Exam (elaborations)
AWS SAA-C03 Whizlabs Practice Exam 4 Missed Questions and Answers
AWS SAA-C03 Whizlabs Practice Exam 4 Missed Questions and Answers
[Show more]
Preview 2 out of 10 pages
Uploaded on
October 1, 2024
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers
Institution
AWS SAA
Course
AWS SAA
$12.49
100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached
AWS SAA-C03 Whizlabs Practice Exam 4
Missed Questions and Answers
You iihave iiimplemented iiAWS iiCognito iiservices iito iirequire iiusers iito iisign iiin iiand iisign
iiup iito iiyour iiapp iithrough iisocial iiidentity iiproviders iilike iiFacebook, iiGoogle, iietc. iiYour
iimarketing iidepartment iiwants iiusers iito iianonymously iitry iiout iithe iiapp iibecause iithe
iicurrent iilog-in iirequirement iiis iiexcessive, iiwhich iimay iireduce iithe iidemand iifor
iiproducts iiand iiservices iioffered iithrough iithe iiapp. iiWhat iiwould iiyou iisuggest iito iithe
iimarketing iidepartment iiin iithis iiregard?
A. iiIt's iitoo iimuch iiof iia iisecurity iirisk iito iiallow iiunauthenticated iiusers iiaccess iito iithe
iiapp.
B. iiCognito iiIdentity iisupports iiguest iiusers iifor iithe iiability iito iienter iithe iiapp iiand iihave
iilimited iiaccess.
C. iiA iisecond iiversion iiof iithe iiapp iiwill iineed iito iibe iioffered iifor iiunauthenticated iiusers.
D. iiThis iiis iipossible iionly iiif iiwe iiremove iithe iiauthentication iifrom iieverywhere. ii-
iiCorrect iiAnswers ii-B. iiCognito iiIdentity iisupports iiguest iiusers iifor iithe iiability iito iienter
iithe iiapp iiand iihave iilimited iiaccess; iiCognity iiIdentity iiPools iican iisupport
iiunauthenticated iiidentities iiby iiproviding iia iiunique iiidentifier iiand iiAWS iicredentials iifor
iiusers iiwho iido iinot iiauthenticate iiwith iian iiidentity iiprovider. iiUnauthenticated iiusers
iican iibe iiassociated iiwith iia iirole iiwith iilimited iiaccess iito iiresource iicompared iito iia iirole
iifor iiauthenticate iiusers
Your iiapp iiuses iiAWS iiCognito iiIdentity iifor iiauthentication iiand iistores iiuser iiprofiles iiin
iia iiUser iiPool. iiTo iiexpand iithe iiavailability iiand iiease iiof iisigning iiin iito iithe iiapp, iiyour
iiteam iiis iirequesting iiadvice iion iiallowing iithe iiuse iiof iiOpenID iiConnect ii(OIDC) iiidentity
iiproviders iias iiadditional iimeans iiof iiauthenticating iiusers iiand iisaving iithe iiuser iiprofile
iiinformation. iiWhat iiis iiyour iirecommendation iion iiOIDC iiidentity iiproviders?
A. iiThis iiis iisupported, iialong iiwith iisocial iiand iiSAML iibased iiidentity iiproviders.
B. iiThis iiis iinot iisupported, iionly iisocial iiidentity iiproviders iican iibe iiintegrated iiinto iiUser
iiPools
C. iiIf iiyou iiwant iiOIDC iiidentity iiproviders, iithen iiyou iimust iiinclude iiSAML iiand iisocial-
based iisupport iias iiwell
D. iiIt's iitoo iimuch iieffort iito iiadd iinon-Cognito iiauthenticated iiuser iiinformation iito iia iiUser
iiPool ii- iiCorrect iiAnswers ii-A. iiThis iiis iisupported, iialong iiwith iisocial iiand iiSAML iibased
, iiidentity iiproviders; iiOpenID iiConnect ii(OIDC) iiidentity iiproviders iiare iisupported iiin
iiCognito, iialong iiwith iisocial iiand iiSAML.
Your iicompany iicurrently iihas iia iiweb iidistribution iihosted iiusing iithe iiAWS iiCloudFront
iiservice. iiThe iiIT iiSecurity iidepartment iihas iiconfirmed iithat iithe iiapplication iiusing iithis
iiweb iidistribution iinow iifalls iiunder iithe iiscope iiof iiPCI ii(Payment iiCard iiIndustry)
iicompliance. iiWhat iiare iithe iinecessary iisteps iito iibe iifollowed iibefore iiauditing?
ii(SELECT iiTWO)
A. iiEnable iiCloudFront iiaccess iilogs.
B. iiEnable iiCache iiin iiCloudFront.
C. iiUse iiAWS iiCloudTrail iito iicapture iirequests iisent iito iithe iiCloudFront iiAPI.
D. iiEnable iiVPC iiFlow iiLogs ii- iiCorrect iiAnswers ii-A. iiEnable iiCloudFront iiaccess iilogs
C. iiUse iiAWS iiCloudTrail iito iicapture iirequests iisent iito iithe iiCloudFront iiAPI
A iicompany iihas iiapplications iirunning iiin iimultiple iiVPCs. iiThese iiapplications iirequire
iiinteraction iibetween iiAmazon iiS3 iibuckets iiand iiDynamoDB. iiThe iicompany's iisecurity
iipolicy iirequires iithat iicommunication iishould iibe iisecure iiand iishould iinot iigo iiover iithe
iipublic iiinternet.
How iidoes iia iisolutions iiarchitect iidesign iithis iisolution iito iimeet iithese iirequirements?
A. iiCreate iiVPC iiGateway iiEndpoints iifor iiS3 iiand iiDynamoDB iiand iiupdate iiroute
iitables iifor iiall iithe iiavailability iizones.
B. iiUse iithe iiNAT iiGateway iiand iiInternet iiGateway iifor iiall iithe iiegress iicommunication
iito iithese iiAWS iiservices.
C. iiSet iiup iiVPC iipeering iiand iiuse iiVPC iigateway iiendpoint iifor iiS3 iiand iiinterface
iiendpoint iifor iiDynamoDB iito iicommunicate iiover iiAWS iinetwork.
D. iiSet iiup iia iiVPC iiinterface iiendpoint iifor iiboth iiS3 iiand iiDynamoDB iito iicommunicate
iiover iithe iiAWS iinetwork. ii- iiCorrect iiAnswers ii-A. iiCreate iiVPC iiGateway iiEndpoints iifor
iiS3 iiand iiDynamoDB iiand iiupdate iiroute iitables iifor iiall iithe iiavailability iizones; iiGateway
iiendpoints iisupport iiS3 iiand iiDynamoDB, iithe iiconnection iiwill iinot iigo iiover iithe iiInternet
iiand iiit iiwill iiuse iiAWS iiprivate iinetwork. iiVPC iiendpoints iido iinot iirequire iiIGW,NAT
iidevices iiand iiinstances iiin iithe iiVPC iido iinot iirequire iipublic iiIP iiaddress iito
iicommunicate iiwith iiresources iiin iithe iiservice
A iicompany iiconsists iiof ii50 iiplus iiAWS iiaccounts. iiEach iiaccount iihas iimultiple iiVPCs
iiwith iiegress iiinternet iiconnectivity iiusing iiNAT iigateway iiper iiAvailability iiZone ii(AZ). iiA
iisolution iiarchitect iihas iibeen iiasked iito iiredesign iithe iinetwork iiarchitecture iithat iiwill
iireduce iicosts, iiand iimanage iiegress iitraffic, iiand iithe iigrowing iineeds iiof iinew iiaccounts.
Which iisolution iimeets iithe iirequirements?
A. iiCreate iian iiegress iiVPC iifor iioutbound iiinternet iitraffic. iiUse iiVPC iipeering iibetween
iiAWS iiaccounts' iiVPCs iiand iiconnect iito iia iiset iiof iiredundant iiNAT iigateways iiin iithe
iiegress iiVPC.