Domain 3 - Technology ( 3 of 3 ) Flashcards
Which of the following could be included in an EC2 AMI? (Select TWO.)
- An instance type definition
- An operating system
- A software application stack
- A networking configuration
AMIs can be created that provide both a base operating system and a pre-installed application. They would not, however, include any networking or hardware profile information—those are largely determined by the instance type.
- An operating system
- A software application stack
AMIs can be created that provide both a base operating system and a pre-installed application. They would not, however, include any networking or hardware profile information—those are largely determined by the instance type.
Which of the following are EC2 instance type families? (Select TWO.)
- Compute optimized
- Accelerated computing
- t2.micro
- c5d.18xlarge
- Compute optimized
- Accelerated computing
c5d. 18xlarge and t2.micro are the names of EC2 instance types, not instance type families.
When describing EC2 instance types, what is the role played by the vCPU metric?
- vCPUs represent an AMI’s processing power compared to the number of processors on a physical machine.
- vCPUs represent an instance’s potential resilience against external network demands.
- vCPUs represent an instance type’s compute power compared to the number of processors on a physical machine.
- vCPUs represent an instance type’s system memory compared to the class of memory modules on a physical machine.
- vCPUs represent an instance type’s compute power compared to the number of processors on a physical machine.
A virtual central processing unit (vCPU) is a metric that roughly measures an instance type’s compute power in terms of the number of processors on a physical server. It has nothing to do with resilience to high traffic, system memory, or the underlying AMI.
Which of the following are true regarding the AWS Storage Gateway —volume gateway configuration? (Select THREE.)
- Cached volumes asynchronously back up data to S3 as EBS snapshots
- Stored volumes asynchronously back up data to S3 as EBS snapshots.
- Stored-volumes can be up to 32 TB in size.
- Cached volumes can be up to 32 TB in size.
- Cached volumes locally store only a frequently used subset of data.
- Stored volumes asynchronously back up data to S3 as EBS snapshots.
- Cached volumes can be up to 32 TB in size.
- Cached volumes locally store only a frequently used subset of data.
The volume gateway type offers two configurations: stored volumes and cached volumes. Stored volumes store all data locally and asynchronously back up that data to S3 as EBS snapshots. Stored volumes can be up to 16 TB in size. In contrast, cached volumes locally store only a frequently used subset of data but do not asynchronously back up the data to S3 as EBS snapshots. Cached volumes can be up to 32 TB in size.type’s compute power compared to the number of processors on a physical machine.
vCPUs represent an instance type’s system memory compared to the class of memory modules on a physical machine.
A virtual central processing unit (vCPU) is a metric that roughly measures an instance type’s compute power in terms of the number of processors on a physical server. It has nothing to do with resilience to high traffic, system memory, or the underlying AMI.
What’s the most data you can store on a single Snowball device?
- 42 TB
- 72 TB
- 80 TB
- 50 TB
- 72 TB
The 80 TB Snowball device offers 72 TB of usable storage and is the largest available. The 50 TB Snowball offers 42 TB of usable space.
Which of the following are security features of AWS Snowball? (Select TWO.)
- It enforces NFS encryption.
- It enforces encryption at rest.
- It has tamper-resistant network ports.
- It uses a Trusted Platform Module (TPM) chip
- It enforces encryption at rest.
- It uses a Trusted Platform Module (TPM) chip
AWS Snowball enforces encryption at rest and in transit. It also uses a TPM chip to detect unauthorized changes to the hardware or software. Snowball doesn’t use NFS encryption, and it doesn’t have tamper-resistant network ports.
Which of the following might AWS do after receiving a damaged Snowball device from a customer?
- Copy the customer’s data to Glacier
- Replace the Trusted Platform Module (TPM) chip
- Securely erase the customer’s data from the device
- Copy the customer’s data to S3
- Securely erase the customer’s data from the device
If AWS detects any signs of tampering or damage, it will not replace the TPM chip or transfer customer data from the device. Instead, AWS will securely erase it.
