Multiple Choice
A Security team is concerned that a Developer can unintentionally attach an Elastic IP address to an Amazon EC2 instance in production. No Developer should be allowed to attach an Elastic IP address to an instance. The Security team must be notified if any production server has an Elastic IP address at any time. How can this task be automated?
A) Use Amazon Athena to query AWS CloudTrail logs to check for any associate-address attempts. Create an AWS Lambda function to disassociate the Elastic IP address from the instance, and alert the Security team.
B) Attach an IAM policy to the Developers' IAM group to deny associate-address permissions. Create a custom AWS Config rule to check whether an Elastic IP address is associated with any instance tagged as production, and alert the Security team.
C) Ensure that all IAM groups are associated with Developers do not have associate-address permissions. Create a scheduled AWS Lambda function to check whether an Elastic IP address is associated with any instance tagged as production, and alert the Security team if an instance has an Elastic IP address associated with it.
D) Create an AWS Config rule to check that all production instances have EC2 IAM roles that include deny associate-address permissions. Verify whether there is an Elastic IP address associated with any instance, and alert the Security team if an instance has an Elastic IP address associated with it.
Correct Answer:

Verified
Correct Answer:
Verified
Q192: If Erin has three clusters of server
Q193: You are running a Docker daemon on
Q194: A company has a website in an
Q195: Which of these configuration or deployment practices
Q196: You use Amazon CloudWatch as your primary
Q198: A software company wants to automate the
Q199: You are creating an application which stores
Q200: What flag would you use to limit
Q201: A company wants to ensure that their
Q202: A DevOps engineer is creating a CI/CD