AWS DEV-A Practice Exam 6 (training mode) Flashcards

1
Q

Envelope encryption is the practice of encrypting __________ data with a data key, and then __________ the data key under another key.

A

Envelope encryption is the practice of encrypting plaintext data with a data key, and then encrypting the data key under another key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

With envelope encryption, one key must ____ ____ ________ so you can decrypt the keys and your data.

A

With envelope encryption, one key must remain in plaintext so you can decrypt the keys and your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Amazon Cognito Sync ________ user profile data across ________ devices and the ____ without requiring your backend.

A

Amazon Cognito Sync synchronizes user profile data across mobile devices and the web without requiring your backend.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The AWS Serverless Application Model (SAM) provides ______ syntax to express functions, APIs, ________, and _____ ______ mappings.

A

The AWS Serverless Application Model (SAM) provides shorthand to express functions, APIs, databases and event source mappings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

During deployment, SAM transforms and expands the ____ syntax into AWS ____________ syntax, enabling you to build serverless applications faster.

A

During deployment, SAM transforms and expands the SAM syntax into AWS CloudFormation syntax, enabling you to build serverless applications faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Amazon Kinesis Data Firehose is the easiest way to reliably ____ streaming data into data lakes, data ________ and ________ tools

A

Amazon Kinesis Data Firehose is the easiest way to reliably load streaming data into data lakes, data stores and analytics tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Amazon Kinesis Data Firehose can ________, ________, and ____ streaming data into S3, Redshift, ________________, and ________.

A

Amazon Kinesis Data Firehose can capture, transform, and load streaming data into S3, Redshift, Elasticsearch, and Splunk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Amazon Kinesis Firehose can enables near real-time ________ with existing business intelligence ________ and ________ .

A

Amazon Kinesis FIrehouse can enables near real-time analytics with existing business intelligence tools and dashboards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

With an Application Load Balancer it is possible to route requests based on the _____ _____ specified in the Host header

A

With an Application Load Balancer it is possible to route requests based on the domain name specified in the Host header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AWS Step Functions is based on the concepts of ____ and state _________.

A

AWS Step Functions is based on the concepts of tasks and state machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AWS Step Functions

You define state machines using the JSON-based Amazon ________ Language.

A

You define state machines using the JSON-based Amazon States Language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AWS ________ makes it easy for developers to analyze the behavior of their production, distributed applications with end-to-end tracing capabilities

A

AWS X-Ray makes it easy for developers to analyze the behavior of their production, distributed applications with end-to-end tracing capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AWS X-Ray

Use ________ to record data you want to store in the trace but don’t need to use for searching traces.

A

Use metadata to record data you want to store in the trace but don’t need to use for searching traces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AWS X-Ray

Annotations are simple key-value pairs that are indexed for use with ____ ______.

A

Annotations are simple key-value pairs that are indexed for use with filter expressions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The memberOf task placement constraint places tasks on container instances that ________ an expression.

A

The member Of task placement constraint places tasks on container instances that satisfy an expression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A task placement ______ is a rule that is considered during task placement. Task placement constraints can be specified when either running a task or creating a new service.

A

A constraint is a rule that is considered during task placement. Task placement constraints can be specified when either running a task or creating a new service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ________________ is a collection of build commands and related settings, in ____ format, that CodeBuild uses to run a build your application

A

A buildspec.yml is a collection of build commands and related settings, in YAML format, that CodeBuild uses to run a build using AWS CodeBuild.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You can apply task placement strategies and constraints to customize how Amazon ECS ________ and ________ tasks.

A

You can apply task placement strategies and constraints to customize how Amazon ECS places and terminates tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In IAM roles, use the ________ element in the role trust policy to specify who can assume the role.

A

In IAM roles, use the Principal element in the role trust policy to specify who can assume the role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Amazon ____ ____ ________ requires consumers running on EC2 instances or AWS Lambda for processing the data from the stream.

A

Amazon Kinesis Data Streams requires consumers running on EC2 instances or AWS Lambda for processing the data from the stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

To encrypt ________ quantities of data with the AWS Key Management Service (KMS), you must use a ____ encryption key rather than a ________ master keys

A

To encrypt large quantities of data with the AWS Key Management Service (KMS), you must use a data encryption key rather than a ; customer master keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IAM JSON policy required elements

A

Version
Statement
Effect
Principal: You must use the Principal element in resource-based policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The ____ policy element is mandatory and tells AWS whether this policy will explicitly Allow or Deny access to the particular resources declared in the statement.

A

The Effect policy element is mandatory and tells AWS whether this policy will explicitly Allow or Deny access to the particular resources declared in the statement.

{

“Version”: “2012-10-17”,

“Statement”:[

{
“Effect”: “Allow”,
}
]
}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IAM JSON policy elements:

The ____ element describes the specific actions that will be allowed or denied. Statements must include either an ____ or ________ element.

A

The Action element describes the specific action or actions that will be allowed or denied. Statements must include either an Action or NotAction element.

{

“Version”: “2012-10-17”,

“Statement”:[

{

“Effect”: “Allow”,

“Action”: “ec2:StartInstances”,
}
]
}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CodeDeploy

The AppSpec.yml file specifies the ____ ____ definition used for the deployment,

A

The AppSpec.yml file specifies the ECS task definition used for the deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CodeDeploy provides two deployment type options: __ ______ and ___/____.

A

CodeDeploy provides two deployment type options: in-place and blue/green

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In-place deployment:

The application on each instance in the deployment group is ________ , the latest application revision is ________, and the new version of the application is started and ________.

A

The application on each instance in the deployment group is stopped, the latest application revision is installed, and the new version of the application is started and validated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Whats the only situation that will allow you to usein-place deployments?

A

EC2/On-Premises compute platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The name of the AppSpec file for an EC2/On-Premises deployment must be ________. The name of the AppSpec file for an Amazon ECS or AWS Lambda deployment must be ________ or ________.

A

The name of the AppSpec file for an EC2/On-Premises deployment must be appspec.yml. The name of the AppSpec file for an Amazon ECS or AWS Lambda deployment can be appspec.yaml or appspec.yml.

30
Q

For Amazon ECS and AWS Lambda there are three ways traffic can be shifted during a deployment:
Canary, Linear, All-At-Once

A

Canary: Traffic is shifted in two increments. You choose the 1st increment & the interval, in minutes, before the remaining traffic is shifted

Linear: Traffic is shifted in equal increments with an equal number of minutes between each increment.

All-at-once: All traffic is shifted from the original Amazon ECS task set / Lambda function to the updated ECS task set / Lambda function at once

31
Q

EC2 Instance Blue/Green Deployment

During the blue/green deployment, CodeDeploy uses ___ ____ group you specify as a template for the replacement environment, including the same number of running ________ and many other ________ options.

A

During the blue/green deployment, CodeDeploy uses EC2 ASG you specify as a template for the replacement environment, including the same number of running instances and many other configuration options.

32
Q

EC2 Instance Blue/Green Deployment

You can Choose to deploy instances manually:

You can EC2 instance ____, ___ _______, or both.
If you choose this option, you do not need to specify the instances for the replacement environment until you create a deployment.

A

You can EC2 instance tags, ASG Names, or both.
If you choose this option, you do not need to specify the instances for the replacement environment until you create a deployment.

33
Q

A Lambda authorizer is an API Gateway feature that uses a Lambda function to _________ _________ to your API.

A

A Lambda authorizer is an API Gateway feature that uses a Lambda function to control access to your API.

There are two types of Lambda authorizers: A token-based request or request parameter-based

34
Q

Lambda authorizer

When a client makes a request to one of your API’s methods, API Gateway calls your Lambda authorizer, which takes the caller’s ________ as input and returns an ___ ________ as output.

A

When a client makes a request to one of your API’s methods, API Gateway calls your Lambda authorizer, which takes the caller’s identity as input and returns an IAM policy as output.

35
Q

A request parameter-based Lambda authorizer receives the caller’s identity in a combination of _______ , ______ ______ parameters, stageVariables, and $_________ variables.

(also called a REQUEST authorizer)

A

A request parameter-based Lambda authorizer receives the caller’s identity in a combination of headers, query string parameters, stageVariables, and $context variables.

