Ch2-Part2 Flashcards
- Which of the following are valid routing policies for Route 53? (Choose two.)
Simple routing
Fault recovery routing
Latency-based routing
Cached routing
A, C. Route 53 offers a number of different routing policies: simple, failover, geolocation, geoproximity, latency-based, multivalue answer, and weighted.
- Which of the following are valid routing policies for Route 53? (Choose two.)
FIFO routing
Multivalue answer routing
Geoproximity routing
Distributed routing
B, C. Route 53 offers a number of different routing policies: simple, failover, geolocation, geoproximity, latency-based, multivalue answer, and weighted.
- Which of the following routing policies sends traffic to a single resource, unless that resource is unhealthy, and then routes to a backup resource?
Health-based routing
Failover routing
Simple routing
Latency-based routing
B. Failover routing is used to send traffic to a single resource but then to failover routing to a secondary resource if the first is unhealthy.
- Which of the following routing policies can direct traffic to multiple resources as long as those resources are healthy?
Health-based routing
Latency-based routing
Multivalue answer routing
Region-based routing
C. Multivalue answer routing can direct requests to multiple resources and also performs health checks on those resources.
- Which of the following values is an invalid weight for a weighted routing policy?
1
255
125
These weights are all valid.
D. Weights are simply integers that can be summed to determine an overall weight and the fractional weights of each resource to which traffic is directed.
- How does a weight of 0 affect routing on Route 53 when using a weighted routing policy?
0 is an invalid weight.
All traffic is directed to the resource with a weight of 0, as long as that resource is healthy.
No traffic is directed to the resource with a weight of 0.
Traffic is routed to the resource, but health checks are not performed.
C. A weight of 0 removes the resource from service in a weighted routing policy.
- Which of the following statements concerning Route 53 routing policies are true? (Choose two.)
You can have multiple primary resources in a simple routing policy.
A weighted routing policy uses weights for routing, but not health checks.
You can have multiple secondary resources in a simple routing policy.
Health checks are ignored if a resource has a weight of over 100 in a routing policy.
A, C. A simple routing policy allows single and multiple resources for both the primary and secondary resources, so A and C are true. Weighted policies do honor health checks (so B is false), and D is inaccurate as weight numbers do not affect health checks.
- You are responsible for a media-serving website backed by a database that has a global user base. The fleet of EC2 instances serving the website is responding well to requests from the US, but requests from the EU are taking nearly five times as long to receive a response. Database CPU utilization stays between 70% and 90% throughout the day. What suggestions would you make to attempt to improve performance of this website? (Choose two.)
Install ElastiCache in front of the RDS instance to cache common queries and reduce database reads and therefore overall load.
Set up CloudFront to enable caching of data at edge locations closer to the EU user base.
Set up an Auto Scaling group with low CPU thresholds to scale up the EC2 instances.
Create additional EC2 instances that will serve the website, and locate them in a South Asia region.
A, B. The issues here are geographical proximity from EU users and load on the database, which has high CPU utilization. Therefore, those problems must be addressed. ElastiCache (A) should reduce load on the RDS instance, and CloudFront (B) caches responses in a way that should serve EU users more quickly.
- Which of the following are not valid instance types? (Choose two.)
T3
E1
M5
Q2
B, D. This is another memorization question. Valid instance types begin with T, M, C, R, X, Z, D, H, I, F, G, and P. Frankly, it’s hard to memorize these; the questions like this aren’t frequent, but they can sometimes appear. In this case, E and Q are not valid instance type prefixes.
- Which of the following statements about IAM are accurate? (Choose two.)
IAM manages access from one AWS resource to another.
IAM manages the authentication interface for the AWS console.
IAM manages access from a user to the AWS console.
IAM manages single sign-on for users to AWS applications.
A, C. IAM controls permissions for resource-to-resource interaction as well as user access to the AWS console. It does not provide an authentication interface or single sign-on.
- What does IAM stand for?
Improved Access Management
Identity and Access Management
Information and Access Management
Identity and Authorization Management
B. IAM stands for Identity and Access Management.
- Which of the following does IAM manage? (Choose two.)
Management of users accessing the AWS platform
Management of permissions for hosted application features
Management of roles affecting resources within AWS
Management of cost controls for user actions
A, C. IAM only applies to permissions for users, roles, and groups and does not affect billing or cost or specific application feature accessibility.
- Which of the following is not a feature of IAM?
Multi-Factor Authentication for AWS console access
Multi-Factor Authentication for object deletion in S3
Centralized control of AWS resource access
Integration with Active Directory accounts
B. IAM is not the managed service for handling MFA Delete setup on S3 buckets.
- Which of the following is required when you create additional IAM users beyond the root user?
Turning on MFA for all accounts
Turning on MFA for the root account
Creating a customized sign-in link for users in addition to the AWS root account sign-in link
Creating IAM groups for each new user
C. The only requirement here is creating a sign-in link that is not the same as the root sign-in link. Turning on MFA for the root or all accounts is not required, and while it is common to create an IAM group at this stage, it is not required for access.
- Which of the following are components of IAM? (Choose two.)
Users
Groups
Organizations
Organizational units
AB
- Which of the following are components of IAM? (Choose two.)
Roles
User policies
Connections
Permissions
A, D. Users, groups, roles, permissions, and similar constructs are part of IAM.
- Which of the following are valid AWS and IAM policy types? (Choose two.)
Access control lists
Application-based
Resource-based
Permission-based
A, C. There are four types of policies in IAM: identity-based, resource-based, organization SCPs, and access control lists (ACLs).
- How does IAM provide scalability benefits to your application deployments? (Choose two.)
It allows assignment of permissions to users en masse via groups.
It handles allowing users access to hosted applications en masse.
It allows consistency in access from instances to managed AWS services across large numbers of instances.
It ensures that users do not accidentally delete objects from S3 stores.
A, C. IAM aids in scalability primarily by consolidating and centralizing management of permissions, both to AWS users (A) and from instances to services (C).
- What is power user access, as it relates to IAM roles?
The AWS name for the root user
All IAM users are considered power users.
A type of user that has full access to all AWS services and resources but not group or user management
A user that can access application deployment profiles
C. Power user access is a predefined policy that allows access to all AWS services with the exception of group or user management within IAM.
- Which of the following can a power user not do?
Create users.
Create a new SNS topic.
Stop a running EC2 instance created by another user.
The power user can do all of these.
A. Power users can work with managed services, but they cannot create (or otherwise manage) IAM users.
- Which of the following is a best practice for handling root user access keys?
Store them only in an instances-protected .aws/ directory.
Delete them and instead use different user IAM credentials.
Only use them for API access but avoid console access.
Enable MFA Delete for when they are used in association with S3.
B. Although it might sound odd, AWS strongly recommends you delete your root user access keys and create IAM users for everyday use.
- Which of the following require root user credentials? (Choose two.)
Close an AWS account.
Delete IAM users.
Create a CloudFront key pair.
Create an IAM policy.
A, C. As a starting point, always consider that the root account is typically required for account-level operations, such as closing an account (A). It’s also needed for very privileged access; in this case, that’s creating a CloudFront key pair, which essentially provides signed access to applications and is a very trusted action. IAM does allow you to distribute user and policy management (B and D).