Search⌘ K
AI Features

Secure Architecture I

Explore how to design secure AWS architectures by addressing compliance certifications, managing temporary access securely, configuring IAM for dynamic teams, and ensuring data protection on Amazon Glacier. This lesson helps you understand practical solutions for access control, encryption, notification setup, and audit readiness in AWS environments.

Question 19

An Australian company requires compliance reports during its audit for applications hosted on AWS. The company discusses the matter with a cloud engineer to get the Australian Hosting Certification Framework—Strategic Certification certificate as soon as possible.

As a solutions architect, what solution would you propose?

A. Use AWS Certificate Manager to generate the certificate.

B. Use AWS Trusted Advisor to generate the report.

C. Use Amazon Detective to generate the report.

D. Use AWS Artifact to download the certificate.

Question 20

An organization needs to deploy a new web application in its AWS account. The application will run on servers deployed in EC2 instances within an Auto Scaling group behind an Application Load Balancer. The organization has approached you to provide your services as a consultant.  ...