AWS Cloud Practiioner Flashcards
Describe the role of Security Groups in AWS.
Security Groups are fundamental to network security in AWS, controlling inbound and outbound traffic to EC2 instances.
What do Security Groups in AWS primarily consist of?
Security groups in AWS primarily consist of rules that dictate how traffic is allowed into or out of EC2 instances.
How can Security Group rules in AWS be referenced?
Security Group rules in AWS can be referenced by IP or by another Security Group.
Define Inbound traffic in the context of Security Groups in AWS.
Inbound traffic in Security Groups refers to traffic coming into the EC2 instance.
Explain the significance of Outbound traffic in Security Groups in AWS.
Outbound traffic in Security Groups determines the traffic leaving the EC2 instance.
Describe the role of security groups in EC2 instances.
Security groups as a ‘firewall’ on EC2 instances, regulating access to ports, authorized IP ranges (IPv4 and IPv6), inbound network control, and outbound network control.
What aspects of network traffic do security groups regulate in AWS EC2 instances?
Security groups in AWS EC2 instances regulate access to ports, authorized IP ranges (IPv4 and IPv6), inbound network traffic (from other to the instance), and outbound network traffic (from the instance to other).
What is the purpose of Security Groups in AWS?
Security Groups in AWS act as virtual firewalls that control inbound and outbound traffic for EC2 instances.
Describe the concept of Inbound and Outbound rules in Security Groups.
Inbound rules in Security Groups control the incoming traffic to an EC2 instance, while Outbound rules manage the outgoing traffic from the instance.
How do Security Groups in AWS help in enhancing network security?
Security Groups in AWS help enhance network security by allowing users to define rules that filter traffic based on IP addresses and ports, thereby restricting unauthorized access to EC2 instances.
Describe Security Groups in AWS.
Security Groups in AWS can be attached to multiple instances, are locked down to a region/VPC combination, and control inbound and outbound traffic.
How does a security group function in relation to EC2 instances?
A security group in AWS functions outside the EC2 instance; if traffic is blocked by the security group, the EC2 instance won’t receive it.
What is the recommended practice regarding SSH access in security groups?
It is recommended to maintain a separate security group specifically for SSH access.
What could be the issue if an application is not accessible and times out?
If an application is not accessible and times out, it could be due to a security group issue.
What is the default setting for inbound and outbound traffic in security groups?
All inbound traffic is blocked by default, while all outbound traffic is authorized by default.
Describe the concept of referencing other security in AWS.
Referencing security groups in AWS involves allowing inbound traffic from instances associated with one security group to instances associated with another security group.
Define an EC2 Instance in AWS.
An EC2 Instance is a virtual server in the Amazon Elastic Compute Cloud (EC2) service that can run applications and host data on the AWS infrastructure.
How can security groups be used to control inbound traffic in AWS?
Security groups in AWS can be used to control inbound traffic by specifying rules that allow or deny traffic based on protocols, ports, and source/destination IP addresses.
Do security groups in AWS support cross-referencing each other?
Yes, security groups in AWS support cross-referencing each other, allowing instances associated with one security group to communicate with instances associated with another security group by authorizing the necessary inbound rules.
Describe the relationship between EC2 instances and security groups in AWS.
In AWS, EC2 instances can be associated with one or more security groups, which act as virtual firewalls to control inbound and outbound traffic to the instances based on defined rules.
Describe SSH and its typical use.
SSH stands for Secure Shell and is used to log into a Linux instance securely.
What is the purpose of FTP and how is it commonly used?
FTP, or File Transfer Protocol, is used to upload files into a file share.
Define SFTP and explain its relationship with SSH.
SFTP stands for Secure File Transfer Protocol and is used to upload files using SSH for added security.
How is HTTP typically used and what does it allow users to do?
HTTP is used to access unsecured websites, allowing users to view web content.
Explain the significance of HTTPS and its common application.
HTTPS is used to access secured websites, providing a secure connection for sensitive data transmission.
What is the purpose of SSH?
Securely connect to remote servers.
Describe the SSH Summary Table provided in the content.
It lists the SSH clients for different operating systems like Mac, Linux, Windows < 10, and Windows >= 10, along with2 Instance and Putty for connecting.
How can SSH be used to connect to an EC2 Instance?
By using an SSH client like Putty on Windows or the built-in terminal on Mac and Linux to establish a secure connection to the EC2 Instance.
Describe the purpose of SSH in the context of EC2 instances.
SSH allows users to remotely control a machine using the command line, such as accessing and managing an EC2 instance.
How can you SSH into an EC2 instance from a Windows machine?
You can SSH into an EC2 instance from a Windows machine by configuring the necessary parameters using a tool like Putty.
Define the significance of Port 22 in the context of SSH and EC2 instances.
Port 22 is the default port used for SSH connections to EC2 instances, allowing secure communication between the local and remote machines.
What is the importance of a Public IP in SSH connections to EC2 instances?
A Public IP is essential for establishing a connection to an EC2 instance over the internet, enabling remote access via SSH.
How does SSH facilitate remote machine control in the context of EC2 instances?
SSH enables users to securely access and manage their EC2 instances from a remote location, providing command-line control over the instance’s operations.
What is EC2 Instance Connect?
A feature that allows users to connect to their EC2 instance within a browser without the need for the downloaded key file, as AWS uploads a temporary key onto the instance.
Describe how EC2 Instance Connect works.
EC2 Instance Connect enables users to connect to their EC2 instance through a browser by uploading a temporary key onto the instance, eliminating the need for the downloaded key file. It is compatible out-of-the-box with Amazon Linux 2, but users must ensure that port 22 is open.
Describe On-Demand Instances in AWS EC2
On-Demand Instances are suitable for short workloads with predictable pricing, where users pay by the second.
What are Savings Plans in AWS EC2?
Savings Plans involve committing to a specific amount of usage for 1 or 3 years, ideal for long workloads.
Define Spot Instances in AWS EC2
Spot Instances are cost-effective but less reliable, suitable for short workloads where instances can be lost.
How do Reserved Instances differ from Convertible Reserved Instances in AWS EC2?
Reserved Instances are for long workloads, while Convertible Reserved Instances offer flexibility for changing instance types.
Do Dedicated Hosts in AWS EC2 allow users to control instance placement?
Yes, Dedicated Hosts enable users to book an entire physical server and have control over where instances are placed.
Describe EC2 On Demand pricing model.
Pay for what you use, with billing per second for Linux or Windows after the first minute, and billing per hour for all other operating systems.
What are the characteristics of EC2 On Demand instances in terms of cost and commitment?
Highest cost with no upfront payment and no long-term commitment.