Computer Science Questions
Explore questions in the Computer Science category that you can ask Spark.E!
Question: 218 A company wants to improve its security and audit posture by limiting Amazon EC2 inbound access. What should the company use to access instances remotely instead of opening inbound SSH ports and managing SSH keys? A. EC2 key pairs B. AWS Systems Manager Session Manager C. AWS Identity and Access Management (IAM) D. Network ACLs
Question: 206 Which AWS Trusted Advisor check is available to all AWS users? A. Core checks B. All checks C. Cost optimization checks D. Fault tolerance checks
If one input is 1 in an XOR gate, what is the output?
If one input in an AND gate is 1 then what is the output?
Simplifying expressions X . NOT X
Assembly code instructionsCompare the contents of the accumulator with the contents of the location specified by the operand
If both inputs in an AND gate are 1 then what is the output?
What is the absorption rule? (starting with +)
It is possible and useful for a function in an derived class to have the same name and parameters as a function in the its base class. When is this only possible?
Assembly code instructionsLoad the value stored in the memory location specified by the operand into the accumulator
How are the complexities of an operation hidden?
Question: 207 A web developer is concerned that a DDoS attack could target an application. Which AWS services or features can help protect against such an attack? (Choose two.) A. AWS Shield B. AWS CloudTrail C. Amazon CloudFront D. AWS Support Center E. AWS Service Health Dashboard
Assembly code instructionsStore the value in the accumulator in memory location specified by the operand
If a 0 is inputted in to a NOT gate, what will be outputted?
Assembly code instructionsAdd the value specified in the operand to the value in the accumulator
A photo sharing web application wants to store thumbnails of user-uploaded images on Amazon S3. The thumbnails are rarely used but need to be immediately accessible from the web application. The thumbnails can be regenerated easily if they are lost. Which is the most cost-effective way to store these thumbnails on S3?A. Use S3 Standard Infrequent Access (Standard-IA) to store the thumbnailsB. Use S3 Glacier to store the thumbnailsC. Use S3 One-Zone Infrequent Access (One-Zone IA) to store the thumbnailsD. Use S3 Standard to store the thumbnails
Which of the following AWS authentication mechanisms supports a Multi-Factor Authentication (MFA) device that you can plug into a USB port on your computer?A. U2F security keyB. Hardware MFA deviceC. SMS text message-based MFAD. Virtual MFA device
What is the primary benefit of deploying an RDS database in a Read Replica configuration?A. Read Replica reduces database usage costsB. Read Replica enhances database availabilityC. Read Replica protects the database from a regional failureD. Read Replica improves database scalability
An IT company wants to run a log backup process every Monday at 2 AM. The usual runtime of the process is 5 minutes. As a Cloud Practitioner, which AWS services would you recommend to build a serverless solution for this use-case? (Select two)A. CloudWatchB. Systems ManagerC. Step FunctionD. LambdaE. EC2 Instance
Which of the following is a container service of AWS?A. Amazon Simple Notification ServiceB. AWS FargateC. Amazon SageMakerD. AWS Elastic Beanstalk