Cloud Solutions Architecture Flashcards
Which is the best definition of cloud architecture?
a) Applying cloud characteristics to technical and business requirements
a solution that uses cloud services and features to meet-
b) Designing applications in cloud-based, shared IT infrastructure by using virtual machines and
fault-tolerant data stores in the cloud
c) Relocating traditional on-premises data centers to internet-accessible data centers that a vendor
m a n a g e s
d) Combining frontend and backend software and components to create highlyavailable and
scalable web services that meet the needs of an organization
a) Applying cloud characteristics to technical a n d business requirements
The AWS Well-Architected Framework has six pillars. Three of the pillars are security,
operational excellence, and sustainability. What are two of the other pillars of the Well-
Architected Framework? (Select TWO.)
a) Cost optimization
b) Reliability
c) Risk management
d) Governance Privacy
a) Cost optimization
b) Reliability
Which actions are consistent with the operational excellence pillar of the AWS Well- Architected Framework? (Select TWO.)
a) Evaluate organizational structures and roles to identify skill gaps.
b) Plan and manage the full lifecycle of hardware assets.
c) Apply software engineering principles a n d methodology t o infrastructure as code.
d) Review and improve processes and procedures o n a continuous cycle.
d) Ensure operations personnel document changes to the infrastructure.
c) Apply software engineering principles a n d methodology t o infrastructure as code.
d) Review and improve processes and procedures o n a continuous cycle.
A specific application requires a frontend web tier of multiple servers that communicate with a backend application tier of multiple servers.
Which design most closely follows AWS best practices?
a) Design the web tier to communicate with the application tier through the Elastic Load Balancing (ELB) service
b) Create multiple instances that each combine a web frontend and application backend in the
same instance.
c) Assign a dedicated application server and a dedicated connection to each web server.
d) Create a full mesh network between the web and application tiers, so that each web server can
communicate directly with every application server.
a) Design the web tier to communicate with the application tier through the Elastic Load Balancing (ELB) service
A solutions architect is developing a process for handling server failures. Which process most closely follows AWS best practices?
a) Amazon CloudWatch detects a system failure. It notifies the systems administrator, who provisions a new server by using the AWS Management Console.
b) The operations Staff detects a system failure. They notify the systems administrator, who
provisions a new server by using the AWS Management Console.
c) Amazon CloudWatch detects a system failure. It initiates automation to provision a new server.
d) The operations staff detects a system failure. They initiate automation to provision a new server.
c) Amazon CloudWatch detects a system failure. It initiates automation to provision a new server.
A company is considering moving their on-premises data center to the cloud. Their primary motivation is to increase their cost efficiency. Which approach most closely follows AWS best practices?
a) Provision some of the servers in the cloud and ensure the servers run 24/7.
b) Provision the servers that are needed and stop services when they are not being used.
c) Replicate their on-premises data center in the cloud.
d) Maintain the on-premises data center as long as possible.
b) Provision the servers that are needed and stop services when they are not being used.
Here’s the corrected and formatted version:
A company stores read-only data in Amazon S3. Most users are in the same country as the company headquarters, while some users are located around the world. Which design decision most closely follows AWS best practices?
a) Use a bucket in the AWS Region that is closest to the company headquarters. All users access the data through Amazon CloudFront.
b) Use a bucket in the Region closest to the company headquarters.
c) Replicate objects across buckets in AWS Regions around the world. Users access the bucket in the Region that is closest to them.
d) Use a bucket in the Region that has the lowest average latency for all users.
a) Use a bucket in the AWS Region that is closest to the company headquarters. All users access the data through Amazon CloudFront.
Here’s the corrected and formatted version:
A consultant must access a large object in an S3 bucket. They need one day to access the file. Which method for granting access most closely follows AWS best practices?
a) Create a user account for the consultant. Grant the user account permissions to access the S3 bucket through the AWS Management Console.
b) Enable public access on the S3 bucket. Give the object URL to the consultant.
c) Create a presigned URL to the object that expires in 24 hours, and give it to the consultant.
d) Copy the object to a new S3 bucket. Enable public access on the new bucket. From the new bucket, get the object URL, and give it to the consultant.
c) Create a presigned URL to the object that expires in 24 hours, and give it to the consultant.
Which are main considerations that influence which AWS Regions to use? (Select TWO.)
a) Application resiliency during system failures
b) Latency reduction for end users
c) Security and access control
d) Compliance with laws and regulations
e) Protection against localized natural disasters
b) Latency reduction for end users
d) Compliance with laws and regulations
Which are main considerations that influence which Availability Zones to use? (Select TWO.)
a) Security and access control
b) Latency reduction for end users
c) Protection against localized natural disasters
d) Compliance with laws and regulations
e) Application resiliency during system failures
c) Protection against localized natural disasters
e) Application resiliency during system failures
Which statement reflects a design principle of the security pillar of the Well-Architected Framework?
a) Apply security at all layers of an architecture.
b) Ensure that staff are actively monitoring potential risks manually.
c) Decentralize privilege management.
d) Do not deploy a solution to production until you’re certain that no security risks exist.
a) Apply security at all layers of an architecture.
Which statements about responsibility are accurate based on the AWS shared responsibility model? (Select TWO.)
a) AWS is responsible for the configuration of security groups.
b) AWS is responsible for the physical security of data centers.
c) Customers are responsible for managing their user data.
d) AWS is responsible for host-based firewall configurations.
e) Customers are responsible for the installation, maintenance, and decommissioning of the hardware that they use in the AWS data center.
b) AWS is responsible for the physical security of data centers.
c) Customers are responsible for managing their user data.
Which options are characteristics of the principle of least privilege? (Select TWO.)
a) Always use groups.
b) Use encryption.
c) Monitor actions and changes.
d) Craft security policies that limit access to specific tasks.
e) Grant access only as needed.
d) Craft security policies that limit access to specific tasks.
e) Grant access only as needed.
Which statement about AWS Identity and Access Management (IAM) is true?
a) With IAM, you can manage encryption for items that require encryption at rest.
b) IAM provides an extra layer of security by offering anomaly detection on resources.
c) With IAM, you can grant principals granular access to resources.
d) IAM provides an audit trail of who performed an action, what action they performed, and when they performed it.
c) With IAM, you can grant principals granular access to resources.
Which statements describe AWS Identity and Access Management (IAM) roles? (Select TWO.)
a) They provide temporary security credentials.
b) They can only be used by accounts that are associated to the person who creates the role.
c) They provide permanent security credentials.
d) Individuals, applications, and services can assume roles.
e) They are uniquely associated to an individual.
a) They provide temporary security credentials.
d) Individuals, applications, and services can assume roles.