[Logging and Monitoring]
A company hosts an end user application on AWS Currently the company deploys the application on Amazon EC2 instances behind an Elastic Load Balancer The company wants to configure end-to-end encryption between the Elastic Load Balancer and the EC2 instances.
Which solution will meet this requirement with the LEAST operational effort?
To configure end-to-end encryption between the Elastic Load Balancer and the EC2 instances with the least operational effort, the most appropriate solution would be to use Amazon issued AWS Certificate Manager (ACM) certificates on the EC2 instances and the Elastic Load Balancer to configure end-to-end encryption.
AWS Certificate Manager - Amazon Web Services:Elastic Load Balancing - Amazon Web Services:Amazon Elastic Compute Cloud - Amazon Web Services:AWS Certificate Manager - Amazon Web Services
For compliance reasons a Security Engineer must produce a weekly report that lists any instance that does not have the latest approved patches applied. The Engineer must also ensure that no system goes more than 30 days without the latest approved updates being applied
What would the MOST efficient way to achieve these goals?
A security engineer needs to implement a write-once-read-many (WORM) model for data that a company will store in Amazon S3 buckets. The company uses the S3 Standard storage class for all of its S3 buckets. The security engineer must en-sure that objects cannot be overwritten or deleted by any user, including the AWS account root user.
Which solution will meet these requirements?
A healthcare company has multiple AWS accounts in an organization in AWS Organizations. The company uses Amazon S3 buckets to store sensitive information of patients. The company needs to restrict users from deleting any S3 bucket across the organization.
What is the MOST scalable solution that meets these requirements?
A medical company recently completed an acquisition and inherited an existing AWS environment. The company has an upcoming audit and is concerned about the compliance posture of its acquisition.
The company must identify personal health information inside Amazon S3 buckets and must identify S3 buckets that are publicly accessible. The company needs to prepare for the audit by collecting evidence in the environment.
Which combination of steps will meet these requirements with the LEAST operational overhead? (Select THREE.)
Naomi
4 days agoLauran
1 months agoDelmy
2 months agoIzetta
2 months agoKanisha
3 months agoMiesha
3 months agoCandra
3 months agoDan
4 months agoElliott
4 months agoAdelina
4 months agoAnnabelle
5 months agoStephane
5 months agoBerry
5 months agoLura
5 months agoEden
6 months agoFelicia
6 months agoRolande
6 months agoLeonie
6 months agoLarae
6 months agoRolland
7 months agoLorrine
7 months agoFausto
7 months agoCurtis
7 months agoBrock
7 months agoLazaro
8 months agoCasie
8 months agoGerald
8 months agoMarcos
8 months agoTawny
8 months agoClemencia
9 months agoArthur
9 months agoRashad
9 months agoRodrigo
9 months agoElvera
9 months agoDorinda
10 months agoJames
10 months agoGary
11 months agoShaniqua
11 months agoRory
12 months agoStephaine
12 months agoAmmie
12 months agoChristiane
12 months agoNu
1 years agoLamonica
1 years ago