AWS Certified Developer Associate Flashcards
What is the proper definition of an IAM Role?
a. IAM Users in multiple User Groups
b. An IAM entity that defines a set of permissions for making requests to AWS services and will be used by an AWS service.
c. An IAM entity that defines a password policy for IAM Users
d. Permissions assigned to IAM Users to perform actions
b. An IAM entity that defines a set of permissions for making requests to AWS services and will be used by an AWS service
Which of the following is an IAM Security Tool?
a. IAM Credentials Report
b. IAM Root Account Manager
c. IAM Services Report
d. IAM Security Advisor
a. IAM Credentials Report
Which answer is INCORRECT regarding IAM Users?
a. IAM Users can belong to multiple User Groups
b. IAM Users don’t have to belong to a User Group
c. IAM Policies can be attached directly to IAM Users
d. IAM Users access AWS services using root account credentials
d. IAM Users access AWS services using root account credentials
Which of the following is an IAM best practice?
a. create serveral IAM Users for on physical person
b. share your AWS account credentials with your colleague, so he can perform a task for you
c. don’t use the root user account
d. do not enable MFA for easier access
c. don’t use the root user account
What are IAM Policies?
a. a set of policies defines how AWS accounts interact with each other
b. JSON documents that define a set of permissions for making requests to AWS services, and can be used by IAM Users, User Groups, and IAM Roles
c. a set of policies that define a password for IAM Users
d. a set of policies defined by AWS that show how customers interact with AWS
b. JSON documents that define a set of permissions for making requests to AWS services, and can be used by IAM Users, User Groups, and IAM Roles
Which principle should you apply regarding IAM Permissions?
a. grant least privilege
d. grant most privilege
c. grant more permissions if your employee asks you to
d. restrict root account permissions
a. grant least privilege
What should you do to increase your root account security?
a. remove permissions from the root account
b. only access AWS services through AWS Command Line Interface (CLI)
c. enable Multi-factor Authentication (MFA)
d. don’t create IAM Users, only access your AWs account using the root account
c. enable Multi-factor Authentication (MFA)
True or False:
IAM User Groups can contain IAM Users and other User Groups
False
An IAM policy consists of one or more statements. A statement in an IAM Policy consists of the following EXCEPT:
a. effect
b. principal
c. version
d. action
e. resource
c. version
According to the AWS Shared Responsibility Model, which of the following is AWS responsibility?
a. rotate Access Key for IAM users
b. enable MFA for the root account and all IAM Users
c. IAM Users, User Groups, and IAM Policies
d. AWS Infrastructure
d. AWS Infrastructure
Which EC2 Purchasing Option can provide you the biggest discount, but it is not suitable for critical jobs or databases?
a. convertible reserved instances
b. dedicated hosts
c. spot instances
c. spot instances
What should you use to control traffic in and out of EC2 instances?
a. network access control list (NACL)
b. security groups
c. IAM policies
b. security groups
How long can you reserve and EC2 Reserved Instance?
a. 1 or 3 years
b. 2 or 4 years
c. 6 months or 1 year
d. anytime between 1 and 3 years
a. 1 or 3 years
You would like to deploy a High-Performance Computing (HPC) application on EC2 instances. Which EC2 instance type should you choose?
a. storage optimized
b. memory optimized
c. compute optimized
d. general purpose
c. compute optimized
Which EC2 Purchasing option should you use for an application you plan to run on a sever continuously for 1 year?
a. on-demand instances
b. spot instances
c. reserved instances
c. reserved instances
You are preparing to launch an application that will be hosted on a set of EC2 instances. This application needs some software installation and some OS packages need to be updated during the first launch. What is the best way to achieve this when you launch the EC2 instance?
a. Connect to each EC2 instance using SSH, then install the required software and update your OS package manually.
b. Write a bash script that installs the required software and updates to your OS, then use this script in EC2 User Data when you launch your EC2 instances.
c. Write a bash script that installs the required software and updates to your OS, then contact AWS Support and provide them with the script. They will run it on your EC2 instances at launch.
b. Write a bash script that installs the required software and updates to your OS, then use this script in EC2 User Data when you launch your EC2 instances.
Which EC2 instance type should you choose for a critical application that uses an in-memory database?
a. compute optimized
b. storage optimized
c. memory optimized
d. general purpose
c. memory optimized
You have an e-commerce application with an OLTP database hosted on-premises. This application has popularity which results in its database has thousands of requests per second. You want to migrate the database to an EC2 instance. Which EC2 instance type should you choose to handle this high-frequency OLTP database?
a. compute optimized
b. storage optimized
c. memory optimized
d. general purpose
b. storage optimized
True or False: Security Groups can be attached to only one EC2 instance.
False
You are planning to migrate on-premises applications to AWS. Your company has strict compliance requirements that require your application to run on dedicated servers. You also need to use your own server-bound software license to reduce costs. Which EC2 purchasing options is suitable for you?
a. convertible reserved instances
b. dedicated hosts
c. spot instances
b. dedicated hosts
You would like to deploy a database technology on an EC2 instance and the vendor license bills you based on the physical cores and underlying network socket visibility. Which EC2 purchasing option allows you to get visibility into them?
a. dedicated hosts
b. spot instances
c. on-demand
d. reserved instances
a. dedicated hosts
You have just terminated an EC2 instance in us-east-1a, and its attached EBS volume is now available. Your teammate tries to attach it to an EC2 instance in us-east-1b but he can’t. What is a possible cause for this?
a. he’s missing IAM permissions
b. EBS volumes are locked to an AWS Region
c. EBS volumes are locked to an AZ
c. EBS volumes are locked to an AZ
You have launched an EC2 instance with two EBS volumes, the root volume type and the other EBS volume type to store the data. A month later you are planning to terminate the EC2 instance. What’s the default behavior that will happen to each EBS volume?
a. both the root volume type and the EBS volume type will be deleted
b. the root volume type will be deleted and the EBS volume type will not be deleted.
c. the root volume type will not be deleted and the EBS volume type will be deleted.
d. Both the root volume type and the EBS volume type will not be deleted.
b. the root volume type will be deleted an the EBS volume type will not be deleted.
True or False: You can use an AMI in N. Virginia Region us-east-1 to launch an EC2 instance in any AWS Region.
False
Which of the following EBS volume types can be used as boot volumes when you create EC2 instances?
a. gp2, gp3, io1, io2
b. gp2, gp3, st1, sc1
c. io1, io2, st1, sc1
a. gp2, gp3, io1, io2
What is EBS Multi-Attach?
a. attach the same EBS volume to multiple EC2 instances in multiple AZs
b. attach multiple EBS volumes in the same AZ to the same EC2 instance.
c. attach the same EBS volume to multiple EC2 instances in the same AZ.
d. attach multiple EBS volumes in multiple AZs to the same EC2 instance
c. attach the same EBS volume to multiple EC2 instances in the same AZ
You have provisioned an 8TB gp2 EBS volume and you are running out of IOPS. What is NOT a way to increase performance?
a. mount EBS volumes in RAID 0
b. change to an io1 volume type
c. increase the EBS volume size
c. increase the EBS volume size
You have a fleet of EC2 instances distributed across AZs that process a large data set. What do you recommend to make the same data to be accessible as an NFS drive to all of your EC2 instances?
a. use an instance store
b. use EBS
c. use EFS
c. use EFS
You would like to have a high-performance local cache for your application hosted on an EC2 instance. You don’t mind losing the cache upon the termination of your EC2 instance. Which storage mechanism do you recommend as a Solutions Architect?
a. instance store
b. EBS
c. EFS
a. instance store
You are running a high-performance database that requires and IPS of 310,000 for its underlying storage. What do you recommend?
a. use an EC2 Instance store
b. use an EBS gp2 drive
c. use an EBS io1 drive
d. use an EBS io2 Block Express drive
a. use an EC2 instance store
Scaling an EC2 instance from r4.large to r4.4xlarge is called _____.
a. horizontal scalability
b. vertical scalability
b. vertical scalability
Running an application on an Auto Scaling Group that scales the number of EC2 instance in and out is called ____.
