A cloud practitioner wants a repeatable way to deploy identical AWS resources by using infrastructure templates. Which AWS service will meet these requirements?
A company purchased Amazon EC2 Standard Reserved Instances (Rls) for a workload in the AWS Cloud. The company needs to move part of the workload to an instance family that does not match the instance family of these Standard RIs.
How can the company take advantage of the Standard RIs that it no longer needs?
Which AWS service allows users to model and provision AWS resources using common programming languages?
A company wants to rightsize its Amazon EC2 instances.
Which configuration change will meet this requirement with the LEAST operational overhead?
A company needs to invoke an AWS Step Functions workflow each time an Amazon EC2 instance state changes to RUNNING.
Which AWS service can the company use to meet this requirement?
Which AWS service can a company use to manage encryption keys in the cloud?
Which design principle aligns with performance efficiency pillar of the AWS Well-Architected Framework?
Which task can an IAM user perform without AWS account root user credentials?
Which AWS service or tool provides users with a graphical interface that they can use to manage AWS services?
Which AWS service supports the deployment and management of applications in the AWS Cloud?
A company runs a database on Amazon Aurora in the us-east-1 Region. The company has a disaster recovery requirement that the database be available in another Region.
Which solution meets this requirement with minimal disruption to the database operations?
Who is responsible for decommissioning end-of-life underlying storage devices that are used to host data on AWS?
Which AWS service or tool helps companies measure the environmental impact of their AWS usage?
A company needs to manage multiple logins across AWS accounts within the same organization in AWS Organizations.
Which AWS service should the company use to meet this requirement?
A company notices suspicious network activity against an application that is running on a fleet of Amazon EC2 instances. The suspicious activity is coming from a single IP address.
Which AWS service should the company use to block access from this IP address?
A company wants to enhance security by launching a third-party ISP intrusion detection system from its AWS account.
Which AWS service or resource should the company use to meet this requirement?
Which AWS service or resource can a company use to deploy AWS WAF rules?
A company's workload can recover with minimal downtime when failures occur. Which AWS Cloud benefit does this scenario represent?
Which AWS service or tool can a company use to set up consolidated billing?
Which task is a responsibility of AWS, according to the AWS shared responsibility model?