Created by - Mary Smith
Questions 1. In a large organization requesting outsourced services, which of the following contract clauses is MOST important to the information security manager?A) Compliance with security requirementsB) Frequency of status reportingC) Nondisclosure clauseD) Intellectual property2. Which of the following service offerings in a typical Infrastructure as a Service (IaaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?A) Availability of current infrastructure documentationB) Capability to take a snapshot of virtual machinesC) Availability of web application firewall logsD) Capability of online virtual machine analysis3. Which of the following is the BESTapproach for an information security manager when developing new information security policies?A) Create a stakeholder map.B) Reference an industry standard.C) Establish an information security governance committee.D) Download a policy template.4. The FIRST step in establishing an information security program is to:A) define policies and standards that mitigate the organization's risksB) secure organizational commitment and support.C) assess the organization's compliance with regulatory requirements.D) determine the level of risk that is acceptable to senior management.5. Due to budget constraints, an internal IT application does not include the necessary controls to meet a client service level agreement (SLA).Which of the following is the information security manager's BEST course of action?A) Inform the legal department of the deficiency.B) Analyze and report the issue to senior management.C) Require the application owner to implement the controls.D) Assess and present the risks to the application owner. Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: BExplanation: 3. Right Answer: CExplanation: 4. Right Answer: BExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A Google account on an Android device by default will synchronize to which of the following locations?A) A. CloudB) B. SSDC) C. PC desktopD) D. MicroSD2. A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?A) A. TRACERTB) B. NETSTATC) C. IPCONFIGD) D. NSLOOKUP3. An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technician-s FIRST step in troubleshooting the problem?A) A. Run defrag on the hard driveB) B. Restore the CAD files from backupC) C. Replace the hard driveD) D. Remove and reinstall the CAD software4. Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO).(Select 2answers)A) A. Use multi-factor authenticationB) B. Require strong passwordsC) C. Enable file encryptionD) D. Educate end usersE) E. Restrict user permissions5. Which of the following is TRUE about the difference between a worm and a virus?A) A. Worms are written in assembly while viruses are written with scripting languages.B) B. Viruses hide in the boot record while worms hide within the file system.C) C. Worms self propagate while viruses need human intervention to replicate.D) D. Viruses disable the antivirus update service while worms kill the antivirus process. Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: AExplanation: 3. Right Answer: AExplanation: 4. Right Answer: A,DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12?(Select 2answers)A) A. *.* /dev/tty12B) B. /var/log/messages | /dev/tty12C) C. | /dev/tty12D) D. syslog tty12E) E. mail.* /dev/tty122. What is true regarding the file ~/.forward?A) A. As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command.B) B. After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.C) C. Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses.D) D. When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.3. Which of the following commands is used to rotate, compress, and mail system logs?A) A. rotatelogB) B. striplogC) C. syslogd --rotateD) D. logrotateE) E. logger4. How many bits make up an IPv6 address?A) A. 32B) B. 48C) C. 64D) D. 128E) E. 2565. Which of the following files is consulted when programs like netstat try to match port numbers to names?A) A. /etc/networksB) B. /etc/portmapperC) C. /etc/protocolsD) D. /etc/resolv.confE) E. /etc/services Right Answer and Explanation: 1. Right Answer: A,CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: DExplanation: 4. Right Answer: DExplanation: 5. Right Answer: EExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An incident response analyst at a large corporation is reviewing proxy log data. The analyst believes a malware infection may have occurred. Upon further review,the analyst determines the computer responsible for the suspicious network traffic is used by the Chief Executive Officer (CEO). Which of the following is the best NEXT step for the analyst to take?A) Call the CEO directly to ensure awareness of the eventB) Run a malware scan on the CEO - s workstationC) Reimage the CEO - s workstationD) Disconnect the CEO - s workstation from the network2. An incident response manager has started to gather all the facts related to a SIEM alert showing multiple systems may have been compromised. The manager has gathered these facts: The breach is currently indicated on six user PCs One service account is potentially compromised Executive management has been notified In which of the following