1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
9

A customer is looking for a storage archival solution for 1,000 TB of data. The customer requires that the solution be durable a

nd data be available within a few hours of requesting it, but not exceeding a day. The solution should be as cost-effective as possible. To meet security compliance policies, data must be encrypted at rest. The customer expects they will need to fetch the data two times in a year. Which storage solution should a Solutions Architect recommend to meet these requirements
Computers and Technology
1 answer:
jeka57 [31]3 years ago
4 0

Incomplete question. The options;

A. Copy data to Amazon S3 buckets by using server-side encryption. Move data to Amazon S3 to reduce redundancy storage (RRS).

B. Copy data to encrypted Amazon EBS volumes, then store data into Amazon S3.

C. Copy each object into a separate Amazon Glacier vault and let Amazon Glacier take care of encryption.

D. Copy data to Amazon S3 with server-side encryption. Configure lifecycle management policies to move data to Amazon Glacier after 0 days.

Answer:

D. Copy data to Amazon S3 with server-side encryption. Configure lifecycle management policies to move data to Amazon Glacier after 0 days.

<u>Explanation:</u>

Note, the Amazon S3 (Amazon Simple Storage Service) is a cloud storage service that is both durable, cost-effective, and secure. Since the customer wants a storage space of up to 1,000 TB (terra bytes), this makes the Amazon S3 solution the most recommended solution.

The process begins by copying the data to Amazon S3 with server-side encryption. Next, set-up the configuration of lifecycle management policies to move data to Amazon Glacier after 0 days.

You might be interested in
Which of the following is not a bus type A. Address bus B. Data bus C. Memory bus D. Control bus ​
SVEN [57.7K]

Answer:

Answer is memory bus.

Explanation:

Answer is memory bus.

8 0
3 years ago
Read 2 more answers
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. black-hat gray-ha
Masteriza [31]
<span>These are white-hat hackers. They are typically hired by the company doing the testing as a way of making sure that there are no bugs or holes in the code or program that could be exploited. The ethical hacker would look for ways to get around these issues and helps the company strengthen their programs or sites.</span>
3 0
3 years ago
Write a method named removeRange that accepts an ArrayList of integers and two integer values min and max as parameters and remo
telo118 [61]

Answer:

Answered below

Explanation:

public ArrayList<Integer> removeRange(ArrayList<Integer> X, int min, int max){

int i; int j;

//Variable to hold new list without elements in //given range.

ArrayList<Integer> newList = new ArrayList<Integer>();

//Nested loops to compare list elements to //range elements.

if(max >= min){

for( i = 0; i < x.length; I++){

for(j = min; j <= max; j++){

if( x [i] != j){

newList.add( x[i] );

}

}

}

return newList;

}

}

5 0
3 years ago
Who is the fan of Techno gamerz and Total gaming
Helen [10]
Over here lol- it’s pretty cool
6 0
3 years ago
Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being co
kakasveta [241]

Answer:

captive portal

Explanation:

Captive portal -

It is a web page , which is opened along side the web browser which get displayed on to the fresh connected users of the Wi-Fi network , just before it gets the assurance to use the resources of the network , is known as captive portal .

Generally captive portal requires authentication or payment for access the internet resource .

Hence , from the question information , the example shown in the question is about captive portal .

4 0
3 years ago
Other questions:
  • what properties are associated with all Microsoft Office files and include author, title, and subject
    5·1 answer
  • When troubleshooting a desktop motherboard, you discover the network port no longer works. What is the best and least expensive
    10·1 answer
  • kevin is working on a financial project that involves a lot of statistical information. He needs software that allows him to ent
    8·2 answers
  • The principle of time preference requries a larger payment in the future than the present. Which situation best illustrates this
    12·1 answer
  • The labels button is found under the
    7·2 answers
  • Fill in the blanks with given words:{system unit / desktop / laptop / tablet / smartphone}1. A _____ can be as powerful as a des
    11·1 answer
  • Explain why it is not necessary for a program to Explain why it is not necessary for a program to be completely free of defects
    13·1 answer
  • COMPUTER CODING
    5·1 answer
  • Write a formula that would return a TRUE result if the sum of the first five numbers in a column of data are negative
    7·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!