ec2 Flashcards

1
Q

Your company has a web application on AWS. The application computes thousands of algorithms per second and is very CPU and disk intensive. The application runs on a c4.8xlarge, the largest C class instance available. The application stores it’s data locally on a standard SSD disk. Your application starts to perform slow. You check the logs and notice that your disk IO is routinely going above 10,000 IOPS. What should you do to remediate the issue?

Change the instance family from a c4.8xlarge to an r4.8xlarge so that you have more memory available to cope with the increased IO.

Decrease the size of the EBS volume so as to increase its IOPS performance.

Migrate the EBS volume from a standard EBS volume to a provisioned IOPS EBS volume.

Migrate the EBS volume from a standard EBS volume to a magnetic volume.

A

Migrate the EBS volume from a standard EBS volume to a provisioned IOPS EBS volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have a word press site hosted on EC2 with a MySQL database hosted on RDS. The majority of your traffic is read traffic, there is only write traffic when you create a new blog. One of your blogs has gone viral and your wordpress site is struggling to cope. You check your cloudwatch metrics and notice your RDS instance is at 100% CPU utilization. What two steps should you take to reduce the CPU utilization? (Choose 2)

Create multiple RDS read replicas and point multiple EC2 instances to these read replicas thereby spreading the load.

Create an elasticache cluster and use this to cache your most frequently read blog posts.

Enable Multi-AZ on your RDS instances and point multiple EC2 instances to the new Multi-AZ instances thereby spreading the load.

Migrate from an Elastic Load Balancer to a Network Loadbalancer so you can sustain more connections.

A

Create multiple RDS read replicas and point multiple EC2 instances to these read replicas thereby spreading the load.

Create an elasticache cluster and use this to cache your most frequently read blog posts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An HTTP 3xx code means ________.

The request was successful

There has been a redirection

There has been a server side error

There has been a client side error

A

There has been a redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have a very popular blog site, which has recently had a surge in traffic. You want to implement an elasticache solution to help take the load off the production database and you want to keep it as simple as possible. You will need to scale your cache horizontally and object caching will be your primary goal. Which elasticache solution will best suit your needs?

Couchbase

ArangoDB

Memcached

Redis

A

Memcached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You work for a media production company that streams popular TV shows to millions of users. They are migrating their web application from an in house solution to AWS. They will have a fleet of over 10,000 webservers to meet the demand and will need a reliable layer 4 load balancing solution capable of handling millions of requests per second. What AWS load balancing solution would be suit their needs?

Network Load Balancer.

Application Load Balancer.

AWS Direct Connect

Elastic Load Balancer.

A

Network Load Balancer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An new CIO joins your company and implements a new company policy that all EC2 instances must have encryption at rest. What is the quickest and easiest way to apply this policy to your existing EC2 instances?

Create an encrypted snapshot of the EC2 volume using the ecrypt on the fly option. Create an AMI of the copied snapshot and then redeploy the EC2 instance using the encrypted AMI. Delete the old EC2 instance.

Create a snapshot of the EC2 volume. Then create a copy of that volume, checking the box to enable encryption. Create an AMI of the copied snapshot and then redeploy the EC2 instance using the encrypted AMI. Delete the old EC2 instance.

Create an encrypted AMI of the EC2 volume using Windows Bitlocker.

In the AWS console, click on the EC2 instances, click actions and click encrypt EBS volumes.

A

Create a snapshot of the EC2 volume. Then create a copy of that volume, checking the box to enable encryption. Create an AMI of the copied snapshot and then redeploy the EC2 instance using the encrypted AMI. Delete the old EC2 instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You work for an online gaming store which has a global world wide leaderboard for players of the game. You need to implement a caching system for your leaderboard that has multiple availability zones in order to prevent an outage. Which elasticache solution should you use?

ArangoDB

Memcached

Redis

Couchbase

A

Redis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You work at a busy fast food chain who have recently migrated their physical servers on to EC2. Each instance needs to be able to communicate to S3 in order to pull down some configuration data. What is the best way to achieve this?

Create a new user, assign that user full administrative privileges on AWS and then generate an Access Key ID and Secret Access Key. Store the details on each EC2 instance.

Create a new user, assign that user full S3 Administrator Access and then generate an Access Key ID and Secret Access Key. Store the details on each EC2 instance.

