AWS Cloud Practiioner Flashcards

1
Q

Describe the role of Security Groups in AWS.

A

Security Groups are fundamental to network security in AWS, controlling inbound and outbound traffic to EC2 instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do Security Groups in AWS primarily consist of?

A

Security groups in AWS primarily consist of rules that dictate how traffic is allowed into or out of EC2 instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can Security Group rules in AWS be referenced?

A

Security Group rules in AWS can be referenced by IP or by another Security Group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Inbound traffic in the context of Security Groups in AWS.

A

Inbound traffic in Security Groups refers to traffic coming into the EC2 instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the significance of Outbound traffic in Security Groups in AWS.

A

Outbound traffic in Security Groups determines the traffic leaving the EC2 instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the role of security groups in EC2 instances.

A

Security groups as a ‘firewall’ on EC2 instances, regulating access to ports, authorized IP ranges (IPv4 and IPv6), inbound network control, and outbound network control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What aspects of network traffic do security groups regulate in AWS EC2 instances?

A

Security groups in AWS EC2 instances regulate access to ports, authorized IP ranges (IPv4 and IPv6), inbound network traffic (from other to the instance), and outbound network traffic (from the instance to other).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of Security Groups in AWS?

A

Security Groups in AWS act as virtual firewalls that control inbound and outbound traffic for EC2 instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the concept of Inbound and Outbound rules in Security Groups.

A

Inbound rules in Security Groups control the incoming traffic to an EC2 instance, while Outbound rules manage the outgoing traffic from the instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do Security Groups in AWS help in enhancing network security?

A

Security Groups in AWS help enhance network security by allowing users to define rules that filter traffic based on IP addresses and ports, thereby restricting unauthorized access to EC2 instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe Security Groups in AWS.

A

Security Groups in AWS can be attached to multiple instances, are locked down to a region/VPC combination, and control inbound and outbound traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a security group function in relation to EC2 instances?

A

A security group in AWS functions outside the EC2 instance; if traffic is blocked by the security group, the EC2 instance won’t receive it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the recommended practice regarding SSH access in security groups?

A

It is recommended to maintain a separate security group specifically for SSH access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What could be the issue if an application is not accessible and times out?

A

If an application is not accessible and times out, it could be due to a security group issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the default setting for inbound and outbound traffic in security groups?

A

All inbound traffic is blocked by default, while all outbound traffic is authorized by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the concept of referencing other security in AWS.

A

Referencing security groups in AWS involves allowing inbound traffic from instances associated with one security group to instances associated with another security group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define an EC2 Instance in AWS.

A

An EC2 Instance is a virtual server in the Amazon Elastic Compute Cloud (EC2) service that can run applications and host data on the AWS infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How can security groups be used to control inbound traffic in AWS?

A

Security groups in AWS can be used to control inbound traffic by specifying rules that allow or deny traffic based on protocols, ports, and source/destination IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Do security groups in AWS support cross-referencing each other?

A

Yes, security groups in AWS support cross-referencing each other, allowing instances associated with one security group to communicate with instances associated with another security group by authorizing the necessary inbound rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe the relationship between EC2 instances and security groups in AWS.

A

In AWS, EC2 instances can be associated with one or more security groups, which act as virtual firewalls to control inbound and outbound traffic to the instances based on defined rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe SSH and its typical use.

A

SSH stands for Secure Shell and is used to log into a Linux instance securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of FTP and how is it commonly used?

A

FTP, or File Transfer Protocol, is used to upload files into a file share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define SFTP and explain its relationship with SSH.

A

SFTP stands for Secure File Transfer Protocol and is used to upload files using SSH for added security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How is HTTP typically used and what does it allow users to do?

A

HTTP is used to access unsecured websites, allowing users to view web content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Explain the significance of HTTPS and its common application.

A

HTTPS is used to access secured websites, providing a secure connection for sensitive data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the purpose of SSH?

A

Securely connect to remote servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Describe the SSH Summary Table provided in the content.

A

It lists the SSH clients for different operating systems like Mac, Linux, Windows < 10, and Windows >= 10, along with2 Instance and Putty for connecting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How can SSH be used to connect to an EC2 Instance?

A

By using an SSH client like Putty on Windows or the built-in terminal on Mac and Linux to establish a secure connection to the EC2 Instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Describe the purpose of SSH in the context of EC2 instances.

A

SSH allows users to remotely control a machine using the command line, such as accessing and managing an EC2 instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How can you SSH into an EC2 instance from a Windows machine?

A

You can SSH into an EC2 instance from a Windows machine by configuring the necessary parameters using a tool like Putty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define the significance of Port 22 in the context of SSH and EC2 instances.

A

Port 22 is the default port used for SSH connections to EC2 instances, allowing secure communication between the local and remote machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the importance of a Public IP in SSH connections to EC2 instances?

A

A Public IP is essential for establishing a connection to an EC2 instance over the internet, enabling remote access via SSH.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

How does SSH facilitate remote machine control in the context of EC2 instances?

A

SSH enables users to securely access and manage their EC2 instances from a remote location, providing command-line control over the instance’s operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is EC2 Instance Connect?

A

A feature that allows users to connect to their EC2 instance within a browser without the need for the downloaded key file, as AWS uploads a temporary key onto the instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Describe how EC2 Instance Connect works.

A

EC2 Instance Connect enables users to connect to their EC2 instance through a browser by uploading a temporary key onto the instance, eliminating the need for the downloaded key file. It is compatible out-of-the-box with Amazon Linux 2, but users must ensure that port 22 is open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Describe On-Demand Instances in AWS EC2

A

On-Demand Instances are suitable for short workloads with predictable pricing, where users pay by the second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are Savings Plans in AWS EC2?

A

Savings Plans involve committing to a specific amount of usage for 1 or 3 years, ideal for long workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define Spot Instances in AWS EC2

A

Spot Instances are cost-effective but less reliable, suitable for short workloads where instances can be lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How do Reserved Instances differ from Convertible Reserved Instances in AWS EC2?

A

Reserved Instances are for long workloads, while Convertible Reserved Instances offer flexibility for changing instance types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Do Dedicated Hosts in AWS EC2 allow users to control instance placement?

A

Yes, Dedicated Hosts enable users to book an entire physical server and have control over where instances are placed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Describe EC2 On Demand pricing model.

A

Pay for what you use, with billing per second for Linux or Windows after the first minute, and billing per hour for all other operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the characteristics of EC2 On Demand instances in terms of cost and commitment?

A

Highest cost with no upfront payment and no long-term commitment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How is EC2 On Demand usage recommended to be utilized?

A

Recommended for short-term and uninterrupted workloads where the application behavior is unpredictable.

44
Q

Define the billing structure for Linux or Windows on EC2 On Demand instances.

A

Billing is per second after the first minute.

45
Q

What is the billing structure for all other operating systems on EC2 On Demand instances?

A

Billing is per hour for all other operating systems.

46
Q

Describe EC2 Reserved Instances.

A

EC2 Reserved Instances offer discounts of up to 72% compared to On-demand pricing. Users reserve specific instance attributes for a set period with various payment options.

47
Q

What is the Reservation Period for EC2 Reserved Instances?

A

The Reservation Period can be 1 year (+discount) or 3 years (+++discount).

48
Q

How do Convertible Reserved Instances differ from standard Reserved Instances?

A

Convertible Reserved Instances allow changing instance type, family, OS, scope, and tenancy, offering discounts of up to 66%.

49
Q

Define the scope options for Reserved Instances.

A

Reserved Instances can have a Regional scope or a Zonal scope, where the latter reserves capacity in a specific Availability Zone.

50
Q

What are some recommended use cases for EC2 Reserved Instances?

A

They are recommended for steady-state usage applications, such as databases, and can be bought and sold in the Reserved Instance Marketplace.

51
Q

Describe EC2 Savings Plans.

A

EC2 Savings Plans offer discounts based on long-term usage, requiring a commitment to a certain type of usage for 1 or 3 years.

52
Q

What does EC2 Savings Plans lock to a specific instance family and AWS region?

A

EC2 Savings Plans are locked to a specific instance family and AWS region, such as M5 in us-east-1.

53
Q

How does billing work for usage beyond EC2 Savings Plans?

A

Usage beyond EC2 Savings Plans is billed at the On-Demand price.

54
Q

Define tenancy options available with EC2 Savings Plans.

A

EC2 Savings Plans offer flexibility in tenancy options, including Host, Dedicated, and Default.

55
Q

What are the factors that EC2 Savings Plans are flexible across?

A

EC2 Savings Plans are flexible across instance size, operating system, and tenancy options.

56
Q

Describe EC2 Spot Instances in AWS.

A

EC2 Spot Instances in AWS offer a discount of up to 90% compared to On-demand. These instances can be terminated at any time if the current spot price exceeds your maximum price.

57
Q

What workloads are EC2 Spot Instances suitable for?

A

EC2 Spot Instances are suitable for workloads that are resilient to failure, batch jobs, data analysis, image processing, distributed workloads, and workloads with flexible start and end times.

58
Q

How cost-efficient are EC2 Spot Instances in AWS?

A

EC2 Spot Instances are considered the most cost-efficient instances in AWS, offering significant discounts compared to On-demand instances.

59
Q

Define the main drawback of EC2 Spot Instances.

A

The main drawback of EC2 Spot Instances is that they are not suitable for critical jobs or databases due to the possibility of termination at any time.

60
Q

Do EC2 Spot Instances require a specific workload type?

A

Yes, EC2 Spot Instances are best suited for workloads that can tolerate interruptions and are not critical in nature, such as batch jobs, data analysis, and image processing.

61
Q

Describe EC2 Dedicated Hosts.

A

EC2 Dedicated Hosts are physical with EC2 instance capacity fully dedicated to a user, allowing for compliance with regulations and utilization of existing server-bound software licenses.

62
Q

What are the purchasing options for EC2 Dedicated Hosts?

A

The purchasing options include On-demand (pay per second for active Dedicated Host) and Reserved (1 or 3 years with options like No Upfront, Partial Upfront, All Upfront).

63
Q

How can EC2 Dedicated Hosts be beneficial for companies?

A

EC2 Dedicated Hosts are useful for companies with complicated software licensing models (BYOL - Bring Your Own License) or strong regulatory and compliance needs.

64
Q

Define BYOL in the context of EC2 Dedicated Hosts.

A

BYOL stands for Bring Your Own License and refers to the practice of using existing software licenses on EC2 Dedicated Hosts.

65
Q

What are some key features of EC2 Dedicated Hosts?

A

EC2 Dedicated Hosts provide fully dedicated server capacity, compliance with regulations, utilization of existing software licenses, and purchasing options like On-demand and Reserved.

66
Q

Describe EC2 Dedicated Instances.

A

EC2 Dedicated Instances run on hardware that is exclusively dedicated to a single account, although this hardware may be shared with other instances within the same account.

67
Q

What is a key characteristic of EC2 Dedicated Instances regarding hardware placement?

A

Users have no control over the placement of their instances and the hardware may be moved after a Stop/Start operation.

68
Q

What is an EC2 Capacity Reservation?

A

Reserving On-Demand instances capacity in a specific Availability Zone for any duration.

69
Q

How does EC2 Capacity Reservation work in terms of billing?

A

You are charged at the On-Demand rate whether you run instances or not, with no billing discounts.

70
Q

Describe the flexibility of EC2 Capacity Reservations.

A

There is no time commitment, allowing you to create or cancel reservations anytime.

71
Q

What is the recommended use case for EC2 Capacity Reservations?

A

Suitable for short-term, uninterrupted workloads that need to be in a specific Availability Zone.

72
Q

How can EC2 Capacity Reservations be optimized for cost savings?

A

They can be combined with Regional Reserved Instances and Savings Plans to benefit from billing discounts.

73
Q

Describe the ‘On demand’ purchasing option for resort stays.

A

Customers can come and stay in the resort whenever they like, paying the full price each time.

74
Q

What is the concept behind ‘Spot instances’ in resort purchasing options?

A

Customers bid for empty rooms, with the highest bidder securing the room, but they can be asked to leave at any time.

75
Q

Define ‘Capacity Reservations’ in the context of resort stays.

A

It involves booking a room for a period at full price, even if the customer does not stay in it during that time.

76
Q

How does the ‘Savings Plans’ purchasing option work for resort stays?

A

Customers pay a certain amount per hour for a specific period and can stay in any room type available, such as King, Suite, or Sea View.

77
Q

Do you stay in a specific room type with the ‘Savings Plans’ purchasing option for resort stays?

A

No, customers can stay in any room type available, such as King, Suite, or Sea View.

78
Q

Describe the Shared Responsibility Model for EC2.

A

The Shared Responsibility Model for EC2 outlines the division of security responsibilities between AWS and the customer, specifying which security aspects are managed by each party.

79
Q

Define IAM Roles in the context of EC2.

