A) ...a machine learning service that detects languages. B) ...a machine learning service that converts text to speech. C) ...is a service that enables you to create conversational interfaces using voice and text. D) ...a machine learning service that extracts text from scanned documents.
2. What is AWS Well-Architected Framework used for? (select 2)(Select 2answers)
A) To make sure that customers are thinking cloud natively. B) To make sure that customers stay with monolithic applications to get the most out of the cloud. C) To make sure that customers don't care about the cloud-based approach. D) To provide a consistent approach to evaluating architectures and implementing scalable designs.
3. Imagine you are responsible for the architecture of your company's cloud resources and need to take care of security using DynamoDB. Select all true statements. (select 2)(Select 2answers)
A) IAM policies are not applicable to users for DynamoDB. B) You should store AWS credentials directly in the application or EC2 instance. C) DynamoDB encrypts at rest all user data stored in tables, indexes, streams, and backups using encryption keys stored in AWS Key Management Service (AWS KMS). D) You should use IAM to manage credentials for DynamoDB.
4. You are responsible for managing cloud infrastructure in your company and you must have a good understanding of Amazon S3. What is an Access Control List (ACL)?
A) It is a document that has a necessary credentials to connect to the Amazon EC2 instance using SSH. B) It is a document defining permissions that apply to an IAM user. C) It is a document that defines who can access a particular bucket or object. D) It is a document that defines who can access a particular Amazon EC2 instance.
5. Select all true statements about access key for IAM users. (select 3)(Select 3answers)
A) It is a combination of an access key ID and a secret access key. B) You can use access keys to connect to Amazon EC2 instance using SSH. C) You can use access keys to sign programmatic requests to the AWS CLI or AWS API (directly or using the AWS SDK). D) When you create an access key pair, save the access key ID and secret access key in a secure location. The access key ID is available only at the time you create it. E) Access keys are long-term credentials for an IAM user or the AWS account root user.
Leave a comment