AWS 7 Flashcards
A developer wants to deploy an application on a container-based service. The service must automatically provision and manage the backend instances. The service must provision only the necessary resources.Which AWS service will meet these requirements?
A. Amazon EC2
B. Amazon Lightsail
C. Amazon Elastic Kubernetes Service (Amazon EKS)
D. AWS Fargate
D. AWS Fargate
Which tasks require use of the AWS account root user? (Choose two.)
A. Changing an AWS Support plan
B. Modifying an Amazon EC2 instance type
C. Grouping resources in AWS Systems Manager
D. Running applications in Amazon Elastic Kubernetes Service (Amazon EKS)
E. Closing an AWS account
A. Changing an AWS Support plan
E. Closing an AWS account
Which AWS service enables the decoupling and scaling of applications?
A. Amazon Simple Queue Service (Amazon SQS)
B. AWS Outposts
C. Amazon S3
D. Amazon Simple Email Service (Amazon SES)
A. Amazon Simple Queue Service (Amazon SQS)
Which of the following describes some of the core functionality of Amazon S3?
A. Amazon S3 is a high-performance block storage service that is designed for use with Amazon EC2.
B. Amazon S3 is an object storage service that provides high-level performance, security, scalability, and data availability.
C. Amazon S3 is a fully managed, highly reliable, and scalable file storage system that is accessible over the industry-standard SMB protocol.
D. Amazon S3 is a scalable, fully managed elastic NFS for use with AWS Cloud services and on-premises resources.
B. Amazon S3 is an object storage service that provides high-level performance, security, scalability, and data availability.
How does consolidated billing help reduce costs for a company that has multiple AWS accounts?
A. It aggregates usage across accounts so that the company can reach volume discount thresholds sooner.
B. It offers an additional 5% discount on purchases of All Upfront Reserved Instances.
C. It provides a simplified billing invoice that the company can process more quickly than a standard invoice.
D. It gives AWS resellers the ability to bill their customers for usage.
A. It aggregates usage across accounts so that the company can reach volume discount thresholds sooner.
A company wants to secure its consumer web application by using SSL/TLS to encrypt traffic.Which AWS service can the company use to meet this goal?
A. AWS WAF
B. AWS Shield
C. Amazon VPC
D. AWS Certificate Manager (ACM)
D. AWS Certificate Manager (ACM)
Which of the following are advantages of moving to the AWS Cloud? (Choose two.)
A. Users can implement all AWS services in seconds.
B. AWS assumes all responsibility for the security of infrastructure and applications.
C. Users experience increased speed and agility.
D. Users benefit from massive economies of scale.
E. Users can move hardware from their data center to the AWS Cloud.
C. Users experience increased speed and agility.
D. Users benefit from massive economies of scale.
A company stores configuration files in an Amazon S3 bucket. These configuration files must be accessed by applications that are running on Amazon EC2 instances.According to AWS security best practices, how should the company grant permissions to allow the applications for access the S3 bucket?
A. Use the AWS account root user access keys.
B. Use the AWS access key ID and the EC2 secret access key.
C. Use an IAM role with the necessary permissions.
D. Activate multi-factor authentication (MFA) and versioning on the S3 bucket.
C. Use an IAM role with the necessary permissions.
A company needs an AWS service that will continuously monitor the company’s AWS account for suspicious activity. The service must have the ability to initiate automated actions against threats that are identified in the security findings.Which service will meet these requirements?
A. AWS Trusted Advisor
B. Amazon Detective
C. Amazon Inspector
D. Amazon GuardDuty
D. Amazon GuardDuty
A company wants to analyze streaming user data and respond to customer queries in real time.Which AWS service can meet these requirements?
A. Amazon QuickSight
B. Amazon Redshift
C. Amazon Kinesis Data Analytics
D. AWS Data Pipeline
C. Amazon Kinesis Data Analytics
Who can create and manage access keys for an AWS account root user?
A. The AWS account owner
B. An IAM user that has administrator permissions
C. IAM users within a designated group
D. An IAM user that has the required role
A. The AWS account owner
Which AWS service can help a company detect an outage of its website servers and redirect users to alternate servers?
A. Amazon CloudFront
B. Amazon GuardDuty
C. Amazon Route 53
D. AWS Trusted Advisor
C. Amazon Route 53
A web application is hosted on AWS using an Elastic Load Balancer, multiple Amazon EC2 instances, and Amazon RDS.Which security measures fall under the responsibility of AWS? (Choose two.)
A. Running a virus scan on EC2 instances
B. Protecting against IP spoofing and packet sniffing
C. Installing the latest security patches on the RDS instance
D. Encrypting communication between the EC2 instances and the Elastic Load Balancer
E. Configuring a security group and a network access control list (NACL) for EC2 instances
B. Protecting against IP spoofing and packet sniffing
C. Installing the latest security patches on the RDS instance
Which of the following is an AWS Well-Architected Framework design principle for operational excellence in the AWS Cloud?
A. Go global in minutes.
B. Make frequent, small, reversible changes.
C. Implement a strong foundation of identity and access management.
D. Stop spending money on hardware infrastructure for data center operations.
B. Make frequent, small, reversible changes.
Which AWS service provides intelligent recommendations to improve code quality and identify an application’s most expensive lines of code?
A. Amazon CodeGuru
B. AWS CodeStar
C. AWS CodeCommit
D. AWS CodeDeploy
A. Amazon CodeGuru