A systems administrator created a new 1AM user for a developer and assigned the user an access key instead of a user name and password. What is the access key used for?
Which AWS service or feature identifies whether an Amazon S3 bucket or an IAM role has been shared with an external entity?
A company's application has high customer usage during certain times of the day. The company wants to reduce the number of Amazon EC2 instances that run when application usage is low.
Which AWS service or instance purchasing option should the company use to meet this requirement?
A company wants to automatically add and remove Amazon EC2 instances. The company wants the EC2 instances to adjust to varying workloads dynamically.
Which service or feature will meet these requirements?
Amazon Elastic File System (Amazon EFS) and Amazon FSx offer which type of storage?
An auditor needs to find out whether a specific AWS service is compliant with specific compliance frameworks.
Which AWS service will provide this information?
A company deployed an application on an Amazon EC2 instance. The application ran as expected for 6 months. In the past week, users
have reported latency issues. A system administrator found that the CPU utilization was at 100% during business hours. The company
wants a scalable solution to meet demand.
Which AWS service or feature should the company use to handle the load for its application during periods of high demand?
According to the AWS shared responsibility model, who is responsible for the virtualization layer down to the
physical security of the facilities in which AWS services operate?
Which top-level key performance indicator (KPI) is available in AWS rightsizing recommendations of Cost Optimization?
Which AWS services allow users to monitor and retain records of account activities that include governance, compliance, and auditing?
(Select TWO.)
Which AWS services or features provide disaster recovery solutions for Amazon EC2 instances? (Select TWO.)
Which AWS service or feature gives users the ability to capture information about network traffic in a VPC?
An IT engineer needs to access AWS services from an on-premises application.
Which credentials or keys does the application need for authentication?