Search⌘ K
AI Features

Secure Architecture II

Discover how to design secure and resilient AWS architectures by implementing hardware security modules for encryption, building scalable document analysis pipelines, ensuring database high availability, and managing user access with minimal overhead. This lesson helps you understand practical solutions for data security, global application deployment, and cost-effective AWS resource management.

Question 24

Audit results have been given back to your company. Another requirement from the audit is that the application, hosted on EC2, must encrypt data before this data is written to storage. It has been directed internally that you should be able to handle dedicated hardware security module instances to generate and store your encryption keys. Which service could you use to meet this requirement?

A. AWS CloudHSM

B. AWS KMS

C. AWS Security Token Service

D. Amazon EBS encryption

Question 25

A hospital plans to digitize its extensive collection of historical written records and continue adding hundreds of new documents daily. The hospital’s data team will scan and upload these documents to the AWS Cloud. 

A solutions architect needs to design a solution to analyze the documents, extract medical information, and store the data in a way that allows an application to perform SQL queries. The solution should prioritize scalability ...