Cloud Practitioner - PRACTICE 6 Flashcards
The AWS Cost Management tools give users the ability to do which of the following? (Select TWO.)
- Terminate all AWS resources automatically if budget thresholds are exceeded
- Break down AWS costs by day, service, and linked AWS account
- Create budgets and receive notifications if current or forecasted usage exceeds the budgets
- Switch automatically to Reserved Instances or Spot Instances, whichever is most cost- effective
- Move data stored in Amazon S3 to a more cost-effective storage class
Break down AWS costs by day, service, and linked AWS account & Create budgets and receive notifications if current or forecasted
Which AWS service or feature helps restrict the AWS service, resources, and individual API actions the users and roles in each member account can access?
- Amazon Cognito
- AWS Organizations
- AWS Shield
- AWS Firewall Manager
AWS Organizations
Under the shared responsibility model, which of the following tasks are the responsibility of the AWS customer? (Select TWO.)
- Ensuring that application data is encrypted at rest
- Ensuring that AWS NIP servers are set to the correct time
- Ensuring that users have received security training in the use of AWS services
- Ensuring that access to data centers is restricted
- Ensuring that hardware is disposed of properly
Ensuring that application data is encrypted at rest & Ensuring that users have received security training in the use of AWS services
As a customer on AWS you take responsibility for encrypting data. This includes encrypting data at rest and data in transit. It’s also a customer’s responsibility to properly train their staff in security best practices and procedures for the AWS services they use.
Under the AWS shared responsibility model, which of the following are customer responsibilities? (Select TWO.)
- Setting up server-side encryption on an Amazon S3 bucket
- Amazon RDS instance patching
- Network and firewall configurations
- Physical security of data center facilities
- Compute capacity availability
Setting up server-side encryption on an Amazon S3 bucket & Network and firewall configurations
As a customer on AWS you take responsibility for encrypting data. This includes encrypting data at rest and data in transit. Another security responsibility the customer owns is setting network and firewall configurations. For instance, you must configure Network ACLs and Security Groups, and any operating
system-level firewalls on your EC2 instances.
A web application running on AWS has been received malicious requests from the same set of IP addresses. Which AWS service can help secure the application and block the malicious traffic?
- AWS IAM
- Amazon GuardDuty
- Amazon SNS
- AWS WAF
AWS WAF
The AWS Web Application Firewall (WAF) is used to protect web applications or APIs against common web exploits. Rules can be created that block traffic based on source IP address.
Which AWS service provides the ability to detect inadvertent data leaks of personally identifiable information (PII) and user credential data?
- Amazon GuardDuty
- Amazon Inspector
- Amazon Macie
- AWS Shield
Amazon Macie
Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in Amazon S3.
According to the AWS Well-Architected Framework, what change management steps should be taken to achieve reliability in the AWS Cloud? (Select TWO.)
- Use AWS Config to generate an inventory of AWS resources
- Use service limits to prevent users from creating or making changes to AWS resources
- Use AWS CloudTrail to record AWS API calls into an auditable log file
- Use AWS Certificate Manager to create a catalog of approved services
- Use Amazon GuardDuty to record API
activity to an S3 bucket
Use AWS Config to generate an inventory of AWS resources & Use AWS CloudTrail to record AWS API calls into an auditable log file
AWS Config can be used to track the configuration state of your resources and how the state has changed over time. With CloudTrail you can audit who made what API
calls on what resources at what time. This can help with identifying changes that cause reliability issues.
Which of the following acts as a virtual firewall at the Amazon EC2 instance level to control traffic for one or more instances?
- Route table
- Virtual private gateways (VPG)
- Security groups
- Network Access Control Lists (ACL)
Security Groups
A security group is an instance-level firewall that can be used to control traffic the that reaches (ingress/inbound) and is sent out from (egress/outbound) your EC2 instances. Rules are created for inbound or outbound traffic.
Which AWS Cloud design principles can help increase reliability? (Select TWO.)
- Using monolithic architecture
- Measuring overall efficiency
- Testing recovery procedures
- Adopting a consumption model
- Automatically recovering from failure
Testing recovery procedures
& Automatically recovering from failure
Which pricing model will interrupt a running Amazon EC2 instance if capacity becomes temporarily unavailable?
- On-Demand Instances
- Standard Reserved Instances
- Spot Instances
- Convertible Reserved Instances
Spot Instances
Amazon EC2 Spot Instances let you take advantage of unused EC2 capacity in the AWS cloud. Spot Instances are available at up to a 90% discount compared to On-Demand prices. When AWS need to reclaim the capacity you get a 2 minute warning and then your instances are terminated.
Which of the following statements about AWS’s pay-as-you-go pricing model is correct?
- It results in reduced capital expenditures
- It requires payment up front for AWS services
- It is relevant only for Amazon EC2, Amazon S3, and Amazon DynamoDB
- It reduces operational expenditures
It results in reduced capital expenditures
The pay-as-you-go pricing model means you only pay for the services and consumption you actually use. You are charged for compute, storage and outbound data transfer. This model reduces capital expenditure as you pay a monthly bill (operational expenditure).
Which AWS service can serve a static website?
- Amazon S3
- Amazon Route 53
- Amazon QuickSight
- AWS X-Ray
Amazon S3
A startup eCommerce company needs to quickly deliver new website features in an iterative manner, minimizing
the time to market. Which AWS Cloud feature allows this?
- Elasticity
- High availability
- Agility
- Reliability
Agility
What is the most efficient way to establish network connectivity from on-premises to multiple VPCs in different AWS Regions?
- Use AWS Direct Connect
- Use AWS VPN
- Use AWS Client VPN
- Use an AWS Transit Gateway
AWS Transit Gateway
AWS Transit Gateway is a service that enables customers to connect their Amazon Virtual Private Clouds (VPCs)
and their on-premises networks to a single gateway.
A company is using the AWS CLI and programmatic access of AWS resources from its on-premises network. What is a mandatory requirement in this scenario?
- Using an AWS Direct Connect connection
- Using an AWS access key and a secret key
- Using Amazon API Gateway
- Using an Amazon EC2 key pair
Using an AWS access key and a secret key
Access keys are long-term credentials for an IAM user or the AWS account root user. You can use access keys to sign programmatic requests to the AWS CLI or AWS API (directly or using the AWS SDK). Access keys consist of two parts: an access key ID (for example, AKIAIOSFODNN7EXAMPLE) and a secret
access key (for example, walrXUtnFEMI/K7MDENG/
bPxRfiCYEXAMPLEKEY). Like a username and password, you must use both the access key ID and secret access key together to authenticate your requests.