Which of the following will enhance the security of access to the AWS Management Console

Which of the following will enhance the security of access to the AWS Management Console

Chris Kuo/Dr. Dataman

Aug 19, 2021

20 min read

Security: People may concern if their data are safe on cloud. AWS had designed multiple layers to secure data and services at the highest level. Security is achieved by controlling who can access (authorize) to what services (authenticate). In this Section you will learn how to use the Identity and Access Management (IAM) service to control who…

Level 19 Level 21

Level 20

Question 300-330


30 words 0 ignored

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?

Use AWS Professional Services to provide guidance and to set up an AWS Landing Zone in the company’s AWS account,Select a partner from the AWS Partner Network (APN) to assist with the migration

A company is migrating from on-premises data centers to the AWS Cloud and is looking for hands-on help with the project. How can the company get this support?

Answering billing and account inquires

How does the AWS Enterprise Support Concierge team help users?

An application designed to span multiple Availability Zones is described as:

A new service using AWS must be highly available. Yet, due to regulatory requirements, all of its Amazon EC2 instances must be located in a single geographic area. According to best practices, to meet these requirements, the EC2 instances must be placed in at least two:

AWS Total Cost of Ownership (TCO) Calculator

Which AWS tool is used to compare the cost of running an application on-premises to running the application in the AWS Cloud?

Purchase the Reserved Instances from master payer account and turn off Reserved Instance sharing.

A company has multiple AWS accounts within AWS Organizations and wants to apply the Amazon EC2 Reserved Instances benefit to a single account only. Which action should be taken?

An intrusion attempt is made from an AWS IP address

Which situation should be reported to the AWS Abuse team?

AWS Global Accelerator,Amazon CloudFront

A company is planning to launch an ecommerce site in a single AWS Region to a worldwide user base. Which AWS services will allow the company to reach users and provide low latency and high transfer speeds? (Choose two.)

Which AWS service or resource is serverless?

Subnets,Internet gateways

Which of the following are components of Amazon VPC? (Choose two.)

send an alert when the utilization of Reserved Instances drops below a certain percentage

AWS Budgets can be used to:

AWS Multi-Factor Authentication (AWS MFA),Password policies

Which of the following will enhance the security of access to the AWS Management Console? (Choose two.)

Information on Amazon S3 bucket permissions,Multi-factor authentication enabled on the AWS account root user

The AWS Trusted Advisor checks include recommendations regarding which of the following? (Choose two.)

Create and manage keys for encryption and decryption of data

Which functions can users perform using AWS KMS?

It provides a list of cost optimization recommendations based on current AWS usage,It detects potential security vulnerabilities caused by permissions settings on account resources

How does AWS Trusted Advisor provide guidance to users of the AWS Cloud? (Choose two.)

AWS manages the maintenance of the cloud infrastructure,AWS manages capacity planning for physical servers

Which of the following are advantages of the AWS Cloud? (Choose two.)

A user deploys an Amazon RDS DB instance in multiple Availability Zones. This strategy involves which pillar of the AWS Well-Architected Framework?

AWS VPN,AWS Direct Connect

Which AWS services provide a user with connectivity between the AWS Cloud and on-premises resources? (Choose two.)

AWS Billing and Cost Management

Which AWS service is used to pay AWS bills, and monitor usage and budget costs?

Which element of the AWS global infrastructure consists of one or more discrete data centers, each with redundant power, networking, and connectivity, which are housed in separate facilities?

Which Amazon VPC feature enables users to capture information about the IP traffic that reaches Amazon EC2 instances?

Which AWS service can be used to automatically scale an application up and down without making capacity planning decisions?

AWS Enterprise Support users have access to which service or feature that is not available to users with other AWS Support plans?

A company wants to migrate a MySQL database to AWS but does not have the budget for Database Administrators to handle routine tasks including provisioning, patching, and performing backups. Which AWS service will support this use case?

Begin deploying resources in the second Region

A company wants to expand from one AWS Region into a second AWS Region. What does the company need to do to start supporting the new Region?

A user must meet compliance and software licensing requirements that state a workload must be hosted on a physical server. Which Amazon EC2 instance pricing option will meet these requirements?

AWS Key Management Service (AWS KMS),AWS CloudHSM

Which AWS service will provide a way to generate encryption keys that can be used to encrypt data? (Choose two.)

AWS Total Cost of Ownership (TCO) Calculator

A company is planning to migrate from on-premises to the AWS Cloud. Which AWS tool or service provides detailed reports on estimated cost savings after migration?

AWS Professional Services,AWS Partner Network (APN)

What can assist in evaluating an application for migration to the cloud? (Choose two.)

Which AWS service helps users meet contractual and regulatory compliance requirements for data security by using dedicated hardware appliances within the AWS Cloud?

Which of the following should be used to improve the security of access to AWS management Console?

MFA is the best way to protect accounts from inappropriate access. Always set up MFA on your Root user and AWS Identity and Access Management (IAM) users.

Which approach will enhance users security on AWS?

Activating MFA can help secure the accounts and prevent unauthorized users from logging in to accounts without a security token. For increased security, it's a best practice to configure MFA to help protect your AWS resources. You can activate a virtual MFA for IAM users and the AWS account root user.

What additional layer of security can you add for logging in to AWS management Console?

Require multi-factor authentication (MFA) We recommend using IAM roles for human users and workloads that access your AWS resources so that they use temporary credentials. However, for scenarios in which you need IAM or root users in your account, require MFA for additional security.

Which of the following are steps for securing a new AWS account?

Create an admin account. The principle of least privilege is a well-known security concept that limits a user's access to only what is required to perform their job. ... .
Update root user access. ... .
Create your AWS users. ... .
Secure access using MFA. ... .
Set standard password policies. ... .
Define custom policies. ... .
Secure EC2 use..