A company is building software on AWS that requires access to various AWS services. Which configuration should be used to ensure mat AWS credentials (i.e., Access Key ID/Secret Access Key combination) are not compromised?
A. Enable Multi-Factor Authentication for your AWS root account.
B. Assign an IAM role to the Amazon EC2 instance.
C. Store the AWS Access Key ID/Secret Access Key combination in software comments.
D. Assign an IAM user to the Amazon EC2 Instance.
Answer: B. Assign an IAM role to the Amazon EC2 instance.
You might also like to view...
Case-Based Critical Thinking QuestionsCase 9-3Little Learning Tools is a Web site where parents can find approved learning aides for toddlers. They are looking to make a set of pages where people can navigate through the products. Stan is currently thinking about using frames, as he has heard that they will meet what he wants to do. In XHTML, which DTD should Stan add to his pages?
A. strict B. frameset C. transitional D. none of the above
Victor, a population analyst, has the following data on an Excel sheet: month-wise population of a city in 2014 in column A and month-wise population of the same city in 2015 in column B. He wants to calculate the change in population in 2015 compared to 2014 and check if the change is more or less than 2 million. Victor uses multiple functions, including the IF function, within a single formula for this analysis. In this scenario, Victor uses a _____.
A. ?loop function B. ?nested function C. ?Web function D. ?Compatibility function