[Modify] Answer Correction

This commit is contained in:
Kanani Nirav
2023-07-13 18:03:12 +09:00
parent 63d9e16e69
commit 7130a85178
3 changed files with 3 additions and 3 deletions

View File

@@ -330,7 +330,7 @@ If this practice exam has been helpful to you please share it with others and re
- A. By creating an AWS Config template from the old instance and launching a new instance from it. - A. By creating an AWS Config template from the old instance and launching a new instance from it.
- B. By creating an EBS Snapshot of the old instance. - B. By creating an EBS Snapshot of the old instance.
- C. By installing Aurora on EC2 and launching a new instance from it. - C. By installing Aurora on EC2 and launching a new instance from it.
- D. By creating an AMI from the old instance and (Correct) launching a new instance from it. - D. By creating an AMI from the old instance and launching a new instance from it.
<details markdown=1><summary markdown='span'>Answer</summary> <details markdown=1><summary markdown='span'>Answer</summary>
Correct answer: D Correct answer: D

View File

@@ -434,7 +434,7 @@ If this practice exam has been helpful to you please share it with others and re
42. AWS recommends some practices to help organizations avoid unexpected charges on their bill. Which of the following is NOT one of these practices? 42. AWS recommends some practices to help organizations avoid unexpected charges on their bill. Which of the following is NOT one of these practices?
- A. Deleting unused EBS volumes after terminating an EC2instance. - A. Deleting unused EBS volumes after terminating an EC2instance.
- B. Deleting unused AutoScaling launch (Correct) configuration. - B. Deleting unused AutoScaling launch configuration.
- C. Deleting unused Elastic Load Balancers. - C. Deleting unused Elastic Load Balancers.
- D. Releasing unused Elastic IPs after terminating an EC2instance. - D. Releasing unused Elastic IPs after terminating an EC2instance.

View File

@@ -132,7 +132,7 @@ If this practice exam has been helpful to you please share it with others and re
13. A company is seeking to better secure its AWS account from unauthorized access. Which of the below options can the customer use to achieve this goal? 13. A company is seeking to better secure its AWS account from unauthorized access. Which of the below options can the customer use to achieve this goal?
- A. Restrict any API call made through SDKs or CLI. - A. Restrict any API call made through SDKs or CLI.
- B. Create one IAM account for each department in the company (Development, QA, Production), and share it across all staff in that department. - B. Create one IAM account for each department in the company (Development, QA, Production), and share it across all staff in that department.
- C. Require Multi-Factor Authentication (MFA) (Correct) for all IAM User access. - C. Require Multi-Factor Authentication (MFA) for all IAM User access.
- D. Set up two login passwords. - D. Set up two login passwords.
<details markdown=1><summary markdown='span'>Answer</summary> <details markdown=1><summary markdown='span'>Answer</summary>