Core Exam Flashcards

1
Q

A published lambda version is a snapshot copy of the lambda function code and configuration in the $LATEST version. This means ….

A

A published version is inmutable. Code and configuration cannot be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Many instances can pull a single queue, but to keep multiple instances from processing the same SQS message…

A

your application must delete the SQS message after processing. Being processed many times is probably an indication that the message is not being deleted following processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Benefits in costs of SQS long polling over short polling

A

Long polling doesn’t return a response until a message arrives to the queue. That is why you also reduce the cost because you reduce the number of empty receives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An application requires maximum throughput and minimum latency. High availability is not a requirement. Which ec2 solution is best?

A

Cluster placement groups. These are logical grouping of instances in the same Availability Zone. Performance benefits by using private ip addresses. Also P2 instances are preferred (over T2) because they have enhanced Networking and compute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which method use CodePipeline to trigger automatically ?

A

CodePipeline use CloudWatch events to detect changes in the configured CodeCommit or Amazon S3 source. So then this starts the pipeline. This is default configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If you want to route traffic by subdomain names which EC2 solution is best?

A

An Application Load Balancer with host-based routing rules. With path-based rules you can route based on the uris (.com/lalala/lelele)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

For stream-based event sources (ex polling a dynamoDB) a lambda function is invoked. What happens if it is throttled?

A

Lambda attempts to process the throttled batch of records until the data expires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If data requires to be encrypted in transit and at Rest, what could not be allowed?

A

ELB configured with SSL termination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the best option to share an encrypted EBS volume between different accounts?

A

It is not possible to share access in the default process with a AWS managed CMK. To do so, you need a custom CMK. So copy the data to an unencrypted volume, create an snapshot and share it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A person with only list object permissions on a bucket can generate pre-signed urls?

A

No. Only the owner can share the objects using pre-signed urls with his own credentials to grant time-limited permission to download objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you have a deployment group with 10 instances and a minimum of 8 healthy instances, what would do CodeDeploy?

A

Will deploy in two instances at a time. If it fails, fails the overall deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the benefits of using CORS on S3?

A

Allows Javascript trying to access web pages on the bucket and allows to host a web font.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to ensure that data is encrypted in-flight both into and out S3?

A

Use the TLS endpoint and you can encrypt the data yourself on the client side before upload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The integration between AWS Api Gateway and a backend running other AWS service is called..

A

AWS Service Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you require to integrate Jenkins running on a instance with CodePipeline

A

Provide the IAM user credentials to integrate CodePipeline and fill out the required fields for your proxy host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What would be valid reasons to run most of the code on Lambda?

A

Scalability is a main reason and updates on the logic of the app occurs very frequently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If you use the AWS config managed rule IAM_PASSWORD_POLICY to check that password are changed after a period of time, which type of rule use?

A

Only a periodic trigger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

If the execution code of a lambda is taking too longer, which CloudWatch Metrics you should check?

A

The function’s latency CloudWatch metric to see if the latency is increasing or you can see an increase in the CloudWatch errors metric, which might be due to timeout errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You have two instances in separated subnets, how you failover to the other?

A

You can add a second private ip to the primary instance’s ENI that can be moved to the secondary instance. Then use load balancing to redirect traffic to the secondary instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The frontend connection to an ELB has timeout. The health checks are not reaching the EC2 instances. What are the recommendation to troubleshoot?

A

First of all check a direct connection to the instances. After that verify different configuration for the health checks settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

After a code update your app is down. What troubleshot steps could you take?

A

. Verify the SSL certificate is not expired.
. Validate the health check is working as expected after the software update. Instances are not in service until it succeeds
. The instances do not have the correct port open. Validate connection between the load balancer and the instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

If a system status check for an instances has failed you can try..

A

. Stop and restart the instance
. Create an instance recovery alarm. Retrieve the system log and look for errors
. Post your issue to the Amazon EC2 forum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is not a feature of KMS?

A

You cannot synchronize or move/copy keys across regions. You can only define rules to allow access across regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which is a best practice to test a correct RDS implementation?

A

Test the failover for your DB instance to see how long it takes and ensure that your programmatic connection to the new database is working as expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In the context of Authentication Flow for Cognito you must pass also one valid token. And also all tokens must pass the validation during the GetOpenIdToken if not the connection fails. Why?

A

Because the Identity ID you pass may not be the one that is returned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is recommended to prevent users to deleting CodeCommit repositories accidentally ?

A

AWS recommends using IAM policies along with MFA-protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which feature enables API developers to generate API responses from API Gateway directly without the integration with a backend?

