Where possibilities begin

We’re a leading marketplace platform for learning and teaching online. Explore some of our most popular content and learn something new.
Total 3065 Blogs
Comptia A+ 1002 2023 Questions and answer - Part 57

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 57

Questions 1. A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT?A) A. Change the router firewall settingsB) B. Check for and apply a firmware updateC) C. Reconfigure the QoS settingsD) D. Change router user-names and passwords2. A user-s PC breaks and a technician needs to configure a new machine with a copy of their computer image stored on a remote server. Which of the following technologies would help RIS install this image?A) A. BRDB) B. DVDC) C. USBD) D. PXEE) E. CD3. A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless signal connection when the laptop screen is tilted forward or backward during operation. When this happens, the entire wireless signal drops out until the screen is left in position for a good minute or so. Which of the following MOST likely explains what is happening?A) A. The hinges on the laptop screen are not strong enough to support the wireless signal cables.B) B. The wireless card is losing contact to its socket when the screen is opening/closing.C) C. The laptop is designed to work optimally with wireless when the screen is at a perfect 90 degree angle.D) D. The wireless signal cables are being crimped when the screen is opening/closing.4. An administrator is in a Remote Assistance session, sharing a user-s desktop. While trying to map a shared network drive for the user, an -access denied error is encountered while using the user-s credentials. Which of the following should be the administrator-s NEXT step?A) A. Ensure the user-s account is not locked outB) B. Use the fully qualified domain name of the shareC) C. Open the location with administrator privilegesD) D. Try mapping with a different drive letter5. A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements?A) A. GPTB) B. LogicalC) C. MBRD) D. Extended Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: DExplanation: 3. Right Answer: DExplanation: 4. Right Answer: CExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia Linux + 2023 Questions and answer - Part 7

Created by - Mary Smith

Comptia Linux + 2023 Questions and answer - Part 7

Questions 1. When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?A) A. debugB) B. lsofC) C. nessusD) D. straceE) E. traceroute2. Which configuration file would be edited to change default options for the OpenSSH server?A) A. /etc/ssh/sshd_configB) B. /etc/ssh/sshC) C. /etc/ssh/serverD) D. /etc/ssh/ssh_configE) E. /etc/ssh/ssh_server3. Which configuration file does sudo read when determining if a user is permitted to run applications with root privileges?A) A. /etc/security.confB) B. /etc/supasswdC) C. /etc/sudoersD) D. /etc/sudo.conf4. Which of the following commands can be used to associate open TCP ports with the processes that opened the ports?A) A. ptraceB) B. straceC) C. debugD) D. nessusE) E. lsof5. Which of the following resources can be directly limited for a given user using ulimit? (Choose THREE correct answers.)(Select 3answers)A) A. Maximum seconds of CPU time spent.B) B. Maximum number of open file descriptors.C) C. Maximum number of processes available.D) D. Maximum number of concurrent login sessions.E) E. Maximum seconds of login duration per session. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: EExplanation: 5. Right Answer: A,B,CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 33

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 33

Questions 1. An organization is providing employees on the shop floor with computers that will log their time based on when they sign on and off the network. Which of the following account types should the employees receive?A) Shared accountB) Privileged accountC) User accountD) Service account2. An organization is trying to decide which type of access control is most appropriate for the network. The current access control approach is too complex and requires significant overhead. Management would like to simplify the access control and provide user with the ability to determine what permissions should be applied to files,document,and directories. The access control method that BEST satisfies these objectives is:A) Rule-based access controlB) Role-based access controlC) Mandatory access controlD) Discretionary access control3. An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?A) False negativeB) True negativeC) False positiveD) True positive4. An organization is working with a cloud services provider to transition critical business applications to a hybrid cloud environment. The organization retains sensitive customer data and wants to ensure the provider has sufficient administrative and logical controls in place to protect its data. In which of the following documents would this concern MOST likely be addressed?A) Service level agreementB) Interconnection security agreementC) Non-disclosure agreementD) Business process analysis5. An organization needs to implement a large PKI. Network engineers are concerned that repeated transmission of the OCSP will impact network performance. Which of the following should the security analyst recommend is lieu of an OCSP?A) CSRB) CRLC) CAD) OID Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Excel Certification Success Practice Questions 2023 - Part 1

