AWS Cloud Technical Essentials Flashcards

1
Q

It is the on-demand delivery of IT resources over the internet with pay-as-you-go pricing. Instead of buying, owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage, and databases, on an as-needed basis from a cloud provider.

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 benefits of Cloud Computing?

A
  1. Pay as you go (Elasticity)
  2. Benefit from massive economies of scale (Cost Savings)
  3. Stop guessing capacity (Elasticity)
  4. Increase speed and agility (Agility)
  5. Stop sending money running and maintaining data centers (Cost Savings)
  6. Go global in minutes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the types of Cloud Computing?

A
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It contains the basic building blocks for cloud IT. It typically provides access to networking features, computers (virtual or on dedicated hardware), and data storage space. IaaS gives you the highest level of flexibility and management control over your IT resources. It is most similar to the existing IT resources with which many IT departments and developers are familiar.

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It removes the need for you to manage underlying infrastructure (usually hardware and operating systems), and allows you to focus on the deployment and management of your applications. This helps you be more efficient as you don’t need to worry about resource procurement, capacity planning, software maintenance, patching, or any of the other undifferentiated heavy lifting involved in running your application.

A

PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It provides you with a complete product that is run and managed by the service provider. In most cases, people referring to SaaS are referring to end-user applications (such as web-based email). With a SaaS offering, you don’t have to think about how the service is maintained or how the underlying infrastructure is managed. You only need to think about how you will use that particular software.

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the types of Cloud Computing?

A
  1. Cloud
  2. Hybrid
  3. On-premises
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are clusters of Data Centers?

A

Availability Zone or AZ

An AZ consists of one or more data centers with redundant power, networking, and connectivity. These data centers operate in discrete facilities with undisclosed locations. They are connected using redundant high-speed and low-latency links.

If you see that a resource exists in us-east-1c, you know this resource is located in AZ c of the us-east-1 Region.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are clusters of AZs called?

A

Region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the four aspects of choosing a Region?

A
  1. Compliance - Enterprise companies often need to comply with regulations that require customer data to be stored in a specific geographic territory.
  2. Latency - IT resources have to be close to your user base
  3. Price - Prices may vary per region due to local economy and physical nature of operating data centers
  4. Service Availability - Not all services are available in every region
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It consists of Edge locations and regional Edge caches. These are used to cache content closer to end users, thus reducing latency.

A

Global Edge Network

You can use services like Amazon CloudFront to cache content using the Edge locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These are geographic locations worldwide where AWS hosts its data centers. AWS Regions are named after the location where they reside.

A

Regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where is the AWS Cloud Infrastructure built around?

A

AWS Regions and Availability Zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It is the URL of the entry point for an AWS web service.

A

AWS Service Endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of AWS Service Endpoints?

A
  1. Regional
  2. Global
  3. Federal Information Processing Standard (FIPS) - FIPS endpoints use a TLS software library that complies with FIPS 140-2. These endpoints might be required by enterprises that interact with the United States government. With FIPS endpoints, the minimum requirement is TLS 1.2. Recommended is TLS 1.3.
  4. Dual Stack - These endpoints can be accessed using either IPv4 or IPv6 requests.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does API stand for?

A

Application Program Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How to make API calls in AWS or how do you connect to AWS?

A
  1. AWS Management Console - This is a web-based method that you log into from your browser.
  2. AWS Command Line Interface (CLI)
  3. AWS Software Development Kits (SDK)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who is responsible for the security in AWS Cloud?

A

This is a shared responsibility between AWS and the customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What part of the Shared Responsibility Model is AWS responsible for?

A

AWS is responsible for security of the cloud. This means AWS is required to protect and secure the infrastructure that runs all the services offered in the AWS Cloud. AWS is responsible for:

  • Protecting and securing AWS Regions, Availability Zones, and data centers, down to the physical security of the buildings
  • Managing the hardware, software, and networking components that run AWS services, such as the physical server, host operating systems, virtualization layers, and AWS networking components
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Provide the 3 categories of AWS Services.

A
  1. Infrastructure Services - Compute services, such as Amazon Elastic Compute Cloud (Amazon EC2
  2. Container Services - Services that require less management from the customer, such as Amazon Relational Database Service (Amazon RDS). Container services refer to AWS abstracting application containers behind the scenes, not Docker container services. This enables AWS to move the responsibility of managing that platform away from customers.
  3. Abstracted Services - Services that require very little management from the customer, such as Amazon Simple Storage Service (Amazon S3)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What part of the Shared Responsibility Model is the customer responsible for?

