4. Question

An organization leverages Amazon VPC to host its multi-tier services. The organization aims to provide a web analytics service via RESTful APIs to a user base spanning millions. Access to these APIs requires user verification through an authentication service.

What is the most operationally efficient approach to satisfy these requirements?


9. Question

A company is looking to protect its mobile app’s sensitive data, which is encrypted using AWS Key Management Service (AWS KMS). To enhance security, the company wishes to implement a mechanism that not only prevents the accidental deletion of KMS keys but also alerts administrators via email if there’s an attempt to delete a KMS key.

Which of the following solutions fulfills these requirements with minimal operational overhead?


13. Question