36
Q

To encrypt large quantities of data with the AWS Key Management Service (KMS), you must use a ____ encryption key rather than a _____ _________ keys

A

To encrypt large quantities of data with the AWS Key Management Service (KMS), you must use a data encryption key rather than a customer master keys

This is because a CMK can only encrypt up to 4KB in a single operation

37
Q

** CloudFront edge caches**

To invalidate files, you can specify either the ____ for individual files or a path that ends with the _______

A

To invalidate files, you can specify either the path for individual files or a path that ends with the * wildcard, which might apply to one file or to many, as shown in the following examples:

/images/image1.jpg
/images/image*
/images/*

38
Q

Amazon Cognito identity pools provide ______________ AWS credentials for users who are ______________ ________ or a ________ for users who have been authenticated.

A

Amazon Cognito identity pools provide temporary AWS credentials for users who are unauthenticated guests or a token for users who have been authenticated.

39
Q

Port mappings allow containers to access ports on the host container instance to ____ or ____ traffic.

Docker & ECS

A

Port mappings allow containers to access ports on the host container instance to send or receive traffic.

Port mappings are specified as part of the container definition.

40
Q

The ________ definition settings are specified within the ____ definition.

Docker & ECS

A

The container definition settings are specified within the task definition.

41
Q

CodeDeploy

What are the steps to a Blue/green depoyment on EC2?
7 Steps

  1. New Instances Provisioned
  2. New Version Installed
  3. Testing Performed
    4.
    5.
    6.
    7.
A
  1. New Instances Provisioned
  2. New Version Installed
  3. Testing Performed
  4. ELB Registration
  5. Traffice Re-Route
  6. Original Instances De-Registered
  7. Terminated
42
Q

In container definition section within the task definition you specify the settings for _______________ and ____________

A

In container definition section within the task definition you specify the settings for containerPort and hostPort.

43
Q

Container Definition

containerPort is the port number on the container that is ________ to the user-specified or automatically assigned ____ port.

A

containerPort is the port number on the container that is bound to the user-specified or automatically assigned host port.

44
Q

When you invoke a function, two types of error can occur:

A

Invocation errors
Function errors

45
Q

When you invoke a function, two types of error can occur. ________ errors occur when the ________ request is rejected before your function receives it. ____ errors occur when your ________ code or runtime returns an error.

A

When you invoke a function, two types of error can occur. Invocation errors occur when the invocation request is rejected before your function receives it. Function errors occur when your function’s code or runtime returns an error.

46
Q

An Invocation error occurs when the invocation request is ________ before your function ________ it.

A

An Invocation error occurs when the invocation request is rejected before your function receives it.

47
Q

Function errors occur when your function’s ____ or ________ returns an error.

A

Function errors occur when your function’s code or runtime returns an error.

48
Q

Kinesis Data Streams enables you to build custom ________ that ________ or ____________ streaming data for specialized needs.

A

Kinesis Data Streams enables you to build custom applications that process or analyze streaming data for specialized needs.

49
Q

Kinesis Data Streams Common use cases include:

Real-time metrics and ________.
Real-time data ________.
Complex stream ____________.

A

Real-time metrics and reporting.
Real-time data analytics.
Complex stream processing.

50
Q

What are the two caching strategies available when using ElastiCache

A

Lazy Loading and Write-Through

51
Q

ElastiCache: Lazy loading only loads data into the cache when _______ like if a cache ______ occurs

ElastiCache

A

Lazy loading only loads data into the cache when necessary like if a cache miss occurs

52
Q

Lazy loading avoids _____________ ___ the cache with data that won’t be ___________

A

Lazy loading avoids filling up the cache with data that won’t be requested.

53
Q

When using Lazy Loading what happens if the data is not in the cache or has expired? ElastiCache returns a _____.

The application then fetches the data from the __________ and writes the data received into the _______ so that it is available for next time.

A

ElastiCache returns a null.

The application then fetches the data from the database and writes the data received into the cache so that it is available for next time.

54
Q

When using a write-through strategy, the cache is updated whenever a new ____ or ________ is made to the underlying database.

ElastiCache

A

When using a write-through strategy, the cache is updated whenever a new write or update is made to the underlying database.

Allows cache data to remain up-to-date.

55
Q

What is a downside of using the write-through strategy with ElastiCache?

A

Can add wait time to write operations in your application

56
Q

Sequencing with FIFO queues:

To ensure strict ordering between messages, specify a ____________.

A

To ensure strict ordering between messages, specify a MessageGroupId.

57
Q

To determine the number of WCUs required ________ the item size by the number of ____ ______.

A

To determine the number of WCUs required multiply the item size by the number of writes required.

58
Q

Within Amazon CloudWatch you can view statistical ____ of your published ________ with the AWS Management Console.

A

Within Amazon CloudWatch you can view statistical graphs of your published metrics with the AWS Management Console.

59
Q

Custom Metrics

You can publish your own metrics to CloudWatch using the AWS ____ or an ____.

A

You can publish your own metrics to CloudWatch using the AWS CLI or an API.

60
Q

A namespace is a container for CloudWatch metrics. Metrics in different namespaces are ________ from each other, so that metrics from different applications are not mistakenly ________ into the ____ statistics.

A

A namespace is a container for CloudWatch metrics. Metrics in different namespaces are isolated from each other, so that metrics from different applications are not mistakenly aggregated into the same statistics.

61
Q

In custom metrics, the dimensions parameter further clarifies the metrics ________ and the type of data it ______.

A

In custom metrics, the dimensions parameter further clarifies the metric functionalityand the type of data it stores

62
Q

CloudWatch Alarms

You can use an alarm to ________ initiate ________ on your behalf.

A

You can use an alarm to automatically initiate actions on your behalf.

63
Q

CodeDeploy

What are the steps to a Blue/green depoyment on EC2?
7 Steps

  1. ELB Registration
  2. Traffice Re-Route
  3. Original Instances De-Registered
  4. Terminated
A
  1. New Instances Provisioned
  2. New Version Installed
  3. Testing Performed
  4. ELB Registration
  5. Traffice Re-Route
  6. Original Instances De-Registered
  7. Terminated
64
Q

To calculate the concurrency requirements for the Lambda function multiply the number of ________ per second by the ________ it takes to complete the execution

A

To calculate the concurrency requirements for the Lambda function multiply the number of executions per second by the time it takes to complete the execution

65
Q

Amazon SQS only supports messages up to ________ in size. Therefore, the SQS ______ ______ Library for Java must be used.

A

Amazon SQS only supports messages up to 256KB in size. Therefore, the SQS Extended Client Library for Java must be used.

66
Q

To restrict access to content that you serve from Amazon S3 buckets, you create CloudFront signed ________ or signed ________ to limit access to files in your Amazon S3 bucket. Then you create a special CloudFront user called an origin _______ _______ and associate it with your distribution

A

To restrict access to content that you serve from Amazon S3 buckets, you create CloudFront signed URLs or signed cookies to limit access to files in your Amazon S3 bucket. Then you create a special CloudFront user called an origin access identity (OAI) and associate it with your distribution

67
Q

When you use an CloudFront OAI the ________ must be changed on the S3 bucket to _____ _________ to the OAI only.

A

When you use an CloudFront OAI the permissions must be changed on the S3 bucket to restrict access to the OAI only.

68
Q

ElastiCache is a fully ________, low ________, ____________ data store that supports either Memcached or Redis.

A

ElastiCache is a fully managed, low latency, in-memory data store that supports either Memcached or Redis.

69
Q

FIFO (First-In-First-Out) queues are designed to ________ messaging between applications when the order of operations and events is critical, or where ________ can’t be tolerated.

A

FIFO (First-In-First-Out) queues are designed to enhance messaging between applications when the order of operations and events is critical, or where duplicates can’t be tolerated.

70
Q

CloudWatch: Custom Metrics

Each metric is one of the following:

Standard resolution: data granularity of one ________
High resolution: data granularity of one ________

A

Standard resolution: data granularity of one minute
High resolution: data granularity of one second

71
Q

Sequencing with FIFO queues:

Messages with a different Group ID may be received ____ __ _____

A

Messages with a different Group ID may be received out of order