Created by - Mary Smith
Questions 1. A network administrator notices a new WiFi connection has appeared as a wireless network choice and is always at the top of the list. As a result, users are constantly trying to connect to the wrong network. Which of the following should the administrator do to correct this issue?A) A. Adjust the wireless router antennas to 90 degrees clockwise from the current position.B) B. Ask the new wireless network owner to adjust the radio power level so it is listed below the company-s network.C) C. Set all of the WiFi users- wireless profiles to automatically connect to the company network.D) D. Change the company-s channel to a lower number than the new network-s channel.2. An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue?A) A. The HIPS device is blocking the messagesB) B. The access control list is blocking the messagesC) C. The email filter has quarantined the messagesD) D. The firewall is blocking the sender-s email address3. A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?A) A. Re-join the computer to the domainB) B. Reboot the PC as the domain will automatically rebuild the relationshipC) C. Update the BIOS using the latest versionD) D. Run CHKDSK4. A user wants to save a file into another user-s directory, but the file save is denied. Which of the following is the MOST likely reason the file save cannot be completed?A) A. The user must be a member of the Users groupB) B. The user requires write permissions to the folderC) C. The user requires read permission to the folderD) D. The user must be a member of the Administrators group5. A technician is installing a wireless network and wants to limit the signal available outside the building. Which of the following would help accomplish this?A) A. Place directional antennasB) B. Use omni-directional antennasC) C. Enable MAC filteringD) D. Disable SSID broadcast Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: BExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following commands changes the ownership of file.txt to the user dan and the group staff?A) A. chown dan/staff file.txtB) B. chown dan:staff file.txtC) C. chown -u dan -g staff file.txtD) D. chown dan -g staff file.txt2. Which of the following commands makes /bin/foo executable by everyone but writable only by its owner?A) A. chmod u=rwx,go=rx /bin/fooB) B. chmod o+rwx,a+rx /bin/fooC) C. chmod 577 /bin/fooD) D. chmod 775 /bin/foo3. Which of the following commands can be used to search for the executable file foo when it has been placed in a directory not included in $PATH?A) A. aproposB) B. whichC) C. findD) D. queryE) E. whereis4. What does the command mount -a do?A) A. It ensures that all file systems listed with the option noauto in /etc/fstab are mounted.B) B. It shows all mounted file systems that have been automatically mounted.C) C. It opens an editor with root privileges and loads /etc/fstab for editing.D) D. It ensures that all file systems listed with the option auto in /etc/fstab are mounted.E) E. It ensures that all file systems listed in /etc/fstab are mounted regardless of their options.5. Which of the following settings for umask ensures that new files have the default permissions -rw-r----- ?A) A. 0017B) B. 0640C) C. 0038D) D. 0027 Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: DExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following is a random value appended to a credential that makes the credential less susceptible to compromise when hashed?A) IVB) NonceC) OTPD) Block cipherE) Salt2. A security administrator has completed a monthly review of DNS server query logs. The administrator notices continuous name resolution attempts from a large number of internal hosts to a single Internet addressable domain name. The security administrator then correlated those logs with the establishment of persistent TCP connections out to this domain. The connections seem to be carrying on the order of kilobytes of data per week. Which of the following is the MOST likely explanation for this anomaly?A) Internal hosts have become members of a botnet.B) Employees are playing multiplayer computer games.C) An attacker is exfiltrating large amounts of proprietary company data.D) A worm is attempting to spread to other hosts via SMB exploits.3. A security administrator is creating a subnet on one of the corporate firewall interfaces to use as a DMZ which is expected to accommodate at most 14 physical hosts. Which of the following subnets would BEST meet the requirements?A) 192.168.2.32/27B) 192.168.0.16/28C) 192.168.1.50 255.255.25.240D) 192.168.0.16 255.25.255.2484. A security administrator is configuring a RADIUS server for wireless authentication. The configuration must ensure client credentials are encrypted end-to-end between the client and the authenticator. Which of the following protocols should be configured on the RADIUS server? (Choose two.)(Select 2answers)A) PAPB) SAMLC) NTLMD) MSCHAPE) PEAP5. A portable data storage device has been determined to have malicious firmware. Which of the following is the BEST course of action to ensure data confidentiality?A) Re-image the deviceB) Physically destroy the deviceC) Perform virus scan in the deviceD) Format the device Right Answer and Explanation: 1. Right Answer: EExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: D,EExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which Excel function can be used to perform a sensitivity analysis?A) Goal SeekB) Data TablesC) Scenario ManagerD) Forecasting2. Which of the following Excel features is used to determine the optimal value of a cell based on a specific goal?A) What-If AnalysisB) Scenario ManagerC) Goal SeekD) Solver3. Which of the following is an example of a data visualization tool in Excel?A) VLOOKUP functionB) Scenario ManagerC) Trend AnalysisD) Pie chart4. Which of the following statements about the Scenario Manager in Excel is true?A) It is used to create and compare multiple scenarios based on different inputs.B) It is used to create custom charts and graphs.C) It is used to analyze large data sets using statistical functions.D) It is used to validate and check the accuracy of data entered into a worksheet.5. Which Excel tool can be used to perform optimization and find the best solution to a problem?A) SolverB) Goal SeekC) Scenario ManagerD) Trend Analysis Right Answer and Explanation: 1. Right Answer: BExplanation: Data Tables can be used to perform a sensitivity analysis.2. Right Answer: CExplanation: The Goal Seek feature is used to determine the optimal value of a cell based on a specific goal.3. Right Answer: DExplanation: A pie chart is an example of a data visualization tool in Excel.4. Right Answer: AExplanation: The Scenario Manager is used to create and compare multiple scenarios based on different inputs.5. Right Answer: AExplanation: Solver is the Excel tool used to perform optimization and find the best solution to a problem. .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. The most appropriate frequency for the sales and operations planning process typically is:A) weekly.B) monthly.C) quarterly.D) annually.2. Successfully using a sales and operations planning (S&OP) process requires which of the following actions?A) Focusing on performance of the past 12 to 18 monthsB) Implementing a unified cross-functional processC) Implementing bottom-up decision makingD) Aligning the forecast to the annual budget3. A master production schedule serves a company best by functioning as a:A) dispatch list.B) forecast system buffer.C) priority planning tool.D) supplier scheduling system.4. In an advanced planning system, which of the following modules feeds the master planning module?A) Purchasing planningB) Demand planningC) Distribution planningD) Fulfillment planning5. The globalization of a supply chain typically increases challenges in communication and:A) production lead time.B) local competition.C) documentation complexity.D) product standardization. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: BExplanation: 3. Right Answer: CExplanation: 4. Right Answer: BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. What are the elements for Device Mobility configuration?A) physical location, device pool, and Device Mobility groupB) device pool, Device Mobility group, and regionC) device pool, Device Mobility group, and Cisco IP phoneD) physical location. Device Mobility group, and region2. A user reports when they press the services key they do not receive a user ID and password prompt to assign the phone extension. Which action resolves the issue?A) Create the end user and associate it to the device profileB) Create the default device profiles for all phone models that are usedC) Assign the extension as a mobile extensionD) Subscribe the phone to the Cisco Extension Mobility service3. Which call pickup feature allows users to pick up incoming calls in a group that is associated with their own group?A) Directed Call PickupB) Other Group PickupC) BLF Call PickupD) Group Call Pickup4. The Cisco Unified Communications Manager Dialed Number Analyzer allows analysis of calls from which two devices? (Choose two.)(Select 2answers)A) IP phonesB) CTI portsC) translation patternsD) device pools5. Configure Call Queuing in Cisco Unified Communications Manager. Where do you set the maximum number of callers in the queue?A) in the queuing configurationB) in Cisco Unified CM Enterprise ParametersC) in Cisco Unified CM Service ParametersD) in the telephony service configuration Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: DExplanation: 3. Right Answer: BExplanation: 4. Right Answer: A,BExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. You have the EC2 Instance, which is responsible for processing a lot of video and audio. There is a requirement to ensure maximum performance EC2 Instance, when it comes to handling the packet network. How can this be achieved? Select 2 response options below(Select 2answers)A) Make sure your MTU is set to 9001 for the VPCB) Choose t2.medlum example, typeC) Make sure your MTU is set to 9001 instanceD) To ensure that, for example, supports a rotor I / O virtualization2. You have to setup the EC2 instance that hosts the web application. You have set the following rules � � � Security group o rules allow incoming traffic on port 80 from 0.0.0.0/0 No Deny Outbound traffic � � � No NaCl allow incoming traffic on port 80 from 0.0.0.0/0 No Deny outgoing traffic users complain that they can not access the web server. How can we ensure that the problem gets resolved?A) Outbound traffic is allowed NaCl port 80B) Allow Outgoing traffic protection groups gate 80C) NoneD) Allow Outgoing traffic protection for short-term groups of portsE) Outbound traffic is allowed NaCl for short-term ports3. You?re hosting an NGINX web server running on port 80 on an EC2 Instance. Users are not able to access the server running on port 80. Which of the following could be an issue ?A) The Security Group does not allow inbound traffic on ephemeral portsB) The Security Group does not allow outbound traffic on port 80C) The NACL don?t allow inbound traffic on ephemeral portsD) The NACL dont allow outbound traffic on ephemeral ports4. When configuring a Public VIF for AWS(Amazon Web Service) Direct Connect, which of the following is not required in the configurationA) Router Peer IPB) Virtual Private GatewayC) VLAN IDD) BGPASN5. Which of the following can be used to control how far your routes gets advertised when using AWS(Amazon Web Service) Direct Connect and a public VIF?A) Use BGP headersB) Use AS....PATH pretendingC) Use MEDXD) Use BGP communities Right Answer and Explanation: 1. Right Answer: A,DExplanation: 2. Right Answer: EExplanation: 3. Right Answer: DExplanation: 4. Right Answer: BExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following is a cloud architectural design principle?A) A. Scale up, not out.B) B. Loosely couple components.C) C. Build monolithic systems.D) D. Use commercial database software.2. Under the shared responsibility model; which of the following areas are the customer's responsibility? (Choose two.)(Select 2answers)A) A. Firmware upgrades of network infrastructureB) B. Patching of operating systemsC) C. Patching of the underlying hypervisorD) D. Physical security of data centersE) E. Configuration of the security group3. Which service enables customers to audit and monitor changes in AWS resources?A) A. AWS Trusted AdvisorB) B. Amazon GuardDutyC) C. Amazon InspectorD) D. AWS Config4. Which AWS service identifies security groups that allow unrestricted access to a user's AWS resources?A) A. AWS CloudTrailB) B. AWS Trusted AdvisorC) C. Amazon CloudWatchD) D. Amazon Inspector5. According to the AWS shared responsibility model, who is responsible for configuration management?A) A. It is solely the responsibility of the customer.B) B. It is solely the responsibility of AWS.C) C. It is shared between AWS and the customer.D) D. It is not part of the AWS shared responsibility model. Right Answer and Explanation: 1. Right Answer: BExplanation: Loosely coupled architectures reduce interdependencies, so that a change or failure in a component does notcascade to other components.https://aws-certified-cloud-practitioner.fandom.com/wiki/1.3_List_the_different_cloud_architecture_design_principles2. Right Answer: B,EExplanation: https://aws.amazon.com/compliance/shared-responsibility-model/3. Right Answer: DExplanation: AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWSresources. Config continuously monitors and records your AWS resource configurations and allows you toautomate the evaluation of recorded configurations against desired configurations. With Config, you can reviewchanges in configurations and relationships between AWS resources, dive into detailed resource configurationhistories, and determine your overall compliance against the configurations specified in your internal guidelines.This enables you to simplify compliance auditing, security analysis, change management, and operationaltroubleshooting.https://aws.amazon.com/config/4. Right Answer: BExplanation: 5. Right Answer: CExplanation: AWS maintains the configuration of its infrastructure devices, but a customer is responsible for configuring theirown guest operating systems, databases, and applications.https://aws.amazon.com/compliance/shared-responsibility-model/ .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Your company has defined privileged users for their AWS(Amazon Web Service) Account. These users are administrators for key resources defined in the company. There is now a mandate to enhance the security authentication for these users. How can this be accomplished?A) Enable accidental deletion for these user accountsB) Disable root access for the users (Incorrect)C) Enable versioning for these user accountsD) Enable MFA for these user accounts2. Your company has defined a number of EC2 Instances over a period of 6 months. They want to know if any of the security groups allow unrestricted access to a resource. What is the best option to accomplish this requirement?A) Use the AWS(Amazon Web Service) Trusted Advisor to see which security groups have compromised access.B) Use AWS(Amazon Web Service) Configure to see which security groups