a. vertical scalability
b. horizontal scalability
b. horizontal scalability
Elastic Load Balancers provide a ____.
a. static IPv4 we can use in our application
b. static DNS name we can use in our application
c. static IPv6 we can use in our application
b. static DNS name we can use in our application
You are running a website on 10 EC2 instances fronted by an Elastic Load Balancer. Your users are complaining about the fact that the website always asks them to re-authenticate when they are moving between website pages. You are puzzled because it’s working just fin on your machine and in the Dev environment with 1 EC2 instance. What could be the reason?
a. The elastic load balancer does not have Sticky Sessions enabled.
b. your website must have an issue when hosted on multiple EC2 instances.
c. The ec2 instances log out users as they cant see their IP addresses, instead, they receive ELB IP addresses.
a. The elastic load balancer does not have Sticky Sessions enabled.
You are using an Application Load Balancer to distribute traffic to your website hosted on EC2 instances. It turns out that your website only sees traffic coming from private IPv4 addresses which are in fact your Application Load Balancer’s IP addresses. What should you do to get the IP address of clients connected to your website?
a. modify your website’s frontend so that users send their IP in every request.
b. modify your website’s backend to get the client IP address from X-Forwarded-For header
c. modify your website’s backend to get the client IP address from X-Forwarded-Port header
d. modify your website’s backend to get the client IP address from X-Forwarded-Proto header
b. modify your website’s backend to get the client IP address from X-Forwarded-For header
You hosted an application on a set of EC2 instances fronted by an Elastic load balancer. A week later, users begin complaining that sometimes the application just doesn’t work. You investigate the issue and found that some EC2 instances crash from time to time. What should you do to protect users from connecting to the EC2 instances that are crashing?
a. Enable ELB stickiness
b. enable SSL Termination
c. enable ELB health checks
d. enable Cross-Zone Load Balancing
c. enable ELB health checks
You are working as a Solutions Architect for a company and you are required to design an architecture for a high-performance, low-latency application that will receive millions of requests per second. Which type of Elastic Load Balancer should you choose?
a. Application Load Balancer
b. Classic Load Balancer
c. Network Load Balancer
c. Network Load Balancer
Application Load Balancers support the following protocols, EXCEPT:
a. HTTP
b. HTTPS
c. WebSocket
d. TCP
d. TCP
Application Load Balancers can route traffic to different Target Groups based on the following EXCEPT:
a. hostname
b. client’s location (geography)
c. request URL path
d. source IP address
b. client’s location (geography)
Registered targets in a Target Group for an Application Load Balancer can be one of the following EXCEPT:
a. network load balancer
b. lambda functions
c. private IP addresses
d. EC2 instances
a. network load balancer
For compliance purposes, you would like to expose a fixed static IP address to your end-users so that they can write firewall rules that will be stable and approved by regulators. What type of Elastic Load Balancer would you choose?
a. Application Load Balancer with an Elastic IP attached to it
b. Network Load Balancer
c. Classic Load Balancer
b. Network Load Balancer
You want to create a customer applciaton-based cookie in your Application Load Balancer. Which of the following can you use as a cookie name?
a. AWSALBAPP
b. AWSALBTG
c. APPUSERC
d. AWSALB
c. APPUSERC
You have a Network Load Balancer that distributes traffic across a set of EC2 instances in us-east-1. You have 2 EC2 instances in us-east-1b AZ and 5 EC2 instances in us-east-1e AZ. You have noticed that the CPU utilization is higher in the EC2 instances in us-east-1b AZ. After more investigation, you noticed that the traffic is equally distributed across the two AZs. How would you solve this problem?
a. enable Sticky Sessions
b. enable Cross-Zone Load Balancing
c. enable ELB Health Checks
d. enable SSL termination
b. enable Cross-Zone Load Balancing
Which feature in both Application Load Balancers and Network Load Balancers allows you to load multiple SSL certificates on one listener?
a. Server Name Indication (SNI)
b. TLS Termination
c. Host Headers
d. SSL Security Policies
a. Sever Name Indication (SNI)
You have an Application Load Balancer that is configured to redirect traffic to 2 Target Groups based on the following hostnames: users.example.com, api.external.example.com, and checkout.example.com. You would like to configure HTTPS for each of these hostnames. How do you configure the ALB to make this work?
a. use an HTTP to HTTPS redirect rule
b. use a security group SSL certificate
c. use Server Name Indication (SNI)
c. user Server Name Indication (SNI)
You have an application hosted on a set of EC2 instances managed by an Auto Scaling Group that you configured both desired and maximum capacity to 3. Also, you have created a CloudWatch Alarm that is configured to scale out your ASG when CPU Utilization reaches 60%. Your application suddenly received huge traffic and is now running at 80% CPU Utilization. What will happen?
a. the desired capacity will go up to 4 and the maximum capacity will stay at 3.
b. nothing
c. the desired capacity will go up to 4 and the maximum capacity will stay at 4
b. nothing
You have an Auto Scaling Group frontend by an Application Load Balancer. You have configured the ASG to use ALB Health Checks, then one EC2 instance has just been reported unhealthy. What will happen to the EC2 instance?
a. the ASG will keep the instance running and re-start the applciaton.
b. the ASG will detach the EC2 instance and leave it running
c. the ASG will terminate the EC2 instance
c. the ASG will terminate the EC2 instance
Your boss asked you to scale your ASG based on the number of requests per minute your application makes to your database. What should you do?
a. You politely tell him it’s impossible
b. create a CloudWatch custom metric then create a CloudWatch Alarm on this metric to scale your ASG
c. enable Detailed Monitoring then create a CloudWatch Alarm to scale your ASG
b. create a CloudWatch custom metric then create a CloudWatch Alarm on this metric to scale your ASG
A web application hosted on a fleet of EC2 instances managed by an ASG. You are exposing the application through an ALB. Both the EC2 instances and the ALB are deployed on a VPC with the following CIDR 192.168.0.0/18. How do you configure the EC2 instances’ security group to ensure only the ALB can access them on port 80?
a. add an inbound rule with port 80 and 0.0.0.0/0 as the source
b. add an inbound rule with port 80 and 192.168.0.0/18 as the source
c. add an inbound rule with port 80 and the ALB’s Security Group as the source
d. load an SSL certificate on the ALB
c. add an inbound rule with port 80 and the ALB’s Security Group as the source
An application is deployed with an ALB and an ASG. Currently, you manually scale the ASG and you would like to define a Scaling Policy that will ensure the average number of connections to your EC2 instances is around 1000. Which Scaling Policy should you use?
a. simple scaling policy
b. step scaling policy
c. scheduled scaling policy
d. target tracking policy
d. target tracking policy
Your application hosted on EC2 instances by and ASG suddenly receives a spike in traffic which triggers your ASG to scale out and a new EC2 instance has been launched. The traffic continuously increases but the ASG doesn’t launch any new EC2 instances immediately but after 5 minutes. What is a possible cause for this behavior?
a. cooldown period
b. lifecycle hooks
c. target tracking policy
d. launch template
a. cooldown period
Amazon RDS supports the following databases, EXCEPT:
a. MongoDB
b. MySQL
c. MariaDB
d. Microsoft SQL Server
a. MongoDB
You’re planning for a new solution that requires a MySQL database that must be available even in case of a disaster in one of the Availability Zones. What should you use?
a. Create Read Replicas
b. Enable Encryption
c. Enable Multi-AZ
c. Enable Multi-AZ
We have an RDS database that struggles to keep up with the demand of requests from our website. Our million users mostly read news, and we don’t post news very often. Which solution is NOT adapted to this problem?
a. an ElastiCache Cluster
b. RDS Multi-AZ
c. RDS Read Replicas
b. RDS Multi-AZ
You have set up read replicas on your RDS database, but users are complaining that upon updating their social media posts, they do not see their updated posts right away. What is a possible cause for this?
a. There must be a bug in your application
b. Read Replicas have Asynchronous Replication, therefore it’s likely your users will only read Eventual Consistency
c. You should have setup Multi-AZ instead.
