{"id":1954,"date":"2022-12-15T07:16:36","date_gmt":"2022-12-15T07:16:36","guid":{"rendered":"https:\/\/exampracticetests.com\/aws\/Cloud_Practitioner_CLF-C01\/aws-certified-cloud-practitioner-clf-c01-question196\/"},"modified":"2022-12-15T07:16:36","modified_gmt":"2022-12-15T07:16:36","slug":"aws-certified-cloud-practitioner-clf-c01-question196","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/aws\/Cloud_Practitioner_CLF-C01\/aws-certified-cloud-practitioner-clf-c01-question196\/","title":{"rendered":"AWS Certified Cloud Practitioner CLF-C01 &#8211; Question196"},"content":{"rendered":"<div class=\"question\">Which of the following actions are controlled with AWS Identity and Access Management (IAM)? (Choose two.)<br \/><strong><br \/>A.<\/strong> Control access to AWS service APIs and to other specific resources.<br \/><strong>B.<\/strong> Provide intelligent threat detection and continuous monitoring.<br \/><strong>C.<\/strong> Protect the AWS environment using multi-factor authentication (MFA).<br \/><strong>D.<\/strong> Grant users access to AWS data centers.<br \/><strong>E.<\/strong> Provide firewall protection for applications from common web attacks.<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>AC<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Which of the following actions are controlled with AWS Identity and Access Management (IAM)? (Choose two.)A. Control access to AWS service APIs and to other specific resources.B. Provide intelligent threat detection and continuous monitoring.C. Protect the AWS environment using multi-factor authentication (MFA).D. Grant users access to AWS data centers.E. Provide firewall protection for applications from [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[873],"tags":[874,1070],"class_list":["post-1954","post","type-post","status-publish","format-standard","hentry","category-aws-certified-cloud-practitioner-clf-c01","tag-aws-certified-cloud-practitioner-clf-c01","tag-question-196"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/aws\/Cloud_Practitioner_CLF-C01\/wp-json\/wp\/v2\/posts\/1954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/aws\/Cloud_Practitioner_CLF-C01\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/aws\/Cloud_Practitioner_CLF-C01\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/aws\/Cloud_Practitioner_CLF-C01\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/aws\/Cloud_Practitioner_CLF-C01\/wp-json\/wp\/v2\/comments?post=1954"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/aws\/Cloud_Practitioner_CLF-C01\/wp-json\/wp\/v2\/posts\/1954\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/aws\/Cloud_Practitioner_CLF-C01\/wp-json\/wp\/v2\/media?parent=1954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/aws\/Cloud_Practitioner_CLF-C01\/wp-json\/wp\/v2\/categories?post=1954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/aws\/Cloud_Practitioner_CLF-C01\/wp-json\/wp\/v2\/tags?post=1954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}