ClaireS
Forum Replies Created
-
Thanks for your reply Carlo – that makes perfect sense in that case.
Claire
-
Hi Carlo,
Sorry for delayed reply. A DX connection is not encrypted. To achieve encryption, need to implement a site to site VPN with IPSec tunnels over a public VIF. This would then make it secure. I think really it’s the use of the word “secure”. It’s a dedicated line and if that line was tapped all data would be plaintext. Hence, not secure.
Right?
Thanks,
Claire
-
-
Hi Kenneth,
Thanks for this explanation – that makes complete sense.
Best regards,
Claire -
Hi Kenneth,
Thank for your reply and excellent rationale given. What can I say, I’m here to learn and that’s a pretty good lesson for today!
Thanks,
Claire
-
Hi Carlo,
Thanks for your reply. I can answer my own question now 🙂
It was Review Mode Set 1 – AWS Certified Developer Associate > Question 19 (see attached)
I understand how the formula in the rationale given is working (I got the answer right; I just didn’t follow the rationale).
It was best for me to consider a timeline: 1s = 10 invocations, 2 = 20, 3 = 30, 4 = 40, … , 10 = 100, and thereafter the formula roughly works out (as this is all averages in any case). Therefore,
= 10 invocations per second * 10 seconds average duration
= 100 concurrent executions (after 10 seconds…)
Thanks,
Claire
-