What is the AWS service that provides a secure key management system for encrypting data at rest?
Select Answer
- AWS KMS
- Amazon S3
- AWS CloudTrail
- AWS Config
What is the AWS service that provides a managed service for encrypting data in transit?
Select Answer
- AWS KMS
- AWS Certificate Manager
- AWS CloudTrail
- Amazon S3 Transfer Acceleration
What is the best practice for securing data at rest on an EC2 instance?
Select Answer
- Store the data on an EBS volume with encryption enabled.
- Store the data on the EC2 instance's root volume with encryption enabled.
- Store the data on a separate S3 bucket with server-side encryption enabled.
What is the recommended way to secure access to Amazon S3 buckets?
Select Answer
- Use Amazon S3 bucket policies and Access Control Lists (ACLs)
- Use IAM policies to control access to S3 resources
- Use SSL/TLS encryption for all S3 requests
What is the recommended way to secure access to an Amazon EC2 instance?
Select Answer
- Use a security group to control inbound and outbound traffic
- Use an IAM role to control access to the EC2 instance
- Use SSL/TLS encryption for all traffic to the EC2 instance
What is the recommended way to secure access to Amazon SNS topics?
Select Answer
- Use AWS Identity and Access Management (IAM) policies to control access
- Use HTTP basic authentication to control access
- Use SSL/TLS encryption for all SNS requests
What is the recommended way to secure access to an Amazon DynamoDB table?
Select Answer
- Use AWS Identity and Access Management (IAM) policies to control access
- Use SSL/TLS encryption for all DynamoDB requests
- Use Amazon VPC endpoints to connect to the DynamoDB table
What is the best practice for protecting data in transit?
Select Answer
- Use SSL/TLS to encrypt data sent over the internet
- Use IPsec VPN to encrypt data sent over the internet
- Use AWS KMS to encrypt data sent over the internet
- Use client-side encryption to encrypt data sent over the internet
What is the best practice for securing access to an Amazon Elastic Beanstalk environment?
Select Answer
- Use IAM roles and policies to control access to the environment.
- Allow unrestricted access to the environment.
- Use a shared SSH key for all users.
What is the best way to protect sensitive data in an AWS infrastructure?
Select Answer
- Use encryption to protect data both in transit and at rest
- Ensure that all instances are patched with the latest security updates
- Use a firewall with strict rules to block unauthorized access
- Use a security group to restrict traffic to only authorized IP addresses
What is the best way to protect data in transit between an RDS instance and an EC2 instance?
Select Answer
- Use SSL/TLS encryption
- Use a firewall with strict rules to block unauthorized access
- Use a security group to restrict traffic to only authorized IP addresses
- Use a VPN connection between the RDS instance and the EC2 instance
What is the best way to protect sensitive data in transit between EC2 instances?
Select Answer
- Use SSL/TLS encryption
- Use HTTP without encryption
- Use SSH encryption
What is the best way to protect against DDoS attacks in AWS?
Select Answer
- Use AWS Shield
- Use AWS WAF
- Use AWS Firewall Manager
What is the AWS service that provides network security for VPCs?
Select Answer
- AWS Security Groups
- AWS Network ACLs
- AWS WAF
What is the recommended method for securely storing secrets such as database passwords in AWS?
Select Answer
- Store passwords in environment variables.
- Store passwords in plain text files in an S3 bucket.
- Store passwords in an RDS database instance.
- Store passwords in Secrets Manager.
What is AWS CloudTrail?
Select Answer
- A service that provides real-time monitoring and analysis of AWS resources for security threats.
- A service that enables you to audit, monitor, and log activity across your AWS infrastructure.
- A service that provides automated backup and recovery of AWS resources.
- A service that provides automated patching and maintenance of AWS resources.
What is the recommended method for securely accessing an EC2 instance in a private subnet?
Select Answer
- Use a bastion host.
- Use a VPN connection.
- Use AWS CloudTrail.
- Use AWS WAF.
What is the recommended way to secure AWS credentials?
Select Answer
- Use AWS Identity and Access Management (IAM) roles
- Store them in plain text files
- Share them with everyone on the team
What is the recommended approach for implementing secure communications between AWS resources?
Select Answer
- Using unencrypted protocols for faster communication
- Using VPNs to secure communications
- Using VPC peering and SSL/TLS to secure communications
What is the best practice for securing data at rest in RDS?
Select Answer
- Use encryption at rest.
- Use plain text storage.
- Use client-side encryption.
What is the best way to secure access to your API Gateway?
Select Answer
- Use IAM roles to restrict access
- Use resource policies to restrict access
- Use a Network Access Control List (ACL) to restrict access
What is the best practice for securing data in transit on AWS?
Select Answer
- Using HTTP for sensitive data
- Using HTTPS for sensitive data
- Using FTP for file transfers
What is the best practice for protecting against cross-site scripting (XSS) attacks?
Select Answer
- Using AWS Shield for protection
- Using AWS WAF for protection
- Disabling all JavaScript in the application
What is the purpose of AWS Key Management Service (KMS)?
Select Answer
- KMS is a service that provides automated patching for EC2 instances.
- KMS is a service that provides centralized logging for AWS resources.
- KMS is a service that provides encryption and decryption of data keys.
- KMS is a service that provides load balancing for EC2 instances.
What is the AWS Key Management Service (KMS) and how can it be used to secure data?
Select Answer
- AWS KMS is a managed service that makes it easy to create and control the encryption keys used to protect your data, and it can be used to encrypt data at rest, in transit, and in use
- AWS KMS is a tool for storing and managing API access keys and secret keys, and it can be used to secure access to AWS resources
- AWS KMS is a service for managing certificates and SSL/TLS encryption, and it can be used to secure internet traffic to and from AWS resources
What is the AWS Identity and Access Management (IAM) service and how can it be used to manage access to AWS resources?
Select Answer
- AWS IAM is a web service that helps you securely control access to AWS resources by enabling you to create and manage AWS users, groups, and permissions, and it can be used to enforce the principle of least privilege
- AWS IAM is a tool for monitoring and analyzing traffic to and from AWS resources, and it can be used to detect and prevent unauthorized access
- AWS IAM is a service for managing certificates and SSL/TLS encryption, and it can be used to secure internet traffic to and from AWS resources
What is the AWS Shield service and how can it be used to protect against DDoS (Distributed Denial of Service) attacks?
Select Answer
- AWS Shield is a managed service that provides protection against DDoS attacks on AWS resources, and it can be used to automatically detect and mitigate attacks
- AWS Shield is a tool for managing DNS records and routing internet traffic to AWS resources, and it can be used to control network access with security groups
- AWS Shield is a service for managing API access keys and secret keys, and it can be used to encrypt data at rest, in transit, and in use
What is the AWS CloudTrail service and how can it be used to track and audit activity on AWS resources?
Select Answer
- AWS CloudTrail is a web service that records API calls and events made on AWS resources and delivers log files for audit and review, and it can be used to monitor security events and troubleshoot operational issues
- AWS CloudTrail is a tool for managing certificates and SSL/TLS encryption, and it can be used to secure internet traffic to and from AWS resources
- AWS CloudTrail is a managed service that provides protection against DDoS attacks on AWS resources, and it can be used to control access with IAM policies and VPC security groups
What is the recommended way to secure data stored in an Amazon RDS instance?
Select Answer
- Enable SSL/TLS encryption for connections to the RDS instance
- Encrypt the data at rest using a third-party encryption tool
- Use IAM roles to control access to the RDS instance
What is the recommended way to protect AWS resources from DDoS attacks?
Select Answer
- Use AWS Shield to protect against DDoS attacks
- Configure IAM roles to control access to AWS resources
- Use AWS WAF to filter incoming traffic
How would you design a secure architecture that uses AWS CloudTrail to monitor and log all API calls made to AWS?
Select Answer
- By creating a CloudTrail trail to specify the resources to log and the location of the log files
- By using AWS Config to track changes to resources and compliance with policies
- By using AWS Shield to protect against distributed denial of service (DDoS) attacks
What is an effective way to mitigate DDoS attacks on an EC2 instance?
Select Answer
- Use Elastic Load Balancer (ELB) to distribute traffic to multiple instances
- Block traffic using Network ACLs
What is the best way to secure data in transit between EC2 instances?
Select Answer
- Use SSL/TLS to encrypt communication
- Use IPsec to encrypt communication
What is the best way to secure data stored on a Redshift cluster?
