Digital Cloud Training Flashcards

1
Q

You would like to share some documents with public users accessing an S3 bucket over the internet. What are two valid methods of granting public red permissions so you can share the documents?

A

Grant public read access to the objects when uploading.
Use the AWS Policy Generator to create a bucket policy for your Amazon S3 bucket granting read access to public anonymous users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why would using CloudFront and a static website not be ideal for sharing documents from an S3 bucket over the Internet?

A

It’s not necessary when you can grant public read access through the AWS Policy Generator or the object policy, and it imposes some contraints on the solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dynamo DB

A

A Fully managed NoSQL database solution that can scale seamlessly and has very low read/write latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Push Button Scaling

A

Scale the Database without incurring downtime. A key feature of DynamoDB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are building an application that will collect information about user behavior. The application will rapidly ingest large amounts of dynamic data and requires very low latency. The database must be scalable without incurring downtime. Which database solution would you recommend for this scenario?

A

DynamoDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Solutions Architect is building a complex application with several back-end APIs. The architect is considering using Amazon API Gateway. With Amazon API Gateway what are features that assist with creating and managing APIs?

A

Metering - define plans that meter and restrict third-party developer access to APIs
Lifecycle Management - Operate multiple API versions and multiple stages for each version simultaneously so that existing applications can continue to call previous versions after new API versions are published.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your company would like to restrict the ability of most users to change their own passwords whilst continuing to allow a select group of users within specific user groups. What is the best way to achieve this:

A

1) Under the IAM Password Policy, deselect the option to allow users to change their own passwords.
2) Create an IAM Policy that grants users the ability to change their own password and attach it to the groups that contain those users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are IAM Roles used for?

A

IAM roles are Identity and Access Management entities that define a set of permissions for making AWS service requests. They are NOT associated with a specific user or group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the best way to restrict a port and protocol combination from a security group?

A

Update the security group by removing the rule. You can only assign permit rules in a security group, you cannot assign deny rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You need to design a solution for distributing load across a number of EC2 instances across multiple AZs within a region. Customers will connect to several different applications running on the client’s serers through their browser using multiple domain names and SSL ceritificates. The certificates are stored in AWS Certificate Manager (ACM).
What is the optimal architecture to ensure HA, Cost Effectiveness, and performance?

A

Launch a single ALB and bind multiple SSL certificates to the same secure listener. Clients will use the Server Name Indication (SNI) extension.
With Server Name Indication (SNI) a client indicates the hostname to connect to. SNI supports multiple secure websites using a single secure listener.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SNI

A

Server Name Indication - An extension to the TLS protocol that is supported by browsers and clients released after 2010. If you configure CloudFront to server HTTPS requests using SNI, CloudFront associates your alternate domain name with an IP address for each edge location. This is the recommended method if you want viewers to use HTTPS and also use alternate domain names for your files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the other option for allowing CloudFront to serve HTTPS requests?

A

Dedicated IP Addresses. This will incur an additional monthly charge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two ways you can encrypt data stored on an EBS volume without downtime?

A

Either create an encrypted volume and migrate the data, or take a snapshot, encrypt it, and create a new encrypted volume from the snapshot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A customer has asked you to recommend the best solution for a highly available database. The database is relational OLTP type of database and the customer does not want to manage the operating system the database runs on. Failover between AZs must be automatic.

A

Use RDS in a Multi-AZ configuration. RDS is a managed service that will allow you to configure Multi-AZ which creates a replica in another AZ and synchronously replicates to it (DR only)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between OLTP and OLAP

A

Online Transaction Processing is a class of software capable of supporting transactional-based software over the internet. Online Analytical Processing is a technology for report viewing and complex analytical calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name an AWS service that is used for OLAP

A

RedShift is used for data warehous analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name an AWS service that is used for OLTP

A

RDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name all RDS database engines

A
Amazon Aurora
PostgreSQL
MySQL
MariaDB
Oracle
MS SQL Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the benefits of Amazon Aurora

A
Cost-effectiveness of Open Source Databases (MySQL)
3x faster than PostgreSQL
5x faster than MySQL
1/10th the cost of Commercial Databases
Fully Managed by RDS
64TB fault-tolerant, self healing, distributed storage per instance
up to 15 low-latency read replicates
Replication across 3 AZs
Continuous backup to S3
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You are troubleshooting a connectivity issue where you cannot connect to an EC2 instance in a public subnet in your VPC from the Internet. Which configuration items would you check first?

