Architecting Fundamentals Flashcards

1
Q

AWS Local Zones

A

Not as big as regions but mitigate places where there is no region where latency is an issue

Allows services to be close to your data center

AWS infrastructure at the edge

Local compute, storage, DB and other services

Connecting to services in AWS region

Delivers new low latency applications

Doesn’t have access to global storage services (e.g. S3, dynamoDB, EFS, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Edge Locations

A

Edge locations based on proximity to people with computers and mobile devices - 2 main services running Cloud Front, Route53

Uses cache to distribute content/DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Well Architected Framework

A

Six PDFs that list best practices for :

Security
Cost Optimization
Reliability
Performance Efficiency
Operational Excellence
Sustainability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Well Architected Tool

A

Based on the AWS Well-Architected Framework

Can review your applications and workloads

Central place for best practices and guidance

Used in tens of thousands of workload reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AWS data centers

A

AWS services operate within AWS data centers.

Data centers host thousands of servers.

Each location uses AWS proprietary network equipment.

Data centers are organized into Availability Zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability Zones

A

A group of one or more data centers is called an Availability Zone.

An Availability Zone is one or more discrete data centers with redundant power, networking, and connectivity in an AWS Region

Data centers in a Region

Designed for fault isolation

Interconnected by using high-speed
private links

Used to achieve high availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Policy types

A

Policies that grant/deny permissions:
Identity-based policies

Resource-based policies

Policies that set maximum policy:
AWS Organizations service control policies (SCPs)

IAM permissions boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Resource based policies

A

Attach inline policies to resources. The most common examples of resource-based
policies are Amazon S3 bucket policies and IAM role trust policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AWS Organizations service control policies (SCPs)

A

Use Organizations SCPs to define the maximum
permissions for account members of an organization or organizational unit (OU).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IAM permissions boundaries

A

AWS supports permissions boundaries
for IAM entities (users or roles). Use IAM permissions boundaries to set the maximum permissions that an IAM entity can receive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identity based policies

A

Attach managed and inline policies to IAM identities. These identities include users,
groups to which users belong, and roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What policies need to explicitly allow if present?

A

IAM identity based policies, IAM permissions boundary, AWS Organization SCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What policy type works independently of the others

A

IAM resource based policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identity-based policies can be categorized by the following types?

A

Managed policies –Standalone identity-based policies that you can attach to multiple users, groups, and
roles in your AWS account. There are two types of managed policies:

AWS managed policies –Managed policies that AWS creates and manages. They are built to provide
specific service access or permissions for job functions.

Customer managed policies –
Managed policies that you create and manage in your AWS account.
Customer managed policies provide more precise control over your policies than AWS managed
policies.

*Inline policies –Policies that you add directly to a single user, group, or role. Inline policies maintain a strict
one-to-one relationship between a policy and an identity. They are deleted when you delete the identity.

An inline policy is a policy that you create and embed directly to an IAM group, user, or role. Inline policies can’t be reused on other identities or managed outside of the identity where they ex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why might you want to create a multi-account structure in your organization?

A

*To group resources for categorization and discovery (many teams)
*To improve your security posture with a logical boundary
*To limit potential impact in case of unauthorized access
*To simplify management of user access to different environments (billing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AWS
Organizations provides these key features?

A

*Centralized management of all your AWS accounts
*Consolidated billing for all member accounts
*Hierarchical grouping of your accounts to meet your budgetary, security, or compliance needs
*Policies to centralize control over the AWS services and API actions that each account can access
*Policies to standardize tags across the resources in your organization's accounts
*Policies to control how AWS artificial intelligence (AI) and machine learning (ML) services can collect and
store data
*Policies that configure automatic backups for the resources in your organization's accounts
*Integration and support for IAM
*Integration with other AWS services
*Global access
*Data replication that is eventually consistent
*No cost for use

16
Q

Which IP addresses in each CIDR block for a subnet are not available and cannot be
assigned to an instance?

A

*10.0.0.0: Network address.
*10.0.0.1: Reserved by AWS for the VPC router.
*10.0.0.2: Reserved by AWS. The IP address of the DNS server is always the base of the VPC network range
plus 2.
*10.0.0.3: Reserved by AWS for future use.
*10.0.0.255: Network broadcast address. AWS does not support broadcast in a VPC; therefore, we reserve this
add

17
Q

A public subnet requires the following?

A

*Internet gateway: The internet gateway allows communication between resources in your VPC and the
internet.
*Route table: A route table contains a set of rules (routes) that are used to determine where network traffic is
directed. It can direct traffic to the internet gateway.
*Public IP addresses: These addresses are accessible from the internet. Public IP addresses obscure the private
IP addresses, which are only reachable within the network.