A

You’re responsible for security in the cloud. When using any AWS service, you’re responsible for properly configuring the service and your applications, as well as ensuring your data is secure.The level of responsibility you have depends on the AWS service. Some services require you to perform all the necessary security configuration and management tasks, while other more abstracted services require you to only manage the data and control access to your resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Who is responsible for Hardware or AWS Global Infrastructure?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Who is responsible for Regions, AZs, and Edge Locations?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Who is responsible for the infrastructure in various software components that run AWS services?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Who is responsible for compute databases, storage, and networking?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Who is responsible for securing services from the host operating system up through the virtualization layer?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Who manages the physical host the VM is placed on as well as everything through the hypervisor level?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Who is responsible for patching the host operating system and the hypervisor?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Who is responsible for the underlying hardware up through the virtualization layer?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Who is responsible for the security in the Cloud?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Who is responsible for patching the operating systems of the customers’ VMs?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Who is responsible for the security of the base layer in the Cloud?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Who is responsible for encrypting the data in transit and at rest?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Who is responsible for configuring firewalls in the Cloud?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Who is responsible for defining user access?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Who owns the customer’s data in AWS?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Does the Shared Responsibility Model vary from service to service?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Who is responsible for Platform, applications, identity and access management?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Who is responsible for the security of the Cloud?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Who is responsible for protecting and securing AWS Regions, Availability Zones, and data centers, down to the physical security of the buildings?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Who is responsible for managing the hardware, software, and networking components that run AWS services, such as the physical server, host operating systems, virtualization layers, and AWS networking components

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Who is responsible for managing the underlying infrastructure and foundation services?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Who is responsible for managing the underlying infrastructure and foundation services, operating system, and application platform?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Who is responsible for operating the infrastructure layer, operating system, and platforms, as well as server-side encryption and data protection?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Who is responsible for controlling the operating system and application platform, as well as encrypting, protecting, and managing customer data?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Who is responsible for customer data, encrypting that data, and protecting it through network firewalls and backups?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Who is responsible for managing customer data and protecting it through client-side encryption?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Who is responsible for choosing a Region for AWS resources in accordance with data sovereignty regulations?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Who is responsible for implementing data protection mechanisms, such as encryption and managing backups?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Who is responsible for using access control to limit who has access to your data and AWS resources?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Who is responsible for patching and fixing flaws within the infrastructure?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Who is responsible for patching their guest OS and applications?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Who is responsible for maintaining the configuration of its infrastructure devices?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Who is responsible for configuring the guest operating systems, databases, and applications?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What are the things to remember when creating a root user account?

A
  1. Use Multi-factor Authentication (MFA)
  2. Do not use the root user for everyday tasks, even the administrative ones.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is the process of giving users permission to access AWS resources and services?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the process of verifying the user’s identity?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is a single sign-in identity that has complete access to all AWS services and resources in the account?

A

AWS Root User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are the two sets of credentials associated with an AWS Root User?

A
  1. Email address and Password
  2. Access keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What are the two parts of an Access Key?

A
  1. Access Key ID
  2. Secret Access Key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What do you need to authenticate your requests via AWS CLI or AWS API?

A
  1. Access Key ID
  2. Secret Access Key
62
Q

Who has complete access to all AWS services and resources in your account, as well as your billing and personal information?

A

AWS Root User

63
Q

How do you ensure the safety of the AWS Root User?

A
  1. Choose a strong password for the root user.
  2. Never share your root user password or access keys with anyone.
  3. Disable or delete the access keys associated with the root user.
  4. Do not use the root user for administrative tasks or everyday tasks.
64
Q

How do you delete the access key of your AWS Root User?

A
  1. Go to the My Security Credentials page in the AWS Management Console and sign-in with the root user’s email address and password.
  2. Open the Access Keys section.
  3. Under Actions, click Delete.
  4. Click Yes.
65
Q

What is the simplest and most common form of authentication?

A

Single-factor Authentication

66
Q

What are the forms of Single-factor Authentication?

A
  1. Username and Password
  2. Security PIN
  3. Security token
67
Q

What form of authentication requires two or more authentication methods to verify an identity?

A

Multi-factor Authentication

68
Q

What are the different categories of information for an MFA?

A
  1. Something you know, such as a username and password, or PIN
  2. Something you have, such as a one-time passcode from a hardware device or mobile app
  3. Something you are, such as fingerprint or face scanning technology
69
Q

What are the different MFA mechanisms?

A
  1. Virtual MFA devices
  2. Hardware devices
  3. Universal 2nd Factor (U2F) devices
70
Q

Which Virtual MFA devices are supported by AWS?

A
  1. Authy
  2. Duo Mobile
  3. LastPass Authenticator
  4. Microsoft Authenticator
  5. Google Authenticator
71
Q

Which Hardware devices are supported by AWS?

A
  1. Key Fob
  2. Display Card
72
Q

Which U2F device is supported by AWS?

