Which of the following items are required to allow an a…

Which of the following items are required to allow an application deployed on an EC2 instance to write data to aDynamoDB table?Assume that no security Keys are allowed to be stored on the EC2 instance. (Choose two.) A. Create an IAM User that allows write access to the DynamoDB table. B. Add an IAM Role […]

Read More

What could explain this behavior?

You attempt to store an object in the US-STANDARD region in Amazon S3, and receive a confirmation that ithas been successfully stored. You then immediately make another API call and attempt to read this object. S3tells you that the object does not exist.What could explain this behavior? A. US-STANDARD uses eventual consistency and it can […]

Read More

Which of the following steps could resolve the issue?

After launching an instance that you intend to serve as a NAT (Network Address Translation) device in a publicsubnet you modify your route tables to have the NAT device be the target of internet bound traffic of yourprivate subnet. When you try and make an outbound connection to the Internet from an instance in the […]

Read More

What should you do to enable internet access?

You have an environment that consists of a public subnet using Amazon VPC and 3 instances that are runningin this subnet. These three instances can successfully communicate with other hosts on the Internet. Youlaunch a fourth instance in the same subnet, using the same AMI and security group configuration you used forthe others, but find […]

Read More

Which of the following are correct statements with poli…

Which of the following are correct statements with policy evaluation logic in AWS Identity and AccessManagement? (Choose two.) A. By default, all requests are denied B. An explicit allow overrides an explicit deny C. An explicit allow overrides default deny. D. An explicit deny does not override an explicit allow E. By default, all request […]

Read More