AWS Certified Developer Associate Flashcards
What is the proper definition of an IAM Role?
a. IAM Users in multiple User Groups
b. An IAM entity that defines a set of permissions for making requests to AWS services and will be used by an AWS service.
c. An IAM entity that defines a password policy for IAM Users
d. Permissions assigned to IAM Users to perform actions
b. An IAM entity that defines a set of permissions for making requests to AWS services and will be used by an AWS service
Which of the following is an IAM Security Tool?
a. IAM Credentials Report
b. IAM Root Account Manager
c. IAM Services Report
d. IAM Security Advisor
a. IAM Credentials Report
Which answer is INCORRECT regarding IAM Users?
a. IAM Users can belong to multiple User Groups
b. IAM Users don’t have to belong to a User Group
c. IAM Policies can be attached directly to IAM Users
d. IAM Users access AWS services using root account credentials
d. IAM Users access AWS services using root account credentials
Which of the following is an IAM best practice?
a. create serveral IAM Users for on physical person
b. share your AWS account credentials with your colleague, so he can perform a task for you
c. don’t use the root user account
d. do not enable MFA for easier access
c. don’t use the root user account
What are IAM Policies?
a. a set of policies defines how AWS accounts interact with each other
b. JSON documents that define a set of permissions for making requests to AWS services, and can be used by IAM Users, User Groups, and IAM Roles
c. a set of policies that define a password for IAM Users
d. a set of policies defined by AWS that show how customers interact with AWS
b. JSON documents that define a set of permissions for making requests to AWS services, and can be used by IAM Users, User Groups, and IAM Roles
Which principle should you apply regarding IAM Permissions?
a. grant least privilege
d. grant most privilege
c. grant more permissions if your employee asks you to
d. restrict root account permissions
a. grant least privilege
What should you do to increase your root account security?
a. remove permissions from the root account
b. only access AWS services through AWS Command Line Interface (CLI)
c. enable Multi-factor Authentication (MFA)
d. don’t create IAM Users, only access your AWs account using the root account
c. enable Multi-factor Authentication (MFA)
True or False:
IAM User Groups can contain IAM Users and other User Groups
False
An IAM policy consists of one or more statements. A statement in an IAM Policy consists of the following EXCEPT:
a. effect
b. principal
c. version
d. action
e. resource
c. version
According to the AWS Shared Responsibility Model, which of the following is AWS responsibility?
a. rotate Access Key for IAM users
b. enable MFA for the root account and all IAM Users
c. IAM Users, User Groups, and IAM Policies
d. AWS Infrastructure
d. AWS Infrastructure
Which EC2 Purchasing Option can provide you the biggest discount, but it is not suitable for critical jobs or databases?
a. convertible reserved instances
b. dedicated hosts
c. spot instances
c. spot instances
What should you use to control traffic in and out of EC2 instances?
a. network access control list (NACL)
b. security groups
c. IAM policies
b. security groups
How long can you reserve and EC2 Reserved Instance?
a. 1 or 3 years
b. 2 or 4 years
c. 6 months or 1 year
d. anytime between 1 and 3 years
a. 1 or 3 years
You would like to deploy a High-Performance Computing (HPC) application on EC2 instances. Which EC2 instance type should you choose?
a. storage optimized
b. memory optimized
c. compute optimized
d. general purpose
c. compute optimized
Which EC2 Purchasing option should you use for an application you plan to run on a sever continuously for 1 year?
a. on-demand instances
b. spot instances
c. reserved instances
c. reserved instances
You are preparing to launch an application that will be hosted on a set of EC2 instances. This application needs some software installation and some OS packages need to be updated during the first launch. What is the best way to achieve this when you launch the EC2 instance?
a. Connect to each EC2 instance using SSH, then install the required software and update your OS package manually.
b. Write a bash script that installs the required software and updates to your OS, then use this script in EC2 User Data when you launch your EC2 instances.
c. Write a bash script that installs the required software and updates to your OS, then contact AWS Support and provide them with the script. They will run it on your EC2 instances at launch.
b. Write a bash script that installs the required software and updates to your OS, then use this script in EC2 User Data when you launch your EC2 instances.
Which EC2 instance type should you choose for a critical application that uses an in-memory database?
a. compute optimized
b. storage optimized
c. memory optimized
d. general purpose
c. memory optimized
You have an e-commerce application with an OLTP database hosted on-premises. This application has popularity which results in its database has thousands of requests per second. You want to migrate the database to an EC2 instance. Which EC2 instance type should you choose to handle this high-frequency OLTP database?
a. compute optimized
b. storage optimized
c. memory optimized
d. general purpose
b. storage optimized
True or False: Security Groups can be attached to only one EC2 instance.
False
You are planning to migrate on-premises applications to AWS. Your company has strict compliance requirements that require your application to run on dedicated servers. You also need to use your own server-bound software license to reduce costs. Which EC2 purchasing options is suitable for you?
a. convertible reserved instances
b. dedicated hosts
c. spot instances
b. dedicated hosts
You would like to deploy a database technology on an EC2 instance and the vendor license bills you based on the physical cores and underlying network socket visibility. Which EC2 purchasing option allows you to get visibility into them?
a. dedicated hosts
b. spot instances
c. on-demand
d. reserved instances
a. dedicated hosts
You have just terminated an EC2 instance in us-east-1a, and its attached EBS volume is now available. Your teammate tries to attach it to an EC2 instance in us-east-1b but he can’t. What is a possible cause for this?
a. he’s missing IAM permissions
b. EBS volumes are locked to an AWS Region
c. EBS volumes are locked to an AZ
c. EBS volumes are locked to an AZ
You have launched an EC2 instance with two EBS volumes, the root volume type and the other EBS volume type to store the data. A month later you are planning to terminate the EC2 instance. What’s the default behavior that will happen to each EBS volume?
a. both the root volume type and the EBS volume type will be deleted
b. the root volume type will be deleted and the EBS volume type will not be deleted.
c. the root volume type will not be deleted and the EBS volume type will be deleted.
d. Both the root volume type and the EBS volume type will not be deleted.
b. the root volume type will be deleted an the EBS volume type will not be deleted.
True or False: You can use an AMI in N. Virginia Region us-east-1 to launch an EC2 instance in any AWS Region.
False