SCS-C02 · Question #379
SCS-C02 Question #379: Real Exam Question with Answer & Explanation
Sign in or unlock SCS-C02 to reveal the answer and full explanation for question #379. The question stem and answer options stay visible for context.
Question
You have just developed a new mobile application that handles analytics workloads on large scale datasets that are stored on Amazon Redshift. Consequently, the application needs to access Amazon Redshift tables. Which of the belov methods would be the best both practically and security-wise, to access the tables? Choose the correct answer from the options below
Options
- ACreate an IAM user and generate encryption keys for that user. Create a policy for Redshift read-
- BCreate an HSM client certificate in Redshift and authenticate using this certificate.
- CCreate a Redshift read-only access policy in IAM and embed those credentials in the application.
- DUse roles that allow a web identity federated user to assume a role that allows access to the
Unlock SCS-C02 to see the answer
You've previewed enough free SCS-C02 questions. Unlock SCS-C02 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.