A Security Engineer is building a Java application that is running on Amazon EC2. The application communicates with an Amazon RDS instance and authenticates with a user name and password.
Which combination of steps can the Engineer take to protect the credentials and minimize downtime when the credentials are rotated? (Choose two.)
RaySmith
Highly Voted 3 years, 9 months agoChauPhan
Highly Voted 3 years, 8 months agoITGURU51
Most Recent 2 years, 2 months agodcasabona
2 years, 11 months agoMoreOps
3 years, 2 months agoDerekKey
3 years, 8 months agoDaniel76
3 years, 8 months agocontinent34
3 years, 8 months agoLarsson
3 years, 8 months agoZia842
3 years, 8 months agoZia842
3 years, 8 months agoHuy
3 years, 8 months agoKdosec
3 years, 8 months agoDanMuniz
3 years, 8 months agoPeppaPig
3 years, 8 months agosunnybunny
3 years, 9 months agordy4u
3 years, 9 months agoawssecuritynewbie
3 years, 9 months agosunnybunny
3 years, 9 months agoscuzzy2010
3 years, 8 months agoawssecuritynewbie
3 years, 9 months ago