Create a role, and assign an IAM policy giving you access to S3 to the role.

Create a new user, assign that user read only access for S3 and then generate an Access Key ID and Secret Access Key. Store the details on each EC2 instance.

A

Create a role, and assign an IAM policy giving you access to S3 to the role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In order to enable encryption at rest using EC2 and Elastic Block Store, you must ________.

Configure encryption using X.509 certificates

Configure encryption using the appropriate Operating Systems file system

Configure encryption when creating the EBS volume

Mount the EBS volume in to S3 and then encrypt the bucket using a bucket policy.

A

Configure encryption when creating the EBS volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are a developer for a genomics firm who are moving their infrastructure to AWS. Their environment consists of a three tier web application, a web tier, an application tier and a relational database tier. They have a seperate fleet of virtual machines that are used to access large HPC clusters on the fly. Their lab researches run multiple projects simulaneously and they will need to launch and de-commission 1,000’s of nodes on-demand while reducing the time required to complete genomic sequencing from weeks to days. In order to stay competitive they need to do this at as low cost as possible, with no long term contracts. These HPC clusters can run any time day or night and their workloads store information in S3, so the instances can be terminated at any time without any effect on the data. What is the most COST EFFECTIVE ec2 pricing model for their requirements?

Reserved Instances.

Dedicated Instances.

On-demand.

Spot Instances.

A

Spot Instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You work for a government contractor who supply services that are critical to national security. Because of this your corporate IT policy states that no multi-tenant virtualization is authorised within the company. Despite this, they are interested in moving to AWS but they cannot violate corporate IT policy. Which EC2 billing model would you recommend that they use to achieve this?

Reserved Instances.

Spot Instances.

On-demand.

Dedicated Instances.

A

Dedicated Instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have an EC2 instance in a single availability zone connected to an RDS instance. The EC2 instance needs to communicate to S3 to download some important configuration files from it. You try the command aws s3 cp s3://yourbucket /var/www/html however you receive an error message. You log in to Identity Access Management (IAM) and discover there is no role created to allow EC2 to communicate to S3. You create the role and attach it to the existing EC2 instance. How fast will the changes take to propagate?

The same duration as Cloudwatch detailed monitoring – 1 minute.

Immediately.

The same duration as Cloudwatch standard monitoring – 5 minutes.

It depends on the region and availability zone.

A

Immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have a three tier web application with a webserver tier, application tier and database tier. The application is spread across multiple availability zones for redundancy and is in an autoscaling group with a minimum size of 2 and a maximum size of 10. The application relies on connecting to an RDS multi-AZ database. When new instances are launched they download a connection string file which is saved in an encrypted S3 bucket using a boot strap script. During a routine scaling event you notice that your new webservers are failing their health checks and are not coming in to service. You investigate and discover that the EC2 - S3 read only role that the webservers rely on has no policies attached to it. What steps should you take to remediate this problem (choose 2) while maintaining the principle of least privilege? (Choose 2)

Attach the S3 – Read Only policy to the role.

Create a new role giving lambda permission to execute.

Create a snapshot of the EBS Volume and then restart the instance.

Terminate the existing instances and allow the new instances to come in to service.

Copy the role to a new AMI.

Attach the S3 – Administrator policy.

A

Terminate the existing instances and allow the new instances to come in to service.

Attach the S3 – Read Only policy to the role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are the IT manager at a furniture retailer and they are considering moving their web application to AWS. They currently colocate their servers in a colocation facility and the contract for this facility is now coming to an end. Mangement are comfortable signing a 3 year contract and want to get the cheapest web servers as possible while still maintaining availability. Their traffic is very steady and predictable. What EC2 pricing model would you recommend to maintain availability and to get the lowest cost price available?

Dedicated Instances.

Reserved Instances.

Spot Instances.

On-demand.

A

Reserved Instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An HTTP 200 code means ________.

There has been a client side error.

There has been a server side error

The request has failed

The request was successful

A

The request was successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Individual instances are provisioned ________.

In Regions

Globally

In Availability Zones

A

In Availability Zones

17
Q

A HTTP 5XX code means ________.

There has been a server side error

The request was a success

There has been a redirection

There has been a client side error

A

There has been a server side error

18
Q

You work at a small start up that has 4 developers. Each developer will need access to AWS using the SDK, CLI and Console. You create 4 user accounts and assign them to the developer group. What should you do next?

