Domain 1 - Cloud Concepts Flashcards

1
Q

AWS documentation is available in a number of formats, including which of the following? (Select TWO.)

  • Microsoft Word (DOC)
  • HTML
  • DocBook
  • Kindle
A
  • HTML
  • Kindle

Although DOC and DocBook are both popular and useful formats, neither is used by AWS for its documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Instances that are running (mostly) idle should be identified by which of these Trusted Advisor categories?

  • Replication
  • Performance
  • Cost Optimization
  • Service Limits
A
  • Cost Optimization

Performance identifies configuration settings that might be blocking performance improvements. Service Limits identifies resource usage that’s approaching AWS Region or service limits. There is no Replication category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following design strategies is most effective for maintaining the reliability of a cloud application?

  • Resource redundancy
  • Resource isolation
  • Resource automation
  • Resource geolocation
A
  • Resource redundancy

Resource isolation can play an important role in security, but not reliability. Automation can improve administration processes, but neither it, nor geolocation, is the most effective reliability strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

While looking at the EC2 service console in the AWS Management Console while logged in as the root user, you notice all of your instances are missing. What could be the reason?

  • You don’t have view access.
  • You don’t have an access key.
  • You’ve selected the wrong Availability Zone in the navigation bar.
  • You’ve selected the wrong region in the navigation bar.
A

You’ve selected the wrong region in the navigation bar.

If a resource that should be visible appears to be missing, you may have the wrong Region selected. Since you’re logged in as the root, you have view access to all resources in your account. You don’t need an access key to use the console. You can’t select an Availability Zone in the navigation bar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is required to use the AWS Command Line Interface (CLI)?

  • An IAM user
  • A secret key
  • Linux
  • Outbound network access to TCP port 80
A
  • A secret key

The AWS CLI requires an access key ID and secret key. You can use those of an IAM user or the root user. Outbound network access to TCP port 443 is required, not port 80. Linux is also not required, although you can use the AWS CLI with Linux, macOS, or Windows. You also can use the AWS Console Mobile Application with Android or iOS devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are options for installing the AWS CLI on Windows 10? (Choose two.)

  • An AWS software development kit (SDK)
  • Using Python and pip
  • The MSI installer
  • The Yum or Aptitude package manager
A
  • Using Python and pip
  • The MSI installer

You can use Python and the pip package manager or (with the exception of Windows Server 2008) the MSI installer to install the AWS CLI on Windows. AWS SDKs don’t include the AWS CLI. Yum and Aptitude are package managers for Linux only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

After installing the AWS Command Line Interface, what should you do before using it to securely manage your AWS resources?

  • Reboot
  • Issue the aws configure command.
  • Issue the aws –version command.
  • Generate a new access key ID and secret access key for the root user.
A
  • Issue the aws configure command.

The aws configure command walks you through setting up the AWS CLI to specify the default Region you want to use as well as your access key ID and secret key. The aws –version command displays the version of the AWS CLI installed, but running this command isn’t necessary to use the AWS CLI to manage your resources. Rebooting is also not necessary. Using your root user to manage your AWS resources is insecure, so there’s no need to generate a new access key ID for your root user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which output format does the AWS CLI support?

  • Comma-separated values (CSV)
  • JavaScript object notation (JSON)
  • Tab-separated values (TSV)
  • None of these
A
  • JavaScript object notation (JSON)

The AWS CLI can display output in JSON, text, or table formats. It doesn’t support CSV or TSV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following programming languages are AWS software development kits available for? (Select THREE.)

  • PHP
  • JavaScript
  • Java
  • JSON
  • Fortran
A
  • PHP
  • Javascript
  • Java

AWS offers SDKs for JavaScript, Java, and PHP. There are no SDKs for Fortran. JSON is a format for output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following software development kits (SDKs) enable developers to write mobile applications that run on both Apple and Android devices? (Select TWO.)

  • AWS Mobile SDK for Unity
  • AWS Mobile SDK for .NET and Xamarin
  • AWS Mobile SDK for iOS
  • AWS SDK for Go
A
  • AWS Mobile SDK for Unity
  • AWS Mobile SDK for .NET and Xamarin

The AWS Mobile SDK for Unity and the AWS Mobile SDK for .NET and Xamarin let you create mobile applications for both Android and Apple iOS devices. The AWS SDK for Go doesn’t enable development of mobile applications for these devices. The AWS Mobile SDK for iOS supports development of applications for Apple iOS devices but not Android.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some key benefits often available for applications run on a large cloud platform like AWS? (Select TWO.)

  • Improved developer-admin communications
  • Improved data security
  • Improved infrastructure reliability
  • Improved turnaround for new application code releases
A
  • Improved data security
  • Improved infrastructure reliability

Amazon’s size and scale allow it to implement best security and reliability practices. Its size alone is, however, unlikely to directly impact your team’s code commit or communication processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following best describes infrastructure redundancy?

  • Maintaining secure network connections to control incoming access
  • Increasing the number of deployed resources to meet changing user demand
  • Increasing the size of deployed resources to meet changing user demand
  • Maintaining copies of application data across multiple physical locations
A
  • Maintaining copies of application data across multiple physical locations

Your assets are redundant when they’re replicated in a way that ensures they’ll survive the failure of one set. Increasing the number of deployed resources is known as horizontal scaling. Increasing the size of deployed resources is known as vertical scaling. Controlling network access is not a function of redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main benefit of server virtualization for cloud computing customers?

  • Virtualization allows cloud customers greater server security.
  • Virtualization allows cloud customers direct access to a wide range of compute choices.
  • Virtualization allows cloud customers access to a wider range of software choices.
  • Virtualization allows cloud customers more effective utilization of hardware resources.
A
  • Virtualization allows cloud customers direct access to a wide range of compute choices.

It’s true that virtualized environments can sometimes allow for enhanced hardware utilization and security, but that’s not primarily a benefit that’s specific to the cloud. Virtualization has very little to do with enhanced software choices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of these Trusted Advisor alert categories will identify resources in your account that are unnecessarily vulnerable to service disruptions?

  • Service Limits
  • Fault Tolerance
  • Security
  • Performance
A
  • Fault Tolerance

The Performance category identifies configuration settings that might be blocking performance improvements. The Service Limits category identifies resource usage that’s approaching AWS Region or service limits. The Security category identifies any failures to use security best-practice configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of these Trusted Advisor alert categories are available only for accounts subscribed to Business or Enterprise support tiers? (Select TWO.)

Correct Answer
- Cost Optimization 
Correct!
- Fault Tolerance 
- Security 
- Service Limits
A
  • Cost Optimization
  • Fault Tolerance

The Service Limits category and many Security alerts are available for all AWS customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following are design approaches that can directly increase the performance reliability of your applications? (Select TWO.)

  • Use a content distribution network (CDN) like CloudFront to cache your content.
  • Locate resources geographically close to your users.
  • Run redundant resources in multiple Availability Zones
  • Incorporate Auto Scaling into your design.
A
  • Run redundant resources in multiple Availability Zones
  • Incorporate Auto Scaling into your design.

While geolocation and a good CDN can improve performance, they won’t have a direct impact on reliability.