A security incident has occurred within an organization's AWS environment. A cloud forensic investigation
procedure is initiated for the acquisition of forensic evidence from the compromised EC2 instances. However,
it is essential to abide by the data privacy laws while provisioning any forensic instance and sending it for
analysis. What can the organization do initially to avoid the legal implications of moving data between two
AWS regions for analysis?
A new public web application is deployed on AWS that will run behind an Application Load Balancer (ALB).
An AWS security expert needs to encrypt the newly deployed application at the edge with an SSL/TLS
certificate issued by an external certificate authority. In addition, he needs to ensure the rotation of the
certificate yearly before it expires. Which of the following AWS services can be used to accomplish this?
Assume you work for an IT company that collects user behavior data from an e-commerce web application.
This data includes the user interactions with the applications, such as purchases, searches, saved items, etc.
Capture this data, transform it into zip files, and load these massive volumes of zip files received from an
application into Amazon S3. Which AWS service would you use to do this?
The organization TechWorld Ltd. used cloud for its business. It operates from an EU country (Poland and
Greece). Currently, the organization gathers and processes the data of only EU users. Once, the organization
experienced a severe security breach, resulting in loss of critical user data. In such a case, along with its cloud
service provider, the organization should be held responsible for non-compliance or breaches. Under which
cloud compliance framework will the company and cloud provider be penalized?
Thomas Gibson is a cloud security engineer who works in a multinational company. His organization wants to
host critical elements of its applications; thus, if disaster strikes, applications can be restored quickly and
completely. Moreover, his organization wants to achieve lower RTO and RPO values. Which of the following
disaster recovery approach should be adopted by Thomas' organization?
© Copyrights FreePDFQuestions 2026. All Rights Reserved
We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.