AWS Solutions Architect Flashcards

1
Q

AWS Aurora

A

Amazon Aurora (Aurora) is a fully managed relational database engine that’s compatible with MySQL and PostgreSQL.

Handles highly transactional (OLTP) workloads. Online Transaction Processing.

The code, tools, and applications you use today with your existing MySQL and PostgreSQL databases can be used with Aurora.

Aurora can deliver up to five times the throughput of MySQL and up to three times the throughput of PostgreSQL without requiring changes to most of your existing applications.

The underlying storage grows automatically as needed, up to 64 tebibytes (TiB).

Aurora also automates and standardizes database clustering and replication, which are typically among the most challenging aspects of database configuration and administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OLTP

A

OLTP (Online Transactional Processing) is a category of data processing that is focused on transaction-oriented tasks.

OLTP typically involves inserting, updating, and/or deleting small amounts of data in a database. OLTP mainly deals with large numbers of transactions by a large number of users.

Think RDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OLAP

A

OLAP (Online Analytical Processing) is the technology behind many Business Intelligence (BI) applications. OLAP is a powerful technology for data discovery, including capabilities for limitless report viewing, complex analytical calculations, and predictive “what if” scenario (budget, forecast) planning.

Think Redshift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AWS ECS

A

Amazon Elastic Container Service (Amazon ECS) is a fully managed container orchestration service.

ECS supports Fargate to provide serverless compute for containers. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design.

There are two different charge models for Amazon Elastic Container Service (ECS): Fargate Launch Type Model and EC2 Launch Type Model. With Fargate, you pay for the amount of vCPU and memory resources that your containerized application requests while for EC2 launch type model, there is no additional charge. You pay for AWS resources (e.g. EC2 instances or EBS volumes) you create to store and run your application. You only pay for what you use, as you use it; there are no minimum fees and no upfront commitments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AWS Fargate

A

AWS Fargate is a serverless compute engine for containers that works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS).

Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AWS Elastic Kubernetes Service

A

Amazon Elastic Kubernetes Service (Amazon EKS) is a fully managed Kubernetes service.

EKS is the best place to run Kubernetes for several reasons. First, you can choose to run your EKS clusters using AWS Fargate, which is serverless compute for containers. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design.

EKS integrates with AWS App Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

App Mesh

A

AWS App Mesh is a service mesh that provides application-level networking to make it easy for your services to communicate with each other across multiple types of compute infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fanout Pattern

A

A “fanout” pattern is when an Amazon SNS message is sent to a topic and then replicated and pushed to multiple Amazon SQS queues, HTTP endpoints, or email addresses.

This allows for parallel asynchronous processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Visibility Timeout

A

a period of time during which Amazon SQS prevents other consumers from receiving and processing the message.

The default visibility timeout for a message is 30 seconds. The maximum is 12 hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dead Letter Queue

A

Amazon SQS supports dead-letter queues, which other queues (source queues) can target for messages that can’t be processed (consumed) successfully.

Dead-letter queues are useful for debugging your application or messaging system because they let you isolate problematic messages to determine why their processing doesn’t succeed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AWS CloudHSM

A

AWS CloudHSM enables you to generate and use your encryption keys on a FIPS 140-2 Level 3 validated hardware.

CloudHSM protects your keys with exclusive, single-tenant access to tamper-resistant HSM instances in your own Amazon Virtual Private Cloud (VPC).

Attempting to log in as the administrator more than twice with the wrong password zeroizes your HSM appliance. When an HSM is zeroized, all keys, certificates, and other data on the HSM is destroyed. You can use your cluster’s security group to prevent an unauthenticated user from zeroizing your HSM.

Amazon strongly recommends that you use two or more HSMs in separate Availability Zones in any production CloudHSM Cluster to avoid loss of cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ALB Health Checks

A

Your Application Load Balancer periodically sends requests to its registered targets to test their status. These tests are called health checks.

Each load balancer node routes requests only to the healthy targets in the enabled Availability Zones for the load balancer.

Each load balancer node checks the health of each target, using the health check settings for the target group with which the target is registered. After your target is registered, it must pass one health check to be considered healthy.

After each health check is completed, the load balancer node closes the connection that was established for the health check.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AWS Trusted Advisor

A

AWS Trusted Advisor is an online tool that provides you real-time guidance to help you provision your resources following AWS best practices.

It inspects your AWS environment and makes recommendations for saving money, improving system performance and reliability, or closing security gaps.

Cost Optimization – recommendations that can potentially save you money by highlighting unused resources and opportunities to reduce your bill.

Security – identification of security settings that could make your AWS solution less secure.

Fault Tolerance – recommendations that help increase the resiliency of your AWS solution by highlighting redundancy shortfalls, current service limits, and over-utilized resources.

Performance – recommendations that can help to improve the speed and responsiveness of your applications.

Service Limits – recommendations that will tell you when service usage is more than 80% of the service limit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cooldown Period

A

The cooldown period is a configurable setting for your Auto Scaling group that helps to ensure that it doesn’t launch or terminate additional instances before the previous scaling activity takes effect.

After the Auto Scaling group dynamically scales using a simple scaling policy, it waits for the cooldown period to complete before resuming scaling activities.

When you manually scale your Auto Scaling group, the default is not to wait for the cooldown period, but you can override the default and honor the cooldown period. If an instance becomes unhealthy, the Auto Scaling group does not wait for the cooldown period to complete before replacing the unhealthy instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IAM Tagging

A

You can define the tags on UAT and production EC2 instances and add a condition to the IAM policy which allows access to specific tags.

Tags enable you to categorize your AWS resources in different ways, for example, by purpose, owner, or environment. This is useful when you have many resources of the same type — you can quickly identify a specific resource based on the tags you’ve assigned to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AWS Resource Access Manager (RAM)

A

the AWS Resource Access Manager (RAM) is primarily used to securely share your resources across AWS accounts or within your Organization and not on a single AWS account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Edge Location

A

An edge location helps deliver high availability, scalability, and performance of your application for all of your customers from anywhere in the world.

This is used by other services such as Lambda and Amazon CloudFront.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CloudFront

A

Amazon CloudFront is a web service that gives businesses and web application developers an easy and cost-effective way to distribute content with low latency and high data transfer speeds.

CloudFront delivers your files to end-users using a global network of edge locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ELB Access Logs

A

Elastic Load Balancing provides access logs that capture detailed information about requests sent to your load balancer.

Each log contains information such as the time the request was received, the client’s IP address, latencies, request paths, and server responses.

You can use these access logs to analyze traffic patterns and troubleshoot issues.

Access logging is an optional feature of Elastic Load Balancing that is disabled by default.

After you enable access logging for your load balancer, Elastic Load Balancing captures the logs and stores them in the Amazon S3 bucket that you specify as compressed files.

You can disable access logging at any time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IAM Database Authentication

A

You can authenticate to your DB instance using AWS Identity and Access Management (IAM) database authentication.

IAM database authentication works with MySQL and PostgreSQL.

With this authentication method, you don’t need to use a password when you connect to a DB instance.

An authentication token is a string of characters that you use instead of a password.

After you generate an authentication token, it’s valid for 15 minutes before it expires. If you try to connect using an expired token, the connection request is denied.

Benefits:

Network traffic to and from the database is encrypted using Secure Sockets Layer (SSL).

You can use IAM to centrally manage access to your database resources, instead of managing access individually on each DB instance.

For applications running on Amazon EC2, you can use profile credentials specific to your EC2 instance to access your database instead of a password, for greater security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

“AWSAuthenticationPlugin”

A

AWS-provided plugin that works seamlessly with IAM to authenticate your IAM users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

S3 Standard (S3 Standard)

A

General-purpose storage of frequently accessed data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

S3 Standard_IA

A

Long lived, but less frequently accessed data. Stored redundantly across multiple geo separated AZs.

Suitable for objects larger than 128k.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

S3 Onezone_IA

A

Stores object data in only one AZ. Less expensive than Standard_IA, but not as resilient to the physical loss of an AZ.

Suitable for objects larger than 128k.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

S3 Intelligent Tiering

A

Designed for customers who want to optimize storage costs automatically.

First cloud object storage class that delivers automatic cost savings by moving data between two access tiers - Frequent access and infrequent access.

Ideal for data with unknown or changing access patterns.

Monitors access patterns and moves objects that have not been accessed for 30 consecutive days to the infrequent access tier. If accessed later, it is moved back to frequent.

No retrieval fees in intelligent tiering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Glacier

A

Long-term archive

Not available for real-time access

Cannot be specified at the time an object is created.

Visible through S3 only.

Retrieval Options:
Expedited - allows quick access for urgent requests for a subset of archives. Data access is typically within 1-5 minutes. Two types:

On-demand - similar to EC2 and are available most of the time.
Provisioned - are guaranteed to be available.

Standard - Allows access to any archives within several hours. Typically 3-5 hours. Default.

Bulk - Glaciers lowest-cost retrieval option, enabling retrieval of large amounts, even petabytes, of data inexpensively in a day. Usually takes 5-12 hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Aurora Database Failure - Auto-healing

A

Failover is automatically handled by Amazon Aurora so that your applications can resume database operations as quickly as possible without manual administrative intervention.

If you have an Amazon Aurora Replica in the same or a different Availability Zone, when failing over, Amazon Aurora flips the canonical name record (CNAME) for your DB Instance to point at the healthy replica, which in turn is promoted to become the new primary. Start-to-finish, failover typically completes within 30 seconds.

If you are running Aurora Serverless and the DB instance or AZ become unavailable, Aurora will automatically recreate the DB instance in a different AZ.

If you do not have an Amazon Aurora Replica (i.e. single instance) and are not running Aurora Serverless, Aurora will attempt to create a new DB Instance in the same Availability Zone as the original instance. This replacement of the original instance is done on a best-effort basis and may not succeed, for example, if there is an issue that is broadly affecting the Availability Zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

VPC Endpoint

A

A VPC endpoint enables you to privately connect your VPC to supported AWS services and VPC endpoint services powered by PrivateLink without requiring an Internet gateway, NAT device, VPN connection, or AWS Direct Connect connection.

Instances in your VPC do not require public IP addresses to communicate with resources in the service. Traffic between your VPC and the other services do not leave the Amazon network.

Endpoints are virtual devices. They are horizontally scaled, redundant, and highly available VPC components that allow communication between instances in your VPC and services without imposing availability risks or bandwidth constraints on your network traffic.

There are two types of VPC endpoints: interface endpoints and gateway endpoints. You should create the type of VPC endpoint required by the supported service. As a rule of thumb, most AWS services use VPC Interface Endpoint except for S3 and DynamoDB, which use VPC Gateway Endpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

ALB Health Check Protocols/Ports

A

HTTP: 80
HTTPS: 443

Succeeds if instance returns 200 response code within HC interval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

NLB Listener Protocols/Ports

A

TCP, TLS, UDP, TCP_UDP

1-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

NLB Healthcheck

A

Succeeds if TCP connection succeeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Kinesis Results Storage

A
Redshift
DynamoDB
S3
Amazon EMR
Kinesis Firehose
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Cloudtrail Default Encryption Settings

A

By default, CloudTrail event log files are encrypted using Amazon S3 server-side encryption (SSE).

You can also choose to encrypt your log files with an AWS Key Management Service (AWS KMS) key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Cloudtrail

A

Actions taken by a user, role, or an AWS service in the AWS management console, CLI, and AWS SDKs and APIs are recorded as events.

Enabled on account creation.

Focuses on auditing API activity.

Event history allows viewing, search, and download of the past 90 days of activity.

Two Types:
All regions - Records events in each region and delivers the CT log files to a specified S3 bucket. (default option)
One region - records events in the region specified. (default option when creating trail in CLI or CT API).

Cloudtrail events can be sent to Cloudwatch logs to trigger alarms according to metric filters.

Cloudtrail log file integrity validation can verify if a log file was modified, deleted, or unchanged after Cloudtrail delivered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Organization Trail

A

A cloudtrail trail that will log all events for AWS accounts in an organization created by AWS Organizations. Org trails must be created by the master account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

AWS WAF - Allow then block

A

Create a web ACL with a rule that explicitly allows an approved IP.

Then create another rule with a condition like “geo match” that blocks requests that originate from a specific country.

Allow first, then block what you desire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

AWS Database Migration Service

A

AWS Database Migration Service helps you migrate databases to AWS quickly and securely. The source database remains fully operational during the migration, minimizing downtime to applications that rely on the database.

It supports homogeneous migrations such as Oracle to Oracle, as well as heterogeneous migrations between different database platforms, such as Oracle to Amazon Aurora.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

AWS Schema Conversion Tool

A

Used to convert the source schema and code to match that of the target database in a heterogeneous database migration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

FSx for Windows File Server

A

fully managed, highly reliable, and scalable file storage accessible over the industry-standard Service Message Block (SMB) protocol.

It is built on Windows Server, delivering a wide range of administrative features such as user quotas, end-user file restore, and Microsoft Active Directory (AD) integration.

Amazon FSx supports the use of Microsoft’s Distributed File System (DFS) Namespaces to scale-out performance across multiple file systems in the same namespace up to tens of Gbps and millions of IOPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Lifecycle hook

A

Add a lifecycle hook to your Auto Scaling group so that you can perform custom actions when instances launch or terminate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Lifecycle hook stages and hook actions

A
Pending
Pending:Wait
Pending:Proceed
InService
Terminating:Wait
Terminating:Proceed
Terminated

If you added an autoscaling:EC2_INSTANCE_LAUNCHING lifecycle hook to your Auto Scaling group, the instances move from the Pending state to the Pending:Wait state. After you complete the lifecycle action, the instances enter the Pending:Proceed state. When the instances are fully configured, they are attached to the Auto Scaling group and they enter the InService state.

When Amazon EC2 Auto Scaling responds to a scale in event, it terminates one or more instances. These instances are detached from the Auto Scaling group and enter the Terminating state. If you added an autoscaling:EC2_INSTANCE_TERMINATING lifecycle hook to your Auto Scaling group, the instances move from the Terminating state to the Terminating:Wait state. After you complete the lifecycle action, the instances enter the Terminating:Proceed state. When the instances are fully terminated, they enter the Terminated state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

HDD Volumes

A

Cannot be used as boot volume in AWS

Large, Sequential I/O operations

Low Price

Big data, data warehouses, log processing

Throughput-oriented storage for a large volumes of data is infrequently accessed

Cost: Low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

SSD Volumes

A

Small, random I/O operations

Best for Transactional workloads

Critical business apps that require sustained IOPS performance

Large database workloads such as MongoDB, Oracle, Microsoft SQL

Cost: moderate/high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

API Gateway supported protocol?

A

All of the APIs created with Amazon API Gateway expose HTTPS endpoints only.

Amazon API Gateway does not support unencrypted (HTTP) endpoints. By default, Amazon API Gateway assigns an internal domain to the API that automatically uses the Amazon API Gateway certificate. When configuring your APIs to run under a custom domain name, you can provide your own certificate for the domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

SQS Retention Period Default/Max

A

Amazon SQS automatically deletes messages that have been in a queue for more than the maximum message retention period. The default message retention period is 4 days.

Max is 14 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Amazon Workspaces

A

Amazon WorkSpaces is a managed, secure Desktop-as-a-Service (DaaS) solution. You can use Amazon WorkSpaces to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe.

You can pay either monthly or hourly, just for the WorkSpaces you launch, which helps you save money when compared to traditional desktops and on-premises VDI solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What Route 53 Alias resource record sets allow you to do?

A

Allows mapping of zone apex (e.g. yourwebsite.com) DNS name to your load balancer (or other AWS resource) DNS name.

Useful because IP addresses change all of the time, so using DNS is appropriate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

AWS Glue

A

AWS Glue is a fully managed extract, transform, and load (ETL) service that makes it easy for customers to prepare and load their data for analytics.

You can create and run an ETL job with a few clicks in the AWS Management Console. You simply point AWS Glue to your data stored on AWS, and AWS Glue discovers your data and stores the associated metadata (e.g. table definition and schema) in the AWS Glue Data Catalog.

Once cataloged, your data is immediately searchable, queryable, and available for ETL. AWS Glue generates the code to execute your data transformations and data loading processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

ASG Default Termination Policy

A
  1. If there are instances in multiple Availability Zones, choose the Availability Zone with the most instances and at least one instance that is not protected from scale in. If there is more than one Availability Zone with this number of instances, choose the Availability Zone with the instances that use the oldest launch configuration.
  2. Determine which unprotected instances in the selected Availability Zone use the oldest launch configuration. If there is one such instance, terminate it.
  3. If there are multiple instances to terminate based on the above criteria, determine which unprotected instances are closest to the next billing hour. (This helps you maximize the use of your EC2 instances and manage your Amazon EC2 usage costs.) If there is one such instance, terminate it.
  4. If there is more than one unprotected instance closest to the next billing hour, choose one of these instances at random.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

AWS Storage Gateway Hardware Appliance

A

A physical hardware appliance with the Storage Gateway software preinstalled on a validated server configuration.

The hardware appliance is a high-performance 1U server that you can deploy in your data center, or on-premises inside your corporate firewall.

When you buy and activate your hardware appliance, the activation process associates your hardware appliance with your AWS account. After activation, your hardware appliance appears in the console as a gateway on the Hardware page.

You can configure your hardware appliance as a file gateway, tape gateway, or volume gateway type. The procedure that you use to deploy and activate these gateway types on a hardware appliance is the same as on a virtual platform.

A file gateway can be configured to store and retrieve objects in Amazon S3 using the protocols NFS and SMB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

“aws ec2 describe-instances”

A

The describe-instances command shows the status of the EC2 instances including the recently terminated instances. It also returns a StateReason of why the instance was terminated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What characteristics does an Encrypted EBS Volume have?

A

When you create an encrypted EBS volume and attach it to a supported instance type, the following types of data are encrypted:

  • Data at rest inside the volume
  • All data moving between the volume and the instance
  • All snapshots created from the volume
  • All volumes created from those snapshots

Encryption operations occur on the servers that host EC2 instances, ensuring the security of both data-at-rest and data-in-transit between an instance and its attached EBS storage. You can encrypt both the boot and data volumes of an EC2 instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Direct Connect

A

Direct Connect creates a direct, private connection from your on-premises data center to AWS, letting you establish a 1-gigabit or 10-gigabit dedicated network connection using Ethernet fiber-optic cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

S3 Scaling

A

S3 now provides increased performance to support at least 3,500 requests per second to add data and 5,500 requests per second to retrieve data, which can save significant processing time for no additional charge.

Each S3 prefix can support these request rates, making it simple to increase performance significantly.

This S3 request rate performance increase removes any previous guidance to randomize object prefixes to achieve faster performance. That means you can now use logical or sequential naming patterns in S3 object naming without any performance implications. This improvement is now available in all AWS Regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is SQS ReceiveMessageWaitTimeSeconds?

A

The queue attribute that determines whether you are using Short or Long polling.

By default, its value is zero which means it is using Short polling. If it is set to a value greater than zero, then it is Long polling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Long Polling

A
  • Long polling helps reduce your cost of using Amazon SQS by reducing the number of empty responses when there are no messages available to return in reply to a ReceiveMessage request sent to an Amazon SQS queue and eliminating false empty responses when messages are available in the queue but aren’t included in the response.
  • Long polling reduces the number of empty responses by allowing Amazon SQS to wait until a message is available in the queue before sending a response. Unless the connection times out, the response to the ReceiveMessage request contains at least one of the available messages, up to the maximum number of messages specified in the ReceiveMessage action.
  • Long polling eliminates false empty responses by querying all (rather than a limited number) of the servers. Long polling returns messages as soon any message becomes available.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are the best AWS tools for Distributed Session Data Management?

A

Think Elasticache

Redis, and Memchached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Redis

A

Redis is an open source, in-memory data structure store used as a database, cache, and message broker.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Memcached

A

Memcached is an in-memory key-value store for small arbitrary data (strings, objects) from results of database calls, API calls, or page rendering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Elastic Network Adapter (ENA) w/ Enhanced Networking

A

Enhanced networking uses single root I/O virtualization (SR-IOV) to provide high-performance networking capabilities on supported instance types.

It supports network speeds of up to 100 Gbps for supported instance types. Elastic Network Adapters (ENAs) provide traditional IP networking features that are required to support VPC networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Enhanced Networking

A

Enhanced networking provides higher bandwidth, higher packet-per-second (PPS) performance, and consistently lower inter-instance latencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

SR-IOV

A

a method of device virtualization that provides higher I/O performance and lower CPU utilization when compared to traditional virtualized network interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Elastic Fabric Adapter (EFA)

A

An Elastic Fabric Adapter (EFA) is simply an Elastic Network Adapter (ENA) with added capabilities. It provides all of the functionality of an ENA, with additional OS-bypass functionality. OS-bypass is an access model that allows HPC and machine learning applications to communicate directly with the network interface hardware to provide low-latency, reliable transport functionality.

The OS-bypass capabilities of EFAs are not supported on Windows instances. If you attach an EFA to a Windows instance, the instance functions as an Elastic Network Adapter, without the added EFA capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

How do you encrypt an EBS volume?