A

IAM Roles in EC2 refer to the permissions and policies that can be assigned to an EC2 instance, allowing it to interact securely with other AWS services.

80
Q

How does the Shared Responsibility Model for EC2 address compliance validation?

A

The Shared Responsibility Model for EC2 includes compliance validation as a responsibility of the customer, emphasizing the need for customers to ensure their instances comply with relevant regulations and standards.

81
Q

Describe an EC2 Instance.

A

An EC2 Instance consists of an AMI (OS), Instance Size (CPU + RAM), Storage, security groups, and EC2 User Data.

82
Q

How does EC2 User Data function in AWS?

A

EC2 User Data allows for the execution of a script at the first start of an instance, enabling customization and automation.

83
Q

Define SSH in the context of AWS EC2.

A

SSH (Secure Shell) is used to start a terminal into EC2 Instances, typically on port 22 for secure remote access.

84
Q

Explain the concept of EC2 Instance Role in AWS.

A

An EC2 Instance Role in AWS is a link to IAM roles, providing permissions and access to AWS resources for the instance.

85
Q

Describe an EBS Volume.

A

An EBS (Elastic Block Store) Volume is a network drive that can be attached to instances while they are running, allowing them to persist data even after termination.

86
Q

What is the limitation regarding the attachment of EBS Volumes to instances?

A

EBS Volumes can only be mounted to one instance at a time at the CCP level.

87
Q

Define the concept of EBS Volumes being bound to a specific availability zone.

A

EBS Volumes are associated with and limited to a particular availability zone within a region.

88
Q

How can EBS Volumes be analogously compared to for better understanding?

A

EBS Volumes can be thought of as a ‘network USB stick’ in terms of their functionality.

89
Q

Do EBS Volumes offer any free storage options? If so, what are they?

A

Yes, EBS Volumes provide a free tier offering 30 GB of General Purpose (SSD) or Magnetic storage per month.

90
Q

Describe an EBS Volume in AWS.

A

An EBS Volume is a network drive in AWS that can be detached from one EC2 instance and attached to another quickly, but is locked to a specific Availability Zone.

91
Q

How can you move an EBS Volume across Availability in AWS?

A

To move an EBS Volume across Availability Zones, you first need to snapshot it.

92
Q

Define provisioned capacity in relation to EBS Volumes in AWS.

A

Provisioned capacity for EBS Volumes refers to the size in GBs and IOPS allocated to the volume, for which you will be billed.

93
Q

What is the billing model for provisioned capacity of EBS Volumes in AWS?

A

You get billed for all the provisioned capacity of an EBS Volume.

94
Q

How can you increase the capacity of an EBS Volume over time in AWS?

A

You can increase the capacity of an EBS Volume gradually as needed.

95
Q

What is the content indicating?

A

The content is a disclaimer that it is not for distribution and providing contact information.

96
Q

Describe the components mentioned in the content.

A

The content mentions EBS Volumes of various sizes (10 GB, 100 GB, 50 GB) in a specific AWS region and availability zone, labeled as unattached.

97
Q

Define the term ‘EBS Volume’ based on the content.

A

An EBS Volume refers to a block storage device in AWS that can be attached to EC2 instances for persistent storage.

98
Q

What does the EBS - Delete on Termination attribute control?

A

Controls the EBS behavior when an EC2 instance terminates.

99
Q

How does the EBS - Delete on Termination attribute handle the root EBS volume by default?

A

By default, the root EBS volume is deleted when the attribute is enabled.

100
Q

Describe the default behavior of attached EBS volumes with the EBS - Delete on Termination attribute.

A

By default, any other attached EBS volume is not deleted when the attribute is disabled.

101
Q

How can the EBS - Delete on Termination attribute be controlled?

A

It can be controlled through the AWS console or AWS CLI.

102
Q

Provide a use case for preserving the root volume when an instance is terminated using the EBS - Delete on Termination attribute.

A

The use case is to preserve the root volume when an instance is terminated.

103
Q

What is an EBS Snapshot used for?

A

To make a backup of an EBS volume at a specific point in time.

104
Q

Describe the process of creating an EBS Snapshot.

A

It involves capturing the state of an EBS volume without the need to detach it, although it is recommended to do so before taking the snapshot.

105
Q

Define the flexibility of EBS Snapshots in terms of copying them.

A

EBS Snapshots can be copied across Availability Zones (AZ) or Regions for redundancy and disaster recovery purposes.