phases of the IRP is the manager currently working?A) RecoveryB) EradicationC) ContainmentD) Identification3. An information security analyst needs to work with an employee who can answer questions about how data for a specific system is used in the business. The analyst should seek out an employee who has the role of:A) stewardB) ownerC) privacy officerD) systems administrator4. An information system owner has supplied a new requirement to the development team that calls for increased non-repudiation within the application. After undergoing several audits,the owner determined that current levels of non-repudiation were insufficient. Which of the following capabilities would be MOST appropriate to consider implementing is response to the new requirement?A) Transitive trustB) Symmetric encryptionC) Two-factor authenticationD) Digital signaturesE) One-time passwords5. An in-house penetration tester has been asked to evade a new DLP system. The tester plans to exfiltrate data through steganography. Discovery of which of the following would help catch the tester in the act?A) Abnormally high numbers of outgoing instant messages that contain obfuscated textB) Large-capacity USB drives on the tester's desk with encrypted zip filesC) Outgoing emails containing unusually large image filesD) Unusual SFTP connections to a consumer IP address Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: DExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A company that sells direct to industrial and commercial businesses has become successful by being responsive to the needs of its customers. The company currently produces in each country all of the products it sells in that country. Several countries in which the company operates have negotiated an agreement to establish a trading bloc. Which of the following actions by the company would be most appropriate if the agreement is implemented?A) Consolidate production outside the trading bloc to reduce total costs.B) Consolidate production within the trading bloc to reduce tariffs paid.C) Outsource the production of products with low sales volumes to reallocate capacity.D) Reassign products so that each is produced in a single facility within the trading bloc to get economies of scale.2. The transportation manager at a consumer goods manufacturer has decided to begin shipping full truckload rather than less-than-truckload quantities. Which of the following outcomes is likely following implementation of this decision?A) Inventory levels at the manufacturer will decrease.B) Lead times as seen by the customer will increase.C) Production efficiencies at the manufacturer will increase.D) Transportation costs as seen by the customer will increase.3. Which of the following processes would a company use to evaluate the risk profile for end-of-life planning for a product family?A) Distribution requirements planningB) Sales and operations planningC) Rough-cut capacity planningD) Production activity control4. A business is changing from a business to business model to a business to consumer model. Which of the following statements about this supply chain change is true?A) Returns from customers will decrease.B) Number of supplier orders will increase.C) Number of customer orders will increase.D) Average supplier order size will increase.5. Which of the following actions is most likely to increase total supply chain risk?A) Standardizing components used in a product familyB) Expanding operations to multiple locationsC) Consolidating manufacturing locationsD) Reducing the supplier base for commodity-type components Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: BExplanation: 3. Right Answer: BExplanation: 4. Right Answer: CExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. What are two differences between SNMP and model-driven telemetry? (Choose two.)(Select 2answers)A) SNMP uses a push model.B) Model-driven telemetry uses a push modelC) SNMP uses a continuous stream modelD) SNMP uses a pull model.2. What is a feature of modeldriven telemetry?A) continuously pulls data out of the networkB) continuously streams data out of the networkC) randomizes the data coming to the networkD) randomizes the data out of the network3. Which step must be taken to enable the REST API browser within Cisco UCS Director?A) Edit the user profile and enable developer optionsB) Raise a case with TACC) The REST API browser is automatically enabled in Cisco UCS Director when a Power User is createdD) Log in as the user 'REST'4. Which two statements apply to authentication when using the Cisco Intersight API? (Choose two.)(Select 2answers)A) Secret Key is only available at API Key creation timeB) An API Key is composed of a Key ID and Secret Key.C) The user credentials for the cisco.com accounts are shared with the Cisco Intersight Web ServiceD) Each API Key can be assigned specific roles but not privileges5. Which two bootstrap technologies are supported by Cisco NX-OS platforms? (Choose two.)