A

Two ways:

  • By using your own keys in AWS KMS
  • By using Amazon-managed keys in AWS KMS

Amazon EBS encryption offers seamless encryption of EBS data volumes, boot volumes, and snapshots, eliminating the need to build and maintain a secure key management infrastructure. EBS encryption enables data at rest security by encrypting your data using Amazon-managed keys, or keys you create and manage using the AWS Key Management Service (KMS). The encryption occurs on the servers that host EC2 instances, providing encryption of data as it moves between EC2 instances and EBS storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Cloudformation Outputs

A

Outputs is an optional section of the CloudFormation template that describes the values that are returned whenever you view your stack’s properties.

Can provide info like DNS name of ELB, hostname of EC2 instances, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

EC2 “Server Refused our Key” error

A

You might be unable to log into an EC2 instance if:

  • You’re using an SSH private key but the corresponding public key is not in the authorized_keys file.
  • You don’t have permissions for your authorized_keys file.
  • You don’t have permissions for the .ssh folder.
  • Your authorized_keys file or .ssh folder isn’t named correctly.
  • Your authorized_keys file or .ssh folder was deleted.
  • Your instance was launched without a key, or it was launched with an incorrect key.

To connect to your EC2 instance after receiving the error “Server refused our key,” you can update the instance’s user data to append the specified SSH public key to the authorized_keys file, which sets the appropriate ownership and file permissions for the SSH directory and files contained in it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Throuhput Optimized HDD (st1)

A

Throughput Optimized HDD (st1) volumes provide low-cost magnetic storage that defines performance in terms of throughput rather than IOPS.

This volume type is a good fit for large, sequential workloads such as Amazon EMR, ETL, data warehouses, and log processing. Bootable st1 volumes are not supported.

Throughput Optimized HDD (st1) volumes, though similar to Cold HDD (sc1) volumes, are designed to support frequently accessed data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

EBS Provisioned IOPS SSD (io1) & io2

A

Highest performance SSD volume designed for latency-sensitive transactional workloads

I/O-intensive NoSQL and relational databases

4 GB - 16 TB

64,000 IOPS

io2 is same as io1, except it has higher durability:
99.999% vs. 99.8-99.9%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

EBS General Purpose SSD (gp2)

A

General Purpose SSD volume that balances price performance for a wide variety of transactional workloads.

Boot volumes, low-latency interactive apps, dev and test

99.8% - 99.9% durability

1 GB - 16 TB

16,000 IOPS

250 MB/s Throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

EBS Cold HDD (sc1)

A

Lowest cost HDD volume designed for less frequently accessed workloads

99.8% - 99.9% durability

Colder data requiring fewer scans per day

500 GB - 16 TB

250IOPS per Volume

250 MB/s Throughput

250 Max IPOS/volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is the AWS Systems Manager Run Command?

A

AWS Systems Manager Run Command lets you remotely and securely manage the configuration of your managed instances.

A managed instance is any Amazon EC2 instance or on-premises machine in your hybrid environment that has been configured for Systems Manager.

Run Command enables you to automate common administrative tasks and perform ad hoc configuration changes at scale.

You can use Run Command from the AWS console, the AWS Command Line Interface, AWS Tools for Windows PowerShell, or the AWS SDKs. Run Command is offered at no additional cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Storage Gateway - Volume Gateway

A

Volume Gateway presents cloud-backed iSCSI block storage volumes to your on-premises applications. Volume Gateway stores and manages on-premises data in Amazon S3 on your behalf and operates in either cache mode or stored mode.

In the cached Volume Gateway mode, your primary data is stored in Amazon S3, while retaining your frequently accessed data locally in the cache for low latency access.

In the stored Volume Gateway mode, your primary data is stored locally and your entire dataset is available for low latency access on premises while also asynchronously getting backed up to Amazon S3.

In either mode, you can take point-in-time copies of your volumes using AWS Backup, which are stored in AWS as Amazon EBS snapshots. Using Amazon EBS Snapshots enables you to make space-efficient versioned copies of your volumes for data protection, recovery, migration, and various other copy data needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Can an EBS volume be used when a snapshot is in progress?

A

EBS volumes can be used while a snapshot is in progress.

Snapshots occur asynchronously; the point-in-time snapshot is created immediately, but the status of the snapshot is pending until the snapshot is complete (when all of the modified blocks have been transferred to Amazon S3), which can take several hours for large initial snapshots or subsequent snapshots where many blocks have changed.

While it is completing, an in-progress snapshot is not affected by ongoing reads and writes to the volume hence, you can still use the EBS volume normally.

A non-root EBS volume can be detached or attached to a new EC2 instance while the snapshot is in progress. The only exception here is if you are taking a snapshot of your root volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

ALB Weighted Target Groups Routing

A

Application Load Balancers support Weighted Target Groups routing. With this feature, you will be able to do weighted routing of the traffic forwarded by a rule to multiple target groups.

This enables various use cases like blue-green, canary and hybrid deployments without the need for multiple load balancers. It even enables zero-downtime migration between on-premises and cloud or between different compute types like EC2 and Lambda.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Route 53 Weighted Routing

A

To divert 50% of the traffic to the new application in AWS and the other 50% to the application, you can also use Route 53 with Weighted routing policy. This will divert the traffic between the on-premises and AWS-hosted application accordingly.

Weighted routing lets you associate multiple resources with a single domain name (yourwebsite.com) or subdomain name (portal.yourwebsite.com) and choose how much traffic is routed to each resource. This can be useful for a variety of purposes, including load balancing and testing new versions of software. You can set a specific percentage of how much traffic will be allocated to the resource by specifying the weights.

For example, if you want to send a tiny portion of your traffic to one resource and the rest to another resource, you might specify weights of 1 and 255. The resource with a weight of 1 gets 1/256th of the traffic (1/1+255), and the other resource gets 255/256ths (255/1+255).

You can gradually change the balance by changing the weights. If you want to stop sending traffic to a resource, you can change the weight for that record to 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

ALB Target Types

A
  1. instance - The targets are specified by instance ID.
  2. ip - The targets are IP addresses.
  3. Lambda - The target is a Lambda function.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

ALB IP CIDR block Target Supported Ranges

A

When the target type is ip, you can specify IP addresses from one of the following CIDR blocks:

  • 10.0.0.0/8 (RFC 1918)
  • 100.64.0.0/10 (RFC 6598)
  • 172.16.0.0/12 (RFC 1918)
  • 192.168.0.0/16 (RFC 1918)
  • The subnets of the VPC for the target group

These supported CIDR blocks enable you to register the following with a target group: ClassicLink instances, instances in a VPC that is peered to the load balancer VPC, AWS resources that are addressable by IP address and port (for example, databases), and on-premises resources linked to AWS through AWS Direct Connect or a VPN connection.

Take note that you can not specify publicly routable IP addresses. If you specify targets using an instance ID, traffic is routed to instances using the primary private IP address specified in the primary network interface for the instance. If you specify targets using IP addresses, you can route traffic to an instance using any private IP address from one or more network interfaces. This enables multiple applications on an instance to use the same port. Each network interface can have its own security group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

VPC Gateway Endpoint

A

Used for S3, DynamoDB

All others use interface endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

After creating admins in IAM, what do you need to do to give them access to the AWS console?

A

Provide a password for each user created and give these passwords to the admins.

The AWS Management Console is the web interface used to manage your AWS resources using your web browser. To access this, your users should have a password that they can use to login to the web console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Target tracking scaling - ASG

A

Increase or decrease the current capacity of the group based on a target value for a specific metric. This is similar to the way that your thermostat maintains the temperature of your home – you select a temperature and the thermostat does the rest.

