Confusing Items Flashcards

1
Q

Which performs synchronous data replication in RDS?

A

Multi-AZ deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asynchronous replication - high scalable feature of RDS

A

RDS Read Replica

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloudtrail parameter to capture changes made to AWS resources in all regions and which will also include activity from global services such as IAM, Route 53, AWS WAF, and CloudFront

A
  • -is-multi-region-trail

- -include-global-service-events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

two types of events that can be logged in CloudTrail:

A
  1. management events (default)

2. data events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As a best practice, create a trail that applies to all regions in the AWS partition in which you are working. (default) - true or false

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CloudWatch custom metrics:

A
  1. Memory utilization
  2. disk swap utilization
  3. disk space utilization
  4. page file utilization
  5. log collection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Enhanced Monitoring is a feature of RDS and not of CloudWatch - true or false

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloudwatch agent

A

It can be installed to all of your EC2 instances which gathers the memory and disk utilization data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSM Agent runs using ? permissions

A

SSM agent runs on EC2 using root permissions (Linux) or System permissions (Windows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You can directly assign an EIPto an Auto Scaling group. - true or false

A

false; you still cannot directly assign an EIPto an Auto Scaling group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ASG is highly dependent on the ELB - true or false

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSD are best for workloads with

A

small, random IO Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HDD are best for

A

large, sequential IO operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

gp2
volume size
max iops

A

general purpose SSD
1GiB-16TiB
16,000 IOPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

io1
volume size
max iops

A

Provisioned IOPS SSD
4GiB-16TiB
64,000 IOPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

st1
volume size
max iops

A

Throughput Optimized HDD
500GiB-16TiB
500 IOPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

sc1
volume size
max iops

A

Cold HDD
500GiB-16TiB
250 IOPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Aurora primary instance handles all?

A

DDL and DML statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The Aurora custom endpoint

A

provides load-balanced database connections based on criteria other than the read-only or read-write capability of the DB instances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

reader endpoint enables your Aurora database to automatically perform load-balancing among all the Aurora Replicas - true or false

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

cluster/writer endpoint has the functionality to automatically perform load-balancing among all the Aurora Replicas of your cluster - true or false

A

false - cluster/writer endpoint DOES NOT HAVE the functionality to automatically perform load-balancing among all the Aurora Replicas of your cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cloudfront Origin group can be any combination of the following:

A

AWS origins, like Amazon S3 buckets or Amazon EC2 instances, or custom origins, like your own HTTP web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Field Level Encryption

A

cloudfront feature that allows you to specify upload user submitted data such as credit card numbers to your origin servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

the application could use EBS encryption to encrypt or decrypt each individual data that it writes on the disk. - T or F

A

false; the application could not use EBS Encryption to encrypt or decrypt each individual data that it writes on the disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

most cost-effective storage type for the EC2 instance which is used for infrequently accessed data

A

Cold HDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An EBS volume is off-instance storage that can persist independently from the life of an instance - T or F

A

true

27
Q

When you create an EBS volume in an Availability Zone, it is automatically replicated on a separate AWS region to prevent data loss due to a failure of any single hardware component.- T or F

A

false; When you create an EBS volume in an Availability Zone, it is automatically replicated within that zone to prevent data loss due to a failure of any single hardware component.

28
Q

Classic Load Balancer supportServer Name Indication (SNI) - t or f

A

false; Classic Load Balancer does not supportServer Name Indication (SNI)

29
Q

Amazon CloudFront Adds SNI Custom SSL and HTTP to HTTPS Redirect Features - t or F

A

true

30
Q

prerequisites when routing traffic using Amazon Route 53 to a website that is hosted in an Amazon S3 Bucket

A
  1. The S3 bucket name must be the same as the domain name

2. A registered domain name

31
Q

Geolocation routing lets you

A

choose the resources that serve your traffic based on the geographic location of your users, meaning the location that DNS queries originate from

32
Q

Elastic Load Balancers distribute traffic among EC2 instances across multiple AvailabilityZones but not across AWS regions - true or false

A

true

33
Q

CloudFront geo-restriction feature is primarily used to

A

prevent users in specific geographic locations from accessing content that you’re distributing through a CloudFront web distribution

34
Q

S3 Server Side Encryption:

A
  1. Amazon S3-Managed Keys (SSE-S3)
  2. AWS KMS-Managed Keys (SSE-KMS)
  3. Customer Provided Keys (SSE-3)
35
Q

S3 Client Side Encryption:

A
  1. AWS KMS-managed Customer Master Key

2. Client-side master Key

36
Q

EBS Encryption uses:

A

AWS KMS

37
Q

Elastic Load Balancing provides access logs that contains:

A
  1. time the request was received
  2. client’s IP address,
  3. latencies,
  4. request paths, and
  5. server responses.
    You can use these access logs to analyze traffic patterns and troubleshoot issues
38
Q

Access logging is enabled by default for Elastic Load Balancing - true or false

A

false; Access logging is an optional feature of Elastic Load Balancing that is disabled by default

39
Q

You can only change the storage class of your objects from S3 Standard storage class to STANDARD_IA or ONEZONE_IA storage after 30 days - T or F

A

true

40
Q

Does INTELLIGENT_TIERING, GLACIER, and DEEP_ARCHIVE storage class have a time constraint for transitioning S3 objects?

