Assessment Test Flashcards

1
Q

True/false: The Developer Support plan provides access to a support application programming interface (API).
True
False

A

B. The Business plan offers access to a support API, but the Developer plan does not. See Chapter 1 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True/false: AWS is responsible for managing the network configuration of your EC2 instances.
True
False

A

B. Customers are responsible for managing the network configuration of EC2 instances. AWS is responsible for the physical network infrastructure. See Chapter 1 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following services is most useful for decoupling the components of a monolithic application?
SNS
KMS
SQS
Glacier

A

C. Simple Queue Service (SQS) allows for event‐driven messaging within distributed systems that can decouple while coordinating the discrete steps of a larger process. See Chapter 1 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An application you want to run on EC2 requires you to license it based on the number of physical CPU sockets and cores on the hardware you plan to run the application on. Which of the following tenancy models should you specify?
Dedicated host
Dedicated instance
Shared tenancy
Bring your own license

A

A.The dedicated host option lets you see the number of physical CPU sockets and cores on a host. See Chapter 2 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True/false: Changing the instance type of an EC2 instance will change its elastic IP address.
True
False

A

B. An elastic IP address will not change. A public IP address attached to an instance will change if the instance is stopped, as would happen when changing the instance type. See Chapter 2 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True/false: You can use a Quick Start Amazon Machine Image (AMI) to create any instance type.
True
False

A

A.A Quick Start AMI is independent of the instance type. See Chapter 2 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which S3 encryption option does not require AWS persistently storing the encryption keys it uses to decrypt data?
Client‐side encryption
SSE‐KMS
SSE‐S3
SSE‐C

A

D.With SSE‐C you provide your own keys for Amazon to use to decrypt and encrypt your data. AWS doesn’t persistently store the keys. See Chapter 3 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True/false: Durability measures the percentage of likelihood that a given object will not be inadvertently lost by AWS over the course of a year.
True
False

A

A. Durability corresponds to an average annual expected loss of objects stored on S3, not including objects you delete. Availability measures the amount of time S3 will be available to let you retrieve those objects. See Chapter 3 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True/false: After uploading a new object to S3, there will be a slight delay (one to two seconds) before the object is available.
True
False

A

B. S3 uses a read‐after‐write consistency model for new objects, so once you upload an object to S3, it’s immediately available. See Chapter 3 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You created a Virtual Private Cloud (VPC) using the Classless Inter‐Domain Routing (CIDR) block 10.0.0.0/24. You need to connect to this VPC from your internal network, but the IP addresses in use on your internal network overlap with the CIDR. Which of the following is a valid way to address this problem?
Remove the CIDR and use IPv6 instead.
Change the VPC’s CIDR.
Create a new VPC with a different CIDR.
Create a secondary CIDR for the VPC.

A

C. You can’t change the primary CIDR for a VPC, so you must create a new one to connect it to your internal network. See Chapter 4 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True/false: An EC2 instance must be in a public subnet to access the Internet.
True
False

A

B. An EC2 instance can access the Internet from a private subnet provided it uses a NAT gateway or NAT instance. See Chapter 4 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True/false: The route table for a public subnet must have a default route pointing to an Internet gateway as a target.
True
False

A

A. The definition of a public subnet is a subnet that has a default route pointing to an Internet gateway as a target. Otherwise, it’s a private subnet. See Chapter 4 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following use cases is well suited for DynamoDB?
Running a MongoDB database on AWS
Storing large binary files exceeding 1 GB in size
Storing JSON documents that have a consistent structure
Storing image assets for a website

A

C. DynamoDB is a key‐value store that can be used to store items up to 400 KB in size. See Chapter 5 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True/false: You can create a DynamoDB global secondary index for an existing table at any time.
True
False

A

A.You can create a global secondary index for an existing table at any time. You can create a local secondary index only when you create the table. See Chapter 5 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True/false: Enabling point‐in‐time RDS snapshots is sufficient to give you a recovery point objective (RPO) of less than 10 minutes.
True
False

A

A. Enabling point‐in‐time recovery gives you an RPO of about five minutes. The recovery time objective (RTO) depends on the amount of data to restore. See Chapter 5 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following steps does the most to protect your AWS account?
Deleting unused Identity and Access Management (IAM) policies
Revoking unnecessary access for IAM users
Rotating root access keys
Restricting access to S3 buckets
Rotating Secure Shell (SSH) key pairs

A

B. Revoking unnecessary access for IAM users is the most effective of the listed measures for protecting your AWS account. See Chapter 6 for more information.

17
Q

Which of the following can be used to encrypt the operating system of an EC2 instance?
AWS Secrets Manager
CloudHSM
AWS Key Management Service (KMS)
AWS Security Token Service (STS)

A

C. KMS can be used to encrypt Elastic Block Store (EBS) volumes that store an instance’s operating system. See Chapter 6 for more information.

18
Q

What is a difference between a token generated by the AWS Security Token Service (STS) and an IAM access key?
The token generated by STS can’t be used by an IAM principal.
An IAM access key is unique.
The token generated by STS can be used only once.
The token generated by STS expires.

A

D. STS tokens expire and IAM access keys do not. An STS token can be used more than once. IAM access keys and STS tokens are both unique. An IAM principal can use an STS token. See Chapter 6 for more information.

19
Q

True/false: EC2 sends instance memory utilization metrics to CloudWatch every five minutes.
True
False

A

B. EC2 doesn’t track instance memory utilization. See Chapter 7 for more information.

20
Q

You configured a CloudWatch alarm to monitor CPU utilization for an EC2 instance. The alarm began in the INSUFFICIENT_DATA state and then entered the ALARM state. What can you conclude from this?
The instance recently rebooted.
CPU utilization is too high.
The CPU utilization metric crossed the alarm threshold.
The instance is stopped.

A

C. The transition to the ALARM state simply implies that the metric crossed a threshold but doesn’t tell you what the threshold is. Newly created alarms start out in the INSUFFICIENT_DATA state. See Chapter 7 for more information.

21
Q

Where do AWS Config and CloudTrail store their logs?
S3 buckets
CloudWatch Logs
CloudTrail Events
DynamoDB
Amazon Athena

A

A. Both store their logs in S3 buckets. See Chapter 7 for more information.

22
Q

True/false: An EC2 instance in a private subnet can resolve an “A” resource record for a public hosted zone hosted in Route 53.
True
False

A

A. An EC2 instance in a private subnet still has access to Amazon’s private DNS servers, which can resolve records stored in public hosted zones. See Chapter 8 for more information.

23
Q

You want to use Route 53 to send users to the application load balancer closest to them. Which of the following routing policies lets you do this with the least effort?
Latency routing
Geolocation routing
Geoproximity routing
Edge routing

A

C. Geoproximity routing routes users to the location closest to them. Geolocation routing requires you to create records for specific locations or create a default record. See Chapter 8 for more information.

24
Q

True/false: You can use an existing domain name with Route 53 without switching its registration to AWS.
True
False

A

A. Route 53 is a true DNS service in that it can host zones for any domain name. You can also register domain names with or transfer them to Route 53. See Chapter 8 for more information.

25
Q

You’re designing an application that takes multiple image files and combines them into a video file that users on the Internet can download. Which of the following can help you quickly implement your application in the fastest, most highly available, and most cost‐effective manner?
EC2 spot fleet
Lambda
Relational Database Service (RDS)
Auto Scaling

A

B. Lambda is a highly available, reliable, “serverless” compute platform that runs functions as needed and scales elastically to meet demand. EC2 spot instances can be shut down on short notice. See Chapter 10 for more information.

