Multiple Choice
A company wants to migrate its website from an on-premises data center onto AWS. At the same time, it wants to migrate the website to a containerized microservice-based architecture to improve the availability and cost efficiency. The company's security policy states that privileges and network permissions must be configured according to best practice, using least privilege. A Solutions Architect must create a containerized architecture that meets the security requirements and has deployed the application to an Amazon ECS cluster. What steps are required after the deployment to meet the requirements? (Choose two.)
A) Create tasks using the bridge network mode. Create tasks using the bridge network mode.
B) Create tasks using the awsvpc network mode. awsvpc network mode.
C) Apply security groups to Amazon EC2 instances, and use IAM roles for EC2 instances to access other resources.
D) Apply security groups to the tasks, and pass IAM credentials into the container at launch time to access other resources.
E) Apply security groups to the tasks, and use IAM roles for tasks to access other resources.
Correct Answer:

Verified
Correct Answer:
Verified
Q476: A company's AWS architecture currently uses access
Q477: A company has a 24 TB MySQL
Q478: The Amazon ElastiCache clusters are not available
Q479: A large real-estate brokerage is exploring the
Q480: For Amazon EC2 issues, while troubleshooting AWS
Q482: An e-commerce company is revamping its IT
Q483: An ecommerce website running on AWS uses
Q484: A company with multiple accounts is currently
Q485: A company wants to migrate its on-premises
Q486: An enterprise wants to use a third-party