Which of the following minimizes the potential attack surface for applications?
Which of the following minimizes the potential attack surface for applications?Read More →
Which of the following minimizes the potential attack surface for applications?Read More →
A company is concerned that two NAT instances in use will no longer be able to support the traffic needed for the company’s application.A solutions architect wants to implement a solution that is highly available, fault tolerant, and automatically scalable.What should the solutions architect recommend?Read More →
A company is using an on-premises Active Directory service for user authentication.The company wants to use the same authentication service to sign in to the company’s AWS accounts, which are using AWS Organizations.AWS Site-to-Site VPN connectivity already exists between the on-premises environment and all the company’s AWS accounts.The company’s security policy requires conditional access to the accounts based on user groups and roles.User identities must be managed in a single location.Which solution will meet these requirements?Read More →
A Developer has been asked to make changes to the source code of an AWS Lambda function.The function is managed using an AWS CloudFormation template.The template is configured to load the source code from an Amazon S3 bucket.The Developer manually created a .ZIP file deployment package containing the changes and put the file into the correct location on Amazon S3.When the function is invoked, the code changes have not been applied.What step is required to update the function with the changes?Read More →
Which task requires using AWS account root user credentials?Read More →
A sysops administrator set up an Amazon ElastiCache for Memcached cluster for an application.During testing, the application experiences increased latency.Amazon CloudWatch metrics for the Memcached cluster show CPUUtilization is consistently above 95% and FreeableMemory is consistently under 1 MB.Which action will solve the problem?Read More →
A business to business (B2B) ecommerce company wants to develop a fair and equitable risk mitigation strategy to reject potentially fraudulent transactions.The company wants to reject fraudulent transactions despite the possibility of losing some profitable transactions or customers.Which solution will meet these requirements with the LEAST operational effort?Read More →
A company plans to host a survey website on AWS.The company anticipates an unpredictable amount of traffic.This traffic results in asynchronous updates to the database.The company wants to ensure that writes to the database hosted on AWS do not get dropped.How should the company write its application to handle these database requests?Read More →
A company hosts an on-premises Microsoft SQL Server Enterprise edition database with Transparent Data Encryption (TDE) enabled.The database is 20 TB in size and includes sparse tables.The company needs to migrate the database to Amazon RDS for SQL Server during a maintenance window that is scheduled for an upcoming weekend.Data-at-rest encryption must be enabled for the target DB instance.Which combination of steps should the company take to migrate the database to AWS in the MOST operationally efficient manner? (Choose two.)Read More →
A developer is integrating Amazon ElastiCache in an application.The cache will store data from a database.The cached data must populate real-time dashboards.Which caching strategy will meet these requirements?Read More →
© 2026. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.