b. Read Replicas have Asynchronous Replication, therefore it’s likely your users will only read Eventual Consistency
Which RDS (NOT Aurora) feature when used does not require you to change the SQL connection string?
a. Read Replicas
b. Multi-AZ
b. Multi-AZ
Your application running on a fleet of EC2 instances managed by an ASG behind an ALB. Users have to constantly log back in and you don’t want to enable Sticky Sessions on your ALB as you fear it will overload some EC2 instances. What should you do?
a. Use your own custom Load Balancer on EC2 instances instead of using ALB
b. Store session data in RDS
c. Store session data in ElastiCache
d. Store session data in a shared EBS volume
c. Store Session data in ElastiCache
An analytics application is currently performing its queries against your main production RDS database. These queries run at any time of the day and slow down the RDS database which impacts your users’ experience. What should you do to improve the users’ experience?
a. setup a read replica
b. setup Multi-AZ
c. run the analytics queries at night
a. setup a read replica
You are running an ElastiCache Redis cluster which you want to ensure it is high available. What should you do?
a. add read replicas
b. enable mulit-az
a. add read replicas
How can you enhance the security of your ElastiCache Redis Cluster by forcing users to enter a password when they connect?
a. Use Redis Auth
b. Use IAM Auth
c. Use Security Groups
a. Use Redis Auth
Your company has a production Node.js application that is using RDS MySQL 5.6 as its database. A new application programmed in Java will perform some heavy analytics workload to create a dashboard on a regular hourly basis. What is the most cost-effective solution you can implement to minimize disruption for the main application?
a. Enable Multi-AZ for the RDS database and run the analytics workload on the standby database.
b. Create a Read Replica in a different AZ and run the analytics workload on the replica database
c. Create a Read Replica in a different AZ and run the analytics workload on the source database
b. Create a Read Replica in a different AZ and run the analytics workload on the replica database.
You would like to create a disaster recovery strategy for your RDS PostgreSQL database so that in case of regional outage the database can be quickly made available for both read and write workloads in another AWS Region. The DR database must be highly available. what do you recommend?
a. create a read replica in the same region and enable multi-az on the main database.
b. create a read replica in the same region and enable multi-az on the read replica
c. create a read replica in a different region and enable multi-az and the read replica
d. enable multi-region option on the main database
c. create a read replica in a different region and enable multi-az and the read replica
You have migrated the MySQL database from on-premises to RDS. You have a lot of applications and developers interacting with your database. Each developer has an IAM user in the company’s AWS account. What is a suitable approach to give access to developers to the MySQL RDS DB instance instead of creating a DB user for each one?
a. enable IAM Database Authentication
b. user Amazon Cognito
c. by default IAM users have access to your RDS database
a. enable IAM Database Authenticaiton
Which of the following statement is true regarding replication in both RDS Read Replica and Multi-AZ?
a. read replica uses Asynchronous Replication and Multi-AZ uses Asynchronous Replication
b. read replica uses synchronous replication and multi-az uses asynchronous replication
c. read replica uses synchronous replication and multi-az uses synchronous replication
d. read replica uses asynchronous replication and multi-az uses synchronous replication
d. read replica uses asynchronous replication and multi-az uses synchronous replication
How do you encrypt an unencrypted RDS DB Instance?
a. do it straight from AWS Console, select RDS DB instance, choose Actions then Encrypt using KMS
b. create a snapshot of the unencrypted RDS DB instance, copy the snapshot and tick “Enable encryption”, then restore the RDS DB instance from the encrypted snapshot
c. Do it straight from AWS Console, after stopping the RDS DB instance
b. create a snapshot of the unencrypted RDS DB instance, copy the snapshot and tick “Enable encryption”, then restore the RDS DB instance from the encrypted snapshot
For your RDS database, you can have up to ___ read replicas.
a. 3
b. 5
c. 7
b. 5
Which RDS database technology does NOT support IAM Database Authentication?
a. Oracle
b. PostgreSQL
c. MySQL
a. Oracle