- (Exam Topic 1)
Which of the following are characteristics of AWS WAF? (Select TWO.)
Correct Answer:
BC
AWS WAF lets you create rules to filter web traffic based on conditions that include IP addresses, HTTP headers and body, or custom URIs. This gives you an additional layer of protection from web attacks that attempt to exploit vulnerabilities in custom or third party web applications. In addition, AWS WAF makes it easy to create rules that block common web exploits like SQL injection and cross site scripting.
AWS WAF allows you to create a centralized set of rules that you can deploy across multiple websites. This means that in an environment with many websites and web applications you can create a single set of rules that you can reuse across applications rather than recreating that rule on every application you want to protect.
- (Exam Topic 2)
What should a user do if the user loses an IAM secret access key?
Correct Answer:
C
- (Exam Topic 2)
A company moves a workload to AWS lo run on Amazon EC2 instances. The company needs to run the workload in the most cost-effective way.
What can the company do lo meet this requirement?
Correct Answer:
D
- (Exam Topic 3)
A company wants to protect resources that the company hosts on AWS, including Application Load Balancers and Amazon CloudFront distributions. The company wants an AWS service that can provide near real-time visibility into attacks on the company's resources. The service must also have a dedicated AWS team to assist with distributed denial of service (DDoS) attacks.
Which AWS service will meet these requirements?
Correct Answer:
D
https://aws.amazon.com/shield/faqs/
- (Exam Topic 3)
A company needs to organize its resources and track AWS costs on a detailed level. The company needs to categorize costs by business department, environment, and application.
Which solution will meet these requirements?
Correct Answer:
A