AWS CLI, SDK, IAM Roles & Policies Flashcards

Review key concepts from Section 12, including AWS CLI, SDK, IAM Roles, authentication methods, and best practices for accessing AWS services securely. Perfect for reinforcing knowledge on AWS CLI Profiles, EC2 Instance Metadata, Exponential Backoff, Signature v4, and more! 🚀

1
Q

How do you retrieve instance details from AWS EC2 Instance Metadata?

A

Use curl http://169.254.169.254/latest/meta-data/

This command fetches metadata for the instance, including instance ID, type, and security groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What command is used to manage multiple AWS accounts in AWS CLI?

A

aws configure --profile myprofile

This command allows users to set up different profiles for different AWS accounts, making account management easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you generate temporary credentials in AWS CLI with MFA?

A

aws sts get-session-token

This command is used to obtain temporary security credentials when Multi-Factor Authentication is enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are AWS SDKs used for?

A

Libraries for interacting with AWS services using languages like Python (Boto3), JavaScript, etc.

SDKs simplify the process of integrating AWS services into applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Exponential Backoff?

A

A retry strategy to handle throttling by increasing wait time after each failure.

This method helps reduce the load on services that are being throttled, improving overall reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the AWS Credentials Provider Chain check for authentication?

A

Environment variables, credentials file, and IAM roles.

This chain allows AWS SDKs and CLI to find the necessary credentials automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is AWS Signature v4?

A

A method for signing API requests to authenticate with AWS.

This process ensures that requests to AWS services are secure and verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can happen with Service Limit Increase in AWS?

A

Some AWS services have limits that can be increased upon request.

This allows users to scale their services beyond default limits when necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between IAM Roles and IAM Users?

A

IAM Roles are assumed by AWS services, while IAM Users are for people.

Roles allow AWS services to perform actions on behalf of the user without requiring long-term credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly