1. You are creating a VPN software on EC2 Instance used in VPN connections. Which of the following is an important aspect that should be given to the EC2 instance?
A) Enables improved network mode, for example, Amazon EC2. B) Take the route to the progress of Virtual Private Cloud (VPC) to the subnet route table. C) None D) Please check the source destination Amazon EC2 instance. E) Disable source destination to check the Amazon EC2 instance;
2. You have specified hosts the zone on Route 53. You need to have the ability to see the types of records are requested zone. How can you determine this?
A) Specify the Amazon Route 53 entry B) Use the Cloud to watch gauges C) Use the Cloud trail D) Specify the VPC Flow Logs E) None
3. The company currently has bought another smaller company. Both companies have their presence in the AWS. There is a requirement to ensure traffic flows VPC, VPC security A parent company B in the same parent company. And then the traffic can flow VPC C of the acquired company. How can you accomplish this transit flow?
A) None B) Create a VPC traffic exchange agreements connection to VPC VPC B. A and create a second VPC traffic exchange agreements connection to VPC Band VPCC C) Create a VPC traffic exchange agreements connection A VPC and VPC C. to create a VPN connection to a VPC and VPC D) Create VPC peering agreements VPC connection and a second VPC C. VPC traffic create swaps VPC connection B and C VPC E) Create a VPC Peering Connection VPC VPC A and B creates a VPN connection B and VPC VPC
4. There is a requirement for all port scans to see that occurring in a couple of EC2 instances. What can be used as such a requirement of the following?
A) None B) AWS VPC Flow Logs C) AWS Trusted Advisor D) AWS Inspector E) AWS Cloud Watch Events
5. You are going to create a VPC endpoint own SaaS hosted on AWS. You provide a link to the customer, who uses the link to the application. The application works with the UDP protocol. You are going to offer a DNS name to the link. But the client can not access the link of their application. What could be the problem?
A) The gateway the endpoint is a policy that denies access. This should be amended accordingly. B) The service endpoint serves only the TCP protocol C) The customer needs to use the NAT device to reach the end point of service D) None E) The customer needs to create a network load balancer to reach the end point of service
Leave a comment