You run an ad-supported photo sharing website using S3 to serve photos to visitors of your site. At some point you find out that other sites have been linking to the photos on your site, causing loss to your business. What is an effective method to mitigate this?

A. Remove public read access and use signed URLs with expiry dates.
B. Use CloudFront distributions for static content.
C. Block the IPs of the offending websites in Security Groups.
D. Store photos on an EBS volume of the web server.


Answer: A. Remove public read access and use signed URLs with expiry dates.

Computer Science & Information Technology

You might also like to view...

What is the first task that a pop operation should perform?

What will be an ideal response?

Computer Science & Information Technology

Define boxing and unboxing.

What will be an ideal response?

Computer Science & Information Technology

What are six essential questions of fact and analysis and what is their purpose in the design process?

What will be an ideal response?

Computer Science & Information Technology

________-side scripts run on Web servers rather than on your local device.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology