exam questions

Exam AWS Certified Developer Associate All Questions

View all questions & answers for the AWS Certified Developer Associate exam

Exam AWS Certified Developer Associate topic 1 question 337 discussion

Exam question from Amazon's AWS Certified Developer Associate
Question #: 337
Topic #: 1
[All AWS Certified Developer Associate Questions]

A developer wants to process personally identifiable information by using a public HTTP API that is hosted on Amazon EC2. The developer also wants to protect the data as securely as possible in transit.

Which combination of steps will meet these requirements? (Choose two.)

  • A. Use the Amazon CloudFront field-level encryption feature for the incoming data.
  • B. Apply the principle of least privilege for access to the AWS Key Management Service (AWS KMS) service page.
  • C. Frequently rotate any API access keys for the HTTP API.
  • D. Turn on multi-factor authentication (MFA) for all IAM users.
  • E. Implement TLS for the HTTP API.
Show Suggested Answer Hide Answer
Suggested Answer: AE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
k1kavi1
Highly Voted 2 years, 5 months ago
Selected Answer: AE
https://aws.amazon.com/blogs/security/how-to-protect-sensitive-data-for-its-entire-lifecycle-in-aws/
upvoted 5 times
...
a15ce96
Most Recent 1 year, 1 month ago
Selected Answer: AE
A and E are the two when it comes to security in transit. Although I don't like the fact that Cloudfront is not mentioned in the question. It makes me think about C, but C is more about securing your entire application, not the data in transit.
upvoted 1 times
...
GripZA
1 year, 8 months ago
Selected Answer: AE
You can protect data in-transit over individual communications channels using transport layer security (TLS), and at-rest in individual storage silos using volume encryption, object encryption or database table encryption. However, if you have sensitive workloads, you might need additional protection that can follow the data as it moves through the application stack. Fine-grained data protection techniques such as field-level encryption allow for the protection of sensitive data fields in larger application payloads while leaving non-sensitive fields in plaintext. https://aws.amazon.com/blogs/security/how-to-protect-sensitive-data-for-its-entire-lifecycle-in-aws/
upvoted 1 times
...
joanneli77
2 years, 2 months ago
Selected Answer: CE
If it is "A", should CloudFront at least be mentioned in the question? Precision matters, I'm sorry, but it is not "A" the way this is written. C and E. Use TLS and rotate the keys.
upvoted 4 times
...
SoMaL69
2 years, 5 months ago
Selected Answer: AE
should be A, E
upvoted 4 times
...
michaldavid
2 years, 5 months ago
Selected Answer: AE
I believe A and E
upvoted 4 times
...
kapil206001
2 years, 5 months ago
AE https://aws.amazon.com/blogs/security/how-to-protect-sensitive-data-for-its-entire-lifecycle-in-aws/
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago