1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
3 years ago
5

You are working in the media industry, and you have created a web application where users will be able to upload photos they cre

ate to your website. This web application must be able to call the S3 API in order to be able to function. Where should you store your API credentials while maintaining the maximum level of security.
Computers and Technology
2 answers:
Aleksandr-060686 [28]3 years ago
4 0

Answer:

B. Don't save your API credentials. Instead create a role in IAM and assign this role to an EC2 instance when you first create it.

Explanation:

The missing options is:

A. Save the API credentials to your php files.

B. Don't save your API credentials. Instead create a role in IAM and assign this role to an EC2 instance when you first create it.

C. Save your API credentials in a public Github repository.

D. Pass API credentials zto the instance using instance userdata.

The API credentials are confidential information that shouldn't be stored at all or in a place that allows public access to it.

The following steps are use when creating and distributing your AWS credentials, you can delegate permission to make API requests using IAM roles as follows:

1. Create an IAM role.

2. Define which accounts or AWS services can assume the role.

3. Define which API actions and resources the application can use after assuming the role.

4. Specify the role when you launch your instance, or attach the role to an existing instance.

So from the above explanation, the answer is: B. Don't save your API credentials. Instead create a role in IAM and assign this role to an EC2 instance when you first create it.

Vladimir79 [104]3 years ago
3 0

Answer:

Don't save your API credentials. Instead create a role in IAM and assign this role to an EC2 instance when you first create it

Explanation:

If the aim of the web application is to call the S3 API, for proper functioning, there is no need to store the API credentials to maintain a maximum level of security. All you need to do is to create a role in IAM and then assign the created role to an EC instance at the first moment that it was created. This would ensure that the highest level of security, while still achieving the aim of allowing your web application function properly.

You might be interested in
Write a program to print the value of a series of numbers from0-9 in descending order
steposvetlana [31]
This is the simplest way obviously this is ascending

print ("0")
print ("1")
print ("2")
print ("3")
print ("4")
print ("5")
print ("6")
print ("7")
print ("8")
print ("9")
6 0
3 years ago
Assume that programs spend about 25% of their time waiting for I/O operations to complete. If there are FOUR programs loaded int
natima [27]

Answer:

0.9961

Explanation:

Given that:

Proportion of time waiting for I/O operation to complete = 25% = 0.25

Number of programs waiting in memory = 4

Using the CPU Utilization formula :

CPU Utilization = 1 - p^n

1 - 0.25^4

1 - 0.00390625

0.99609375

5 0
3 years ago
write a method that returns a string in the form of hour:minute:second for a given total seconds using the following header: pub
Monica [59]

A method that returns a string in the form of the hour: minute: second for a given total second that utilizes the given header is as follows:

class Convert {

public static String format(long seconds) {

Scanner sc = new Scanner(System.in);

System.out.print("Enter total seconds: ");

int secs = sc.nextInt();

int hours = secs / 3600;

int minutes = (secs % 3600) / 60;

int seconds = (secs % 3600) % 60;

String timeFormat = hours + ":" + minutes + ":" + seconds;

return timeFormat;

}

}

<h3>What is the String function?</h3>

The string function may be characterized as the type of function in a computer's programming function that may significantly have a non-numerical result.

String functions are typically utilized in computer programming languages in order to manipulate a string or query information about a string successfully.

Therefore, a method that returns a string in the form of the hour: minute: second for a given total second that utilizes the given header is well described above.

To learn more about Header, refer to the link:

brainly.com/question/2329500

#SPJ1

5 0
1 year ago
How is a cell named?
tankabanditka [31]
Hi,

I believe your speaking of cells in according to software, like Excel. 

If so, each cell is identified by its column letter and row number.

Faith xoxo
6 0
3 years ago
Read 2 more answers
An 18 year old female is preparing to go to college in the Fall. She received the 1st dose of HPV and her booster dose of Mening
Elenna [48]

Answer: No, you will not have to determine the exact vaccine that caused the fever and rash. The CDC will determine that information.

Explanation:

To report a vaccine reaction to VAERS you just have to list the symptoms and reactions that were caused after getting a vaccine. The form that is needed to fill out a VAERs can be found on the CDC website. The person filling out the form will need to know the who, when, where, and how of the injury or symptom.

After the form has been received the patient will be contacted and their symptoms will be monitored. Some of the most common reactions after getting a vaccine are;

  • swelling
  • pain
  • redness
  • rash

4 0
3 years ago
Other questions:
  • The figure below shows a black and white image with a resolution of 720×504. Identify how much memory (in bits) will be occupied
    15·1 answer
  • IDPSs can also help the organization protect its assets when its networks and systems are still exposed to ____________________
    9·1 answer
  • The crash rate per mile is ..
    12·2 answers
  • What scheme is usually used today for encoding signed integers?
    5·1 answer
  • Which type of graph or chart measures
    15·2 answers
  • Which of the following allows the transmission of voice and often video communication over the internet?
    12·1 answer
  • In Word, the mailing list is known as the ​
    12·1 answer
  • What is the role of UPS in Computer security?<br>4 marks answer​
    12·1 answer
  • List four tasks that humans perform frequently, but which may be difficult for a computerized agent to accomplish. Describe the
    9·1 answer
  • you're building a new network for a small financial services startup company. security is paramount, so each organization within
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!