A

The subnet has “Auto-assign public IPv4 address” set to “Yes”
The security group attached to the EC2 instance has an inbound rule allowing the traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Public subnets are subnets that have:

A

“Auto-assign public IPv4 address” set to “Yes” which will assign a public IP
The subnet route tabe has an attached Internet Gateway
The instance will also need a security group with an inbound rule allowing the traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When using a public subnet with an Internet Gateway, the instance needs ______ to be addressable from the Internet?

A

a Public IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NAT Gateways

A

Used to enable Outbound Internet access for instances in private subnets. Managed service, and provides availability, higher bandwidth, and requires less effort than a NAT Instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

NAT Instances

A

A Non-managed NAT option to enable instances in the private subnet to initiate outbound IPv4 traffic to the internet or other AWS services, but prevent the instances from receiving inbound traffic from the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You would like to provide some on-demand and live streaming video to your customers. The plan is to provide the users with both the media player and the media files from the AWS cloud. One of the features you need is for the content of the media files to begin playing while the file is still being downloaded.
What AWS services can deliver these requirements?

A

Use CloudFront with a Web and RTMP distribution:
-A web distribution for the media player
-An RTMP distribution for the media files
Store the Media files in an S3 bucket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

RTMP

A

Adobe Real-Time Messaging Protocol
Distribute streaming media files using Adobe Flash Media Server’s RTMP protocol
Allows an end user to begin playing a media file before the file has finished downloading from a CloudFront edge location
Files must be stored in an S3 buicket (NOT an EBS volume or EC2 instance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

There is a requirement to implement in-memory caching for an application due to increasing read-heavy load. The data must be stored persistenly. Automatic failover across AZs is also required. What two items deliver these requirements?

A

ElastiCache with the Redis engine - Stores data persistently.
Multi-AZ with Cluster mode and Automatic Failover enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Redis vs Memcache

A

Redis: Stores Data persistenly, Supports Multi-AZ using read replicas in other AZs int he same Region, fully falut tolerant and automated if both cluster mode and multi-AZ failover are enabled.
Memcache: Does NOT store data persistently, Does NOT support Multi-AZ failover or Replication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

ECS

A

Elastic Container Service - A highly scalable, high performance service that supports Docker containers and allows you to run applications across a managed cluster of EC2 instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ECS Task

A

Instances of Containers that are run on underlying compute, but are more or less isolated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

ECR

A

Elastic Container Registry - An AWS managed registry of Container images that is secure, scalable, and reliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

You have launched a Spot instance on EC2 for working on an application development project. What are the possible behaviors that can be configured in the event of an interruption?

A

Hibernate
Stop
Terminate (Default)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

You create a new ASG with 6 instances distributed evenly between two AZs, AZ1 and AZ2. After creating these, you find that all 6 EC2 instances are being hosted on AZ1 since AZ2 does not currently have the capacity for your instance type. What will happen once AZ2 does have the capacity?

A

The ASG will try to redistribute the EC2 instances evenly between the two availability zones. They will only delete the instances in AZ1 once the instances in AZ2 have been created and verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

You would like to create a highly available web application that serves static content hosted on multiple On-Demand EC2 instances. What three features can help you do that?

A

Multiple Availability Zones
Elastic Load Balancer
Auto Scaling Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An EBS-backed EC2 instance has been configured with some proprietary software that uses an embedded license. You need to move the EC2 instance to another AZ in the region. What is the best way to accomplish this?

A

Create an image from the instance and launch an instance from the image from the AMI in the destination AZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Spread Placement Group

A

A group of EC2 instances that are each placed on distinct underlying hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An application that you will be deploying in your VPC requires 14 EC2 instances that must be placed on distinct underlying hardware to reduce the impact of the failure of a hardware node. The instances will use varying instance types. What configuration will cater to these requirements taking cost-effectiveness into account?

A

Use Spread Placement Group across two AZs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How many IAM roles can you apply to a Task Definition?

A

One

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How can you apply granular permissions to distinct containers hosted on the same EC2 instance?

