Assessment Exam Flashcards
Which of the following steps does the most to protect your AWS account?
A. Deleting unused Identity and Access Management (IAM) policies
B. Revoking unnecessary access for IAM users
C. Rotating root access keys
D. Restricting access to S3 buckets
E. Rotating Secure Shell (SSH) key pairs
B. Revoking unnecessary access for IAM users
Revoking unnecessary access for IAM users is the most effective of the listed measures for protecting your AWS account
Which of the following can be used to encrypt the operating system of an EC2 instance?
A. AWS Secrets Manager
B. CloudHSM
C. AWS Key Management Service (KMS)
D. AWS Security Token Service (STS)
C. AWS Key Management Services (KMS)
KMS can be used to encrypt Elastic Block Store volumes that store an instance’s operating system.
What is a difference between a token generated by the AWS Security Token Service (STS) and an IAM access key?
A. The token generated by STS can’t be used by an IAM principal.
B. An IAM access key is unique.
C. The token generated by STS can be used only once.
D. The token generated by STS expires.
D. The token generated by STS expires
STS tokens expire and IAM access keys do not
You created a virtual private cloud (VPC) using the Classless Inter-Domain Routing (CIDR) block 10.0.0.0/24. You need to connect to this VPC from your internal network, but the IP addresses in use on your internal network overlap with the CIDR. Which of the following is a valid way to address this problem?
A. Remove the CIDR and use IPv6 instead.
B. Change the VPC’s CIDR.
C. Create a new VPC with a different CIDR.
D. Create a secondary CIDR for the VPC.
C. Create a new VPC with a different CIDR
You can’t change the the primary CIDR for a VPC, so you must create a new one to connect it to your internal network.
Which of the following services can alert you to malware on an EC2 instance?
A. AWS GuardDuty
B. AWS Inspector
C. AWS Shield
D. AWS Web Application Firewall
A. AWS GuardDuty
GuardDuty looks for potentially malicious activity
True/false: An EC2 instance must be in a public subnet to access the Internet.
A. True
B. False
B. False
An EC2 instance can access the Internet from a private subnet provided it uses a NAT gateway or NAT instance.
True/false: If versioning is enabled on an S3 bucket, applying encryption to an unencrypted object in that bucket will create a new, encrypted version of that object.
A. True
Applying encryption to an unencrypted object will create a new, encrypted version of that object. Previous versions will remain unencrypted
True/false: The EBS Lifecycle Manager can take snapshots of volumes that were once attached to terminated instances.
A. True
The EBS Lifecycle Manager can take scheduled snapshots of any EBS volume, regardless of attachment state.
You’re designing an application that takes multiple image files and combines them into a video file that users on the Internet can download. Which of the following can help you quickly implement your application in the fastest, most highly available, and most cost-effective manner?
B. Lambda
Lambda is a highly available, reliable, “serverless” compute platform that runs functions as needed and scales elastically to meet demand.
You configured a CloudWatch alarm to monitor CPU utilization for an EC2 instance. The alarm began in the INSUFFICIENT_DATA state and then entered the ALARM state. What can you conclude from this?
A. The instance recently rebooted.
B. CPU utilization is too high.
C. The CPU utilization metric crossed the alarm threshold.
D. The instance is stopped.
C. The CPU utilization metric crossed the alarm threshold
The transition to the ALARM state simply implies that the metric crossed a threshold but doesn’t tell you what the threshold is. Newly created alarms start out in the INSUFFICIENT_DATA state.
Which instance type will, if left running, continue to incur costs?
A. Spot
B. Standard reserved
C. On-demand
D. Convertible reserved
C. On-demand
On-demand instances will continue to run and incur costs. Reserved instances cost the same whether they’re running or stopped. Spot instances will be terminated when the spot price exceeds your bid price.
True/false: The Developer Support plan provides access to a support application programming interface (API).
B. False
The Business Plan offers access to support API, but the Developer plan does not.
Which of the following is not an AWS service?
A. CloudFormation
B. Puppet
C. OpsWorks
D. Snowball
B. Puppet
Puppet is a configuration management platform that AWS offers via OpsWorks but is not itself an AWS service
True/false: The route table for a public subnet must have a default route pointing to an Internet gateway as a target.
A. True
The definition of a public subnet is a subnet that has a default route pointing to an Internet gateway as a target. Otherwise, it’s a private subnet.
Which ElastiCache engine can persistently store data?
A. MySQL
B. Memcached
C. MongoDB
D. Redis
D. Redis
ElastiCache supports Memcached and Redis, but only Redis can store data persistently