A
  1. YubiKey
73
Q

What is a Virtual MFA device?

A

A software app that runs on a phone or other device that provides a one-time passcode

74
Q

What is an MFA Hardware device?

A

A hardware device, generally a key fob or display card device that generates a one-time six-digit numeric code.

75
Q

What is an MFA U2F device?

A

A hardware device that you plug into a USB port on your computer.

76
Q

In IAM, what is a Group?

A

It refers to a collection of IAM users.

77
Q

Can you assign a policy to a Root User?

A

No

78
Q

Can you assign a policy to an Admin User?

A

Yes

79
Q

It is a web service that enables you to manage access to your AWS account and resources.

A

IAM

80
Q

What does IAM stand for?

A

Identity and Access Management

81
Q

What provides a centralized view of who and what are allowed inside your AWS account (authentication), and who and what have permissions to use and work with your AWS resources (authorization)?

A

IAM

82
Q

Is IAM global and not specific to any one Region?

A

Yes. You can see and use your IAM configurations from any Region in the AWS Management Console.

83
Q

How much does it cost to use an IAM service?

A

The service is offered at no additional charge.

84
Q

What represents a person or service that interacts with AWS?

A

IAM User

85
Q

Can an IAM Group have many IAM Users?

A

Yes

86
Q

Can an IAM Group belong to other IAM Groups?

A

No

87
Q

Can an IAM User belong to many IAM Groups?

A

Yes

88
Q

How do you grant permissions in IAM?

A

By using IAM Policies

89
Q

Can you attach an IAM Policy to an IAM User?

A

Yes

90
Q

Can you attach an IAM Policy to an IAM Group?

A

Yes

91
Q

Can you attach an IAM Policy to an IAM Role?

A

Yes

92
Q

What are the four major JSON elements in an IAM Policy?

A
  1. Version
  2. Effect
  3. Action
  4. Resource
93
Q

What defines the version of the policy language?

A

The Version element in an IAM Policy.

94
Q

Which JSON element in an IAM Policy specifies the language syntax rules that are needed by AWS to process a policy?

A

Version

95
Q

How do you use all the available policy features in an IAM Policy?

A

Include “Version”: “2012-10-17” before the “Statement” element in all your policies.

96
Q

Which JSON element in an IAM Policy specifies whether the statement will allow or deny access?

A

Effect

97
Q

What are the valid values for the Effect element in an IAM Policy?

A
  1. Allow
  2. Deny
98
Q

Which JSON element in an IAM Policy describes the type of action that should be allowed or denied?

A

Action

99
Q

What does the “*” mean in the Action element of an IAM Policy?

A

“*” is called a wildcard, and it is used to symbolize every action inside your AWS account.

100
Q

Which JSON element in an IAM Policy specifies the object or objects that the policy statement covers?

A

Resource

101
Q

What does the “*” mean in the Resource element of an IAM Policy?

A

“*” is called a wildcard. This represents .all resources inside your AWS console

102
Q

Which JSON element in an IAM Policy specifies whether the statement results in an allow or an explicit deny?

A

Effect

103
Q

Which JSON element in an IAM Policy describes the specific actions that will be allowed or denied?

A

Action

104
Q

Which JSON element in an IAM Policy specifies the object or objects that the statement covers?

A

Resource

105
Q

What is the difference between an IAM User and an IAM Role?

A

IAM users have usernames and passwords as well as static credentials whereas IAM roles do not have any login credentials like a username and password and the credentials used to sign requests are programmatically acquired, temporary in nature, and automatically rotated.

106
Q

What is a standard security principle that advises you to grant only the necessary permissions to do a particular job and nothing more?

A

Principle of Least Privilege

107
Q

Is IAM used to secure access to your AWS account and resources?

A

Yes

108
Q

Is IAM used for website authentication and authorization, such as providing users of a website with sign-in and sign-up functionality?

A

No

109
Q

Does iAM support security controls for protecting operating systems and networks?

A

No

110
Q

What does IdP stand for?

A

Identity Provider

111
Q

What provides you a single source of truth for all identities in your organization?

A

Identity Provider or IdP

112
Q

What is AWS’ Single Sign-On service called?

A

AWS IAM Identity Center

113
Q

What is an AWS IAM Identity Center?

A

It lets your users sign in to a user portal with a single set of credentials.

114
Q

What does ARN stand for?

A

Amazon Resource Name

115
Q

What do you need to define to allow your users to make programmatic calls to AWS using things like the AWS command line and AWS software development kits?

A

Access Keys

116
Q

Which compute service that allows you to host virtual machines?

A

EC2

117
Q

What does AMI stand for?

A

Amazon Machine Image

118
Q

True or False: Every action a user takes in AWS is an API call

A

True

119
Q

What are the four main factors that a solutions architect should consider when they must choose a Region?

