A company is building software on AWS that requires access to various AWS services. Which configuration should be used to ensure mat AWS credentials (i.e., Access Key ID/Secret Access Key combination) are not compromised?
A. Enable Multi-Factor Authentication for your AWS root account.
B. Assign an IAM role to the Amazon EC2 instance.
C. Store the AWS Access Key ID/Secret Access Key combination in software comments.
D. Assign an IAM user to the Amazon EC2 Instance.
Answer: B. Assign an IAM role to the Amazon EC2 instance.
You might also like to view...
____ is a special effect that is created by reducing the number of colors available for the image.
A. Blur B. Reduction C. Posterize D. Compress
Match the following terms to their meanings:
I. Split form II. Nested subform III. Subform IV. Multi-page form V. Linked form A. A related form that is not stored within the main form B. A form that displays data in two views on a single form C. A form that is embedded within another subform D. A form that displays the data from an underlying table or query on more than one page E. A form that is embedded within a main form
Default tab stops are set every:
A) half-inch. B) quarter inch. C) ten centimeters. D) inch.
A(n) ________ error is a software or hardware problem that prevents a program from working correctly during execution.
Fill in the blank(s) with the appropriate word(s).