1. Right Answer: A
Explanation: Since the database should not be hosted on the cloud all other options are invalid. The best option is to create a VPN connection for securing traffic as shown below Option B is invalid because this is the incorrect use of the Storage gateway Option C is invalid since this is the incorrect use of the NAT instance Option D is invalid since this is an incorrect configuration For more information on VPN connections , please visit the below url http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_VPN.html
2. Right Answer: B,D
Explanation: The AWS(Amazon Web Service) Documentation mentions the following To share log files between multiple AWS(Amazon Web Service) accounts, you must perform the following general steps. These steps are explained in detail later in this section. Create an IAM role for each account that you want to share log files with. For each of these IAM roles, create an access policy that grants read-only access to the account you want to share the log files with. Have an IAM user in each account programmatically assume the appropriate role and retrieve the log files. Options A and C are invalid because creating an IAM user and then sharing the IAM user credentials with the vendor is a direct 'NO' practise from a security perspective. For more information on sharing cloudtrail logs files, please visit the following URL: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-sharing-logs.html
3. Right Answer: B
Explanation: The encrypted-volumes config rule for AWS(Amazon Web Service) Config can be used to check for unencrypted volumes. Options A and C are incorrect since these services cannot be used to check for unencrypted EBS volumes Option D is incorrect because even though this is possible , trying to implement the solution alone with just the Lambda service would be too difficult For more information on AWS(Amazon Web Service) Config and encrypted volumes, please refer to below URL https://docs.aws.amazon.com/config/latest/developerguide/encrypted-volumes.html
4. Right Answer: B
Explanation: The AWS(Amazon Web Service) Security best practises mentions the following Unique to AWS, security practitioners can use CloudFormation to quickly create a new, trusted environment in which to conduct deeper investigation. The CloudFormation template can pre-configure instances in an isolated environment that contains all the necessary tools forensic teams need to determine the cause of the incident. This cuts down on the time it takes to gather necessary tools, isolates systems under examination, and ensures that the team is operating in a clean room. Option A is incorrect since this is a logging service and cannot be used to provision a test environment Option C is incorrect since this is an API logging service and cannot be used to provision a test environment Option D is incorrect since this is a configuration service and cannot be used to provision a test environment For more information on AWS(Amazon Web Service) Security best practises, please refer to below URL https://d1.awsstatic.com/whitepapers/architecture/AWS-Security-Pillar.pdf
5. Right Answer: C
Explanation: