Your fortune 500 company has under taken a TCO analysis evaluating the use of Amazon S3 versus acquiring more hardware The outcome was that ail employees would be granted access to use Amazon S3 for storage of their personal documents. Which of the following will you need to consider so you can set up a solution that incorporates single sign-on from your corporate AD or LDAP directory and restricts access for each user to a designated user folder in a bucket?

A. Setting up a federation proxy or identity provider
B. Using AWS Security Token Service to generate temporary tokens
C. Tagging each folder in the bucket
D. Configuring IAM role
E. Setting up a matching IAM user for every user in your corporate directory that needs access to a folder in the bucket


Answer:
A. Setting up a federation proxy or identity provider
B. Using AWS Security Token Service to generate temporary tokens
D. Configuring IAM role

Computer Science & Information Technology

You might also like to view...

Case-based Critical Thinking QuestionsCase 13-1Judy wants to be able to validate the XML documents that she uses for recipes. These documents include numeric elements that specify ingredient amounts and cooking times, so you recommend that she use a schema instead of a DTD, and you teach her some of the key facts about schemas. Which of the following is NOT an advantage of schemas over DTDs?

A. They are more flexible than DTDs in dealing with mixed content. B. They support more data types than DTDs. C. They provide better support for namespaces. D. They are simpler to create and maintain.

Computer Science & Information Technology

Each ____________________ inside the function body must end with a semicolon (;).

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A packet containing a long string of what are called no-operation (NOP) instructions followed by a command is usually indicative of what attack?

A. privilege escalation B. insecure direct object references C. click-jacking D. buffer overflow

Computer Science & Information Technology

Pseudocode is an outline of the logic of the program you would like to write.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology