Exam (elaborations)
AWS Certified Cloud Practitioner Practice Exam CLF-C01- 2 With Correct Solutions 2024
Course
AWS Certified Cloud Practitioner
Institution
AWS Certified Cloud Practitioner
AWS Certified Cloud Practitioner Practice Exam CLF-C01- 2 With Correct Solutions 2024
[Show more]
Uploaded on
October 7, 2024
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers
aws certified cloud practitioner practice exam
when considering common cloud computing models wh
your company is moving to the aws cloud and is rev
a developer deployed an application that consisted
Institution
AWS Certified Cloud Practitioner
Course
AWS Certified Cloud Practitioner
$13.49
100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached
AWS Certified Cloud Practitioner Practice
Exam CLF-C01- 2 With Correct Solutions
2024
When .considering .common .cloud .computing .models, .which .model .is .Amazon .Elastic
.Compute .Cloud .(AWS .EC2) .an .example .of? .- .correct .answer.Infrastructure .as .a .Service
.(IaaS) .- .IaaS .includes .the .fundamental .building .blocks .that .can .be .rented .from .AWS.
.AWS .manages .the .infrastructure .and .provides .you .a .virtual .machine .that .you .can .use
.however .you'd .like .to .meet .your .business .requirements.
Your .company .is .moving .to .the .AWS .Cloud .and .is .reviewing .the .shared .responsibility
.model. .Which .item .is .entirely .the .responsibility .of .AWS? .- .correct .answer.Physical .and
.environmental .controls .- .AWS .is .responsible .for .protecting .the .physical .infrastructure .and
.environmental .controls .that .run .all .of .the .services .offered .in .the .AWS .Cloud. .This
.infrastructure .is .composed .of .the .hardware, .software, .networking, .and .facilities .that .run
.AWS .Cloud .services.
A .developer .deployed .an .application .that .consisted .of .1 .Lambda .function, .a .DynamoDB
.table, .and .a .firewall .using .Web .Application .Firewall .(WAF) .via .the .AWS .Command .Line
.Interface .(CLI). .When .attempting .to .access .the .application's .resources .via .the .AWS
.Management .Console, .the .developer .cannot .find .the .Lambda .function .or .DynamoDB
.table. .What .could .be .the .problem? .- .correct .answer.The .developer .is .probably .in .a
.different .Region .from .where .the .resources .were .initially .deployed. .- .Resources .that .aren't
.global .are .typically .deployed .to .a .specific .Region. .Since .Regions .are .isolated .and
.resources .aren't .automatically .replicated .across .them, .the .developer .needs .to .switch .to
.the .correct .Region .in .order .to .find .the .resources.
During .disaster .recovery .exercises, .you .need .to .re-route .traffic .from .EC2 .instances .to
.instances .in .another .Region. .With .which .service .can .you .do .this .- .correct .answer.Route
.53 .- .Route .53 .can .be .used .for .disaster .recovery .by .simply .shifting .traffic .to .the .new
.Region. .Amazon .Route .53 .is .a .highly .available .and .scalable .cloud .Domain .Name
.System .(DNS) .web .service. .It .is .designed .to .give .developers .and .businesses .an
.extremely .reliable .and .cost-effective .way .to .route .end .users .to .internet .applications .by
.translating .names .(like .www.example.com) .into .the .numeric .IP .addresses .(like
.192.0.2.1) .that .computers .use .to .connect .to .each .other. .Amazon .Route .53 .is .fully
.compliant .with .IPv6 .as .well.
, The .CTO .of .a .software .company .has .requested .an .executive .summary .detailing .the
.advantages .of .a .potential .move .to .the .AWS .Cloud. .What .can .you .say .is .an .advantage .of
.an .RDS .database .over .a .traditional .database? .- .correct .answer.AWS .maintains .the
.underlying .OS .and .performs .software .patching .on .the .database. .- .RDS .is .a .managed
.service .that .makes .it .easy .to .launch .and .manage .relational .databases. .RDS .does
.provide .a .lot .of .value, .like .automated .backups .and .software .patching, .and .frees .you .up .to
.focus .on .your .applications. .https://aws.amazon.com/rds/
Which .of .the .following .acts .like .built-in .firewalls .per .instance .for .your .virtual .servers? .-
.correct .answer.Security .groups .- .Security .groups .act .like .built-in .firewalls .for .your .virtual
.servers .— .the .rules .you .create .define .what .is .allowed .to .talk .to .your .instances .and .how.
.Although .network .access .control .lists .can .be .used .to .block .or .deny .traffic, .these .operate
.at .the .subnet .level .(covering .all .instances .in .the .subnet .with .the .same .ruleset), .not .per
.instance .as .the .question .specifies. .Route .tables .tell .traffic .where .it .should .go .next .to
.reach .its .destination, .and .an .Availability .Zone .is .a .collection .of .data .centers .— .which .isn't
.relevant .in .this .question.
.https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html
A .company .wants .to .block .network .traffic .from .accessing .an .EC2 .instance. .What's .the
.best .way .to .protect .the .EC2 .instance .from .unwanted .traffic? .- .correct .answer.Security
.group .- .The .security .group .acts .as .a .virtual .firewall .to .protect .the .EC2 .instance.
Under .the .shared .responsibility .model, .which .of .the .following .is .an .example .of .security .of
.the .cloud? .- .correct .answer.Managing .the .AWS .global .infrastructure .- .AWS .is
.responsible .for .the .security .of .the .cloud. .AWS .is .responsible .for .its .global .infrastructure
.elements: .Regions, .edge .locations, .and .Availability .Zones.
Protecting .the .data .center .infrastructure- .AWS .is .responsible .for .protecting .the
.infrastructure .that .runs .all .of .the .services .offered .in .the .AWS .Cloud. .This .infrastructure .is
.composed .of .the .hardware, .software, .networking, .and .facilities .that .run .AWS .Cloud
.services.
Maintaining .networking .components .- .AWS .maintains .networking .components:
.generators, .uninterruptible .power .supply .(UPS) .systems, .computer .room .air .conditioning
.(CRAC) .units, .fire .suppression .systems, .and .more.
Which .of .the .following .are .focuses .of .the .performance .efficiency .pillar .of .the .Well-
Architected .Framework? .- .correct .answer.Use .multi-region .deployments. .- .This .is .a .focus
.of .the .performance .efficiency .pillar. .This .pillar .focuses .on .the .effective .use .of .computing
.resources .to .meet .the .system .and .business .requirements .while .removing .bottlenecks.
Use .a .serverless .architecture .first. .- .This .is .a .focus .of .the .performance .efficiency .pillar.
.This .pillar .focuses .on .the .effective .use .of .computing .resources .to .meet .the .system .and
.business .requirements .while .removing .bottlenecks.
A .huge .department .store .sells .products .online .and .in-person. .Most .of .their .customers .use
.credit .cards .instead .of .cash .when .making .purchases. .For .security .purposes, .the .credit
.card .data .must .be .encrypted .at .rest. .Which .services .allow .the .department .store .to
.generate .and .store .the .encryption .key .used .to .secure .the .credit .card .numbers? .- .correct