diff --git a/README.md b/README.md index 439727a..8694d03 100644 --- a/README.md +++ b/README.md @@ -569,7 +569,7 @@ and Access Management (IAM) user allowing DynamoDB puts and S3 gets. You serve y application out of an S3 bucket enabled as a web site. Your client updates DynamoDB.
B) Register the application with a Web Identity Provider like Amazon, Google, or Facebook, create an IAM role for that provider, and set up permissions for the IAM role to allow S3 gets and DynamoDB puts. You -serve your mobile application out of an S3 bucket enabled as a web site. Your client updates DynamoDB. +serve your mobile application out of an S3 bucket enabled as a web site. Your client updates DynamoDB.
C) Provide the JavaScript client with temporary credentials from the Security Token Service using a Token Vending Machine (TVM) to provide signed credentials mapped to an IAM user allowing DynamoDB puts. You serve your mobile application out of Apache EC2 instances that are load-balanced and autoscaled. @@ -580,7 +580,7 @@ D) Register the JavaScript application with a Web Identity Provider like Amazon, create an IAM role for that provider, and set up permissions for the IAM role to allow DynamoDB puts. You serve your mobile application out of Apache EC2 instances that are load-balanced and autoscaled. Your EC2 instances are configured with an IAM role that allows DynamoDB puts. Your server updates -DynamoDB. +DynamoDB.
> You are building a website that will retrieve and display highly sensitive information to users. The amount of traffic the site will receive is known and not expected to fluctuate. The site will leverage SSL to protect @@ -593,17 +593,17 @@ by employees of your company. Which of these architectures meets all of the requ A) Use Elastic Load Balancing to distribute traffic to a set of web servers. To protect the SSL private key, upload the key to the load balancer and configure the load balancer to offload the SSL traffic. Write your -web server logs to an ephemeral volume that has been encrypted using a randomly generated AES key. +web server logs to an ephemeral volume that has been encrypted using a randomly generated AES key.
B) Use Elastic Load Balancing to distribute traffic to a set of web servers. Use TCP load balancing on the load balancer and configure your web servers to retrieve the private key from a private Amazon S3 bucket on boot. Write your web server logs to a private Amazon S3 bucket using Amazon S3 server-side -encryption. +encryption.
C) Use Elastic Load Balancing to distribute traffic to a set of web servers, configure the load balancer to perform TCP load balancing, use an AWS CloudHSM to perform the SSL transactions, and write your -web server logs to a private Amazon S3 bucket using Amazon S3 server-side encryption. +web server logs to a private Amazon S3 bucket using Amazon S3 server-side encryption.
D) Use Elastic Load Balancing to distribute traffic to a set of web servers. Configure the load balancer to perform TCP load balancing, use an AWS CloudHSM to perform the SSL transactions, and write your -web server logs to an ephemeral volume that has been encrypted using a randomly generated AES key. +web server logs to an ephemeral volume that has been encrypted using a randomly generated AES key.
> You are designing network connectivity for your fat client application. The application is designed for business travelers who must be able to connect to it from their hotel rooms, cafes, public Wi-Fi hotspots, @@ -612,14 +612,14 @@ Which network design meets the above requirements while minimizing deployment an costs? A) Implement AWS Direct Connect, and create a private interface to your VPC. Create a public subnet and -place your application servers in it. +place your application servers in it.
B) Implement Elastic Load Balancing with an SSL listener that terminates the back-end connection to the -application. +application.
C) Configure an IPsec VPN connection, and provide the users with the configuration details. Create a public -subnet in your VPC, and place your application servers in it. +subnet in your VPC, and place your application servers in it.
D) Configure an SSL VPN solution in a public subnet of your VPC, then install and configure SSL VPN client software on all user computers. Create a private subnet in your VPC and place your application servers in -it. +it.
> Your company hosts an on-premises legacy engineering application with 900GB of data shared via a central file server. The engineering data consists of thousands of individual files ranging in size from @@ -633,9 +633,8 @@ application’s data to AWS without losing any data and within the given timefra A) Copy the data to Amazon S3 using multiple threads and multi-part upload for large files over the weekend, and work in parallel with your developers to reconfigure the replicated application environment to leverage Amazon S3 to serve the engineering files.
- -B) Sync the application data to Amazon S3 starting a week before the migration, on Friday morning perform -a final sync, and copy the entire data set to your AWS file server after the sync completes. +B) Sync the application data to Amazon S3 starting a week before the migration, on Friday morning perform +a final sync, and copy the entire data set to your AWS file server after the sync completes.
C) Copy the application data to a 1-TB USB drive on Friday and immediately send overnight, with Saturday delivery, the USB drive to AWS Import/Export to be imported as an EBS volume, mount the resulting EBS volume to your AWS file server on Sunday.