AWS Certified Cloud Practitioner CLF-C01 – Question347

According to the AWS shared responsibility model, which activities are the customer's responsibility for security in the AWS Cloud? (Choose two.)

A.
Hardware maintenance
B. Amazon EC2 operating system patching
C. API access control for AWS resources
D. Configuration management of infrastructure devices
E. Maintenance of an Availability Zone

Correct Answer: BC

AWS Certified Cloud Practitioner CLF-C01 – Question344

Which of the following are design principles of the reliability pillar of the AWS Well-Architected Framework? (Choose two.)

A.
Perform operations as code.
B. Stop guessing capacity.
C. Adopt serverless architecture whenever possible.
D. Use build and deployment management systems.
E. Make changes to infrastructure by using automation.

Correct Answer: BE

AWS Certified Cloud Practitioner CLF-C01 – Question343

A company is undergoing a security audit. The audit includes security validation and compliance validation of the AWS infrastructure and services that the company uses. The auditor needs to locate compliance-related information and must download AWS security and compliance documents. These documents include the System and Organization Control (SOC) reports.
Which AWS service or group can provide these documents?

A.
AWS Abuse team
B. AWS Artifact
C. AWS Support
D. AWS Config

Correct Answer: B

AWS Certified Cloud Practitioner CLF-C01 – Question342

A company is running multiple workloads in the AWS Cloud and recently began investigating ways to reduce costs. The company is already running fault-tolerant workloads on Amazon EC2 that perform periodic checkpoints in case of an outage.
Which AWS service or pricing model can provide the GREATEST cost savings?

A.
Capacity Reservations
B. Amazon Lightsail
C. Spot Instances
D. Dedicated Hosts

Correct Answer: A

AWS Certified Cloud Practitioner CLF-C01 – Question341

A company uses a database that has a simple sign-up page to create users, and a basic login form to authenticate users so they can access the database. The company wants to give users the ability to store personal information, but user access must be controlled in a more secure and reliable way.
Which AWS service or feature will meet these requirements?

A.
Security groups
B. Amazon GuardDuty
C. AWS Secrets Manager
D. Amazon Cognito

Correct Answer: D