Multiple Choice
A large company with hundreds of AWS accounts has a newly established centralized internal process for purchasing new or modifying existing Reserved Instances. This process requires all business units that want to purchase or modify Reserved Instances to submit requests to a dedicated team for procurement or execution. Previously, business units would directly purchase or modify Reserved Instances in their own respective AWS accounts autonomously. Which combination of steps should be taken to proactively enforce the new process in the MOST secure way possible? (Choose two.)
A) Ensure all AWS accounts are part of an AWS Organizations structure operating in all features mode.
B) Use AWS Config to report on the attachment of an IAM policy that denies access to the ec2:PurchaseReservedInstancesOffering and ec2:ModifyReservedInstances actions.
C) In each AWS account, create an IAM policy with a DENY rule to the ec2:PurchaseReservedInstancesOffering and ec2:ModifyReservedInstances actions.
D) Create an SCP that contains a deny rule to the ec2:PurchaseReservedInstancesOffering and ec2:ModifyReservedInstances actions. Attach the SCP to each organizational unit (OU) of the AWS Organizations structure.
E) Ensure that all AWS accounts are part of an AWS Organizations structure operating in consolidated billing features mode.
Correct Answer:

Verified
Correct Answer:
Verified
Q600: A company runs a three-tier application in
Q601: Is there any way to own a
Q602: A company CFO recently analyzed the company's
Q603: A company has developed a mobile game.
Q604: To ensure failover capabilities on an elastic
Q606: How does AWS Data Pipeline execute activities
Q607: A financial services company receives a regular
Q608: A retail company is running an application
Q609: A solutions architect needs to define a
Q610: You need a persistent and durable storage