Practice Free CLF-C02 Exam Online Questions
Which AWS solution gives companies the ability to use protocols such as NFS to store and retrieve objects in Amazon S3?
- A . Amazon FSx for Lustre
- B . AWS Storage Gateway volume gateway
- C . AWS Storage Gateway file gateway
- D . Amazon Elastic File System (Amazon EFS)
C
Explanation:
AWS Storage Gateway file gateway allows companies to use protocols such as NFS and SMB to store and retrieve objects in Amazon S3. File gateway provides a seamless integration between on-premises applications and Amazon S3, and enables low-latency access to data through local caching. File gateway also supports encryption, compression, and lifecycle management of the objects in Amazon S3. For more information, see What is AWS Storage Gateway? and File Gateway.
Which task can a company perform by using security groups in the AWS Cloud?
- A . Allow access to an Amazon EC2 instance through only a specific port.
- B . Deny access to malicious IP addresses at a subnet level.
- C . Protect data that is cached by Amazon CloudFront.
- D . Apply a stateless firewall to an Amazon EC2 instance.
A
Explanation:
Security groups are virtual firewalls that control the inbound and outbound traffic for Amazon EC2 instances. They can be used to allow access to an Amazon EC2 instance through only a specific port, such as port 22 for SSH or port 80 for HTTP. Security groups cannot deny access to malicious IP addresses at a subnet level, as they only allow or deny traffic based on the rules defined by the customer. To block malicious IP addresses, customers can use network ACLs, which are stateless firewalls that can be applied to subnets. Security groups cannot protect data that is cached by Amazon CloudFront, as they only apply to EC2 instances. To protect data that is cached by Amazon CloudFront, customers can use encryption, signed URLs, or signed cookies. Security groups are not stateless firewalls, as they track the state of the traffic and automatically allow the response traffic to flow back to the source. Stateless firewalls do not track the state of the traffic and require rules for both inbound and outbound traffic.
A company hosts an application on an Amazon EC2 instance. The EC2 instance needs to access several AWS resources, including Amazon S3 and Amazon DynamoDB.
What is the MOST operationally efficient solution to delegate permissions?
- A . Create an IAM role with the required permissions. Attach the role to the EC2 instance.
- B . Create an IAM user and use its access key and secret access key in the application.
- C . Create an IAM user and use its access key and secret access key to create a CLI profile in the EC2 instance.
- D . Create an IAM role with the required permissions. Attach the role to the administrativeIAM user.
A
Explanation:
Creating an IAM role with the required permissions and attaching the role to the EC2 instance is the most operationally efficient solution to delegate permissions. An IAM role is an entity that defines a set of permissions for making AWS service requests. An IAM role can be assumed by an EC2 instance to access other AWS resources, such as Amazon S3 and Amazon DynamoDB, without having to store any credentials on the instance. This solution is more secure and scalable than using IAM users and their access keys. For more information, see [IAM Roles for Amazon EC2] and [Using an IAM Role to Grant Permissions to Applications Running on Amazon EC2 Instances].
A company needs to request temporary, limited-privilege credentials for IAM users and for the federated users that the company authenticates.
Which AWS service will provide these credentials?
- A . Amazon GuardDuty
- B . AWS Key Management Service (AWS KMS)
- C . AWS Security Token Service (AWS STS)
- D . AWS Identity and Access Management Access Analyzer
A company is planning a migration to the AWS Cloud and wants to examine the costs that are associated with different workloads.
Which AWS tool will meet these requirements?
- A . AWS Budgets
- B . AWS Cost Explorer
- C . AWS Pricing Calculator
- D . AWS Cost and Usage Report
C
Explanation:
The AWS tool that will meet the requirements of the company that is planning a migration to the AWS Cloud and wants to examine the costs that are associated with different workloads is AWS Pricing Calculator. AWS Pricing Calculator is a tool that helps customers estimate the cost of using AWS services based on their requirements and preferences. The company can use AWS Pricing Calculator to compare the costs of different AWS services and configurations, such as Amazon EC2, Amazon S3, Amazon RDS, and more. AWS Pricing Calculator also provides detailed breakdowns of the cost components, such as compute, storage, network, and data transfer. AWS Pricing Calculator helps customers plan and optimize their cloud budget and migration strategy. AWS Budgets, AWS Cost Explorer, and AWS Cost and Usage Report are not the best tools to use for this purpose. AWSBudgets is a tool that helps customers monitor and manage their AWS spending and usage against predefined budget limits and thresholds. AWS Cost Explorer is a tool that helps customers analyze and visualize their AWS spending and usage trends over time. AWS Cost and Usage Report is a tool that helps customers access comprehensive and granular information about their AWS costs and usage in a CSV or Parquet file. These tools are more useful for tracking and optimizing the existing AWS costs and usage, rather than estimating the costs of different workloads34
A company is configuring its AWS Cloud environment. The company’s administrators need to group users together and apply permissions to the group.
Which AWS service or feature can the company use to meet these requirements?
- A . AWS Organizations
- B . Resource groups
- C . Resource tagging
- D . AWS Identity and Access Management (IAM)
D
Explanation:
The AWS service or feature that the company can use to group users together and apply permissions to the group is AWS Identity and Access Management (IAM). AWS IAM is a service that enables users to create and manage users, groups, roles, and permissions for AWS services and resources. Users can use IAM groups to organize multiple users that have similar access requirements, and attach policies to the groups that define the permissions for the users in the group. This simplifies the management and administration of user access
