A company is preparing to give AWS Management Console access to developers Company policy mandates identity federation and role-based access control. Roles are currently assigned using groups in the corporate Active Directory. What combination of the following will give developers access to the AWS console?

A. AWS Directory Service AD Connector
B. AWS Directory Service Simple AD
C. AWS Identity and Access Management groups
D. AWS identity and Access Management roles
E. AWS identity and Access Management users


Answer:
A. AWS Directory Service AD Connector
D. AWS identity and Access Management roles

Computer Science & Information Technology

You might also like to view...

________ architecture separates application’s from the graphical presentation and the processing logic.

a. Data-Presentation-Logic. b. Data-View-Controller. c. Model-View-Controller. d. None of the above.

Computer Science & Information Technology

__________ is the probability that a system will perform as expected for a specified period of time.

a. Robustness b. Reliability c. Auditability d. Dependability

Computer Science & Information Technology

What is the purpose of the sizeof operator in C++?

A. There is no sizeof operator in C++. B. To return the total number of bytes of the program. C. To report if the system has enough memory for the data variables. D. To report the number of bytes of storage reserved for a given variable or datatype.

Computer Science & Information Technology

Which data type is usually based on the ASCII or EBCDIC character sets?

a. NATIONAL CHARACTER b. CHARACTER c. BINARY d. BOOLEAN

Computer Science & Information Technology