exam questions

Exam AWS Certified Cloud Practitioner CLF-C02 All Questions

View all questions & answers for the AWS Certified Cloud Practitioner CLF-C02 exam

Exam AWS Certified Cloud Practitioner CLF-C02 topic 1 question 108 discussion

A user wants to allow applications running on an Amazon EC2 instance to make calls to other AWS services. The access granted must be secure.
Which AWS service or feature should be used?

  • A. Security groups
  • B. AWS Firewall Manager
  • C. IAM roles
  • D. IAM user SSH keys
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cloudrishank
Highly Voted 1 year, 4 months ago
Selected Answer: C
For allowing applications running on an Amazon EC2 instance to make secure calls to other AWS services, the recommended AWS service or feature is: C. IAM roles IAM (Identity and Access Management) roles provide a secure way to grant permissions to AWS services and resources. In this scenario, you can create an IAM role with the necessary permissions for the EC2 instance to access other AWS services. Then, you can associate the IAM role with the EC2 instance. Option A (Security groups) is used for controlling inbound and outbound traffic to and from an EC2 instance, but it's not directly related to granting permissions to AWS services.
upvoted 19 times
...
TheFivePips
Highly Voted 1 year, 3 months ago
Selected Answer: C
C. IAM roles: Are used to grant secure and temporary access to AWS services. In this scenario, where a user wants to allow applications running on an Amazon EC2 instance to make calls to other AWS services, IAM roles should be used. IAM roles provide a secure way to delegate permissions to entities like EC2 instances without the need for long-term credentials. Option A (Security groups) is used for controlling inbound and outbound traffic to EC2 instances but does not provide secure access to AWS services. Option B (AWS Firewall Manager) is a service used for managing AWS WAF (Web Application Firewall) rules across accounts and applications, and it is not directly related to granting permissions to EC2 instances. Option D (IAM user SSH keys) is specifically related to SSH key pairs for IAM users and is not the appropriate solution for granting access to AWS services from EC2 instances.
upvoted 9 times
...
Amin_013
Most Recent 3 months, 3 weeks ago
Selected Answer: C
C. IAM roles IAM (Identity and Access Management) roles provide a secure way to grant permissions to AWS services and resources. In this scenario, you can create an IAM role with the necessary permissions for the EC2 instance to access other AWS services. Then, you can associate the IAM role with the EC2 instance.
upvoted 1 times
...
KeeRee
5 months, 1 week ago
Selected Answer: C
IAM role supplies temporary permissions that applications can use when they make calls to other AWS resources. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2.html
upvoted 1 times
...
ShaiTay
5 months, 1 week ago
Selected Answer: C
C. IAM roles
upvoted 1 times
...
AravindrajG
6 months, 3 weeks ago
Selected Answer: C
Keyword: Amazon EC2 instance to make calls to other AWS services. Here, One AWS service wants to access another AWS services. In AWS wants to access another service by using IAM roles only possible AWS Service -----> Accessed by user == Create IAM User AWS Service -----> Accessed by another AWS service == Create IAM Roles Answer is C. IAM roles
upvoted 1 times
...
LUPING
9 months ago
Thanks for all the discussions. bless
upvoted 1 times
...
aron1621
9 months, 2 weeks ago
I'm seeing wrong answers in alot of questions, Please Admins correct the answers.
upvoted 6 times
...
DOUAHOU13
11 months, 2 weeks ago
C. IAM roles Explication : Les rôles IAM (Identity and Access Management) sont utilisés pour déléguer l'accès aux ressources AWS de manière sécurisée. En attachant un rôle IAM à une instance EC2, les applications s'exécutant sur cette instance peuvent faire des appels sécurisés à d'autres services AWS sans utiliser de longues informations d'identification telles que les clés d'accès. Les rôles IAM sont la méthode recommandée pour accorder un accès sécurisé aux services AWS à partir d'instances EC2.
upvoted 1 times
...
Nools
1 year, 1 month ago
Answer is C
upvoted 1 times
...
aradig
1 year, 2 months ago
Selected Answer: C
The correct answer is C: IAM roles
upvoted 1 times
...
Ruffyit
1 year, 2 months ago
For allowing applications running on an Amazon EC2 instance to make secure calls to other AWS services, the recommended AWS service or feature is: C. IAM roles IAM (Identity and Access Management) roles provide a secure way to grant permissions to AWS services and resources. In this scenario, you can create an IAM role with the necessary permissions for the EC2 instance to access other AWS services. Then, you can associate the IAM role with the EC2 instance.
upvoted 1 times
...
Annkurrrr
1 year, 3 months ago
Selected Answer: C
When an EC2 instance is launched, it can be assigned an IAM role. This role allows the applications running on the instance to make AWS API calls and work with AWS resources by assuming the role. You define the permissions for the applications using the attached IAM policies.
upvoted 2 times
...
Jason3354
1 year, 4 months ago
Selected Answer: A
Answer is Security Groups... Key is: The access granted must be secure.
upvoted 1 times
...
Annkurrrr
1 year, 4 months ago
Using an **IAM role** to grant permissions to applications running on Amazon EC2 instances https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2.html
upvoted 1 times
...
Sharma_sh
1 year, 4 months ago
Selected Answer: A
It is asking how to ensure access granted is secure- so Security groups is the right answer.
upvoted 2 times
...
Salilgen
1 year, 4 months ago
I think answer is D because Security group and IAM roles serve to define granted access. SSH keys allow to secure access.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago