多选题
To assist with service deployment, a development team has built a number of AWS CloudFormation templates. They developed a framework for a
Network/virtual private cloud (VPC) stack, a database stack, a bastion host stack, and a stack specifically for web applications. Each service
Requires the deployment of at least the following:
✑ A network/Virtual Private Cloud stack
✑ A host stack that serves as a bastion
✑ A stack of web applications
Each template has a large number of input parameters, making it impossible to install the services independently using the AWS CloudFormation
Panel. Typically, the input parameters of one stack are the outputs of other stacks. For instance, the network stack's VPC ID, subnet IDs, and
Security groups may need to be utilized in the application or database stack.
Which activities will contribute to lowering both the operational load and the amount of parameters supplied into a service deployment? (Select
Two.)
相关试题
单选题
A business is transferring its on-premises build artifact server to an Amazon Web Services (AWS) solution. The existing system is comprised of an
Apache HTTP server that provides artifacts to clients inside the perimeter firewall's local network. The majority of artifact consumers are built-in
Automation scripts that download artifacts over anonymous HTTP, which the firm will be unable to adjust during the timeframe of its migration.
The business chooses to migrate to Amazon S3 static website hosting. The artifact consumers will be transferred to Amazon EC2 instances
Inside a virtual private cloud's public and private subnets (VPC).
Which solution enables artifact consumers to download artifacts without altering the automated processes already in place?
单选题
A user want to arrange AutoScaling such that it scales up when the CPU usage exceeds 70% and down when the CPU utilization is less than 30%.
How can the user set AutoScaling to accommodate the aforementioned circumstance?
单选题
A client of AWS is launching an application that utilizes an AutoScaling group of EC2 Instances.
According to the customer's security policy, any outbound connections from these instances to any other service inside the customer's Virtual
Private Cloud must be authenticated using a unique x 509 certificate including the instance's unique id.
Additionally, to be trusted for authentication, an x 509 certificate must be created by the customer's key management service.
Which of the following setups meets these specifications?
单选题
A company's recommendation service for video games has just gone popular. The firm is gaining new customers from all corners of the globe.
The service's website is hosted on a collection of Amazon EC2 instances organized in an Auto Scaling group and protected by an Application Load
Balancer (ALB). The website is composed of static content, with resources being loaded in accordance with the device type.
Recently, users claimed that the website's load time has risen. Administrators are reporting that the EC2 instances that host the service are
Experiencing significant demands.
Which specific activities should a solutions architect take in order to increase response times?
单选题
A business is executing a workload on thousands of Amazon EC2 instances. The workload is operating on a virtual private cloud (VPC) that
Comprises many public and private subnets. The public subnets provide a route for 0.0.0.0/0 to an already-established internet gateway. Each
Private subnet has a route to an existing NAT gateway for 0.0.0.0/0.
A solutions architect is responsible for migrating a complete fleet of Amazon EC2 instances to IPv6. Private subnet EC2 instances must be
Inaccessible from the public internet.
What actions should the solutions architect take to ensure that these criteria are met?
单选题
A user is attempting to connect to an EC2 instance through the SSH port 10.20.30.40/32.
Which of the following is the most secure method of configuring the instance such that it can be accessed only from this IP?
单选题
A business has many Amazon EC2 instances linked to both public and private subnets inside a virtual private cloud (VPC) that is not connected to
The corporate network. A security group connected with the EC2 instances enables the firm to access the instances using the Windows remote
Desktop protocol (RDP) via the internet. The security team has detected attempted connections from unidentified sources. The business want to
Establish a more secure method of accessing its EC2 instances.
Which approach should be implemented by a solutions architect?
单选题
A North American corporation with its headquarters on the East Coast is implementing a new web application in the us-east-1 Region using
Amazon EC2. The application's scalability should be dynamic in order to satisfy user demand while maintaining resilience. Additionally, the
Application must support active-passive disaster recovery in the us-west-1 Region.
Which actions should a solutions architect take after the creation of a virtual private cloud in the us-east-1 region?