CloudAcademy: Knowledge Check: Management (SAA-C03) 2 of 2 Flashcards
An AWS CloudFormation _____ allows you to create, update, or delete your stacks across a number of AWS accounts in different regions with a single template.
A. StackSet
B. stack instance
C. stack policy
D. stack trigger
A. StackSet
Explanation:
StackSets allow you to create, update, or delete your stacks across a number of AWS accounts in different regions with a single template.
To install the CloudWatch Logs agent on EC2 instances to send data back to CloudWatch, you need to correctly configure an IAM role and attach it to your instance. When attaching permissions policies, what option(s) should you select?
A. Only CloudWatch Agent Server Policy
B. Only Amazon EC2 Role for SSM
C. CloudWatch Agent Server Policy and with Amazon EC2 Role for SSM
D. Only Amazon Cloudwatch service role for SSM
C. CloudWatch Agent Server Policy and with Amazon EC2 Role for SSM
Explanation:
The role that is simply used to install the agent and send data back to CloudWatch needs the following configuration, the ‘select type of trusted identity’ needs to be ‘AWS service’. The option ‘choose the service that will use this role’ needs to be ‘EC2 Allows EC2 instances to call AWS services on your behalf’. And finally under the ‘Attach Permissions Policies’ it needs to be ‘CloudWatch Agent Server Polic’y and ‘Amazon EC2 Role for SSM’.
What is an AWS CloudFormation stack?
A. a JSON or YAML file that describes your environment and resources to build within your account
B. a tool that allows you to replicate existing infrastructure that wasn’t deployed using CloudFormation
C. a set of AWS resources that you can provision, update, or delete all at once
D. a tool that allows you to visually create your environment through a drag-and-drop interface, which allows CloudFormation to automatically create a template based off of your design
C. a set of AWS resources that you can provision, update, or delete all at once
Explanation:
A CloudFormation stack is a set of AWS resources that you can provision, update, or delete all at once.
Which of the following are use cases for AWS Glue? (Choose 3 answers)
A. Queries against an Amazon S3 data lake
B. Unified view of data across multiple data stores
C. Analyze log data in data warehouse
D. Generate the schema for structured data
A. Queries against an Amazon S3 data lake
B. Unified view of data across multiple data stores
C. Analyze log data in data warehouse
Explanation:
We can use the AWS Glue Data Catalog to quickly discover and search across multiple AWS data sets without moving the data. Once the data is cataloged, it is immediately available for search and query using Amazon Athena, Amazon EMR, and Amazon Redshift Spectrum. AWS Glue generates the schema for Userr semi-structured data, creates ETL code to transform, flatten, and enrich Userr data, and loads Userr data warehouse on a recurring basis.
In AWS Cost Explorer, _____ costs represent your usage costs on the day that they are charged to you, or, in finance terms, they represent your costs on a cash basis of accounting.
A. standard
B. recurrent
C. unblended
D. amortized
C. unblended
Explanation:
The unblended costs represent your usage costs on the day that they are charged to you, or, in finance terms, they represent your costs on a cash basis of accounting.
When a log file is delivered to an S3 bucket, CloudTrail creates a ______ which is a set of unique characters created from a data source.
A. Hash File
B. Log File
C. Data File
D. Action File
A. Hash File
Explanation:
When a log file is delivered to an S3 bucket a hash is created for it by CloudTrail. A hash file is a set of characters that are unique that are created from a data source.
Which AWS Glue component can scan data in all kinds of repositories, classify it, extract schema information from it, and store the metadata automatically?
A. AWS Glue Crawlers
B. AWS Glue Data Catalog
C. AWS Glue ETL Operations
D. AWS Glue Jobs system
A. AWS Glue Crawlers
Explanation:
AWS Glue also lets user set up crawlers that can scan data in all kinds of repositories, classify it, extract schema information from it, and store the metadata automatically in the AWS Glue Data Catalog. The AWS Glue Data Catalog can then be used to guide ETL operations.
In AWS, _____ allow the user to receive notifications when costs or usage exceed a certain predefined amount.
A. budgets
B. quotas
C. thresholds
D. alarms
A. budgets
Explanation:
Budgets allow the user to get notified when costs or usage exceed a certain predefined amount.
Which of the following actions is not a best practice for AWS resource tagging?
A. Use a consistent tag naming convention.
B. Tag as few resources as possible.
C. Think of a certain use case before adding a tag.
D. Find redundancies and overlapping tags and simplify them.
B. Tag as few resources as possible.
Explanation:
Let’s look at some tagging best practices. Tag everything. Tag as many resources as possible so that no resource is left untagged. Make this a rule. Next, find a purpose for each tag. Think of a certain use case before adding a tag. Find redundancies and overlapping tags and simplify them. Next, consistency is key. Use a consistent naming convention.
What is the purpose of AWS CloudFormation?
A. to provision infrastructure resources via a simple template in a YAML or JSON format
B. to connect to, configure, and provision an RDS or DynamoDB database
C. to create a Virtual Private Cloud with both private and public subnets with Network Access Control Lists for security
D. to introduce autoscaling and elastic load balancers for higher variability
A. to provision infrastructure resources via a simple template in a YAML or JSON format
Explanation:
Now, by using AWS CloudFormation you can provision all of your infrastructure resources that you require via a simple template in a YAML or JSON format.
____ tags are special tags that are used by Cost Explorer and other services for allocation and visualization.
A. Simple Resource Name
B. Cost allocation
C. Environment
D. Cost visualization
B. Cost allocation
Explanation:
Cost allocation tags are special tags that are used by Cost Explorer and other services for allocation and visualization.
Which of the following actions is not a best practice for AWS resource tagging?
A. Audit and maintain your tags.
B. Maximize the number of different tags you adopt.
C. Automate tag management.
D. Set up policies to forbid launching untagged resources.
B. Maximize the number of different tags you adopt.
Explanation:
Let’s look at some tagging best practices. Limit the number of tags you adopt. Automate tag management. Set up policies to forbid launching untagged resources. And, finally, audit and maintain your tags.
With _____, AWS introduced a sort of reward system for particularly active users and developers.
A. billing
B. credits
C. vouchers
D. rewards
B. credits
Explanation:
With credits, AWS introduced a sort of reward system for particularly active users and developers. You can use them instead of spending money on certain services.
Which of the following actions is not a best practice for AWS resource tagging?
A. Keep the number of different tags as low as necessary, but the information value of each tag as high as possible.
B. Tag maintenance should involve at most one or two people from the team.
C. Make it a habit to review tags from time to time and verify their purpose.
D. Make use of tools like the AWS tag editor to automate your tagging.
B. Tag maintenance should involve at most one or two people from the team.
Explanation:
Let’s look at some tagging best practices. Obviously, the more tags you have, the more tags you have to deal with. Keep the number as low as necessary, but the information value as high as possible. Make use of tools like the AWS Tag Editor to automate your tagging. Make it a habit to review tags from time to time and verify their purpose. Tag maintenance is essential and should involve everyone on the team.
AWS Artifact reports are known as _____.
A. compliance agreements
B. SOC artifacts
C. audit artifacts
D. identity-based policies
C. audit artifacts
Explanation:
AWS Artifact reports consist of AWS auditor-issued reports and include everything from ISO certifications to PCI and SOC reports. These reports, known as audit artifacts, may be shared with auditors and regulators by creating IAM users with an associated identity-based policy that grants access only to the necessary reports.