Created by - Mary Smith

Excel Certification Success Practice Questions 2023 - Part 1

Questions 1. What is the shortcut key to insert the current date in Excel?A) Ctrl + ;B) Alt + ;C) Alt + Shift + ;D) Ctrl + Shift + ;2. What is the result of the formula =5+2*3 in Excel?A) 29B) 15C) 11D) 213. Which of the following is NOT a part of the Excel interface?A) Quick Access ToolbarB) TaskbarC) RibbonD) Status Bar4. Which of the following is NOT a valid function in Excel?A) SUMB) PRODUCTC) AVERAGED) INCREMENT5. What is the keyboard shortcut to apply the bold formatting to selected text in Excel?A) Alt + BB) F11C) Ctrl + BD) Shift + B Right Answer and Explanation: 1. Right Answer: AExplanation: The shortcut key to insert the current date in Excel is Ctrl + ;.2. Right Answer: CExplanation: The order of operations in Excel is multiplication and division before addition and subtraction. Therefore, the formula calculates as 5 + (2*3) = 11.3. Right Answer: BExplanation: The Taskbar is a part of the Windows operating system and not a part of the Excel interface.4. Right Answer: DExplanation: INCREMENT is not a valid function in Excel.5. Right Answer: CExplanation: The keyboard shortcut to apply the bold formatting to selected text in Excel is Ctrl + B. .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

APICS Certified Supply Chain Professional CSCPPractice Questions 2023 - Part 44

Created by - Mary Smith

APICS Certified Supply Chain Professional CSCPPractice Questions 2023 - Part 44

Questions 1. A company distributes its products through wholesale, retail stores, and its e-commerce website. Inventory and demand forecasting for each channel is managed separately. The company is experiencing high levels of obsolete inventory. Which of the following strategies is most likely to reduce the levels of obsolescence?A) Place smaller orders with suppliers.B) Pool inventory and the forecast.C) Open more outlet stores.D) Negotiate lower costs with suppliers.2. For an item with high profit impact and low supply risk, what would be a likely procurement strategy to support the overall supply strategy?A) Ensure supply, even at a premium cost.B) Vertically integrate the supply chain.C) Exploit purchasing power and minimize cost.D) Form a strategic sourcing group.3. Which of the following factors typically is most important to a company that uses the chase production strategy when evaluating potential suppliers for a component?A) Supplier×?â?¬â?¢s agilityB) Supplier×?â?¬â?¢s certification statusC) Quoted delivery timeD) Quoted total price4. Using financial tools to minimize the impact of currency fluctuations is an example of what type of risk management strategy?A) MitigationB) RecoveryC) PreventionD) Diversification5. Production of a company's highest profit items is dependent upon the purchase of high-quality circuit boards. Which level of collaboration should the company develop with their supplier?A) Pull replenishmentB) Strategic partnershipC) Revenue sharingD) Vendor-managed inventory (VMI) Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: CExplanation: Reference:https://www.mindtools.com/pages/article/newSTR_49.htm3. Right Answer: AExplanation: 4. Right Answer: AExplanation: 5. Right Answer: DExplanation: In the vendor-managed inventory (VMI) model, the vendor, through mutual agreement, has access to the customer's POS inventory data for items they supply.The vendor is responsible for maintaining the inventory level required by the customer and performs actual resupply. The inventory is counted, damaged or outdated goods are removed, and the inventory is restocked to predefined levels. The vendor obtains a receipt for the restocked inventory and accordingly invoices the customer. .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Implementing Cisco Collaboration Practice Test Questions 2023 - Part 4

