm: OK, alarm and insufficient data. In this case, since BSE is detached and inactive will be insufficient.
2. Right Answer: C
Explanation: AWS RDS mandatory maintenance window which by default is 30 minutes. If the user does not specify the maintenance window when creating RDS and AWS wil select a maintenance window of 30 minutes randomly from a block of 8 hours of time by region. In this case, Amazon RDS assigns a 30 minute maintenance window on a day chosen at random for the week.
3. Right Answer: E
Explanation: AWS provides a possibility to have programmatic access to billing. The billing Programmatic access leverages the API (existing Amazon Simple Storage Service Amazon S3 .. Thus, the user can create applications that refer to its billing data to a CSV (comma separated values , file stored in a bucket Amazon S3. AWS download the invoice to the bucket every few hours and the user can download the bucket CSV invoice, analyze and create a billing system as per requirement.
4. Right Answer: E
Explanation: AWS Cloud formation is an application management tool that provides an application modeling, deployment, configuration, management and related activities. AWS Cloud Formation provides a resource wait condition which acts as a barrier and prevents the creation of other resources until a completion signal is received from an external source, such as a user application or management system .
5. Right Answer: B
Explanation: . A virtual private cloud (VPC is a virtual network dedicated to users AWS AWS account provides two features that the user can use to increase security in VPC ... Groups ACLs network security and work safety groups at the proceedings If the user uses the default security group, he will have a rule that allows authorities to communicate with others. for a new security group, the user must specify the rule, add it to define source as a security group itself, and select all protocols and ports for that source.
Leave a comment