Which of the following can you use to transfer data to AWS Snowball from a Windows machine without writing any code?
- NFS
- The S3 SDK Adapter for Snowball
- SMB
- iSCSI
- The Snowball Client
- The Snowball Client
The Snowball Client lets you transfer files to or from a Snowball using a machine running Windows, Linux, or macOS. It requires no coding knowledge, but the S3 SDK Adapter for Snowball does. Snowball doesn’t support the NFS, iSCSI, or SMB storage protocols.
How do the AWS Snowball and Snowball Edge devices differ? (Select TWO.)
- Snowball’s QSFP+ network interface supports speeds up to 40 Gbps.
- Snowball devices can be clustered together for storage.
- Snowball Edge can run EC2 instances.
- Snowball Edge supports copying files using NFS.
Snowball Edge offers compute power to run EC2 instances and supports copying files using the NFSv3 and NFSv4 protocols. Snowball devices can’t be clustered and don’t have a QFSP+ port.
- Snowball Edge can run EC2 instances.
- Snowball Edge supports copying files using NFS.
Snowball Edge offers compute power to run EC2 instances and supports copying files using the NFSv3 and NFSv4 protocols. Snowball devices can’t be clustered and don’t have a QFSP+ port.
Which of the following Snowball Edge device options is the best for running machine learning applications?
- Compute Optimized
- Compute Optimized with GPU
- Network Optimized
- Storage Optimized
- Compute Optimized with GPU
The Snowball Edge—Compute Optimized with GPU option is optimized for machine learning and high- performance computing applications. Although the Compute Optimized and Storage Optimized options could work, they aren’t the best choices. There’s no Network Optimized option.
Which of the following hardware devices offers a network interface speed that supports up to 100 Gbps?
- Snowball Edge with the Storage Optimized configuration
- 80 TB Snowball
- Snowball Edge with the Compute Optimized configuration
- Storage Gateway
- Snowball Edge with the Compute Optimized configuration
Snowball Edge with the Compute Optimized configuration includes a QSFP+ network interface that supports up to 100 Gbps. The Storage Optimized configuration has a QSFP+ port that supports only up to 40 Gbps. The 80 TB Snowball supports only up to 10 Gbps. A storage gateway is a virtual machine, not a hardware device.
Which type of database stores data in columns and rows?
- Nonrelational
- Relational
- Document
- Key-value store
- Relational
A relational database stores data in columns called attributes and rows called records. Nonrelational databases —including key-value stores and document stores—store data in collections or items but don’t use columns or rows.
Which of the following Structured Query Language (SQL) statements can you use to write data to a relational database table?
- INSERT
- WRITE
- CREATE
- QUERY
- INSERT
The SQL INSERT statement can be used to add data to a relational database. The QUERY command is used to read data. CREATE can be used to create a table but not add data to it. WRITE is not a valid SQL command.
Which of the following statements is true regarding nonrelational databases?
- You don’t have to define all the types of data that a table can store before adding data to it.
- You can create only one table.
- You can’t store data with a fixed structure.
- No primary key is required.
- You don’t have to define all the types of data that a table can store before adding data to it.
A nonrelational database is schemaless, meaning that there’s no need to predefine all the types of data you’ll store in a table. This doesn’t preclude you from storing data with a fixed structure, as nonrelational databases can store virtually any kind of data. A primary key is required to uniquely identify each item in a table. Creating multiple tables is allowed, but most applications that use nonrelational databases use only one table.
What is a no-SQL database?
- A relational database with primary keys
- A schemaless relational database
- A schemaless nonrelational database
- A nonrelational database without primary keys
- A schemaless nonrelational database
A no-SQL database is another term for a nonrelational database. By definition, nonrelational databases are schemaless and must use primary keys. There’s no such thing as a schemaless relational database. No-SQL is never used to describe a relational database of any kind.