Created by - Mary Smith

Implementing Cisco Collaboration Practice Test Questions 2023 - Part 4

Questions 1. After integrating Cisco Unity Express with Cisco Unified Communications Manager Express, users report that the system does not respond to their digit presses. Which two configuration snippets resolve this issue? (Choose two.)(Select 2answers)A) dial-peer voice 6800 voip destination-pattern 5... session protocol sipv2 session target ipv4:10.3.6.127 dtmf-relay sip-notify codec g729r8B) dial-peer voice 6800 voip destination-pattern 5... session protocol sipv2 session target ipv4:10.3.6.127 dtmf-relay rtp-nte codec g711ulawC) dial-peer voice 6800 voip destination-pattern 5... session protocol sipv2 session target ipv4:10.3.6.127 dtmf-relay sip-kpml codec g729r8D) dial-peer voice 6800 voip destination-pattern 5... session protocol sipv2 session target ipv4:10.3.6.127 dtmf-relay sip-notify codec g711ulaw2. Which dial-peer configuration routes calls from SIP-based phones on Cisco Unified Communications Manager Express to Cisco Unity Express?A) dial-peer voice 7000 voip destination-pattern 7000 session protocol sipv2 session target ipv4: 10.3.6.127 codec g729r6B) dial-peer voice 7000 voip destination-pattern 7000 session protocol sipv2 session target ipv4: 10.3.6.127 codec ilbC) dial-peer voice 7000 voip destination-pattern 7000 session protocol sipv2 session target ipv4: 10.3.6.127 codec g711alawD) dial-peer voice 7000 voip destination-pattern 7000 session protocol sipv2 session target ipv4: 10.3.6.127 codec g711ulaw3. Secure XMPP communication is required for XMPP federation with external domains and the Cisco IM and Presence. Which certificate is used for XMPP interdomain federation when connecting to an externally federated domain?A) cup-xmpp-s2sB) cup-xmppC) cupD) Tomcat4. Digital networking is configured between two Cisco Unity Connection clusters using an HTTPS connection. Which two objects are replicated between these two clusters? (Choose two.)(Select 2answers)A) users and their corresponding mailboxesB) user templates and user greetingsC) partitions and search spacesD) user greetings5. Which type of SRV record provides the location of Cisco Expressway-E?A) _cisco-uds._tcp.example.comB) cuplogin._tcp.example.comC) _collab-edge._tls.example.comD) Right Answer and Explanation: 1. Right Answer: B,DExplanation: 2. Right Answer: DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: A,CExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

AWS ANS-C00 Certified Advanced Networking Practice Questions 2023 - Part 24

Created by - Mary Smith

AWS ANS-C00 Certified Advanced Networking Practice Questions 2023 - Part 24

Questions 1. A Company currently uses the Net Flow software to monitor and get the details of the traffic that flows between systems in their On-premise network. They want to have the same ability when they start moving their servers to AWS. Which of the following service can help them meet this requirement?A) AWS Cloud watch logsB) AWS ConfigC) AWS Cloud watch metricsD) AWS VPC Flow Logs2. Your company is planning on trying out AWS(Amazon Web Service) Workspaces for 100 users. They want to use a directory service along with AWS(Amazon Web Service) workspaces. Which of the following would be the ideal option which will have a least administrative overhead and also be cost effective?A) Choose Simple AD to use along with AWS(Amazon Web Service) WorkspacesB) Deploy an AD domain server in a VPC and configure AWS(Amazon Web Service) Workspace to use the newly created AD Domain serverC) Choose AWS(Amazon Web Service) Directory Service to use along with AWS(Amazon Web Service) WorkspacesD) Choose an AD connector to use along with AWS(Amazon Web Service) Workspaces3. You have a set of Instances in your VPC that communicate over the lPv6 protocol. You need to ensure that traffic can flow from the Instances to the Internet but not vice versa. How ca you achieve this?A) Use an Egress only Internet gatewayB) Change the Internet gateway to only allow outbound traffic for lPvGC) Change the Security Groups to not allow Inbound Traffic on the InstancesD) Change the NACL?s to not allow Inbound Traffic on the Instances4. Your company currently has a VPC defined as 10.0.0.0/16. Subnets are defined in this VPC along with Instances created in the subnet. You need to ensure that resources In the VPC can resolve your on-premise DNS resources. How can you achieve this? Choose 2 answers from the options given below.(Select 2answers)A) Configure DHCP Options for your VPC to point to the EC2 Instance.B) Create a private hosted zone in Route53C) Configure DHCP Options for your Subnet to point to the EC2 Instance.D) Create an EC2 Instance in your VPC which will act as the DNS server5. Your company currently uses NAT instances to route traffic for Instances in private subnets. They need to convert these to NAT gateways to increase the amount of bandwidth required. They want to automate the provision. How can you accomplish this?A) Use Cloud formatlon templates to replace the NAT Instances with NAT gatewaysB) Use Ops work to replace the NAT instances with NAT gatewaysC) Use AWS(Amazon Web Service) Conflg to change the configuration of the NAT instance to a NAT gatewayD) Use AWS(Amazon Web Service) Inspector to replace the NAT instances with NAT gateways Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: AExplanation: 3. Right Answer: AExplanation: 4. Right Answer: A,DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

AWS Certified Cloud Practitioner Certification - Part 41

Created by - Mary Smith

AWS Certified Cloud Practitioner Certification - Part 41

Questions 1. What time-savings advantage is offered with the use of Amazon Rekognition?A) A. Amazon Rekognition provides automatic watermarking of images.B) B. Amazon Rekognition provides automatic detection of objects appearing in pictures.C) C. Amazon Rekognition provides the ability to resize millions of images automatically.D) D. Amazon Rekognition uses Amazon Mechanical Turk to allow humans to bid on object detection jobs2. When comparing AWS with on-premises Total Cost of Ownership (TCO), what costs are included?A) A. Data center security B) B. Business analysisC) C. Project managementD) D. Operating system administration3. According to the AWS shared responsibility model, what is AWS responsible for?A) A. Configuring Amazon VPC B) B. Managing application codeC) C. Maintaining application trafficD) D. Managing the network infrastructure4. Which service should be used to estimate the costs of running a new project on AWS?A) A. AWS TCO Calculator B) B. AWS Simple Monthly CalculatorC) C. AWS Cost Explorer APID) D. AWS Budgets5. Which AWS tool will identify security groups that grant unrestricted Internet access to a limited list of ports?A) A. AWS Organizations B) B. AWS Trusted AdvisorC) C. AWS Usage ReportD) D. Amazon EC2 dashboard Right Answer and Explanation: 1. Right Answer: BExplanation: Rekognition Image is an image recognition service that detects objects, scenes, and faces; extracts text; recognizes celebrities; and identifies inappropriate content in images. It also allows you to search and compare faces. Rekognition Image is based on the same proven, highly scalable, deep learning technology developed by Amazon's computer vision scientists to analyze billions of images daily for Prime Photos.https://aws.amazon.com/rekognition/faqs/2. Right Answer: AExplanation: https://www.awstcocalculator.com/Output/Load/f85bbf7e1314466439118595043. Right Answer: DExplanation: https://cloudacademy.com/blog/aws-shared-responsibility-model-security/4. Right Answer: BExplanation: To forecast your costs, use the AWS Cost Explorer. Use cost allocation tags to divide your resources into groups, and then estimate the costs for each group.https://aws.amazon.com/premiumsupport/knowledge-center/estimating-aws-resource-costs/5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