Select Answer
- Use SSL/TLS encryption for connections
- Use a VPN to encrypt communication
What is the best way to secure an Elastic Beanstalk application?
Select Answer
- Enable HTTPS for connections to the application
- Use an AWS WAF to filter out malicious traffic
What is AWS CloudTrail?
Select Answer
- A service that records API calls made on your account
- A service that provides secure access to your Amazon S3 buckets
- A service that provides real-time monitoring of your AWS resources
- A service that provides network security for your AWS resources
What is the purpose of AWS Config?
Select Answer
- To monitor and respond to security incidents
- To track changes to AWS resources over time
- To monitor network traffic for suspicious activity
What is the best practice for securing access to an RDS instance in a VPC?
Select Answer
- Use a security group that allows all traffic.
- Use a security group that allows traffic from a specific IP range.
- Use a security group that allows traffic from any IP address.
What is the best practice for securing access to an EC2 instance in a VPC?
Select Answer
- Use a security group that allows all traffic.
- Use a security group that allows traffic from a specific IP range.
- Use a security group that allows traffic from any IP address.
What are some best practices for securing data at rest in an S3 bucket?
Select Answer
- Enable server-side encryption
- Use client-side encryption
- Use bucket policies to control access
What is the recommended practice for securing access to RDS instances?
Select Answer
- Use VPC security groups to control access
- Use IAM policies to control access
- Use RDS instance level security to control access
What are some best practices for securing data in transit?
Select Answer
- Use HTTPS or SSL/TLS connections
- Use plaintext connections
- Use SSH connections
What is the primary function of an Elastic Load Balancer (ELB) in a resilient architecture?
Select Answer
- To distribute traffic across multiple instances in multiple Availability Zones.
- To store and manage data in a highly available manner.
- To manage and configure network security in a VPC.
What is a blue-green deployment, and how does it contribute to resilience and high availability?
Select Answer
- A blue-green deployment is a technique for deploying code changes by creating a duplicate environment to test the changes before switching traffic to the new environment. This ensures high availability and resilience by minimizing downtime and reducing the risk of a failed deployment.
- A blue-green deployment is a technique for scaling up or down resources in response to changes in demand, ensuring high availability and resilience by providing the right amount of capacity at all times.
- A blue-green deployment is a technique for storing and managing data in a highly available manner, ensuring resilience and data durability in case of a failure.
What is a distributed denial-of-service (DDoS) attack, and how can you protect against it in a resilient architecture?
Select Answer
- A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic. You can protect against it in a resilient architecture by using a web application firewall (WAF), a content delivery network (CDN), and elastic load balancing (ELB) to distribute traffic and absorb the attack.
- A distributed denial-of-service (DDoS) attack is a malicious attempt to steal sensitive data from a targeted server, service, or network by exploiting vulnerabilities in software or hardware. You can protect against it in a resilient architecture by using encryption and access controls to secure your data.
- A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt network connectivity of a targeted server, service, or network by intercepting and modifying traffic. You can protect against it in a resilient architecture by using virtual private network (VPN) and intrusion detection system (IDS) to detect and prevent attacks.
What are the key benefits of using Amazon S3 cross-region replication?
Select Answer
- Improved durability, availability, and data recovery in the event of disasters or disruptions
- Reduced cost, better performance, and improved security
What is the purpose of implementing auto scaling in a resilient architecture?
Select Answer
- To reduce the overall cost of running the system
- To ensure that the system can handle sudden increases in traffic
- To ensure that the system can recover quickly from a disaster
- To reduce the amount of manual intervention required to manage the system
What is the purpose of Route 53 in AWS?
Select Answer
- To route internet traffic to the appropriate resources
- To store and retrieve data from a highly available object storage service
- To provision and manage virtual machines running in the cloud
What is a Multi-AZ deployment in AWS?
Select Answer
- A deployment that spans multiple Availability Zones to provide high availability and fault tolerance
- A deployment that uses multiple regions for redundancy and disaster recovery
- A deployment that uses multiple instances in a single Availability Zone for high performance
What is the primary advantage of using Amazon RDS Multi-AZ deployments?
Select Answer
- High availability and automatic failover
QUESTION 1 of 50
Design secure access to AWS resources
What is the AWS service that provides a secure key management system for encrypting data at rest?
