subject
Computers and Technology, 03.01.2020 20:31 bri1334

You are building a system to distribute confidential training videos to employees. using cloudfront, what method could be used to serve content that is stored in s3, but not publically accessible from s3 directly?
(a) create an origin access identity (oai) for cloudfront and grant access to the objects in your s3 bucket to that oai.
(b) add the cloudfront account security group "amazon-cf/amazon-cf-sg" to the appropriate s3 bucket policy.
(c) create an identity and access management (iam) user for cloudfront and grant access to the objects in your s3 bucket to that iam user.
(d) create a s3 bucket policy that lists the cloudfront distribution id as the principal and the target bucket as the amazon resource name (arn).

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 16:30
You have inserted new slides based on a word outline. how do you format these new slides to match the powerpoint presentation formatting? a. select all slides in the presentation and click format on the home tab. b. select the new slides and click reset on the home tab. c. select all slides in the presentation and click reset on the home tab. d. select the new slides and click format on the home tab.
Answers: 2
question
Computers and Technology, 22.06.2019 17:00
The two main ways in which marketers address the competition with their strategies are by satisfying a need better than a competition and by
Answers: 2
question
Computers and Technology, 22.06.2019 22:40
Write a program that defines symbolic names for several string literals (chars between quotes). * use each symbolic name in a variable definition. * use of symbolic to compose the assembly code instruction set can perform vara = (vara - varb) + (varc - vard); ensure that variable is in unsigned integer data type. * you should also further enhance your symbolic logic block to to perform expression by introducing addition substitution rule. vara = (vara+varb) - (varc+vard). required: debug the disassembly code and note down the address and memory information.
Answers: 3
question
Computers and Technology, 23.06.2019 07:00
What are three software programs for mobile computing?
Answers: 1
You know the right answer?
You are building a system to distribute confidential training videos to employees. using cloudfront,...
Questions
Questions on the website: 13722361