AWS Certified Security - Specialty - Part 44

Created by - Mary Smith

AWS Certified Security - Specialty - Part 44

Questions 1. You are designing a custom IAM policy that would allow uses to list buckets in S3 only if they are MFA authenticated. Which of the following would best match this requirement?A) { 'Version': '2012-10-17', 'Statement': { 'Effect': 'Allow', 'Action': [ 's3:ListAllMyBuckets', 's3:GetBucketLocation' ], 'Resource': 'Resource': 'arn:aws:s3:::*', 'Condition': { 'Bool': {'aws:MultiFactorAuthPresent':false} } } }B) { 'Version': '2012-10-17', 'Statement': { 'Effect': 'Allow', 'Action': [ 's3:ListAllMyBuckets', 's3:GetBucketLocation' ], 'Resource': 'Resource': 'arn:aws:s3:::*', 'Condition': { 'aws:MultiFactorAuthPresent':false } } }C) { 'Version': '2012-10-17', 'Statement': { 'Effect': 'Allow', 'Action': [ 's3:ListAllMyBuckets', 's3:GetBucketLocation' ], 'Resource': 'Resource': 'arn:aws:s3:::*', 'Condition': { 'aws:MultiFactorAuthPresent':true } } }D) { 'Version': '2012-10-17', 'Statement': { 'Effect': 'Allow', 'Action': [ 's3:ListAllMyBuckets', 's3:GetBucketLocation' ], 'Resource': 'Resource': 'arn:aws:s3:::*', 'Condition': { 'Bool': {'aws:MultiFactorAuthPresent': true} } } }2. An application running on EC2 instances must use a username and password to access a database. The developer has stored those secrets in the SSM Parameter Store with type SecureString using the default KMS CMK.Which combination of configuration steps will allow the application to access the secrets via the API? Select 2 answers from the options below(Select 2answers)A) Add permission to use the KMS key to decrypt to the EC2 instance roleB) Add permission to read the SSM parameter to the EC2 instance role.C) Add the SSM service role as a trusted service to the EC2 instance role.D) Add permission to use the KMS key to decrypt to the SSM service role.E) Add the EC2 instance role as a trusted service to the SSM service role.3. Your company has defined privileged users for their AWS(Amazon Web Service) Account. These users are administrators for key resources defined in the company. There is now a mandate to enhance the security authentication for these users. How can this be accomplished?A) Enable accidental deletion for these user accountsB) Enable MFA for these user accountsC) Disable root access for the users (Incorrect)D) Enable versioning for these user accounts4. A new application will be deployed on EC2 instances in private subnets. The application will transfer sensitive data to and from an S3 bucket. Compliance requirements state that the data must not traverse the public Internet. Which solution meets the compliance requirement?A) Access the 53 bucket through a NAT gateway.B) Access the 53 bucket through a VPC endpo Ent for 53C) Access the 53 bucket through a proxy serverD) Access the 53 bucket through the SSL protected 53 endpoint5. You have a set of Keys defined using the AWS(Amazon Web Service) KMS service. You want to stop using a couple of keys, but are not sure of which services are currently using the keys. Which of the following would be a safe option to stop using the keys from further usage?A) Set an alias for the keyB) Change the key material for the keyC) Disable the keysD) Delete the keys since anyway there is a 7 day waiting period before deletion Right Answer and Explanation: 1. Right Answer: DExplanation: The Condition clause can be used to ensure users can only work with resources if they are MFA authenticated. Option B and C are wrong since the aws:MultiFactorAuthPresent clause should be marked as true. Here you are saying that only if the user has been MFA activated , that means it is true , then allow access. Option D is invalid because the 'bool clause is missing in the evaluation for the condition clause. For more information on an example on such a policy, please visit the following url https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_examples_aws_mfa-dates.html2. Right Answer: A,BExplanation: The below example policy from the AWS(Amazon Web Service) Documentation is required to be given to the EC2 Instance in order to read a secure string from AWS(Amazon Web Service) KMS. Permissions need to be given to the Get Parameter API and the KMS API call to decrypt the secret. { 'Version': '2012-10-17', 'Statement': [ { 'Effect': 'Allow', 'Action': [ 'ssm:GetParameter*' ], 