Premium

AWS Certified Developer - Associate Questions and Answers (Dumps and Practice Questions)



Question : A root account has created an IAM group and defined the policy as:
"Statement": [
{
"Effect": "Allow"
"Action": ["iam:ChangePassword"],
"Resource": ["arn:aws:iam::3377:user/${aws:username}"]
},
{
"Effect": "Allow",
"Action": ["iam:GetAccountPasswordPolicy"],
"Resource": ["*"]
}
]
Select the corect statement which applies.
 :  A root account has created an IAM group and defined the policy as:
1. Allow all the users of IAM to modify their password
2. Allow this group to view the password policy of all the IAM users
3. Access Mostly Uused Products by 50000+ Subscribers
4. Allow this group to view the password policy and modify the password of all the IAM users

Correct Answer : Get Lastest Questions and Answer :

Explanation: This IAM policy grants access to the ChangePassword action, which lets the users use the console, the CLI, or the API to change their passwords. The Resource element uses a policy variable (aws:username), which is useful in policies that are attached to groups. The aws:username key resolves to the name of the current IAM user when a request is made, so that each user is allowed permission to change only his or her own password . This policy will allow all the users of this group to modify the passwords of all the IAM users.






Question : Being a QuickTechie.com AWS Developer you have hosted an application on EC. The user wants to configure EC to send requests for DB to the MySQL RDS on port .
However, RDS returns the response on port 3372. How can the user configure this?
  : Being a QuickTechie.com AWS Developer you have  hosted an application on EC. The user wants to configure EC to send requests for DB to the MySQL RDS on port .
1. Configure outbound port for RDS as 3372 using VPC
2. It is not possible to configure the outbound port for RDS
3. Access Mostly Uused Products by 50000+ Subscribers
4. Configure RDS my.conf file, which returns data on 3372

Correct Answer : Get Lastest Questions and Answer :

Exp: When the user specifies an EC2 security group as the source, he is allowing incoming traffic from all the EC2 instances that use that particular EC2 security group. The DB security group rules apply only to inbound traffic; outbound traffic is not currently permitted for the DB instances.





Question : Being a QuickTechie.com AWS Developer you are configuring MySQL RDS with PIOPS. What should be the minimum size of DB storage provided by the user?

  : Being a QuickTechie.com AWS Developer you are configuring MySQL RDS with PIOPS. What should be the minimum size of DB storage provided by the user?
1. 50 GB
2. 100 GB
3. Access Mostly Uused Products by 50000+ Subscribers
4. 1 TB


Correct Answer : Get Lastest Questions and Answer :


Explanation: If the user is trying to enable PIOPS with MySQL RDS, the minimum size of storage should be 100 GB


Related Questions


Question : What is the default behavior of a CloudFormation stack if creation fails?
 : What is the default behavior of a CloudFormation stack if creation fails?
1. Delete
2. Undo
3. Access Mostly Uused Products by 50000+ Subscribers
4. None of the above; the stack continues creating and the failed resource is ignored


Question : Which command line command lists all current stacks in your CloudFormation service?

 : Which command line command lists all current stacks in your CloudFormation service?
1. cfn-create-stack
2. cfn-describe-stacks
3. Access Mostly Uused Products by 50000+ Subscribers
4. cfn-describe-stack-resources


Question : The template description declaration cannot be added if the AWSTemplateFormatVersion is not declared at the top of the template.

 : The template description declaration cannot be added if the AWSTemplateFormatVersion is not declared at the top of the template.
1. True
2. False


Question : How can you secure data at rest on an EBS volume?
 : How can you secure data at rest on an EBS volume?
1. Attach the volume to an instance using EC2's SSL interface.
2. Write the data randomly instead of sequentially.
3. Access Mostly Uused Products by 50000+ Subscribers
4. Encrypt the volume using the S3 server-side encryption service.
5. Create an IAM policy that restricts read and write access to the volume.


Question : Which of the following are IAM credentials that AWS supports
1. AWS Access Key
2. X.509 certificate
3. Access Mostly Uused Products by 50000+ Subscribers
4. Multi Factor Authentication

 : Which of the following are IAM credentials that AWS supports
1. 1,2,3
2. 2,3,4
3. Access Mostly Uused Products by 50000+ Subscribers
4. 1,2,3,4


Question : The AWS Account holder can manage

 : The AWS Account holder can manage
1. users
2. groups
3. Access Mostly Uused Products by 50000+ Subscribers
4. 1 and 3
5. 1,2 and 3