26
Q

You’re using EC2 Auto Scaling and want to implement a scaling policy that adds one extra instance only when the average CPU utilization of each instance exceeds 90 percent. However, you don’t want it to add more than one instance every five minutes. Which of the following scaling policies should you use?
Simple
Step
Target tracking
PercentChangeInCapacity

A

A. A simple scaling policy changes the group size and then has a cooldown period before doing so again. Step scaling policies don’t have cooldown periods. Target tracking policies attempt to keep a metric at a set value. PercentChangeInCapacity is a simple scaling adjustment type, not a scaling policy. See Chapter 10 for more information.

27
Q

True/false: EC2 Auto Scaling automatically replaces group instances directly terminated by the root user.
True
False

A

A. Auto Scaling always attempts to maintain the minimum group size or, if set, the desired capacity. See Chapter 10 for more information.

28
Q

Which ElastiCache engine can persistently store data?
MySQL
Memcached
MongoDB
Redis

A

D. ElastiCache supports Memcached and Redis, but only the latter can store data persistently. See Chapter 11 for more information.

29
Q

Which of the following is not an AWS service?
CloudFormation
Puppet
OpsWorks
Snowball

A

B. Puppet is a configuration management platform that AWS offers via OpsWorks but is not itself an AWS service. See Chapter 11 for more information.

30
Q

True/false: S3 cross‐region replication uses transfer acceleration.
True
False

A

B. S3 cross‐region replication transfers objects between different buckets. Transfer acceleration uses a CloudFront edge location to speed up transfers between S3 and the Internet. See Chapter 11 for more information.

31
Q

Which of the following services can you deactivate on your account?
Security Token Service (STS)
CloudWatch
Virtual Private Cloud (VPC)
Lambda

A

A. You can deactivate STS for all regions except US East. See Chapter 12 for more information.

32
Q

Which of the following services can alert you to malware on an EC2 instance?
AWS GuardDuty
AWS Inspector
AWS Shield
AWS Web Application Firewall

A

A. GuardDuty looks for potentially malicious activity. Inspector looks for vulnerabilities that may result in compromise. Shield and Web Application Firewall protect applications from attack. See Chapter 12 for more information.

33
Q

True/false: If versioning is enabled on an S3 bucket, applying encryption to an unencrypted object in that bucket will create a new, encrypted version of that object.
True
False

A

A. Applying encryption to an unencrypted object will create a new, encrypted version of that object. Previous versions remain unencrypted. See Chapter 12 for more information.

34
Q

Which instance type will, if left running, continue to incur costs?
Spot
Standard reserved
On‐demand
Convertible reserved

A

C. On‐demand instances will continue to run and incur costs. Reserved instances cost the same whether they’re running or stopped. Spot instances will be terminated when the spot price exceeds your bid price. See Chapter 13 for more information.

35
Q

True/false: The EBS Lifecycle Manager can take snapshots of volumes that were once attached to terminated instances.
True
False

A

A. The EBS Lifecycle Manager can take scheduled snapshots of any EBS volume, regardless of attachment state. See Chapter 13 for more information.

36
Q

Which of the following lets you spin up new web servers the quickest?
Lambda
Auto Scaling
Elastic Container Service
CloudFront

A

C. Elastic Container Service lets you run containers that can launch in a matter of seconds. EC2 instances take longer. Lambda is “serverless,” so you can’t use it to run a web server. CloudFront provides caching but isn’t a web server. See Chapter 13 for more information.

37
Q

True/false: CloudFormation stack names are case‐sensitive.
True
False

A

A. Almost everything in CloudFormation is case sensitive. See Chapter 14 for more information.

38
Q

Where might CodeDeploy look for the appspec.yml file? (Choose two.)
GitHub
CodeCommit
S3
CloudFormation

A

A, C. CodeDeploy looks for the appspec.yml file with the application files it is to deploy, which can be stored in S3 or on GitHub. See Chapter 14 for more information.

39
Q

True/false: You can use either CodeDeploy or an AWS Systems Manager command document to deploy a Lambda application.
True
False

A

B. You can use CodeDeploy to deploy an application to Lambda or EC2 instances. But an AWS Systems Manager command document works only on EC2 instances. See Chapter 14 for more information.