You have valuable media files hosted on AWS and want them to be served only to authenticated users of your web application. You are concerned that your content could be stolen and distributed for free. How can you protect your content?

A. Use static web hosting.
B. Generate pre-signed URLs for content in the web application.
C. Use AWS Identity and Access Management (IAM) policies to restrict access.
D. Use logging to track your content.


Answer: B. Generate pre-signed URLs for content in the web application.

Computer Science & Information Technology

You might also like to view...

After a successful login, Windows displays the Login screen that provides access to software applications, files, and settings for customizing your computer work environment.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

It is unethical for a search engine company to accept money to list a link on the first page of a search without clearly labeling it as a sponsored link

Indicate whether the statement is true or false

Computer Science & Information Technology

_______ is the most popular open source server-side “scripting” language for developing Internet-based applications.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Critical Thinking QuestionsCase 1You want to start a corporate blog to communicate with your company´s customers. What can a corporate blog provide? a.Customer case studiescInformation about the companybForum for customers to commentdInformation about corporate locations

What will be an ideal response?

Computer Science & Information Technology