Your fortune 500 company has under taken a TCO analysis evaluating the use of Amazon S3 versus acquiring more hardware The outcome was that ail employees would be granted access to use Amazon S3 for storage of their personal documents. Which of the following will you need to consider so you can set up a solution that incorporates single sign-on from your corporate AD or LDAP directory and restricts access for each user to a designated user folder in a bucket?
A. Setting up a federation proxy or identity provider
B. Using AWS Security Token Service to generate temporary tokens
C. Tagging each folder in the bucket
D. Configuring IAM role
E. Setting up a matching IAM user for every user in your corporate directory that needs access to a folder in the bucket
Answer:
A. Setting up a federation proxy or identity provider
B. Using AWS Security Token Service to generate temporary tokens
D. Configuring IAM role
You might also like to view...
Case-based Critical Thinking QuestionsCase 13-1Judy wants to be able to validate the XML documents that she uses for recipes. These documents include numeric elements that specify ingredient amounts and cooking times, so you recommend that she use a schema instead of a DTD, and you teach her some of the key facts about schemas. Which of the following is NOT an advantage of schemas over DTDs?
A. They are more flexible than DTDs in dealing with mixed content. B. They support more data types than DTDs. C. They provide better support for namespaces. D. They are simpler to create and maintain.
Each ____________________ inside the function body must end with a semicolon (;).
Fill in the blank(s) with the appropriate word(s).
A packet containing a long string of what are called no-operation (NOP) instructions followed by a command is usually indicative of what attack?
A. privilege escalation B. insecure direct object references C. click-jacking D. buffer overflow
Pseudocode is an outline of the logic of the program you would like to write.
Answer the following statement true (T) or false (F)