A company is building software on AWS that requires access to various AWS services. Which configuration should be used to ensure mat AWS credentials (i.e., Access Key ID/Secret Access Key combination) are not compromised?

A. Enable Multi-Factor Authentication for your AWS root account.
B. Assign an IAM role to the Amazon EC2 instance.
C. Store the AWS Access Key ID/Secret Access Key combination in software comments.
D. Assign an IAM user to the Amazon EC2 Instance.


Answer: B. Assign an IAM role to the Amazon EC2 instance.

Computer Science & Information Technology

You might also like to view...

____ is a special effect that is created by reducing the number of colors available for the image.

A. Blur B. Reduction C. Posterize D. Compress

Computer Science & Information Technology

Match the following terms to their meanings:

I. Split form II. Nested subform III. Subform IV. Multi-page form V. Linked form A. A related form that is not stored within the main form B. A form that displays data in two views on a single form C. A form that is embedded within another subform D. A form that displays the data from an underlying table or query on more than one page E. A form that is embedded within a main form

Computer Science & Information Technology

Default tab stops are set every:

A) half-inch. B) quarter inch. C) ten centimeters. D) inch.

Computer Science & Information Technology

A(n) ________ error is a software or hardware problem that prevents a program from working correctly during execution.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology