mirror of
				https://gist.github.com/leonardofed/bbf6459ad154ad5215d354f3825435dc
				synced 2025-11-04 04:07:20 +00:00 
			
		
		
		
	
							parent
							
								
									3f846a51c0
								
							
						
					
					
						commit
						ad086bde23
					
				
							
								
								
									
										25
									
								
								README.md
									
									
									
									
									
								
							
							
								
								
								
								
								
								
									
										
										
									
									
								
							
						
						
									
										25
									
								
								README.md
									
									
									
									
									
								
							@ -569,7 +569,7 @@ and Access Management (IAM) user allowing DynamoDB puts and S3 gets. You serve y
 | 
			
		||||
application out of an S3 bucket enabled as a web site. Your client updates DynamoDB.<br>
 | 
			
		||||
B) Register the application with a Web Identity Provider like Amazon, Google, or Facebook, create an IAM
 | 
			
		||||
role for that provider, and set up permissions for the IAM role to allow S3 gets and DynamoDB puts. You
 | 
			
		||||
serve your mobile application out of an S3 bucket enabled as a web site. Your client updates DynamoDB.
 | 
			
		||||
serve your mobile application out of an S3 bucket enabled as a web site. Your client updates DynamoDB.<br>
 | 
			
		||||
C) Provide the JavaScript client with temporary credentials from the Security Token Service using a Token
 | 
			
		||||
Vending Machine (TVM) to provide signed credentials mapped to an IAM user allowing DynamoDB puts.
 | 
			
		||||
You serve your mobile application out of Apache EC2 instances that are load-balanced and autoscaled.
 | 
			
		||||
@ -580,7 +580,7 @@ D) Register the JavaScript application with a Web Identity Provider like Amazon,
 | 
			
		||||
create an IAM role for that provider, and set up permissions for the IAM role to allow DynamoDB puts.
 | 
			
		||||
You serve your mobile application out of Apache EC2 instances that are load-balanced and autoscaled.
 | 
			
		||||
Your EC2 instances are configured with an IAM role that allows DynamoDB puts. Your server updates
 | 
			
		||||
DynamoDB.
 | 
			
		||||
DynamoDB.<br>
 | 
			
		||||
 | 
			
		||||
> You are building a website that will retrieve and display highly sensitive information to users. The amount
 | 
			
		||||
of traffic the site will receive is known and not expected to fluctuate. The site will leverage SSL to protect
 | 
			
		||||
@ -593,17 +593,17 @@ by employees of your company. Which of these architectures meets all of the requ
 | 
			
		||||
 | 
			
		||||
A) Use Elastic Load Balancing to distribute traffic to a set of web servers. To protect the SSL private key,
 | 
			
		||||
upload the key to the load balancer and configure the load balancer to offload the SSL traffic. Write your
 | 
			
		||||
web server logs to an ephemeral volume that has been encrypted using a randomly generated AES key.
 | 
			
		||||
web server logs to an ephemeral volume that has been encrypted using a randomly generated AES key.<br>
 | 
			
		||||
B) Use Elastic Load Balancing to distribute traffic to a set of web servers. Use TCP load balancing on the
 | 
			
		||||
load balancer and configure your web servers to retrieve the private key from a private Amazon S3
 | 
			
		||||
bucket on boot. Write your web server logs to a private Amazon S3 bucket using Amazon S3 server-side
 | 
			
		||||
encryption.
 | 
			
		||||
encryption.<br>
 | 
			
		||||
C) Use Elastic Load Balancing to distribute traffic to a set of web servers, configure the load balancer to
 | 
			
		||||
perform TCP load balancing, use an AWS CloudHSM to perform the SSL transactions, and write your
 | 
			
		||||
web server logs to a private Amazon S3 bucket using Amazon S3 server-side encryption.
 | 
			
		||||
web server logs to a private Amazon S3 bucket using Amazon S3 server-side encryption.<br>
 | 
			
		||||
D) Use Elastic Load Balancing to distribute traffic to a set of web servers. Configure the load balancer to
 | 
			
		||||
perform TCP load balancing, use an AWS CloudHSM to perform the SSL transactions, and write your
 | 
			
		||||
web server logs to an ephemeral volume that has been encrypted using a randomly generated AES key.
 | 
			
		||||
web server logs to an ephemeral volume that has been encrypted using a randomly generated AES key.<br>
 | 
			
		||||
 | 
			
		||||
> You are designing network connectivity for your fat client application. The application is designed for
 | 
			
		||||
business travelers who must be able to connect to it from their hotel rooms, cafes, public Wi-Fi hotspots,
 | 
			
		||||
@ -612,14 +612,14 @@ Which network design meets the above requirements while minimizing deployment an
 | 
			
		||||
costs?
 | 
			
		||||
 | 
			
		||||
A) Implement AWS Direct Connect, and create a private interface to your VPC. Create a public subnet and
 | 
			
		||||
place your application servers in it.
 | 
			
		||||
place your application servers in it.<br>
 | 
			
		||||
B) Implement Elastic Load Balancing with an SSL listener that terminates the back-end connection to the
 | 
			
		||||
application.
 | 
			
		||||
application.<br>
 | 
			
		||||
C) Configure an IPsec VPN connection, and provide the users with the configuration details. Create a public
 | 
			
		||||
subnet in your VPC, and place your application servers in it.
 | 
			
		||||
subnet in your VPC, and place your application servers in it.<br>
 | 
			
		||||
D) Configure an SSL VPN solution in a public subnet of your VPC, then install and configure SSL VPN client
 | 
			
		||||
software on all user computers. Create a private subnet in your VPC and place your application servers in
 | 
			
		||||
it.
 | 
			
		||||
it.</br>
 | 
			
		||||
 | 
			
		||||
> Your company hosts an on-premises legacy engineering application with 900GB of data shared via a
 | 
			
		||||
central file server. The engineering data consists of thousands of individual files ranging in size from
 | 
			
		||||
@ -633,9 +633,8 @@ application’s data to AWS without losing any data and within the given timefra
 | 
			
		||||
A) Copy the data to Amazon S3 using multiple threads and multi-part upload for large files over the
 | 
			
		||||
weekend, and work in parallel with your developers to reconfigure the replicated application environment
 | 
			
		||||
to leverage Amazon S3 to serve the engineering files.<br>
 | 
			
		||||
 | 
			
		||||
<code>B) Sync the application data to Amazon S3 starting a week before the migration, on Friday morning perform</span>
 | 
			
		||||
a final sync, and copy the entire data set to your AWS file server after the sync completes.</code>
 | 
			
		||||
B) Sync the application data to Amazon S3 starting a week before the migration, on Friday morning perform
 | 
			
		||||
a final sync, and copy the entire data set to your AWS file server after the sync completes.<br>
 | 
			
		||||
C) Copy the application data to a 1-TB USB drive on Friday and immediately send overnight, with Saturday
 | 
			
		||||
delivery, the USB drive to AWS Import/Export to be imported as an EBS volume, mount the resulting EBS
 | 
			
		||||
volume to your AWS file server on Sunday.<br>
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user