Basic Terms Flashcards

1
Q

What are burstable instances?

A

Amazon EC2 instances that are designed to provide baseline level of CPI performance w/ ability to burst to higher level when required by workload.

Ideal for workloads that don’t use full CPU often but need to “burst”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the link-local address?

A

http://169.254.169.254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Network ACL (Access Control List) Use Case?

A

Allows/denies specific inbound/outbound traffic at subnet level.

Rules apply to all instances in subnet.

No charge to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a subnet?

A

Availability Zone AWS feature that are range of IP addresses w/in VPC where you can place resources like EC2 instances & can define whether it is public (has internet access) or not (private).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an endpoint service?

Design Secure Architectures

A

Make private connection (w/out public internet) to service in VPC.
Can be connected through interface or gateway endpoint making communication faster & secure.=

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are ACL’s used in AWS?

A
  • Control traffic at Subnet Level
  • Can use default network ACL or create custom one.
  • Use network ACLs w/ security groups to control access to AWS resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Ciphertext?

Data Security

A

Encrypted Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Symmetric Encryption?

Data Security

A

Only one key (secret key) is used to encrypt & decrypt electronic data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Asymmetric Encryption?

A

A public key from public/private key pair used to encrupt plaintext, then private key to encrypt ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is OpenSSL?

A

Software tool that helps you create & manage secure connections over internet & is mainly used for working w/ SSL/TLS certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is elasticity?

Design Resilient Architectures

A

Use automation & horizontal scaling to match capacity w/ demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Synchronous Decoupling?

Design Resilient Architectures

A

Components that must always be available for proper functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Asynchronous Decoupling?

Design Resilient Architectures

A

Communication between components through durable components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Amazon Kinesis Data Streams?

Design Resilient Architectures

A

Allows you to collect, process, & analyze real-time data streams at massive scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is RPO?

Design highly available and/or fault-tolerant architectures

A

Recovery Point Object:

Maximum amount of time since last data recovery point.

Backups taken every so many hours:minutes:seconds based on requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is RTO?

Design highly available and/or fault-tolerant architectures

A

Recovery Time Object

Maximum acceptable delay b/w service interruption & service restoration measured in hours:minutes:seconds based on requirements.

17
Q

What is a Certificate Authority Authorization?

A

DNS record that allows domain owners to specify which certificate authorities are authorized to issue SSL/TLS certificates for their domain, enhancing security & preventing unauthorized certificate issuance.

18
Q

What is a principal?

A

Person/application that can make request for an action/operation on AWS resource.

19
Q

What are Identity-based policies?

A

Policies applied to users, groups, & roles.

20
Q

What are roles?

A

Identity w/ permissions assigned to it via policy where you can assume role & take on permissions.

21
Q

What is Security Token Service?

A

A

Allows for temp credentials be used w/ identity federation, delegation, cross-account access, & IAM roles.

22
Q

What is instance metadata?

A

Data about your EC2 instance.
Available at: http://169.254.169.254/latest/meta-data

23
Q

What is Amazon EC2 User Data?

A

The code is run when instance starts for first time.

24
Q

Is encoding automatic w/ console & AWS CLI?

25
Q

To what size is user data limited to in raw form b/4 it’s base-64 encoded?

26
Q

When does user data run and only run?

A

First time instance launches.