Under what circumstances would someone want to use ElastiCache? (Select all that apply) Choose the 2 Correct answers:
Correct Answer:CD
ElastiCache is used as an in-memory data store or cache in the cloud. Benefits include improved performance for web applications (that rely on information stored in a database). Edge Locations are used for caching content with the CloudFront service, so that is not a answer here.
If you want in-depth details on how to create, manage, and attach IAM access policies to IAM users, in what AWS resource should you look?
Choose the Correct Answer
Correct Answer:B
AWS Service documentation is a collection of documents specific to each AWS service. They contain detailed how-to's, as well as technical walkthroughs and specifications.
What categories full under those analyzed by the AWS Trusted Advisor program? (Select all that apply)
Choose the 2 Correct answers:
Correct Answer:AC
The AWS Trusted Advisor program will analyze your account with check in the following categories: Cost Optimization Performance Security Fault Tolerance
What are the benefits of AWS Organizations? (Select all that apply)
Choose the 2 Correct answers:
Correct Answer:BC
AWS Organizations has four main benefits: 1) Centrally manage access polices across multiple AWS accounts. 2) Automate AWS account creation and management. 3) Control access to AWS services 4) Enable consolidated billing across multiple AWS accounts Analyzing cost is done through the Cost Explorer (or TCO calculator), which is not part of AWS Organizations.
Thomas is managing the access rights and credentials for all the employees that have access to his company's AWS account. This morning, his was notified that some of these accounts may have been compromised, and he now needs to change the password policy and re-generate a new password for all users. What AWS service does Thomas need to use in order to accomplish this?
Choose the Correct Answer
Correct Answer:D
Identity and Access Management (IAM) is the AWS service where password policies and user credentials are managed. (Policy and Access Management as a service does not exist).