A. Create an encrypted copy of manual snapshot of the DB instance. Restore a new DB instance from the encrypted snapshot. Most Voted
B. Modify the DB instance and enable encryption.
C. Restore a DB instance from the most recent automated snapshot and enable encryption.
D. Create an encrypted read replica of the DB instance. Promote the read replica to a standalone instance.

- Awsexamhub website is not related to, affiliated with, endorsed or authorized by Amazon.
- Trademarks, certification & product names are used for reference only and belong to Amazon.