1. Right Answer: E
Explanation: The user can view, download and watch the log database using the Amazon RDS console, command line interface (CLI., Or API Amazon ROS., User To My SQL RDS can view the error log, slow query log, and general. RDS newspapers do not support the transaction log display.
2. Right Answer: C
Explanation: In EC2, when the user copies an AMI, the new AMI is completely independent of the source AMI; there is no link to the original (source. AMI. The user can modify the AMI source without affecting the new AMI and vice a versa. Therefore, in this case, even if you change the source AMI AMI copied from the EU region will not change. Thus, after copying the user needs to copy the new source AMI in the region of destination for these changes.
3. Right Answer: A
Explanation: When the user creates an EBS volume and try to access it for the first time it reduces IOPS game due to wiping or block storage launch. To avoid this, and to achieve the best performance, it is necessary to pre heat the EBS volume. For a volume created from a snapshot and tied with a Linux operating system, à ¬ ¬ Å?CTDà control heats pre existing data and EBS snapshots of restored volumes that were previously pre warmed completely. This command keeps incremental snapshots; However, because this operation is read only, it does not exist before hot unused space that has never been written on the initial volume. In the command à ¬ Å?dd if4dev / xvdf of = / dev / NUL Ma ¬ BS1, the 9E = parameter input Filea ¬ must be set to the reader that the user wishes to warm up. The à ¬ Å?of = output Filea ¬ Ÿ should be set on the virtual null Linux device, / dev / null The à ¬ ¬ Å?BSà parameter specifies the block size of the read operation; for optimal performance, it must be 1 MB.
4. Right Answer: D
Explanation: Elastic Load Balancing access logs capture detailed information on all requests to the load balancer. Each application will have details such as client IP, path of the request, ELB IP, time and latencies. The time information, such as application processing time backend processing time and response processing time.
5. Right Answer: A
Explanation: The admin A can grant permission to S3 buckets or objects to any user or to public policy objects using the bucket and user policy. Both use the language of the JSON based access policy. In general, if the user sets the ACL on the bucket, the objects in the bucket do not Inherit and vice versa a. The bucket policy can be defined at the level of the bucket, which allows objects and the bucket to be a unique public policy applied to this bucket. In the following policy action tells ¬ Å?S3: ListBucketà ¬ Allow effect and when there is no name mentioned bucket as part of the resource, it returns an error and not the backup policy. à ¬ Å?Statementà ¬ Ÿ {à ¬ Ÿ ¬ Å?Sidà : stmtl 388811069831à ¬, à ¬ ¬ Å?Effectà : A1lowà ¬, à ¬ Å?Principalà ¬ (à ¬ ¬ Å?AWSà :} à ¬ Ÿ :. Å?Actionà ¬ [à ¬ Å?s3: GetObjectAclà ¬ Ÿ à ¬ Å?s3: ListBucketà ¬, à ¬ Å?s3: J GetObjectA ¬, à ¬ Ÿ Å?Resourceà ¬ (à ¬ ZAM: aws: s3 :: à ¬ ¬ Å?Statementà : {academy cloud / * jpg j == ========================
Leave a comment