(Select 2answers)A) iPXEB) POAPC) PNPD) BOOTP Right Answer and Explanation: 1. Right Answer: B,DExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: A,BExplanation: 5. Right Answer: A,BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Your company is planning on delivering content via an application hosted on a set of EC2 Instances. The end devices can be laptops, mobile devices , tablets etc. The content needs to be customized based on the type of end user device. Which of the following can help fulfill this requirement and also ensure that cost is MINIMIZED and MAXIMUM ease of deployment?(Select 2answers)A) Network Load BalancersB) Cloud front with Lambda @EdgeC) App streamD) Application Load Balancers2. You have configured a hosted zone in Route 53. You need to have the ability to see the types of records being requested to the zone. How can you configure this?A) Configure Cloud watch metricsB) Configure VPC Flow LogsC) Configure Cloud trailD) Configure Amazon Route 53 logging3. You are planning on using VPC Flow logs to monitor the traffic to EC2 Instances in your VPC. Which of the following types of traffic will not get monitored by VPC Flow logs. Choose 2 answers from the options given belowA) Instances that have Elastic IP?s assigned to the ENIB) Instances which have multiple EnrsC) Requests for Instance metadataD) Traffic that flow to Amazon DNS servers4. Your company has a 3 tier application that consists of a Web , Application and Database Tier. The application is based on delivering REST ful services. They have Auto scaling Groups for the EC2 Instances for the Web and Application Tier. You now want to add high availability to the Tiers, but it needs to ensured that each tier can be scaled independently. How would you architect. Choose the most PREFERRED option.A) Create separate Classic Load Balancers for the Web and Application Tiers.B) Create an Application Load Balancer and add separate target groups for the Web and Application TierC) Create an Application Load Balancer for the Application Tier and a classic load balancer for the Web TierD) Create a Classic Load Balancer and add multiple targets for the Web and Application Tier.5. You?ve setup a Cloud front distribution in AWS. You?re planning on conducting a primary load test to see the performance of the Cloud front distribution. Which of the following factors must you keep in mind when performing the load test. Choose 2 answers from the options given below ?(Select 2answers)A) Ensure to initiate client requests from multiple geographic regionsB) Ensure that SSL is turned on for the distributionC) Configure your test so each client makes an independent DNS requestD) Ensure that client requests hit the origin server Right Answer and Explanation: 1. Right Answer: B,DExplanation: 2. Right Answer: DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: BExplanation: 5. Right Answer: A,DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following is an AWS Well-Architected Framework design principle related to reliability?A) A. Deployment to a single Availability Zone B) B. Ability to recover from failureC) C. Design for cost optimizationD) D. Perform operations as code2. Which type of AWS storage is ephemeral and is deleted when an instance is stopped or terminated?A) A. Amazon EBS B) B. Amazon EC2 instance storeC) C. Amazon EFSD) D. Amazon S33. What is an advantage of using the AWS Cloud over a traditional on-premises solution?A) A. Users do not have to guess about future capacity needs. B) B. Users can utilize existing hardware contracts for purchases.C) C. Users can fix costs no matter what their traffic is.D) D. Users can avoid audits by using reports from AWS.4. Which of the following is an AWS-managed compute service?A) A. Amazon SWFB) B. Amazon EC2C) C. AWS LambdaD) D. Amazon Aurora5. Which of the following is an important architectural principle when designing cloud applications?A) A. Store data and backups in the same region.B) B. Design tightly coupled system componentsC) C. Avoid multi-threading.D) D. Design for failure. Right Answer and Explanation: 1. Right Answer: BExplanation: https://aws.amazon.com/blogs/apn/the-5-pillars-of-the-aws-well-architected-framework/2. Right Answer: BExplanation: When you stop or terminate an instance, every block of storage in the instance store is reset. Therefore, your data cannot be accessed through the instance store of another instance.https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/InstanceStorage.html3. Right Answer: AExplanation: https://data-flair.training/blogs/aws-advantages/4. Right Answer: BExplanation: 5. Right Answer: DExplanation: There are six design principles for operational excellence in the cloud: Perform operations as code Annotate documentation Make frequent, small, reversible changes Refine operations procedures frequently Anticipate failure Learn from all operational failureshttps://aws.amazon.com/blogs/apn/the-5-pillars-of-the-aws-well-architected-framework/ .