Select Answer
- AWS KMS
- Amazon S3
- AWS CloudTrail
- AWS Config
What is the AWS service that provides a managed service for encrypting data in transit?
Select Answer
- AWS KMS
- AWS Certificate Manager
- AWS CloudTrail
- Amazon S3 Transfer Acceleration
What is the best practice for securing data at rest on an EC2 instance?
Select Answer
- Store the data on an EBS volume with encryption enabled.
- Store the data on the EC2 instance's root volume with encryption enabled.
- Store the data on a separate S3 bucket with server-side encryption enabled.
What is the recommended way to secure access to Amazon S3 buckets?
Select Answer
- Use Amazon S3 bucket policies and Access Control Lists (ACLs)
- Use IAM policies to control access to S3 resources
- Use SSL/TLS encryption for all S3 requests
What is the recommended way to secure access to an Amazon EC2 instance?
Select Answer
- Use a security group to control inbound and outbound traffic
- Use an IAM role to control access to the EC2 instance
- Use SSL/TLS encryption for all traffic to the EC2 instance
What is the recommended way to secure access to Amazon SNS topics?
Select Answer
- Use AWS Identity and Access Management (IAM) policies to control access
- Use HTTP basic authentication to control access
- Use SSL/TLS encryption for all SNS requests
What is the recommended way to secure access to an Amazon DynamoDB table?
Select Answer
- Use AWS Identity and Access Management (IAM) policies to control access
- Use SSL/TLS encryption for all DynamoDB requests
- Use Amazon VPC endpoints to connect to the DynamoDB table
What is the best practice for protecting data in transit?
Select Answer
- Use SSL/TLS to encrypt data sent over the internet
- Use IPsec VPN to encrypt data sent over the internet
- Use AWS KMS to encrypt data sent over the internet
- Use client-side encryption to encrypt data sent over the internet
What is the best practice for securing access to an Amazon Elastic Beanstalk environment?
Select Answer
- Use IAM roles and policies to control access to the environment.
- Allow unrestricted access to the environment.
- Use a shared SSH key for all users.
What is the best way to protect sensitive data in an AWS infrastructure?
Select Answer
- Use encryption to protect data both in transit and at rest
- Ensure that all instances are patched with the latest security updates
- Use a firewall with strict rules to block unauthorized access
- Use a security group to restrict traffic to only authorized IP addresses
What is the best way to protect data in transit between an RDS instance and an EC2 instance?
Select Answer
- Use SSL/TLS encryption
- Use a firewall with strict rules to block unauthorized access
- Use a security group to restrict traffic to only authorized IP addresses
- Use a VPN connection between the RDS instance and the EC2 instance
What is the best way to protect sensitive data in transit between EC2 instances?
Select Answer
- Use SSL/TLS encryption
- Use HTTP without encryption
- Use SSH encryption
What is the best way to protect against DDoS attacks in AWS?
Select Answer
- Use AWS Shield
- Use AWS WAF
- Use AWS Firewall Manager
What is the AWS service that provides network security for VPCs?
Select Answer
- AWS Security Groups
- AWS Network ACLs
- AWS WAF
What is the recommended method for securely storing secrets such as database passwords in AWS?
Select Answer
- Store passwords in environment variables.
- Store passwords in plain text files in an S3 bucket.
- Store passwords in an RDS database instance.
- Store passwords in Secrets Manager.
What is AWS CloudTrail?
Select Answer
- A service that provides real-time monitoring and analysis of AWS resources for security threats.
- A service that enables you to audit, monitor, and log activity across your AWS infrastructure.
- A service that provides automated backup and recovery of AWS resources.
- A service that provides automated patching and maintenance of AWS resources.
What is the recommended method for securely accessing an EC2 instance in a private subnet?
Select Answer
- Use a bastion host.
- Use a VPN connection.
- Use AWS CloudTrail.
- Use AWS WAF.
What is the recommended way to secure AWS credentials?
Select Answer
- Use AWS Identity and Access Management (IAM) roles
- Store them in plain text files
- Share them with everyone on the team
What is the recommended approach for implementing secure communications between AWS resources?
Select Answer
- Using unencrypted protocols for faster communication
- Using VPNs to secure communications
- Using VPC peering and SSL/TLS to secure communications
What is the best practice for securing data at rest in RDS?
