New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CLF-C02 Exam Dumps - AWS Certified Cloud Practitioner

Go to page:
Question # 145

A company manages factory machines in real time. The company wants to use AWS technology to deploy its monitoring applications as close to the factory machines as possible.

Which AWS solution will meet these requirements with the LEAST latency?

A.

AWS Outposts

B.

Amazon EC2

C.

AWS App Runner

D.

AWS Batch

Full Access
Question # 146

Which design principle is included in the operational excellence pillar of the AWS Well-Architected Framework?

A.

Create annotated documentation.

B.

Anticipate failure.

C.

Ensure performance efficiency.

D.

Optimize costs.

Full Access
Question # 147

Which AWS service can create a private network connection from on premises to the AWS Cloud?

A.

AWS Config

B.

Virtual Private Cloud (Amazon VPC)

C.

AWS Direct Connect

D.

Amazon Route 53

Full Access
Question # 148

A company wants to migrate its database to a managed AWS service that is compatible with PostgreSQL.

Which AWS services will meet these requirements? (Select TWO)

A.

Amazon Athena

B.

Amazon RDS

C.

Amazon EC2

D.

Amazon DynamoDB

E.

Amazon Aurora

Full Access
Question # 149

Which AWS service or feature offers security for a VPC by acting as a firewall to control traffic in and out of subnets?

A.

AWS Security Hub

B.

Security groups

C.

Network ACL

D.

AWSWAF

Full Access
Question # 150

To assist companies with Payment Card Industry Data Security Standard (PCI DSS) compliance in the cloud. AWS provides:

A.

physical inspections of data centers by appointment.

B.

required PCI compliance certifications for any application running on AWS.

C.

an AWS Attestation of Compliance (AOC) report for specific AWS services.

D.

professional PCI compliance services.

Full Access
Question # 151

Using AWS Identity and Access Management (IAM) to grant access only to the resources needed to perform a task is a concept known as:

A.

restricted access.

B.

as-needed access.

C.

least privilege access.

D.

token access.

Full Access
Question # 152

An auditor is preparing for an annual security audit. The auditor requests certification details for a company's AWS hosted resources across multiple Availability Zones in the us-east-1 Region.

How should the company respond to the auditor's request?

A.

Open an AWS Support ticket to request that the AWS technical account manager (TAM) respond and help the auditor.

B.

Open an AWS Support ticket to request that the auditor receive approval to conduct an onsite assessment of the AWS data centers in

which the company operates.

C.

Explain to the auditor that AWS does not need to be audited because the company's application is hosted in multiple Availability

Zones.

D.

Use AWS Artifact to download the applicable report for AWS security controls. Provide the report to the auditor.

Full Access
Go to page: