Assessment Test Flashcards
True/false: An EC2 instance must be in a public subnet to access the Internet.
False - An EC2 instance can access the Internet from a private subnet provided it uses a NAT gateway or NAT instance. See Chapter 4 for more information.
Which instance type will, if left running, continue to incur costs?
A. Spot
B. Standard reserved
C. On-demand
D. Convertible reserved
C. On-demand
On-demand instances will continue to run and incur costs. Reserved instances cost the same whether they’re running or stopped. Spot instances will be terminated when the spot price exceeds your bid price. See Chapter 13 for more information.
You created a Virtual Private Cloud (VPC) using the Classless Inter-Domain Routing (CIDR) block 10.0.0.0/24. You need to connect to this VPC from your internal network, but the IP addresses in use on your internal network overlap with the CIDR. Which of the following is a valid way to address this problem?
A. Remove the CIDR and use IPv6 instead.
B. Change the VPC’s CIDR.
C. Create a new VPC with a different CIDR.
D. Create a secondary CIDR for the VPC.
C. Create a new VPC with a different CIDR.
You can’t change the primary CIDR for a VPC, so you must create a new one to connect it to your internal network. See Chapter 4 for more information.
True/false: You can create a DynamoDB global secondary index for an existing table at any time.
True - You can create a global secondary index for an existing table at any time. You can create a local secondary index only when you create the table. See Chapter 5 for more information.
Where do AWS Config and CloudTrail store their logs?
A. S3 buckets
B. CloudWatch Logs
C. CloudTrail Events
D. DynamoDB
E. Amazon Athena
A. S3 buckets
Both store their logs in S3 buckets. See Chapter 7 for more information.
Which ElastiCache engine can persistently store data?
A. MySQL
B. Memcached
C. MongoDB
D. Redis
D. Redis
ElastiCache supports Memcached and Redis, but only the latter can store data persistently. See Chapter 11 for more information.
What is a difference between a token generated by the AWS Security Token Service (STS) and an IAM access key?
A. The token generated by STS can’t be used by an IAM principal.
B. An IAM access key is unique.
C. The token generated by STS can be used only once.
D. The token generated by STS expires.
D. The token generated by STS expires.
STS tokens expire and IAM access keys do not. An STS token can be used more than once. IAM access keys and STS tokens are both unique. An IAM principal can use an STS token. See Chapter 6 for more information.
Which of the following services can you deactivate on your account?
A. Security Token Service (STS)
B. CloudWatch
C. Virtual Private Cloud (VPC)
D. Lambda
A. Security Token Service (STS)
You can deactivate STS for all regions except US East. See Chapter 12 for more information.
Which of the following steps does the most to protect your AWS account?
A. Deleting unused Identity and Access Management (IAM) policies
B. Revoking unnecessary access for IAM users
C. Rotating root access keys
D. Restricting access to S3 buckets
E. Rotating Secure Shell (SSH) key pairs
B. Revoking unnecessary access for IAM users
Revoking unnecessary access for IAM users is the most effective of the listed measures for protecting your AWS account. See Chapter 6 for more information.
Which of the following can be used to encrypt the operating system of an EC2 instance?
A. AWS Secrets Manager
B. CloudHSM
C. AWS Key Management Service (KMS)
D. AWS Security Token Service (STS)
C. AWS Key Management Service (KMS)
KMS can be used to encrypt Elastic Block Store (EBS) volumes that store an instance’s operating system. See Chapter 6 for more information.
True/false: You can use an existing domain name with Route 53 without switching its registration to AWS.
A. True
B. False
A. True
Route 53 is a true DNS service in that it can host zones for any domain name. You can also register domain names with or transfer them to Route 53. See Chapter 8 for more information.
You want to use Route 53 to send users to the application load balancer closest to them. Which of the following routing policies lets you do this with the least effort?
A. Latency routing
B. Geolocation routing
C. Geoproximity routing
D. Edge routing
C. Geoproximity routing
Geoproximity routing routes users to the location closest to them. Geolocation routing requires you to create records for specific locations or create a default record. See Chapter 8 for more information.
True/false: The Developer Support plan provides access to a support application programming interface (API).
A. True
B. False
B. False
The Business plan offers access to a support API, but the Developer plan does not. See Chapter 1 for more information.
You’re designing an application that takes multiple image files and combines them into a video file that users on the Internet can download. Which of the following can help you quickly implement your application in the fastest, most highly available, and most cost-effective manner?
A. EC2 spot fleet
B. Lambda
C. Relational Database Service (RDS)
D. Auto Scaling
Lambda
Lambda is a highly available, reliable, “serverless” compute platform that runs functions as needed and scales elastically to meet demand. EC2 spot instances can be shut down on short notice. See Chapter 10 for more information.
True/false: Changing the instance type of an EC2 instance will change its elastic IP address.
A. True
B. False
B. False
An elastic IP address will not change. A public IP address attached to an instance will change if the instance is stopped, as would happen when changing the instance type. See Chapter 2 for more information.