A

Mock Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

If a S3 upload of large amount of data is taking too long which feature you can use to reduce the times?

A
  • Multipart upload

- Use direct connect between the on-premises and AWS VPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

If you need to increase a value on a DynamoDb table which commands would work?

A
  • ADD
  • SET + :p
  • SET - :p
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

On a S3 versioned bucket what is true regarding encryption keys if encryption at rest server-side is enabled and the user provides also his own keys?

A

Both keys can coexist on different versions of the object but the user is responsible to track which key was used for each version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

If you have an app growing and you need elasticity and high availability with increased compute needs how can the environment be optimized?

A
  • Launch larger instances and compute optimized
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

If you want to use CodeDeploy in different regions what is required?

A
  • Define your app in your target regions
  • copy the application bundle to a S3 bucket on each region
  • deploy using either serial o parallel rollout across the regions
33
Q

What do you need to perform a blue/green deployment with elastic Beanstalk?

A

You can clone your current environment or launch a new one with the desired configuration, test the new version and then use the Swap Environment URLs to switch to the new one.

34
Q

A Stateless lambda function does not have affinity with the underlying compute resources. What happens if you want to store the state of the function?

A

The state can be stored in S3, DynamoDB or any other cloud storage

35
Q

What’d be the cause GetRecords returns empty from a Kinesis Stream even there is data?

A

There is no more data currently in the shard

36
Q

How the integration between AWS Lambda and Kinesis works?

A

AWS Lambda invokes a Lambda function using the RequestResponse invocation type (synchronous) by polling the Kinesis Stream.

37
Q

Which features provides API Gateway invoking Lambda function over HTTP?

A
  • Ability to throttle individual users or request.
  • Protect against DDOs attacks
  • Provide a caching layer to cache response from your lambda function.
38
Q

How do CloudFormation and Elastic Beanstalk differs?

A

Cloudformation is a provisioning mechanism that supports Elastic Beanstalk, and this is for deployments only.

39
Q

How do you manage the permissions for a Lambda app to trigger a Lambda function when an image is uploaded to an S3 bucket?

A

Grant the Amazon S3 permissions (event source) to invoke the lambda function.

40
Q

If you want to use a custom domain name for your API endpoints, in addition to register it what else you must provide?

A

an SSL certificate

41
Q

Which protocols are available with IPSec to provide confidentiality?

A

DES, 3DES, AES

42
Q

What do you need to do if you receive the error Code Storage limit exceeded during the lambda execution?

A

Reduce the size of your code storage

43
Q

You want to copy an EBS-backed AMI (an snapshot) between regions, but the launched new AMI doesn’t contain the EBS snapshot, what most likely happened?

A

The EBS snapshot was encrypted and your user account doesn’t have the permissions to use the encryption key.

44
Q

Which API Gateway feature you can enable to reduce the calls made to your endpoint and improve the latency of the requests to your API?

A

API caching

45
Q

If you want to store in DynamoDB an ordered collection of values which type you must use?

A

Document

46
Q

On which cases SSL/TSL protect your data and which ones don’t ?

A

is great for encrypting server traffic , but cannot handle DDOS attacks and SQL injection.

47
Q

How you can immediately publish a lambda function version each time you create or update it?

A

Add the publish parameter in the CreateFunction or UpdateFunction requests

48
Q

If you want to start an app mobile, requiring that user have individual accounts but would only storing simple text data. Budget is a concern What solution would you use?

A

You need a backend database, DynamoDB and the ability for users to sing-in with Cognito

49
Q

A EC2 instance created from a instance store-backed AMI failed a status check. What steps would you follow?

A
  • Retrieve the system log and look for errors
  • Terminate the instance and launch a replacement
  • Wait for Amazon EC2 to resolve the issue
50
Q

How can you encrypt data at Rest in S3?

A
  • Set the server-side encryption option on upload

- Encrypt it on the client-side before uploading

51
Q

Which tasks placement supports Amazon ECS?

A
  • binpack: place task based on the least available amount of CPU or memory. This minimizes the number of instances in use.
  • random: place task randomly.
  • spread: place tasks evenly based on the specified attribute
52
Q

What are the best approaches to migate DDoS attacks?

A
  • Use security groups, acls, and host-based firewalls
  • Use AWS Shield
  • Use host-based or inline IDS/IPS systems

SSL/TLS (encryption) doesn’t help against these attacks

53
Q

If you want to use server-side encryption with S3 but with your own keys, what you must do?

A

Need to send the key and the algorithm of encryption with each api call

54
Q

You are experimenting spikes on traffic and the deployment of new instances is not fast enough. What is a way of not loosing submitted request due an application freeze?

A

Use Amazon SQS to delete acknowledged messages and redeliver the failed.

55
Q

What protocol is supported by AWS Lambda for authenticating in inbound API requests?

A

Signature version 4

56
Q

what provides aws cloudformation list-stacks?

A

A list of any of the stacks you have created or have been deleted up to 90 days ago.

57
Q

How you optimize performance and cost for uploading large amount of data to a principal S3 bucket from other locations on the world?

A

Utilize Cloudfront to allow customers yo upload to their closest location.
Also you can use S3 transfer accelerator on the primary bucket in the primary region.

58
Q

If you use a DynamoDB multi-region, and after a downtime users in different regions see different data. What happened?

A

The system did not include repair logic and request replay buffering logic for post-failure to re-synchronize data to the Region that was unavailable for a number of hours

59
Q

When would be useful CreateEventSourceMapping function when using Lambda or DynamoDB?

A

CreateEventSourceMapping identifies a stream as an event source for a lambda function. It can be either a Kinesis or DynamoDB stream. Lambda invokes the specified functions when records are posted to the stream.

60
Q

Which policies do you need for internal communication between an application running on a EC2 instance?

A
  • An IAM trust policy that allows the EC2 instance to assume a role
  • An IAM policy or S3 bucket policy that allows the role to get/put objects to the specific bucket.
61
Q

On Elastic BeanStalks workers tiers pulls job from..

A

SQS

62
Q

If you want to encrypt your data prior uploading without storing the key off premises, you have to use ..

A

CSE-C (client side encryption - customer key)

63
Q

Kinesis Firehose enables you to capture and transform data streamed from a client producer, to which data services?

A
  • Kinesis Analytics
  • S3
  • Elastic Search
  • Redshift
64
Q

What are the options to create a lambda function to be invoked through an Api Gateway?

A

You must create a deployment package, after which you have the option of uploading either locally or a S3 bucket to the API Gateway. Either from the CLI or the Lambda Console

65
Q

If you need to replicate API calls across two systems in real time, what you should use as a buffer and a transport mechanism for API call events

A

Kinesis is an event stream service. Streams can act as buffers and transport across systems for in-order programmatic events, making it ideal for replicating API calls across systems.

66
Q

Which variants of RTMP protocol does support Cloudfront?

A

RTMP
RTMPE (encrypted)
RTMPT (tunneled)
RTMPTE (tunneled encrypted)

67
Q

If you would like to sing-on AWS using third parties identity providers such as Google, Facebook etc you must use ..

A

Web Identity Federation

68
Q

On which Cloudformation section you define serverless application such as Lambda?

A

on Transform

69
Q

What will happen if you delete a unused custom deployment configuration in CodeDeploy?

A

You will no longer be able to associate the deleted deployment configuration with new deployments and new deployment groups.

70
Q

What do you need to do if CloudFormation doesn’t recognize a template change as an update?

A

You can add or modify the metadata attribute for any of your resources.

71
Q

How you can reestablish a failed connection to a new server after a period of time?

A
  • Use the AWS SDK to change the default client configuration

- Use the ClientConfiguration.setConnectionTTL method

72
Q

Which service helps to achieve compartmentalization or decoupling at sending messages between different application components?

A

SQS queue

73
Q

What is recommended when you enable encryption for your RDS?

A

Determine your encryption key requirements before you create your instance.
Enable backups for your encrypted DB instances.

74
Q

What does the push sync feature in Amazon Cognito ensure?

A

It ensures that every instance of a given identity is notified when identity data changes.

75
Q

Why is not recommended that ElasticCache can be accessed from outside AWS?

A

The problem is the NAT instances:

  • They are a single point of failure
  • They act as proxy between clients and multiple clusters affecting cache cluster performance
  • The traffic between the clients and the NAT is unencrypted.
  • overhead of maintaining.
76
Q

What is a characteristic of CMKs and data keys in relation to KMS?

A

KMS uses CMK to encrypt and decrypt data. They can never leave KMS unencrypted but data keys can.

77
Q

Kinesis Streams supports resharding , which adjust the number of shards in your stream to adapt to changes in the rate of data flow. What other elements are true?

A
  • The shards over the operation acts are the parents
  • The resulting are the child shards
  • After the resharding is called you have to wait for the stream to become active again.
78
Q

Which KMS component you can create from the IAM console?

A

KMS Customer Master Key

79
Q

How are repositories in CodeCommit encrypted?

A

They are automatically encrypted at Rest