A

Create separate Task Definitions for any Task/Container you’d like to alter permissions on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

PFS

A

Perfect Forward Secrecy - provides additional afeguards against eavesdropping of encrypted data through the use of a unique random session key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Can you use Instance IDs with On-Premises targets?

A

No. Be sure to utilize IP address targets, which are supported by either Network or Application Load Balancers. A VPN or Direct Connect connection is required for On-Premises communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

You would like to start recording source IP addresses of traffic that hits your Web Applications that are behind an Elastic Load Balancer. What ELB features will you enable with which protocols?

A

Proxy Protocol for TCP

X-Forwarded-For response header for HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

You would like to record source IP addresses of traffic that hit your Elastic Load Balancers before they get to the EC2 instances hosted behind it. What feature would you enable to start that?

A

Access Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

According to EC2 IO optimized SLAs, what would be the average IOPS an io1 EBS volume configured to provide 1000 IOPS give most of the time throughout the year?

A

900 - SLAs for Provisioned Optimized IOPS guarantees to be within 10 percent of the provisioned IOPS 99.9 percent of the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Valid options for storing CloudWatch logs include:

A

CloudWatch Logs
Centralized Logging System (i.e. Splunk)
Custom script and store on S3

46
Q

What AWS service can help convert media files for multiple mobile formats?

A

Elastic Transcoder

47
Q

You need to add a layer in your application architecture to retain information about user sessions. What are two options available to you?

A

In-Memory Key/Value store like Redis or MemCache

Stick Sessions enabled at the ELB level

48
Q

What AWS service can send you SNS or Email notifications when you are forecast to exceed your funding capacity?

A

AWS Budgets

49
Q

CORS

A

Cross-Origin Resource Sharing:

  • Allows the sharing of resources between different domains
  • Can be used to enable request from domains other than the API’s domain
50
Q

Amazon Athena

A

An interactive, serverless query service that makes it easy to analyze data stored in S3.

51
Q

Can Amazon RedShift analyze data stored in Amazon S3?

A

No

52
Q

AWS Glue

A

A fully managed ETL service used to prepare and load date for analytics. It is not used for S3.

53
Q

ETL

A

Extract, Transform, and Load service

54
Q

AWS Data Pipeline

A

Used to reliably process and move data between AWS compute and storage services, as well as on-premises resources, at specified intervals

55
Q

OAI

A

Original Access Identity - Can be setup in CloudFront to provide a “user” that can be assigned permissions.

56
Q

DynamoDB classic charges:

A

More cost effective for read heavy workloads
Priced based on provisioned throughput (read/write) regardless of whether you use it or not.
Changes only for Dynamo DB Auto Scaling feature.

57
Q

RedShift

A

OLAP databases - Large databases recommended for analytics not transaction functions.
Always keeps 3 copies of your data.
Provides continuous/incremental backups.

58
Q

What two ways can you use MFA to authentication in AWS?

A

AWS Management Console and AWS API

59
Q

Fully Meshed Architecture?

A

Allows a Many to Many VPC communication topology.

60
Q

What are the AWS and Customer facing sides of AWS VPN?

A

AWS Side: Virtual Private Gateway

Customer Side: Customer Gateway

61
Q

You host a lot of resources in AWS through a VPC. Your IT security team wants you to monitor all the traffic from the network interfaces in the VPC. Which service should you use to monitor this traffic?

A

VPC Flow Logs - Used to monitor all network traffic within a VPC.

62
Q

Cloud Trail

A

A service that allows you to log all API calls.

63
Q

You are deploying a two-tier web application within your VPC. The application consists of multiple EC2 instances and an Internet-facing ELB. The application will be used by a small number of users with fixed public IP addresses and you need to control access so only these users can access the application. What are the two practical methods of implementing these controls?

A

Configure the ELB security group to only allow traffic from certain IP sources.
Configure ELB to send the X-Forwarded-For header and configure the EC2 instances to filter on traffic based on the source IP information in the header.

64
Q

Amazon DAX

A

Amazon DynamoDB Accelerator - fully managed, highly available, in memory cache for DynamoDB that delivers 10x performance improvement - from milliseconds to microseconds - even at millions of requests per second.

65
Q

DynamoDB has Read Replicas: T/F

A

False

66
Q

You need to create an encrypted Read Replica in a different region than your current unencrypted RDS Database. What steps do you need to take?

A

Take a snapshot of the current unencrypted database and create an encrypted database from that snapshot.
Create a Read Replica using the region specific encryption key.

67
Q

What database architecture would you choose for fast, repeat queries?

A

RedShift can improve performance for repeat queries by caching results and returning the cached result when the queries are re-run.

68
Q

Developers regularly create and update CloudFormation stacks using API calls. For security reasons, you need to ensure that users are restricted to a specified template. How can this be achieved?

A

Create an IAM policy with a Condition: TemplateURL parameter

69
Q

Amazon MQ

A

Messaging queue that supports industry-standard APIs and protocols. Unique to SQS as that is a messaging queuing system that is not compatible with industry-standard messaging brokers.

70
Q

Query String Parameters

A

Used to direct CloudFront to forward query strings to the origin and to cache based on the language parameter.

71
Q

Signed URLs and Cookies

A

Used by CloudFront to provide additional control over access to content.

72
Q

What status check would you set to alert you to the presence of an issue with an operating system?

A

StatusCheckFailed_Instance - where …_System status checks indicate problems with the instance the require AWS involvement to repair, Instance status checks detect problems that require the customer’s involvement to repair.

73
Q

CloudTrail

A

Records API calls for auditing

74
Q

You want to monitor API calls across several regions inside an AWS account and you have to encrypt the results. What is the best solution for this?

A

Create a single CloudTrail trail and apply it to all regions. Encrypt the results with a single KMS key.

75
Q

What encryption is used or CloudTrail log files?

A

S3 Server Side Encryption (SSE) with the option to enable SSE KMS for additional security.

76
Q

An EBS-backed EC2 instance has been configured with some proprietary software that uses an embedded license. You need to move the EC2 instance to another Availability Zone (AZ) within the region. What’s the best way to accomplish this?

A

Create an image from the instance. Launch an instance from the AMI in the destination AZ.

77
Q

How do Sticky Sessions Work for an ALB?

A

The ALB supports load balancer-generated cookies only (not application-generated) and the cookie name is always AWSALB. The Sticky session feature is enabled at the target group level.

78
Q

Amazon RedShift Enhanced VPC routing

A

Forcess all COPY and UNLOAD traffic between clusters and data repositories through a VPC

79
Q

What has no standard metric in the CloudWatch dashboard?

A

Memory usage

80
Q

CDN

A

Content Delivery Network - Improves the delivery of content by replicating commonly requested files (static content) across a globally distributed set of caching servers.

81
Q

Origins

A

Used by CloudFront to specify the origin of the files that the CDN will distribute. Origins can be either an S3 bucket, EC2 instance, ELB, or Route 53. It can also be external to AWS.

82
Q

S3 pre-signed URL

A

Allows you to upload data to an S3 bucket without having AWS security credentials/permissions.
This solution bypasses the web server, avoiding any performance bottlenecks.

83
Q

Connection Draining

A

ASG setting that will wait for in-flight connections to timeout before initiating a replacement

84
Q

AWS WAF

A

AWS Web Application Firewall - Blocks malicious web requests targeted at your web application.

85
Q

You have created an application in a VPC that uses a Network Load Balancer (NLB). The application will be offered in a service provider model for AWS principals in other accounts within the region to consume. Based on this model, what AWS service will be used to offer the service for consumption?

A

VPC Endpoint Services using AWS PrivateLink

86
Q

How can you control your API Gateway cache to enhance performance and reduce the load on back-end services?

A

Using time-to-live (TTL) settings

87
Q

What are Access Keys?

A

Used to make programmatic calls to AWS through AWSCLI et al

88
Q

AWS OpsWorks

A

A Configuration management service that provides managed instances of Chef and Puppet to automate how servers are configured, deployed, and managed across EC2 or on-premises compute environments.

89
Q

When using a Classic Load Balancer, what two sets of listeners support the Proxy protocol

A

SSL front-end and TCP back-end

TCP front-end and TCP back-end

90
Q

ELB Proxy Protocol

A

Adds header information that lists the source IP, destination IP, and port number
Supported by CLB

91
Q

ELB Proxy Protocol

A

Adds header information that lists the source IP, destination IP, and port number.
Supported by CLB.
Proxy Protocol v2 supported by NLB.

92
Q

Detail the default termination policy for ASG on Multiple AZs with even number of instances on each AZ

A

1) oldest launch configuration

2) closest to next billing hour

93
Q

AWS STS

A

AWS Security Token Service - An AWS service that requests temporary, limited permission credentials to IAM users or for users that you authenticate (federated users).

94
Q

Lists the steps performed by the custom identity broker to sign users into the AWS management console

A

1) Verify authentication by your local identity system (like Active Directory)
2) Call AWS STS AssumeRole or GetFedertionToken API operations and obtain temp security creds
3) Call AWS federation endpoint to supply the temp security creds to request a sign-in token
4) Construct a URL for the console that includes the token
5) Give the URL to the user or invoke it on the user’s behalf.

95
Q

What are 3 common use cases of assigning secondary IP addresses

A

1) Host multiple websites on a single server by using multiple SSL certificates on a single server and associating each certificate with a specific IP address.
2) Operate network appliances, such as firewalls or load balancers, that have multiple IP addresses for each network interface.
3) Redirect internal traffic to a standby instance in case your instance fails, by reassigning the secondary IP address to the standby instance.

96
Q

Name the 3 ways an ENI can be attached to an instance

A

Hot-attached - attached to a running instance.
Warm-attached - attached to a stopped instance.
Cold-attached - attached while an instance is being launched.

97
Q

What happens when DynamoDB hits its provisioned capacity for writes?

A

The requests will be throttled and fail with an HTTP 400 code (Bad Request) with the error: ProvisionedThroughputExceededException

98
Q

Name some differences between ASG reacting to an unhealthy instance, and reacting to AZ rebalancing?

A

If an instance is marked as unhealthy, it is marked for termination and terminated before the replacement is launched, where as AZ rebalancing will launch the replacement in the new AZ before terminating the old instance.

99
Q

Are manually added ENIs terminated when the instance is terminated?

A

No, secondary/manually added ENI interfaces are not terminated by default when an instance is terminated.

100
Q

What are 3 reasons why a previously running EC2 instance would suddenly terminate when restarted?

A

EBS volume limit has been hit
EBS snapshot is corrupted
The root EBS volume is encrypted and you do not have the KMS key to decrypt it.

101
Q

What are the IPs ber GB or GiB for each EBS volume?

A

GS2 - 3 IOPS/GB
IO1 - 50 IOPS/GiB
ST1 - 500 IOPS/Vol No SLA
SC1 - 250 IOPS/Vol No SLA

102
Q

ECS Clusters

A

Logical grouping of container instances you can place tasks on.
Can contain tasks using BOTH the Fargate and EC2 launch types
Containers can only be part of one cluster at a time.
Region Specific
For EC2 Launch type, clusters can contain different container instance types.

103
Q

Name two ways you can protect a web application from suffering from a DDoS attack?

A

Use CloudFront to distribute static and dynamic content. Has the added benefit of ensuring only valid HTTP(S) request swill be forwarded to backend hosts.
Use AutoScaling to be sure that the largest amount of servers can distribute the load.

104
Q

Name the CloudFront capabilities to block malicious traffic

A

Filters request to ensure only valid HTTP(S) requests will be forwarded to backend hosts.
Supports geoblocking to prevent requests from particular geographic locations from being served.

105
Q

Amazon Aurora Global Database

A

Replicates a single database across multiple AWS regions with no impact to performance
Enables fast local reads with low latency in each region
Provides DR recovery from region-wide outages.
Uses storage-based replication with typical latency of less than 1 second

106
Q

Identity Pools

A

Users can obtain temporary AWS credentials to access AWS services, such as S3 and DynamoDB

107
Q

User Pool

A

A user directory in Amazon Cognito.

Can sign into web or mobile apps through Cognito, or federate through a third-party IdP (identity provider)

108
Q

Global Tables

A

DynamoDB feature that provides fully managed solution for multi-master, multi-region database.
Specify what regions you want the table to be available.

109
Q

Detailed Monitoring for ASG is always enabled by default through CLI: True/False?

A

True

110
Q

What VPC-specific information must you includ in your Lambda function to ensure it to connect to an ElastiCache cluster within your VPC?

A

VPC Security Group IDs

VPC Subnet IDs

111
Q

What are the two S3 URL formats

A

https: //.s3.amazonaws.com/
https: //s3-.amazonaws.com//

112
Q

AWS CloudHSM

A

Cloud-based hardware security module (HSM)