A

Latency, price, service availability, and compliance

120
Q

What provides temporary credentials (that expire after a defined period of time) to AWS services?

A

IAM Role

121
Q

It consists of one or more data centers with redundant power, networking, and connectivity. These data centers operate in discrete facilities with undisclosed locations. They are connected using redundant high-speed and low-latency links.

A

Availability Zone (AZ)

122
Q

Name the list of AWS compute services.

A
  1. AWS App Runner
  2. Batch
  3. EC2
  4. EC2 Image Builder
  5. Elastic Beanstalk
  6. Lambda
  7. Lightsail
  8. AWS Outposts
  9. Serverless Application Repository
123
Q

What are the categories of AWS compute services?

A
  1. Instances (virtual machines)
  2. Containers
  3. Serverless
  4. Edge and hybrid
  5. Cost and capacity management
124
Q

What are the AWS services under Instances (virtual machines)?

A
  1. Amazon Elastic Compute Cloud (EC2)
  2. Amazon EC2 Spot Instances
  3. Amazon EC2 Auto Scaling
  4. Amazon Lightsail
  5. AWS Batch
125
Q

What are the AWS services under Containers?

A
  1. Amazon Elastic Container Service (ECS)
  2. Amazon ECS Anywhere
  3. Amazon Elastic Container Registry (ECR)
  4. Amazon Elastic Kubernetes Service (EKS)
  5. Amazon EKS Anywhere
  6. AWS Fargate
  7. AWS App Runner
126
Q

What are the AWS services under Serverless?

A

AWS Lambda

127
Q

What are the AWS services under Edge and Hybrid?

A
  1. AWS Outposts
  2. AWS Snow Family
  3. AWS Wavelength
  4. VMWare Cloud on AWS
  5. AWS Local Zones
128
Q

What are the AWS services under Cost and Capacity Management?

A
  1. AWS Savings Plan
  2. AWS Compute Optimizer
  3. AWS Elastic Beanstalk
  4. EC2 Image Builder
  5. Elastic Load Balancing (ElB)
129
Q

It is a secure and resizeable compute capacity (virtual servers) in the cloud.

A

Amazon Elastic Compute Cloud (EC2)

130
Q

It is used to run fault-tolerant workloads for up to 90% off.

A

Amazon EC2 Spot Instances

131
Q

It is used to automatically add or remove compute capacity to meet changes in demand.

A

Amazon EC2 Auto Scaling

132
Q

It is an easy-to-use cloud platform that offers you everything you need to build an application or website.

A

Amazon Lightsail

133
Q

It is a fully managed batch processing at any scale.

A

AWS Batch

134
Q

It is a highly secure, reliable, and scalable way to run containers.

A

Amazon Elastic Container Service (ECS)

135
Q

It is used to run containers on customer managed infrastructure.

A

Amazon ECS Anywhere

136
Q

It is used to easily store, manage, and deploy container images.

A

Amazon Elastic Container Registry

137
Q

It is a fully managed Kubernetes service.

A

Amazon Elastic Kubernetes Service (Amazon EKS)

138
Q

It is used to create and operate Kubernetes clusters on your own infrastructure.

A

Amazon EKS Anywhere

139
Q

It is a serverless compute for containers.

A

AWS Fargate

140
Q

It is used to build and run containerized applications on a fully managed service.

A

AWS App Runner

141
Q

It is used to run code without thinking about servers. Pay only for the compute time you consume.

A

AWS Lambda

142
Q

It is used to run AWS infrastructure and services on premises for a truly consistent hybrid experience.

A

AWS Outposts

143
Q

It is used to collect and process data in rugged or disconnected edge environments.

A

AWS Snow Family

144
Q

It is used to deliver ultra-low latency application for 5G devices.

A

AWS Wavelength

145
Q

It is the preferred service for all vSphere workloads to rapidly extend and migrate to the cloud

A

VMWare Cloud on AWS

146
Q

It is used to run latency sensitive applications closer to end-users.

A

AWS Local Zones

147
Q

It is a flexible pricing model that provides savings of up to 72% on AWS compute usage.

A

AWS Savings Plan

148
Q

It recommends optimal AWS compute resources for your workloads to reduce costs and improve performance.

A

AWS Compute Optimizer

149
Q

It is an easy-to-use service for deploying and scaling web applications and services.

A

AWS Elastic Beanstalk

150
Q

It is used to build and maintain secure Linux or Windows Server images.

A

EC2 Image Builder

151
Q

It is used to automatically distribute incoming application traffic across multiple targets.

A

Elastic Load Balancing

152
Q

It is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale computing easier for developers.

A

Amazon Elastic Compute Cloud (EC2)