If you are scaling based on a utilization metric that increases or decreases proportionally to the number of instances in an Auto Scaling group, then it is recommended that you use target tracking scaling policies. Otherwise, it is better to use step scaling policies instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Difference between step scaling and simple scaling?

A

Step scaling policies and simple scaling policies are two of the dynamic scaling options available for you to use. Both require you to create CloudWatch alarms for the scaling policies. Both require you to specify the high and low thresholds for the alarms. Both require you to define whether to add or remove instances, and how many, or set the group to an exact size.

The main difference between the policy types is the step adjustments that you get with step scaling policies. When step adjustments are applied, and they increase or decrease the current capacity of your Auto Scaling group, the adjustments vary based on the size of the alarm breach.

In most cases, step scaling policies are a better choice than simple scaling policies, even if you have only a single scaling adjustment.

The main issue with simple scaling is that after a scaling activity is started, the policy must wait for the scaling activity or health check replacement to complete and the cooldown period to expire before responding to additional alarms. Cooldown periods help to prevent the initiation of additional scaling activities before the effects of previous activities are visible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Simple scaling - ASG

A

Increase or decrease the current capacity of the group based on a single scaling adjustment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Scheduled Scaling - ASG

A

Based on a schedule that allows you to set your own scaling schedule for predictable load changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Client-side Encryption

A

Encrypting data before it is sent to S3.

To enable:
Use an AWS KMS managed customer master key
OR
Use client-side master key for client-side encryption that are never sent to AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

AWS SHIELD

A

Network & Transport layer protection
DDOS Attacks, near real-time visibility
Integration with WAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Cloudwatch Events

A

Deliver near real-time stream of system events that describe changes in AWS resources

Events respond to Operational Changes and take corrective action as necessary, by sending messages to respond to the environment, activating functions, making changes, and capturing state information.

Concepts:

  • Events - indicates a change in your AWS environment
  • Targets - Processes events.
  • Rules - matches incoming events and routes them to targets for processing.

EX: can increase or reduce ECS tasks based on PUT or DELETES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Redis Encryption & Authorization

A

Must use “–transit-encryption-enabled,” and “–authtoken” parameters

Redis cannot use IAM for authorization. Must use the above parameters.

88
Q

How does Lambda Encrypt Environment Variables? What about if encryption helpers are required?

A

Lambda encrypts env. variables using AWS KMS

  • When invoked those values decrypted & made available to Lambda code
  • a default KMS Key is created when env. variables used

If encryption helpers required, you must create your own key (default keys don’t work)
-this creates flexibility to create, rotate, disable, and define access controls.

89
Q

Cloudtrail trail region specifications?

A

A trail that applies to ALL REGIONS - CloudTrail records events in each region and delivers the CloudTrail event log files to an S3 bucket you specify. This is the default option when you create a trail in the CloudTrail console.

ONE REGION - Cloudtrail records the events in the region that you specify only this is the default option when you create a trail using the AWS CLI or the Cloudtrail API

90
Q

What are the default Cloudwatch Available Metrics?

A

CPU utilization
Network utilization
Disk read metrics

91
Q

Cloudwatch Custom Monitoring Scripts

A

Written in Perl
Helps to install Cloudwatch Unified Agent

  • memory utilization
  • disk swap utilization
  • disk space utilization
  • page file utilization
  • log collection
92
Q

Lambda @Edge

A

Allows lambda functions to customize content cloudfront delivers, executing functions closer to the viewer

  • viewer request - after CF receives from viewer
  • origin request - before CF forwards request to origin
  • origin response - after CF receives response from origin
  • viewer response - before CF forwards response to viewer
93
Q

CloudFront Origin Failover

A

Provide redundancy when primary orgin fails.

create an origin group with two origins: a primary and a secondary. If the primary origin is unavailable, or returns specific HTTP response status codes that indicate a failure, CloudFront automatically switches to the secondary origin.

To set up origin failover, you must have a distribution with at least two origins. Next, you create an origin group for your distribution that includes two origins, setting one as the primary. Finally, you create or update a cache behavior to use the origin group.

94
Q

RDS Replication

A

RDS Multi AZ are replicated synchronously

RDS read replicas are replicated asynchronously

95
Q

Cloud Trail for Security Logs

A

Enables governance, compliance, operational auditing, risk auditing across ALL AWS RESOURCES

96
Q

IAM DB Authorization

A

works with mysql and postgresql
-no password required, only auth token
Encrypted (SSL)

97
Q

What happens if an API Gateway gets a huge amount of requests?

A

Provides throttling limits - can handle huge traffic spikes

Allows requests to be cached

98
Q

Ephemeral

A

Short term or temporary

Think ephemeral storage (instance based) or ephemeral ports (1089-65535)

99
Q

Redshift Enhanced VPC Routing

A

Enables all VPC features

-NACLS, SGs, DNS, Gateways

100
Q

Amazon Macie

A

Auto discovery, classifying, protecting sensitive data stored in S3

101
Q

Cloudfront for Paying Subscribers

A

Use signed cookies to control access to private files

Members use “set-cookie” which will unlock content

102
Q

Moving static IPs from on Prem. to AWS

A

ROA (Route Origin Authorization) - A document created through ARIN containing IP address range to be moved.

Then in AWS, publish a self signed X.509 in RDAP (Registration Data Accesss Protocol) remarks.

103
Q

AWS ECS Parameter store

A

Amazon ECS enables you to inject sensitive data into your containers by storing your sensitive data in AWS Systems Manager Parameter Store parameters and then referencing them in your container definition.

104
Q

RDS Enhanced Monitoring

A

Amazon RDS provides metrics in real time for the operating system (OS) that your DB instance runs on.

Ehanced monitoring is available in all regions ecept AWS GovCloud (US).

Metrics include:

IOPS - Number of I/O operations completed each second
Latency - time elapsed between submission of I/O request and its completion
Throughput - number of bytes each second that are transferred to or from disk
Queue Depth - number of I/O requests in the queue waiting to be serviced

105
Q

DynamoDB Stream

A

When enabled, DynamoDB Streams captures a time-ordered sequence of item-level modifications in a DynamoDB table and durably stores the information for up to 24 hours.

Applications can access a series of stream records, which contain an item change, from a DynamoDB stream in near real time.

AWS maintains separate endpoints for DynamoDB and DynamoDB Streams.

To work with database tables and indexes, your application must access a DynamoDB endpoint. To read and process DynamoDB Streams records, your application must access a DynamoDB Streams endpoint in the same Region.

You can process DynamoDB streams in multiple ways. The most common approaches use AWS Lambda or a standalone application that uses the Kinesis Client Library (KCL) with the DynamoDB Streams Kinesis Adapter.

DynamoDB is integrated with Lambda to create triggers

106
Q

AWS File Gateway

A

Supports a file interface into S3, and combines a service and a virtual software appliance

-software appliance, or gateway, is deployed into on-premises environment as a virtual machine running on VMware ESXi or Microsoft Hyper-V hypervisor

File gateway supports

  • S3 standard
  • S3 standard - infrequent access
  • S3 One Zone - IA

Store and retrieve files directly using NFS version 3 or 4.1

Store and retrieve files directly using SMB file system version 2 and 3

Access data in S3 from any AWS cloud app or service

Manage S3 using lifecycle policies, cross-region replication, and versioning

107
Q

File Gateway Object Lock

A

File Gateway now supports S3 object lock, enabling write-once-read-many (WORM) file-based systems to store and access objects in S3

108
Q

DAX

A

Fully managed, high availability, in-memory cache for DynamoDB
-supports 10 times performance improvement - from milliseconds to microseconds - even at millions of requests per second

109
Q

Aurora-Serverless

A

On-demand, autoscaling Database
-for intermittent unpredictable workloads set min/max capacity

This is cost effective and scales quickly because the servers are prewarmed

110
Q

AWS EFS

A

POSIX compliant.

Amazon Elastic File System (Amazon EFS) provides a simple, scalable, fully managed elastic NFS file system for use with AWS Cloud services and on-premises resources. It is built to scale on demand to petabytes without disrupting applications, growing and shrinking automatically as you add and remove files, eliminating the need to provision and manage capacity to accommodate growth.

111
Q

Can AMI’s be used in any region?

A

No, they must be copied to the region they will be used in.

112
Q

Amazon MQ

A

Allows switching from a standards based message broker to AWS without rewriting message code.

Connecting your current applications to Amazon MQ is easy because it uses industry-standard APIs and protocols for messaging, including JMS, NMS, AMQP, STOMP, MQTT, and WebSocket.

113
Q

Firehose stores data where?

A

S3, Redshift, Elastisearch, generic HTTP endpoints, datadog, New Relic, MongoDB, Splunk

114
Q

Splunk

A

The Splunk platform makes machine data accessible and usable. Splunk Enterprise enables you to search, monitor, and analyze machine data from any source to gain valuable intelligence and insights across your entire organization.

115
Q

Redshift Spectrum

A

Amazon Redshift Spectrum is a feature within Amazon Web Services’ Redshift data warehousing service that lets a data analyst conduct fast, complex analysis on objects stored on the AWS cloud.

With Redshift Spectrum, an analyst can perform SQL queries on data stored in Amazon S3 buckets.

116
Q

DynamoDB Partition Keys

A

composite primary key: This type of key is composed of two attributes. The first attribute is the partition key, and the second attribute is the sort key.

Simple primary key: This type of key is composed of one attribute known as the partition key. Attributes in DynamoDB are similar in many ways to fields or columns in other database systems.

117
Q

high-cardinality attributes (dynamoDB)

A

These are attributes that have distinct values for each item, like e-mailid, employee_no, customerid, sessionid, orderid, and so on.

118
Q

composite attributes (dynamoDB)

A

Try to combine more than one attribute to form a unique key, if that meets your access pattern. For example, consider an orders table with customerid+productid+countrycode as the partition key and order_date as the sort key.

119
Q

Route53 simple routing policy

A

Use for a single resource that performs a given function for your domain, for example, a web server that serves content for the example.com website.

120
Q

Route53 Failover routing policy

A

Use when you want to configure active-passive failover.

121
Q

Route53 Geolocation routing policy

A

Use when you want to route traffic based on the location of your users.

122
Q

Route53 Geoproximity routing policy

A

Use when you want to route traffic based on the location of your resources and, optionally, shift traffic from resources in one location to resources in another with routing bias.

123
Q

Route53 Latency Routing policy

A

Use when you have resources in multiple AWS Regions and you want to route traffic to the region that provides the best latency.

124
Q

Route53 Multivalue answer routing policy

A

Use when you want Route 53 to respond to DNS queries with up to eight healthy records selected at random.

125
Q

Route53 Weighted routing policy

A

Use to route traffic to multiple resources in proportions that you specify.

126
Q

Customer Gateway with Static IP

A

Required for a VPN connection

127
Q

S3 Website Requirements

A

Bucket name must be the same as the domain name
The website must have a registered domain name
Route 53 will auto register, but if you’re using another registrar, CNAME or Alias must be configured

128
Q

ACM (AWS Certificate Manager)

A

AWS Certificate Manager is a service that lets you easily provision, manage, and deploy public and private Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services and your internal connected resources.

SSL/TLS certificates are used to secure network communications and establish the identity of websites over the Internet as well as resources on private networks.

AWS Certificate Manager removes the time-consuming manual process of purchasing, uploading, and renewing SSL/TLS certificates.

129
Q

AWS Config

A

AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources. Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations.

130
Q

AWS Datasync

A

Think of Migrations. This is not used for day to day on prem and AWS transfers like storage gateway.

AWS DataSync makes it simple and fast to move large amounts of data online between on-premises storage and Amazon S3, Amazon Elastic File System (Amazon EFS), or Amazon FSx for Windows File Server.

Handles NFS and SMB and self managed object store.

Transfers hundreds of terabytes and millions of files at speeds up to 10 times faster than open-source tools, over the internet or AWS Direct Connect links.

Best for AWS Direct Connection. Install data sync agent on premises.

131
Q

VPC Peering - You cannot:

A

Route edge to edge, or do transitive peering

If you are using VPC peering, on-premises connectivity (VPN and/or Direct Connect) must be made to
each VPC. Resources in a VPC cannot reach on-premises using the hybrid connectivity of a peered VPC

132
Q

What AWS resources are used for decoupling

A

SQS and SWF (simple workflow service)

133
Q

ALB supports what kind of routing?

A

Path based and host based

134
Q

S3 supports these notification services when an event occurs?

A

SNS, SQS, Lambda

135
Q

Tape Gateway

A

Uses virtual tapes to back up physical on-prem tapes using AWS Storage Gateway - to reduce costs, use glacier deep archive

136
Q

SQS when to use multiple Queues?

A

For an app that has paid users and free users.

Process paid queue users first, then process the free queue.

137
Q

S3 object lock

A

With S3 Object Lock, you can store objects using a write-once-read-many (WORM) model. You can use it to prevent an object from being deleted or overwritten for a fixed amount of time or indefinitely.

Object Lock helps you meet regulatory requirements that require WORM storage, or simply add another layer of protection against object changes and deletion.

138
Q

AWS Codedeploy

A

Code deployment service capable of deployments to EC2 instances, on-premises instances, lambda, aws fargate, etc.

139
Q

AWS Canary

A

The purpose of a canary deployment is to reduce the risk of deploying a new version that impacts the workload.

The method will incrementally deploy the new version, making it visible to new users in a slow fashion. As you gain confidence in the deployment, you will deploy it to replace the current version in its entirety.

140
Q

AWS Linear deployment

A

Traffic is shifted in equal increments w/ equal number of minutes between

141
Q

Perfect Forward Secrecy

A

Used to offer SSL/TLS cipher suites for CloudFront and ELB

142
Q

SNI (Server Name Indication)

A

Custom SSL uses TLS protocol to allow multiple domains to serve SSL traffic over the same IP address by including the hostname.

Cloudfront delivers content from edge location using SNI custom SSL if an ACM cert is generated & associated with web distribution.

143
Q

Amazon DLM (Data Lifecycle Manager)

A

automates creation, retention, and deletion of snapshots taken to back up EBS volumes.

144
Q

AWS Secrets Manager is used for?

A

Encrypting Credentials, API keys, other secrets, and to enable auto rotation for all creds.

145
Q

Instance Metadata Contains

A

many, many items:

instance ID, public keys, public ip address, network interfaces, placement groups, etc.

146
Q

Cloudwatch Alarms have the ability to:

A

Stop, start, terminate, reboot, or recover EC2 instances

147
Q

Route53 AAAA record (IPv6)

A

An AAAA record maps a domain name to the IP address (Version 6) of the computer hosting the domain. An AAAA record is used to find the IP address of a computer connected to the internet from a name.

148
Q

Route53 A record (IPv4)

A

Maps a domain name to the IP address (version 4) of the computer hosting the domain. An A record is used to find the IP address of a computer connected to the internet from a name.

149
Q

How to route domain traffic to an ELB?

A

Use Route53 to create an alias pointed to the load balancer.

150
Q

Route 53 - when are CNAME’s used?

A

Only can be created for use with subdomains.

151
Q

IoT (Internet of Things)

A

managed cloud service that lets connected devices easily & securely interact with cloud apps and other devices.

Example: data on road conditions, weather services

152
Q

In Kinesis you have a large number of shards, and some of them start to expire. What do you do?

A

Increase write capacity assigned to shard table in Kinesis streams.

153
Q

AWS WAF (web access firewall)

A

AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources.

Set up AWS WAF.

Create a web access control list (web ACL) using the wizard in the AWS WAF console.

Choose the AWS resources that you want AWS WAF to inspect web requests for.

154
Q

Autoscaling cool down

A

Ensures ASG doesnt launch/terminate additional EC2 instances before the previous activity takes effect

Default value is 300 seconds, but can be configured.

155
Q

What is a Cloudformation Creation Policy?

A

Associate the CreationPolicy attribute with a resource to prevent its status from reaching create complete until AWS CloudFormation receives a specified number of success signals or the timeout period is exceeded.

To signal a resource, you can use the cfn-signal helper script or SignalResource API. AWS CloudFormation publishes valid signals to the stack events so that you track the number of signals sent.

"CreationPolicy" : {
  "AutoScalingCreationPolicy" : {
    "MinSuccessfulInstancesPercent" : Integer
  },
  "ResourceSignal" : {    
    "Count" : Integer,
    "Timeout" : String
  }
}
156
Q

EC2 Placement groups

A

Cluster: packs instances close together inside an AZ. Workloads achieve low-latency network performance necessary for tightly coupled node-to-node comms typical of HPC.

Partition: spreads instances across logical partitions such that the groups of instances in one partition dont share underlying hardware with groups of instances in different partitions. Used for large, distributed workloads like Hadoop, cassandra, kafka.

Spread: strictly places a small group of instances across distinct underlying hardware to reduce correlated failures.

157
Q

When are instances billed?

A

While running, and while stopping to hibernate.

Reserved instances are billed when terminated until the end of their term, or until they are sold on the marketplace.

158
Q

What kind of SQS Queues preserve order of messages?

A

Only FIFO queues preserve order of messages

159
Q

AWS Appsync

A

AWS AppSync is a fully managed service that makes it easy to develop GraphQL APIs by handling the heavy lifting of securely connecting to data sources like AWS DynamoDB, Lambda, and more.

Adding caches to improve performance, subscriptions to support real-time updates, and client-side data stores that keep off-line clients in sync are just as easy.

Once deployed, AWS AppSync automatically scales your GraphQL API execution engine up and down to meet API request volumes.

160
Q

When asked about durable storage what service should be the first to come to mind on the test?

A

S3

161
Q

What is GraphQL?

A

A language for API’s that enables you to query and manipulate data easily

162
Q

Which database service is automatically scaled? RDS or DynamoDB?

A

DynamoDB

163
Q

When using parallel requests to store and retrieve data at the same time, what can happen with S3?

A

If an app is using multiple PUT commands and multiple GET commands, and the same file is being accessed, the file with the most recent time stamp will be selected. This can cause inconsistencies when putting or getting files with S3.

S3 doesn’t support file locking in the way that EFS does. S3 file locking only prevents files from being changed or deleted after a set amount of time. EFS will lock files that are in use/being updated to prevent inconsistencies, but S3 will not.

164
Q

While trying to create 30 EC2 instances, it fails. What happened?

A

AWS has limits for vCPUs, so if you create too many, the creation can fail.

vCPU limits are set per region, not per AZ.

If you require more instances, submit a limit increase to AWS for consideration.

165
Q

Restricting access to S3 using Origin Access Identity (OAI)

A

To restrict access to content that you serve from Amazon S3 buckets, follow these steps:

Create a special CloudFront user called an origin access identity (OAI) and associate it with your distribution.

Configure your S3 bucket permissions so that CloudFront can use the OAI to access the files in your bucket and serve them to your users. Make sure that users can’t use a direct URL to the S3 bucket to access a file there.

166
Q

AWS APP Mesh

A

Service mesh that provides app-level networking to make it easy for services to communicate with eachother across multiple types of compute infrastructure

167
Q

AWS Cloud Map

A

Cloud resource discovery service that enables naming of application resources with custom names and auto updates locations of dynamically changing resources.

168
Q

S3 SELECT

A

Custom S3 SELECT query specifically for S3

169
Q

What S3 object attributes are required to make a select query against an S3 object?

A

Bucket name and Object Key

S3 bucket name - Globally unique ID
S3 object name - key name, which uniquely identifies the object in the bucket
S3 metadata - Provides info about the object “Date, type, etc.”
S3 Object Tag - Tagging to help categorize storage

170
Q

Glacier Expedited Retrieval

A

Provides fast retrieval or archived data on urgent requests (1-5 minutes)

171
Q

Glacier Provisioned Capacity (retrieval)

A

Ensures retrieval capacity up to 150MB/s, and needs to be purchased if urgent retrieval is required under all circumstances.

It’s possible an urgent request could be denied without provisioned capacity.

172
Q

Glacier SELECT

A

Used to perform filtering operations on data archives in Glacier

173
Q

BULK Retrieval

A

Bulk retrievals are S3 Glacier’s lowest-cost retrieval option, which you can use to retrieve large amounts, even petabytes, of data inexpensively in a day. Bulk retrievals typically complete within 5–12 hours.

174
Q

What is a destination for Kinesis real time analytics?

A

Kinesis can be used in real-time analytics situations and Lambda can be a destination

175
Q

How are NACL rules evaluated?

A

NACL rules are evaluated from the lowest number first.

If there is a match, the traffic passes immediately.

Example: if rule 100 says “Allow” it will allow traffic even if 101 says explicitly deny the same rule.

176
Q

How to change ownership of object in one bucket to another in a transfer?

A

Enable cross-account permissions in S3 by creating an IAM customer managed policy that allows an IAM user or role to copy objects from source bucket in one account to destination in the other account.

Then attach the policy to the IAM user or role wanted to transfer objects between accounts.

177
Q

What is the largest PUT you can do in S3?

A

5GB

178
Q

Which AWS file storage provides semantics? S3 or EFS?

A

EFS provides semantics

S3 does not

179
Q

S3 Transfer Acceleration

A

Enables, fast,easy, and secure transfer of files over long distances between client and S3.

Uses CloudFront’s globally distributed Edge locations.

