Answer:
Refer below.
Explanation:
VPC, Subnets, Route Table(s), Nat Gateway, and Internet Gateway. These are the least required services to provide internet access to a private EC2 instance. NAT gateway requires an internet gateway.
Answer:
Correct limitation for Attribute Name and value is option
b: Value and name combined must not exceed 400KB
Explanation:
For amazon dynamo db You can have unlimited attribute per item but one attribute cannot exceed 400 kb in size.400Kb is the limit of an item which can be stored in db.
If bigger data is required to store than data is stored some where and links/url to data are stored in the db.
For Item max size is 64KB
<span>When you sit for a typing test, what is the first thought that crosses your mind?
posture</span>
Answer:
The answer is "option d".
Explanation:
UML stands for Unified Modeling Language. It is an OOPs based language that is used to design a graphic by software developers. This language can also be used to build diagrams and provide some tools to ready-to-use, interactive templates for users and other options are not correct that can be described as:
- In option a, The Top-down approach is not followed by UML.
- In option b, UML uses an object-oriented programming language that follows a bottom-up approach. It refers to a style of programming.
- In option c, It does not use structured programming because it uses procedural languages.
Answer and Explanation:
Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user to enter the network without being detected for a long period.
APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.
Some of the practical strategies for protection against APT are:
- Sound Internal Auditing
- Strong Password Accessing Policies
- Stringent policies for accessing any device
- Introduction and implementation of multi factor authentication
- Strong IDs and sound honeypot solutions