Multiple Choice
A SysOps Administrator is writing a utility that publishes resources from an AWS Lambda function in AWS Account A to an Amazon S3 bucket in AWS Account B. The Lambda function is able to successfully write new objects to the S3 bucket, but IAM users in Account B are unable to delete objects written to the bucket by Account A. Which step will fix this issue?
A) Add s3:DeleteObject permission to the IAM execution role of the AWS Lambda function in Account A. Add s3:DeleteObject permission to the IAM execution role of the AWS Lambda function in Account A.
B) Change the bucket policy of the S3 bucket in Account B to allow s3:DeleteObject permission for Account A. Change the bucket policy of the S3 bucket in Account B to allow permission for Account A.
C) Disable server-side encryption for objects written to the S3 bucket by the Lambda function.
D) Call the S3:PutObjectAcl API operation from the Lambda function in Account A to specify bucket owner, full control. Call the S3:PutObjectAcl API operation from the Lambda function in Account A to specify bucket owner, full control.
Correct Answer:

Verified
Correct Answer:
Verified
Q578: A SysOps Administrator implemented the following bucket
Q579: A SysOps Administrator created an AWS CloudFormation
Q580: A SysOps Administrator receives a connection timeout
Q581: Which of the following activities is NOT
Q582: A user has created a VPC with
Q584: A company has an application running on
Q585: Which of the following is true of
Q586: A user has created an application which
Q587: Which of the CloudWatch services mentioned below
Q588: The InfoSec team has asked the SysOps