The IAM user represents the person or service who uses the IAM user to interact with AWS An IAM group is a collection of IAM users. In IAM, what is the representation of a person or service?Īn IAM user is an entity that you create in AWS. This is clearly given in the aws documentation For more information on Cloudformation templates, please visit the url Which of the following is mandatory when defining a cloudformation template? In order for the EC2 or ELBs to be accessible from internet, we would need to configure the route table for public subnet to route traffic to VPC internet gateway.įor information on VPC Route Tables and VPC Internet Gateway, please visit the link: No internet gateway is attached to the VPC. No elastic IP is assigned to web servers.ĭ. Route table for public subnet is not configured to route to VPC internet gateway.Ĭ. Web server must be launched inside public subnet and not private subnet.ī. Yet, you are still unable to access your web application through the internet, which of the following would likely the cause of this?Ī. You have launched two web servers in private subnet and one ELB (internet facing) in public subnet in your VPC. With Windows instances, you use a key pair to obtain the administrator password and then log in using RDP.įor more information on key pairs, please visit the below url įor DynamoDB, what are the scenario’s in which you would want to enable Cross-region replication?įrom the AWS Documentation, it clearly states the reason for why you would want to enable Cross-Region Replication.įor more information on DynamoDB, please visit the url Linux instances have no password, and you use a key pair to log in using SSH. To log in to your instance, you must create a key pair, specify the name of the key pair when you launch the instance, and provide the private key when you connect to the instance. The public and private keys are known as a key pair. Public–key cryptography uses a public key to encrypt a piece of data, such as a password, then the recipient uses the private key to decrypt the data. In AWS what is used for encrypting and decrypting login information to EC2 instances.Īmazon EC2 uses public–key cryptography to encrypt and decrypt login information.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |