97 - Quiz Flashcards
Application Load Balancers can route traffic to different Target Groups based on the following, EXCEPT: A. Client's Location (Geography) B. Hostname C. Request URL Path D. Source IP Address
ALBs can route traffic to different Target Groups based on URL Path, Hostname, HTTP Headers, and Query Strings.
For compliance purposes, you would like to expose a fixed static IP address to your end-users so that they can write firewall rules that will be stable and approved by regulators. What type of Elastic Load Balancer would you choose?
A. Application Load Balancer with an Elastic IP attached to it
B. Network Load Balancer
C. Classic Load Balancer
Network Load Balancer has one static IP address per AZ and you can attach an Elastic IP address to it. Application Load Balancers and Classic Load Balancers have a static DNS name.
You want to create a custom application-based cookie in your Application Load Balancer. Which of the following you can use as a cookie name? A. AWSALBPP B. APPUSERC C. AWSALBTG D. AWSALB
The following cookie names are reserved by the ELB (AWSALB, AWSALBAPP, AWSALBTG).
You have an Application Load Balancer that is configured to redirect traffic to 3 Target Groups based on the following hostnames: users.example.com, api.external.example.com, and checkout.example.com. You would like to configure HTTPS for each of these hostnames. How do you configure the ALB to make this work?
A. Use an HTTP to HTTPS redirect rule
B. Use a security group SSL certificate
C. Use Server Name Indication (SNI)
Server Name Indication (SNI) allows you to expose multiple HTTPS applications each with its own SSL certificate on the same listener. Read more here: https://aws.amazon.com/blogs/aws/new-application-load-balancer-sni/
We have an RDS database that struggles to keep up with the demand of requests from our website. Our million users mostly read news, and we don’t post news very often. Which solution is NOT adapted to this problem?
A. An ElastiCache Cluster
B. RDS Multi-AZ
C. RDS Read Replicas
Be very careful with the way you read questions at the exam. Here, the question is asking which solution is NOT adapted to this problem. ElastiCache and RDS Read Replicas do indeed help with scaling reads.
You have updated an S3 bucket policy to allow IAM users to read/write files in the S3 bucket, but one of the users complain that he can’t perform a PutObject API call. What is a possible cause for this?
A. The S3 bucket policy must be wrong
B. The user is lacking permissions
C. The IAM user must have an explicit DENY in the attached IAM Policy
D. You need to contact AWS support to lift this limit
Explicit DENY in an IAM Policy will take precedence over an S3 bucket policy.
You have enabled versioning and want to be extra careful when it comes to deleting files on an S3 bucket. What should you enable to prevent accidental permanent deletions? A. Use a bucket policy B. Enable MFA Delete C. Encrypt the files D. Disable versioning
MFA Delete forces users to use MFA codes before deleting S3 objects. It’s an extra level of security to prevent accidental deletions.
Which of the following is NOT a Glacier Deep Archive retrieval mode?
A. Expedited (1 - 5 minutes)
B. Standard (12 hours)
C. Bulk (48 hours)
A. Expedited (1 - 5 minutes)
When you are using an Edge-Optimized API Gateway, your API Gateway lives in CloudFront Edge Locations across all AWS Regions.
A. False
B. True
An Edge-Optimized API Gateway is best for geographically distributed clients. API requests are routed to the nearest CloudFront Edge Location which improves latency. The API Gateway still lives in one AWS Region.
You are running an application in production that is leveraging DynamoDB as its datastore and is experiencing smooth sustained usage. There is a need to make the application run in development mode as well, where it will experience the unpredictable volume of requests. What is the most cost-effective solution that you recommend?
A. Use Provisioned Capacity Mode with Auto Scaling enabled for both development and production
B. Use Provisioned Capacity Mode with Auto Scaling enabled for production and use On-Demand Capacity Mode for development
C. Use Provisioned Capacity Mode with Auto Scaling enabled for development and use On-Demand Capacity Mode for production
D. Use On-Demand Capacity Mode for both development and production
B. Use Provisioned Capacity Mode with Auto Scaling enabled for production and use On-Demand Capacity Mode for development
You have created a DynamoDB table in ap-northeast-1 and would like to make it available in eu-west-1, so you decided to create a DynamoDB Global Table. What needs to be enabled first before you create a DynamoDB Global Table? A. DynamoDB Streams B. DynamoDB DAX C. DynamoDB Versioning D. DynamoDB Backups
DynamoDB Streams enable DynamoDB to get a changelog and use that changelog to replicate data across replica tables in other AWS Regions.
A CloudWatch Alarm set on a High-Resolution Custom Metric can be triggered as often as ...................... A. 1 second B. 10 seconds C. 30 seconds D. 1 minute
If you set an alarm on a high-resolution metric, you can specify a high-resolution alarm with a period of 10 seconds or 30 seconds, or you can set a regular alarm with a period of any multiple of 60 seconds.
You have made a configuration change and would like to evaluate the impact of it on the performance of your application. Which AWS service should you use?
A. Amazon CloudWatch
B. AWS CloudTrail
Amazon CloudWatch is a monitoring service that allows you to monitor your applications, respond to system-wide performance changes, optimize resource utilization, and get a unified view of operational health. It is used to monitor your applications’ performance and metrics.
You are running a website on a fleet of EC2 instances with OS that has a known vulnerability on port 84. You want to continuously monitor your EC2 instances if they have port 84 exposed. How should you do this?
A. Setup CloudWatch Metrics
B. Setup CloudTrail Trails
C. Setup Config Rules
D. Schedule a CloudWatch Event to trigger a Lambda function to scan your EC2 instances
C. Setup Config Rules
You need to create KMS Keys in AWS KMS before you are able to use the encryption features for EBS, S3, RDS …
A. True
B. False
You can use the AWS Managed Service keys in KMS, therefore we don’t need to create our own KMS keys.