A

No, It doesn’t apply to INTELLIGENT_TIERING, GLACIER, and DEEP_ARCHIVE storage class

41
Q

AVault Lock policyis a

A

a vault access policy that you can attach to S3 Glacier value with one resource based vault access - can help to enforce regulatory and compliance requirements

42
Q

Redshift Cross-Region Snapshots Copy

A

When cross-region copy is enabled for a cluster, all new manual and automatic snapshots are copied to the specified region.

43
Q

Redshift only supprts multi-AZ deployments - T or F

A

false; Redshift only supports Single AZ

44
Q

AWS X-Ray

A

trace and analyze user requests as they travel through your Amazon API Gateway APIs to the underlying services

45
Q

CloudTrail is primarily used for

A

API logging of all of your AWS resources

46
Q

What can you add to cognito if there’s a requirement to add a second authentication method that doesn’t solely rely on username and password

A

Add multi-factor authentication (MFA) to a user pool in Cognito to protect the identity of your users.

47
Q

FTP server protocol for security group

A

TCP, Port range: 20-21

48
Q

DynamoDB Auto Scaling uses ? for scaling

A

the AWS Application Auto Scaling service to dynamically adjust provisioned throughput capacity on your behalf.

49
Q

Can ASG be used to scale DynamoDB?

A

No, you can only put Ec2 instances for ASG

50
Q

unified CloudWatch agent

A

Used to collect logs from your Amazon EC2 instances and on-premises servers into CloudWatch Logs

51
Q

CloudWatch Logs Insights enables you to

A

interactively search and analyze your log data in Amazon CloudWatch Log

52
Q

Which methods ensure that all of the objects uploaded to the S3 bucket can be read publicly all over the Internet?

A
  1. In S3, set the permissions of the object to public read during upload.
  2. Configure the S3 bucket policy to set all objects to public read.
53
Q

Detailed Monitoring is used by

A

Cloudwatch for Ec2 (Data is available in 1-minute periods for an additional cost)

54
Q

EnhancedMonitoring is used for

A

RDS Cloudwatch (except for db.m1.small)

55
Q

Amazon Cloudwatch Logs vs CloudWatch Logs Agent vs Cloudwatch Agent

A

Amazon CloudWatch Logs to monitor, store, and access your log files from Amazon Elastic Compute Cloud (Amazon EC2) instances, AWS CloudTrail, Route53, and other sources

CloudWatch Logs agent provides an automated way to send log data to CloudWatch Logs from Amazon EC2 instances

CloudWatch agent - Collect logs from Amazon EC2 instances and on-premises servers, running either Linux or Windows Server

56
Q

Amazon Kinesis Data Firehose is the

A

easiest way to load streaming data into data stores and analytics tools.

57
Q

Amazon Kinesis is the streaming data platform of AWS and has four distinct services under it:

A
  1. Kinesis Data Firehose,
  2. Kinesis Data Streams,
  3. Kinesis Video Streams, and
  4. Amazon Kinesis Data Analytics
58
Q

Active-Active Failover

A

when you want all of your resources to be available the majority of the time

59
Q

Active-Passive Failover

A

when you want a primary resource or group of resources to be available the majority of the time and you want a secondary resource or group of resources to be on standby in case all the primary resources become unavailable

60
Q

The following VPC peering connection configurations are not supported.

A
  1. Overlapping CIDR Blocks
  2. Transitive Peering
  3. Edge to Edge Routing Through a Gateway or Private Connection
61
Q

Valid VPC Peering configurations:

A
  1. Two VPCs peered to a specific CIDR block in one VPC
  2. One to one relationship between two Virtual Private Cloud networks
  3. One VPC Peered with two VPCs using longest prefix match
62
Q

You can use a combination of EC2 and SWF for the following scenarios:

A
  1. Managing a multi-step and multi-decision checkout process of an e-commerce mobile app.
  2. Orchestrating the execution of distributed business processes
63
Q

Elasticache is the best option for

A

distributed session management.