'Resource': 'arn:aws:ssm:us-west-2:111122223333:/parameter/ReadableParameters/*' }, { 'Effect': 'Allow', 'Action': [ 'kms:Decrypt' ], 'Resource': 'arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab' } ] } Option A is invalid because roles can be attached to EC2 and not EC2 roles to SSM Option B is invalid because the KMS key does not need to decrypt the SSM service role. Option E is invalid because this configuration is valid For more information on the parameter store, please visit the below URL https://docs.aws.amazon.com/kms/latest/developerguide/services-parameter-store.html3. Right Answer: BExplanation: The AWS(Amazon Web Service) Documentation mentions the following as a best practise for IAM users For extra security, enable multi-factor authentication (MFA) for privileged IAM users (users who are allowed access to sensitive resources or APIs). With MFA, users have a device that generates a unique authentication code (a one-time password, or OTP). Users must provide both their normal credentials (like their user name and password) and the OTP. The MFA device can either be a special piece of hardware, or it can be a virtual device (for example, it can run in an app on a smartphone). Option B,C and D are invalid because no such security options are available in AWS For more information on IAM best practises, please visit the below URL ttps://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html4. Right Answer: BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Search
Popular categories
Latest blogs
CA Foundation Business Economics Questions 2023 - Part 32
CA Foundation Business Economics Questions 2023 - Part 32
Questions 1. Generally an economy is considered under developed ifA) The standard of living of people & Productivity is low.B) Agriculture is the main occupation of the peopleC) The production techniques are backward.D) All of the above.2. Which of the following statement is correct?A) Agriculture occupies 10 per cent population of India.B) Nearly 5 per cent population of India is below the poverty line.C) The production techniques in agriculture are backward.D) None of the above.3. Which of the statements is correct?A) The tertiary sector contributes the maximum to the GDP.B) India is basically a socialist economy.C) The distribution of income and wealth is quite equitable.D) None of the above.4. In perfect competition in the short run there will be __________ possibilitiesA) Normal profits.B) Supernormal profits.C) LossD) All of above5. ______________ measure generally gives the lowest estimate of unemployment especially for poor economy.A) Usual status.B) CWS.C) CDS.D) CMS. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 31
CA Foundation Business Economics Questions 2023 - Part 31
Questions 1. When the price of a complementary of commodity X falls, the demand for X-A) FallsB) RisesC) Remains unchangedD) any of the above2. Which of the following is the method of measuring elasticity of demand when change in price of a commodity is substantial?A) Arc methodB) Point methodC) Percentage methodD) none of the above3. FERA stands for -A) Foreign Exchange Recommendation ActB) Foreign Exchange Regulation ActC) Finance and Export Regulation AssociationD) Funds Export Revaluation Act4. Nearly _____percent of working population is engaged in the service sector.A) 23 per centB) 45 per centC) 80 per centD) 50 per cent5. ACRP stands for â??A) Agro-Commodity Regional PlanningB) Agro-Climatic Rational PlanningC) Agro-Climatic Regional PlanningD) Allied-Climatic Regional Planning Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 30
CA Foundation Business Economics Questions 2023 - Part 30
Questions 1. Literacy rate calculated considering total population into account is known asA) Crude Literacy RateB) Total Literacy RateC) Mean Literacy RateD) None of the above2. In order to encourage investment in the economy, the RBI mayA) Increase Bank RateB) Sell securities in the open marketC) Buy securities in the open marketD) None of above3. Most of unemployment in India is __________A) VoluntaryB) StructuralC) FrictionalD) Technical4. Under a Command economy â??A) State plays a major roleB) Market plays major roleC) Both a & bD) Neither a nor b5. _______is the apex bank for agriculture credit in India.A) RBIB) SIDBIC) NABARDD) ICICI Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

All blogs