In a hardware security module (HSM), what is the function of a Transparent Data Encryption (TDE)?
In a hardware security module (HSM), what is the function of a Transparent Data Encryption (TDE)?Read More →
In a hardware security module (HSM), what is the function of a Transparent Data Encryption (TDE)?Read More →
A machine learning specialist is developing a proof of concept for government users whose primary concern is security.The specialist is using AmazonSageMaker to train a convolutional neural network (CNN) model for a photo classifier application.The specialist wants to protect the data so that it cannot be accessed and transferred to a remote host by malicious code accidentally installed on the training container.Which action will provide the MOST secure protection?Read More →
A company decides to migrate its three-tier web application from on-premises to the AWS Cloud.The new database must be capable of dynamically scaling storage capacity and performing table joins.Which AWS service meets these requirements?Read More →
A news portal is looking for a data store to store 120 GB of metadata about its posts and comments.The posts and comments are not frequently looked up or updated.However, occasional lookups are expected to be served with single-digit millisecond latency on average.What is the MOST cost-effective solution?Read More →
Which AWS Cloud benefit is shown by an architecture’s ability to withstand failures with minimal downtime?Read More →
A developer has an application that stores data in an Amazon S3 bucket.The application uses an HTTP API to store and retrieve objects.When the PutObject API operation adds objects to the S3 bucket the developer must encrypt these objects at rest by using server-side encryption with Amazon S3 managed keys (SSE-S3).Which solution will meet this requirement?Read More →
A company is developing a new application.The application uses AWS Lambda functions for its compute tier.The company must use a canary deployment for any changes to the Lambda functions.Automated rollback must occur if any failures are reported.The company’s DevOps team needs to create the infrastructure as code (IaC) and the CI/CD pipeline for this solution.Which combination of steps will meet these requirements? (Choose three.)Read More →
A company has two VPC networks named VPC A and VPC B.The VPC A CIDR block is 10.0.0.0/16 and the VPC B CIDR block is 172.31.0.0/16.The company wants to establish a VPC peering connection named pcx-12345 between both VPCs.Which rules should appear in the route table of VPC A after configuration? (Choose two.)Read More →
A company is manually deploying its application to production and wants to move to a more mature deployment pattern.The company has asked a solutions architect to design a solution that leverages its current Chef tools and knowledge.The application must be deployed to a staging environment for testing and verification before being deployed to production.Any new deployment must be rolled back in 5 minutes if errors are discovered after a deployment.Which AWS service and deployment pattern should the solutions architect use to meet these requirements?Read More →
A company is undergoing a layer 3 and layer 4 DDoS attack on its web servers running on AWS.Which combination of AWS services and features will provide protection in this scenario? (Choose three.)Read More →
© 2026. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.