Select Answer
- Use encryption at rest.
- Use plain text storage.
- Use client-side encryption.
What is the best way to secure access to your API Gateway?
Select Answer
- Use IAM roles to restrict access
- Use resource policies to restrict access
- Use a Network Access Control List (ACL) to restrict access
What is the best practice for securing data in transit on AWS?
Select Answer
- Using HTTP for sensitive data
- Using HTTPS for sensitive data
- Using FTP for file transfers
What is the best practice for protecting against cross-site scripting (XSS) attacks?
Select Answer
- Using AWS Shield for protection
- Using AWS WAF for protection
- Disabling all JavaScript in the application
What is the purpose of AWS Key Management Service (KMS)?
Select Answer
- KMS is a service that provides automated patching for EC2 instances.
- KMS is a service that provides centralized logging for AWS resources.
- KMS is a service that provides encryption and decryption of data keys.
- KMS is a service that provides load balancing for EC2 instances.
What is the AWS Key Management Service (KMS) and how can it be used to secure data?
Select Answer
- AWS KMS is a managed service that makes it easy to create and control the encryption keys used to protect your data, and it can be used to encrypt data at rest, in transit, and in use
- AWS KMS is a tool for storing and managing API access keys and secret keys, and it can be used to secure access to AWS resources
- AWS KMS is a service for managing certificates and SSL/TLS encryption, and it can be used to secure internet traffic to and from AWS resources
What is the AWS Identity and Access Management (IAM) service and how can it be used to manage access to AWS resources?
Select Answer
- AWS IAM is a web service that helps you securely control access to AWS resources by enabling you to create and manage AWS users, groups, and permissions, and it can be used to enforce the principle of least privilege
- AWS IAM is a tool for monitoring and analyzing traffic to and from AWS resources, and it can be used to detect and prevent unauthorized access
- AWS IAM is a service for managing certificates and SSL/TLS encryption, and it can be used to secure internet traffic to and from AWS resources
What is the AWS Shield service and how can it be used to protect against DDoS (Distributed Denial of Service) attacks?
Select Answer
- AWS Shield is a managed service that provides protection against DDoS attacks on AWS resources, and it can be used to automatically detect and mitigate attacks
- AWS Shield is a tool for managing DNS records and routing internet traffic to AWS resources, and it can be used to control network access with security groups
- AWS Shield is a service for managing API access keys and secret keys, and it can be used to encrypt data at rest, in transit, and in use
What is the AWS CloudTrail service and how can it be used to track and audit activity on AWS resources?
Select Answer
- AWS CloudTrail is a web service that records API calls and events made on AWS resources and delivers log files for audit and review, and it can be used to monitor security events and troubleshoot operational issues
- AWS CloudTrail is a tool for managing certificates and SSL/TLS encryption, and it can be used to secure internet traffic to and from AWS resources
- AWS CloudTrail is a managed service that provides protection against DDoS attacks on AWS resources, and it can be used to control access with IAM policies and VPC security groups
What is the recommended way to secure data stored in an Amazon RDS instance?
Select Answer
- Enable SSL/TLS encryption for connections to the RDS instance
- Encrypt the data at rest using a third-party encryption tool
- Use IAM roles to control access to the RDS instance
What is the recommended way to protect AWS resources from DDoS attacks?
Select Answer
- Use AWS Shield to protect against DDoS attacks
- Configure IAM roles to control access to AWS resources
- Use AWS WAF to filter incoming traffic
How would you design a secure architecture that uses AWS CloudTrail to monitor and log all API calls made to AWS?
Select Answer
- By creating a CloudTrail trail to specify the resources to log and the location of the log files
- By using AWS Config to track changes to resources and compliance with policies
- By using AWS Shield to protect against distributed denial of service (DDoS) attacks
What is an effective way to mitigate DDoS attacks on an EC2 instance?
Select Answer
- Use Elastic Load Balancer (ELB) to distribute traffic to multiple instances
- Block traffic using Network ACLs
What is the best way to secure data in transit between EC2 instances?
Select Answer
- Use SSL/TLS to encrypt communication
- Use IPsec to encrypt communication
What is the best way to secure data stored on a Redshift cluster?
