Amazon (ANS-C01) Exam Questions And Answers page 22
What value in a packet dictates the priority of the packet in a QoS enabled network?
IPv6
NAT
DSCP
Network Security and Optimization
Advanced Network Connectivity
When an AWS Config rule is triggered a JSON object known as an AWS Config Event is created. This object contains a(n) ____ attribute, which is a JSON-formatted set of key/value pairs the receiving AWS Lambda function processes as part of its evaluation logic.
inputParameters
invokingEvent
ruleConfiguration
mappingTemplate
AWS Networking Services
Network Security and Optimization
When an AWS Config rule is triggered a JSON object known as an AWS Config Event is created. This object contains another JSON string in its ____ parameter, which describes the event that triggered the rule.
resultToken
eventLeftScope
invokingEvent
configRuleName
AWS Networking Services
Network Security and Optimization
When configuring Active/Passive HA on VPN tunnels, choose the two best ways to configure this. (Choose two.)
Keep both tunnels up.
Configure AS_PATH prepending on one of the paths.
Turn off one of the paths until you need it.
Configure MED on one of the tunnels.
Networking Fundamentals
Network Security and Optimization
What items are stored on S3 when using AWS Config?
Single Choice
When using AWS Config, which two items are stored on S3 as a part of its operation?
Configuration Items and Configuration History
Configuration Recorder and Configuration Snapshots
Configuration History and Configuration Snapshots
Configuration Snapshots and Configuration Streams
AWS Networking Services
Network Security and Optimization
Which AWS service is used within an AWS Config Rule to perform the logic evaluation of that rule?
Inspector
WAF
Lambda
SWF
AWS Networking Services
Which CloudWatch attributes are used for the statistics generation?
All the options are used
Dimension
Data point unit
NameSpace
AWS Networking Services
Network Security and Optimization
Which element of AWS Config can be used to help maintain internal and external compliance controls?
Configuration Item
Configuration Recorder
Configuration Streams
Config Rules
Network Security and Optimization
Which endpoint is considered to be best practice when analyzing data within a Configuration Stream of AWS Config?
SNS
E-Mail
SQS
Kinesis
AWS Networking Services
Network Security and Optimization
What is an example of an invalid Route 53 record?
Single Choice
Which is not a valid Route 53 record?
SPF
NAPTR
AAAA
BFD
AWS Networking Services
Comments