have compromised access.C) Use AWS(Amazon Web Service) Inspector to inspect all the security GroupsD) Use the AWS(Amazon Web Service) CLI to query the security groups and then filter for the rules which have unrestricted access3. Which of the following is not a best practice for carrying out a security audit?A) Whenever there are changes in your organization (Incorrect)B) Conduct an audit if you ever suspect that an unauthorized person might have accessed your accountC) Conduct an audit on a yearly basisD) Conduct an audit if application instances have been added to your account4. You have a vendor that needs access to an AWS(Amazon Web Service) resource. You create an AWS(Amazon Web Service) user account. You want to restrict access to the resource using a policy for just that user over a brief period. Which of the following would be an ideal policy to use?A) An AWS(Amazon Web Service) Managed PolicyB) An Inline PolicyC) A Bucket PolicyD) A bucket ACL (Incorrect)5. A security team must present a daily briefing to the CISO that includes a report of which of the company?s thousands of EC2 instances and on-premises servers are missing the latest security patches. All instances/servers must be brought into compliance within 24 hours so they do not show up on the next day?s report. How can the security team fulfill these requirements?A) Use Systems Manger Patch Manger to generate the report of out of compliance instances/ servers. Use Systems Manager Patch Mang to install the missing patches.B) Use Amazon Quick Sight and Cloud Trail to generate the report of out of compliance instances/servers. Redeploy all out of compliance Instances/servers using an AMI with the latest patches.C) Use Trusted Advisor to generate the report of out of compliance instances/ servers. Use Systems Manger Patch Manger to install the missing patches.D) Use Systems Manger Patch Manger to generate the report of out of compliance Instances) servers. Redeploy all out of compliance instances/servers using an AMI with the latest patches. Right Answer and Explanation: 1. Right Answer: DExplanation: The AWS(Amazon Web Service) Documentation mentions the following as a best practise for IAM users For extra security, enable multi-factor authentication (MFA) for privileged IAM users (users who are allowed access to sensitive resources or APIs). With MFA, users have a device that generates a unique authentication code (a one-time password, or OTP). Users must provide both their normal credentials (like their user name and password) and the OTP. The MFA device can either be a special piece of hardware, or it can be a virtual device (for example, it can run in an app on a smartphone). Option B,C and D are invalid because no such security options are available in AWS For more information on IAM best practises, please visit the below URL ttps://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html2. Right Answer: AExplanation: 3. Right Answer: CExplanation: A year's time is generally too long a gap for conducting security audits The AWS(Amazon Web Service) Documentation mentions the following You should audit your security configuration in the following situations: On a periodic basis. If there are changes in your organization, such as people leaving. If you have stopped using one or more individual AWS(Amazon Web Service) services. This is important for removing permissions that users in your account no longer need. If you've added or removed software in your accounts, such as applications on Amazon EC2 instances, AWS(Amazon Web Service) OpsWorks stacks, AWS(Amazon Web Service) CloudFormation templates, etc. If you ever suspect that an unauthorized person might have accessed your account. Option B , C and D are all the right ways and recommended best practises when it comes to conducting audits For more information on Security Audit guideline, please visit the below URL https://docs.aws.amazon.com/general/latest/gr/aws-security-audit-guide.html4. Right Answer: BExplanation: The AWS(Amazon Web Service) Documentation gives an example on such a case Inline policies are useful if you want to maintain a strict one-to-one relationship between a policy and the principal entity that it's applied to. For example, you want to be sure that the permissions in a policy are not inadvertently assigned to a principal entity other than the one they're intended for. When you use an inline policy, the permissions in the policy cannot be inadvertently attached to the wrong principal entity. In addition, when you use the AWS(Amazon Web Service) Management Console to delete that principal entity, the policies embedded in the principal entity are deleted as well. That's because they are part of the principal entity. Option A is invalid because AWS(Amazon Web Service) Managed Polices are ok for a group of users , but for individual users , inline policies are better. Option C and D are invalid because they are specifically meant for access to S3 buckets For more information on policies, please visit the following url https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review