Select Answer
- Use SSL/TLS encryption for connections
- Use a VPN to encrypt communication
What is the best way to secure an Elastic Beanstalk application?
Select Answer
- Enable HTTPS for connections to the application
- Use an AWS WAF to filter out malicious traffic
What is AWS CloudTrail?
Select Answer
- A service that records API calls made on your account
- A service that provides secure access to your Amazon S3 buckets
- A service that provides real-time monitoring of your AWS resources
- A service that provides network security for your AWS resources
What is the purpose of AWS Config?
Select Answer
- To monitor and respond to security incidents
- To track changes to AWS resources over time
- To monitor network traffic for suspicious activity
What is the best practice for securing access to an RDS instance in a VPC?
Select Answer
- Use a security group that allows all traffic.
- Use a security group that allows traffic from a specific IP range.
- Use a security group that allows traffic from any IP address.
What is the best practice for securing access to an EC2 instance in a VPC?
Select Answer
- Use a security group that allows all traffic.
- Use a security group that allows traffic from a specific IP range.
- Use a security group that allows traffic from any IP address.
What are some best practices for securing data at rest in an S3 bucket?
Select Answer
- Enable server-side encryption
- Use client-side encryption
- Use bucket policies to control access
What is the recommended practice for securing access to RDS instances?
Select Answer
- Use VPC security groups to control access
- Use IAM policies to control access
- Use RDS instance level security to control access
What are some best practices for securing data in transit?
Select Answer
- Use HTTPS or SSL/TLS connections
- Use plaintext connections
- Use SSH connections
What is the primary function of an Elastic Load Balancer (ELB) in a resilient architecture?
Select Answer
- To distribute traffic across multiple instances in multiple Availability Zones.
- To store and manage data in a highly available manner.
- To manage and configure network security in a VPC.
What is a blue-green deployment, and how does it contribute to resilience and high availability?
Select Answer
- A blue-green deployment is a technique for deploying code changes by creating a duplicate environment to test the changes before switching traffic to the new environment. This ensures high availability and resilience by minimizing downtime and reducing the risk of a failed deployment.
- A blue-green deployment is a technique for scaling up or down resources in response to changes in demand, ensuring high availability and resilience by providing the right amount of capacity at all times.
- A blue-green deployment is a technique for storing and managing data in a highly available manner, ensuring resilience and data durability in case of a failure.
What is a distributed denial-of-service (DDoS) attack, and how can you protect against it in a resilient architecture?
Select Answer
- A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic. You can protect against it in a resilient architecture by using a web application firewall (WAF), a content delivery network (CDN), and elastic load balancing (ELB) to distribute traffic and absorb the attack.
- A distributed denial-of-service (DDoS) attack is a malicious attempt to steal sensitive data from a targeted server, service, or network by exploiting vulnerabilities in software or hardware. You can protect against it in a resilient architecture by using encryption and access controls to secure your data.
- A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt network connectivity of a targeted server, service, or network by intercepting and modifying traffic. You can protect against it in a resilient architecture by using virtual private network (VPN) and intrusion detection system (IDS) to detect and prevent attacks.
What are the key benefits of using Amazon S3 cross-region replication?
Select Answer
- Improved durability, availability, and data recovery in the event of disasters or disruptions
- Reduced cost, better performance, and improved security
What is the purpose of implementing auto scaling in a resilient architecture?
Select Answer
- To reduce the overall cost of running the system
- To ensure that the system can handle sudden increases in traffic
- To ensure that the system can recover quickly from a disaster
- To reduce the amount of manual intervention required to manage the system
What is the purpose of Route 53 in AWS?
Select Answer
- To route internet traffic to the appropriate resources
- To store and retrieve data from a highly available object storage service
- To provision and manage virtual machines running in the cloud
What is a Multi-AZ deployment in AWS?
Select Answer
- A deployment that spans multiple Availability Zones to provide high availability and fault tolerance
- A deployment that uses multiple regions for redundancy and disaster recovery
- A deployment that uses multiple instances in a single Availability Zone for high performance
What is the primary advantage of using Amazon RDS Multi-AZ deployments?
Select Answer
- High availability and automatic failover
1:00:00
Your Exam is paused.
Please wait...
Since this is a preview of our actual test taking interface your progress cannot not be saved.