1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
3 years ago
5

You are working in the media industry, and you have created a web application where users will be able to upload photos they cre

ate to your website. This web application must be able to call the S3 API in order to be able to function. Where should you store your API credentials while maintaining the maximum level of security.
Computers and Technology
2 answers:
Aleksandr-060686 [28]3 years ago
4 0

Answer:

B. Don't save your API credentials. Instead create a role in IAM and assign this role to an EC2 instance when you first create it.

Explanation:

The missing options is:

A. Save the API credentials to your php files.

B. Don't save your API credentials. Instead create a role in IAM and assign this role to an EC2 instance when you first create it.

C. Save your API credentials in a public Github repository.

D. Pass API credentials zto the instance using instance userdata.

The API credentials are confidential information that shouldn't be stored at all or in a place that allows public access to it.

The following steps are use when creating and distributing your AWS credentials, you can delegate permission to make API requests using IAM roles as follows:

1. Create an IAM role.

2. Define which accounts or AWS services can assume the role.

3. Define which API actions and resources the application can use after assuming the role.

4. Specify the role when you launch your instance, or attach the role to an existing instance.

So from the above explanation, the answer is: B. Don't save your API credentials. Instead create a role in IAM and assign this role to an EC2 instance when you first create it.

Vladimir79 [104]3 years ago
3 0

Answer:

Don't save your API credentials. Instead create a role in IAM and assign this role to an EC2 instance when you first create it

Explanation:

If the aim of the web application is to call the S3 API, for proper functioning, there is no need to store the API credentials to maintain a maximum level of security. All you need to do is to create a role in IAM and then assign the created role to an EC instance at the first moment that it was created. This would ensure that the highest level of security, while still achieving the aim of allowing your web application function properly.

You might be interested in
What is Napoleon's friend's full name? From the Napoleon Dynamite movie.
expeople1 [14]

His friend's full name was Pedro Sanchez :)

7 0
3 years ago
Read 2 more answers
Design a 4-bit register that can accept an input from the user and store the accepted input. The 4-bit register will operate in
Digiron [165]

The answer & explanation for this question is given in the attachment below.

4 0
3 years ago
2. Imagine you play a game of fetch with the dog. It takes the dog 60 seconds to run a total of 180 meters. What was the dog's a
vodka [1.7K]

180 meters in 60 seconds is an average speed of 180m/60s = 3 m/s.

3 0
3 years ago
What is the main function of the output on a computer or what is it use for? ​
choli [55]

Answer:

It is used to transfer data

Explanation:

An output used on a computer is used for transferring your data from your device to another by any user

3 0
3 years ago
Read 2 more answers
An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is a
LenKa [72]

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

6 0
2 years ago
Other questions:
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    10·1 answer
  • Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
    8·2 answers
  • Software license infringement is also often called software __________.
    11·2 answers
  • In the 2007/2010 version of Paint, which of the following tools are located in the View tab? (Select all that apply.)
    5·1 answer
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • What is a geam in the ggplot2 system?
    5·1 answer
  • Which line of code outputs the decimal portion of a float stored in the variable x? print (x % 1000) print (x) O print (x / 1000
    13·1 answer
  • Learning Task 3: Write the safety requirement indicated in each number on a
    15·1 answer
  • Something I should look for when trying to decide if a source is credible is the publication's ....
    10·1 answer
  • Anyone know what the very first question that was sent on brainly is?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!