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Every application in a company's portfolio has a separate AWS(Amazon Web Service) account for development and production. The security team wants to prevent the root user and all IAM users in the production accounts from accessing a specific set of unneeded services. How can they control this functionality?A) Create an IAM policy that denies access to the services. Associate the policy with an IAM group and enlist all users and the root users in this group. (Incorrect)B) Create an IAM policy that denies access to the services. Create a Config Rule that checks that all users have the policy assigned. Trigger a Lambda function that adds the policy when found missing.C) Create a Service Control Policy that denies access to the services. Assemble all production accounts in an organizational unit. Apply the policy to that organizational unit.D) Create a Service Control Policy that denies access to the services. Apply the policy to the root account.2. You want to track access requests for a particular 53 bucket. How can you achieve this in the easiest possible way?A) Enable server access logging for the bucketB) Enable Cloud watch logs for the bucketC) Enable AWS(Amazon Web Service) Config for the 53 bucketD) Enable Cloud watch metrics for the bucket3. Your company makes use of S3 buckets for storing data. There is a company policy that all services should have logging enabled. How can you ensure that logging is always enabled for created S3 buckets in the AWS(Amazon Web Service) Account?A) Use AWS(Amazon Web Service) Config Rules to check whether logging is enabled for bucketsB) Use AWS(Amazon Web Service) Inspector to inspect all S3 buckets and enable logging for those where it is not enabledC) Use AWS(Amazon Web Service) Cloudwatch metrics to check whether logging is enabled for bucketsD) Use AWS(Amazon Web Service) Cloudwatch logs to check whether logging is enabled for buckets (Incorrect)4. Your company has confidential documents stored in the simple storage service. Due to compliance requirements, you have to ensure that the data in the S3 bucket is available in a different geographical location. As an architect what is the change you would make to comply with this requirement.A) Enable Cross region replication for the S3 bucketB) Create a snapshot of the S3 bucket and copy it to another regionC) Copy the data to an EBS Volume in another RegionD) Apply Multi-AZ for the underlying S3 bucket5. A company hosts a popular web application that connects to an Amazon RDS MySQL DB instance running in a private VPC subnet that was created with default ACL settings. The IT Security department has a suspicion that a DDos attack is coming from a suspecting IP. How can you protect the subnets from this attack? Please select:A) Change the In bound Security Groups to deny access from the suspecting IPB) Change the Outbound Security Groups to deny access from the suspecting IPC) Change the Inbound NACL to deny access from the suspecting IPD) Change the Outbound NACL to deny access from the suspecting lP Right Answer and Explanation: 1. Right Answer: CExplanation: As an administrator of the master account of an organization, you can restrict which AWS(Amazon Web Service) services and individual API actions the users and roles in each member account can access. This restriction even overrides the administrators of member accounts in the organization. When AWS(Amazon Web Service) Organizations blocks access to a service or API action for a member account, a user or role in that account can't access any prohibited service or API action, even if an administrator of a member account explicitly grants such permissions in an IAM policy. Organization permissions overrule account permissions. Option B is invalid because service policies cannot be assigned to the root account at the account level. Option C and D are invalid because IAM policies alone at the account level would not be able to suffice the requirement For more information on attaching an IAM policy to a group, please visit the below URL https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups_manage_attach-policy.html2. Right Answer: AExplanation: 3. Right Answer: AExplanation: This is given in the AWS(Amazon Web Service) Documentation as an example rule in AWS(Amazon Web Service) Config Option A is invalid because AWS(Amazon Web Service) Inspector cannot be used to scan all buckets Option C and D are invalid because Cloudwatch cannot be used to check for logging enablement for buckets. For more information on Config Rules please see the below link https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config-rules.html4. Right Answer: AExplanation: This is mentioned clearly as a use case for S3 cross-region replication You might configure cross-region replication on a bucket for various reasons, including the following: Compliance requirements ' Although, by default, Amazon S3 stores your data across multiple geographically distant Availability Zones, compliance requirements might dictate that you store data at even further distances. Cross-region replication allows you to replicate data between distant AWS(Amazon Web Service) Regions to satisfy these compliance requirements. Option A is invalid because Multi-AZ cannot be used to S3 buckets Option B is invalid because copying it to an EBS volume is not a recommended practice Option C is invalid because creating snapshots is not possible in S3 For more information on S3 cross-region replication, please visit the following url https://docs.aws.amazon.com/AmazonS3/latest/dev/crr.html5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review