75%(4)3 out of 4 people found this document helpful
This preview shows page 6 - 8 out of 87 pages.
Answer: D 18. You are designing an SSUTLS solution that requires HTTPS clients to be authenticated by
the Web server using client certificate authentication. The solution must be resilient.
Which of the following options would you consider for configuring the web server infrastructure? (Choose 2 answers) 19. An administrator is using Amazon CloudFormation to deploy a three tier web application that consists of a web tier and application tier that will utilize Amazon DynamoDB for storage when creating the CloudFormation template which of the following would allow the application instance access to the DynamoDB tables without exposing API credentials? 20. Your team has a tomcat-based Java application you need to deploy into development, test and production environments. After some research, you opt to use Elastic Beanstalk due to its tight integration with your developer tools and RDS due to its ease of management. Your QA team lead points out that you need to roll a sanitized set of production data into your environment on a nightly basis. Similarly, other software teams in your org want access to that same restored data via their EC2 instances in your VPC .The optimal setup for persistence and security that meets the above requirements would be the following.
You've reached the end of your free preview.
Want to read all 87 pages?
Computer Science, IP address, Amazon Web Services, AWS, Amazon Elastic Compute Cloud, auto scaling group