As data arrives at edge, it is routed to S3 bucket over an optimized network path.

180
Q

How long does Kinesis data streams retain data by default?

A

Default is 24 hours, but it can be increased to a maximum of 168 hours.

181
Q

EFA - Elastic Fabric Adapter

A

One per Ec2 instance, network device to accelerate HPC and machine learning cluster. (not for windows)

182
Q

Launch Configurations

A

A Launch Configuration can only be specified once for an ASG at a time, and cannot be modified after it’s created.

In order to launch a new AMI in an ASG, a new Launch Configuration must be created.

183
Q

Aurora DB Endpoint

A

An intermediate handler so that no hostnames have to be hardcoded, and no logic needs to be written for load balancing/rerouting when some instances aren’t available.

Each Aurora cluster has a reader endpoint.

184
Q

What happens when spot instances are interrupted?

A

They are terminated by default.

You can choose to have them terminated, stopped, or hibernated upon interrupt.

Stop and hibernate are available for persistent spot requests and spot fleets with the “maintain” option enabled.

185
Q

EFS Keywords and attributes

A

“File operation” indicates EFS. EFS allows concurrent connections from multiple EC2 instances.

Achieves throughput and low-latency for big data types.

Provides read after write consistency.

186
Q

How do you associate a DynamoDB stream with Lambda?

A

the DynamoDB stream ARN can be used to associate it with a lambda function.

187
Q

What is AWS Glue

A

A fully managed ETL service

188
Q

What is S3 cross region replication?

A

When S3 is replicated across regions for redundancy

189
Q

In a single EC2 instance, what is the lowest latency storage?

A

EBS for up to 16 TB of storage.

190
Q

For multiple EC2 instances running concurrently, what is the lowest latency storage?

A

EFS

191
Q

Unified Cloudwatch Logs Agent

A

Used to collect EC2 instance and on premises logs.

  • collects logs and advanced metrics with installation and configuration of one agent
  • Unified agent allows collection of logs from Windows server
  • Collects additional metrics for “in-guest” visibility
  • provides better performance
192
Q

Cloudwatch Logs Insights

A

Enables interactive search and analysis of log data of Cloudwatch logs

  • perform queries against logs
  • purpose-built query language with simple, powerful commands
193
Q

SSM Agent (systems manager agent)

A

Centralizes operations data from multiple AWS services and automates tasks across AWS resources

  • create logical groups, such as apps, different layers of app stack, or prod/dev
  • select groups and view API activity, resource config changes, notifications, operations alerts, software inventory, patch compliance.
194
Q

AWS inspector agent

A

A security assessment service which only helps in checking for unintended network accessibility of EC2 and EC2 vulnerabilities

195
Q

CloudWatch Dashboard

A

Allows resources to be managed in a single view

196
Q

Is DynamoDB auto scaling default?

A

Yes it is, but you may be asked about auto scaling DynamoDB, so say that it is.

It can be disabled or enabled on DynamoDB tables.

197
Q

EC2 instance metadata retrieval

A

Use:

curl http://yourec2instance/latest/meta-data/

public ipv4
private ipv4
all other metadata

198
Q

AWS Global Accelerator

A

Improves availability and performance for local and global users.

Provides static IPs as a fixed entry point to app endpoints in single or multiple regions, such as app load balancers, network load balancers, or EC2.

  • optimizes TCP and UDP traffic
  • continually monitors health of application endpoints
  • detects unhealthy endpoints in less than a minute
  • routes traffic to closest location using Anycast
199
Q

When to use Global Accelerator over CloudFront?

A

Global accelerator improves performance for a wide range of apps over TCP and UDP by proxying packets to edge locations.

It is a good fit for non-HTTP, such as gaming (UDP), IoT(MQTT), or VOIP, as well as for HTTP that requires static IP addresses or deterministic fast-regional failover.

Cloudfront improves performance for cacheable content (images and videos), dynamic content (API accelerated, dynamic site delivery), does not route traffic to closest edge location via Anycast Static IP.

Both have DDOS and AWS SHIELD integration.

200
Q

Where should I upload 3rd party SSL Certificates?

A

Upload them to ACM (preferred) or IAM certificate store.

201
Q

How to backup a Redshift cluster to another region?

A

Enable cross-region snapshot copy to backup redshift cluster to another region to prevent loss of data in a region outage.

  • Enable copy feature for each cluster
  • Configure where to copy snapshots and how long to keep automated snapshots in destination region
  • when cross-region copy is enabled for a cluster, all new manual and auto snapshots are copied to specified regions
202
Q

If customer’s identity store isn’t compatible with SAML 2.0, can you use STS for temporary credentials?

A

Yes, but a custom ID broker application has to be created to leverage AWS STS for temp credentials.

203
Q

In SQS what do I do if I cannot have any duplicates in my queue?

A

Use FIFO (first in first out) when duplicates can’t be tolerated.

204
Q

SWF (simple workflow service)

A

Can be used when tasks cannot be duplicated.

Amazon SWF helps developers build, run, and scale background jobs that have parallel or sequential steps. You can think of Amazon SWF as a fully-managed state tracker and task coordinator in the Cloud.

If your app’s steps take more than 500 milliseconds to complete, you need to track the state of processing, and you need to recover or retry if a task fails, Amazon SWF can help you.

205
Q

AWS Guard Duty

A

Intelligent threat detection service to proect AWS accounts and workloads

206
Q

S3 Glacier Vault

A

Used for long-term storage for auditing, and can be used to create a vault-lock policy, which is an access policy that can be locked to deny user permissions, to delete archive until it has existed for X amount of time. After locking, policy is immutable.
-used for regulatory and compliance archival.

207
Q

Cloudwatch Detailed Metrics

A

Provide a higher frequency (every minute) of default monitoring data

208
Q

Are DNS resolution and DNS hostnames enabled by default when a new VPN is created?

A

No.

In order to give a new EC2 instance in a new VPC public DNS hostnames, DNS hostnames and resolution need to be enabled in the new VPC.

209
Q

What AWS Config policy monitors passwords?

A

IAM_PASSWORD_POLICY

210
Q

Cloud Trail event history

A

Allows view, search, and download of past 90 days of supported activity on an AWS afccount.

After that, a cloud trail “trail” can be created to archive trails to S3.
It can also be analyzed in CW Logs and CW Events.

211
Q

AWS Step Functions

A

Allows serverless “orchestrations” for modern apps by breaking workflows into steps. Used for app dev. to separate from business logic.

212
Q

AWS Transit Gateway

A

Used to connect VPCs to on premise-networks with a single gateway.

  • hub and spoke model which can scale with many VPCs
  • allows connections through network transit center
  • connects on premises data centers through site-to-site VPNs
213
Q

Link Aggregation Group (LAG)

A

Logical interface that uses LACP (Link aggregation control protocol) to aggregate multiple connections at a single Direct Connect endpoint, allowing them to be treated like a single, managed connection.

214
Q

X-RAY

A

Used to trace API gateway calls to underlying services

provides end-to-end view of entire API request

215
Q

Cognito

A

Allows MFA through SMS messaging or time based one time paswords

216
Q

How do you track S3 bucket level operations?

A

Use Cloudtrail

217
Q

How do you track S3 object level operations?

A

Use Server Access Logs