Carefully consider what permissions your developers will need and create a custom IAM policy. Attach this IAM policy to an S3 bucket.

Create a user account called super-dev-1. Give this account full administrator access and generate the access key id and secret access key. Share these keys with your developers.

Carefully consider what permissions your developers will need and create a custom IAM policy. Attach this IAM policy to the developer group.

Create a user account called super-dev-1. Give this account S3 read only access and generate the access key id and secret access key. Share these keys with your developers.

A

Carefully consider what permissions your developers will need and create a custom IAM policy. Attach this IAM policy to the developer group.

19
Q

You have a mission critical application on AWS. The application runs across 6 web servers, is extremely read intensive and runs on an RDS instance in the back end. The application’s webservers are behind an Elastic Load Balancer. During peak times your users complain of a HTTP 504 error. You check your CloudWatch metrics for your webservers and everything looks fine, however you notice that your RDS instance is at 100% CPU Utilization. What is a 504 error and how can you fix this issue? (Choose 2)

A 504 Error is a Bad Gateway Error.

A 504 Error is a Gateway Timeout error.

A 504 Error is a Service Unavailable Error.

The error is being caused by an unresponsive RDS instance. You should provision multiple read replicas and update your application to send read only traffic to the replicas.

The error is being caused by an unresponsive RDS instance. The best solution would be to import your relational database in to DynamoDB.

The error is being caused by using a legacy elastic loadbalancer.

A

A 504 Error is a Gateway Timeout error.

The error is being caused by an unresponsive RDS instance. You should provision multiple read replicas and update your application to send read only traffic to the replicas.

20
Q

You work at a large bank and are responsible for transitioning the banks applications to the cloud. You are creating an internal IT policy and this policy needs to dictate what level of access you should give to people in your organization. What is the best practice in terms of assigning permissions?

Deny all access to the cloud as it’s insecure.

Grant administrator acceess to all users.

Grant the minimum level of access to each user, depending on what his or her job requirements are (least privilege).

Grant yourself administrator access and deploy the code that your developers create yourself.

A

Grant the minimum level of access to each user, depending on what his or her job requirements are (least privilege).

21
Q

You work for a web analytics firm who have recently migrated their application to AWS. The application sits behind an Elastic Load Balancer and it monitors user traffic to their website. You have noticed that in the application logs you are no longer seeing your users public IP addresses, instead you are seeing the private IP address of the elastic load balancer. This data is critical for your business and you need to rectify the issue immediately. What should you do?

Migrate the application in front of a Network Load Balancer and then reverse proxy traffic to your RDS instance.

Update the application to log the x-forwarded-for header to get your users public IPv4 addresses.

Migrate the application to AWS Lambda instead of EC2 and put the Lambda function behind a Network Load Balancer.

Install a CloudWatch logs agent on the EC2 instances behind the elastic load balancer to monitor the public IPv4 addresses and then stream this data to AWS Neptune.

A

Update the application to log the x-forwarded-for header to get your users public IPv4 addresses.

22
Q

You have a large team of developers working on a web application. A new developer joins the organization but discovers they cannot do anything in the AWS console. You discover that they are not in the the developer group. You add the user to the group. How long will it take for the group’s permissions to take effect?

24 hours

Immediately

12 hours

60 seconds

A

Immediately

23
Q

Which of the following are valid types of load balancers? (Choose 3)

Virtual Load Balancer.

Network Load Balancer.

Application Load Balancer.

Elastic Load Balancer.

A

Network Load Balancer.

Application Load Balancer.

Elastic Load Balancer.

24
Q

A HTTP 4XX code means ________.

There has been a server side error.

There has been a client side error.

The request was successful.

There has been a redirection.

A

There has been a client side error.

25
Q

You run the internal intranet for a corporate bank. The intranet consists of a number of webservers and single relational database running Microsoft SQL Server. Your peak demand occurs at 9am every week morning when users are first logging in to the intranet. They can only log in using the company’s internal network and it is not possible to access the intranet from any location other than within the office building for security purposes. Management is considering a change and to move this enironment to AWS where users will be able to access the intranet via a software VPN. You have been asked to evaluate a migration to AWS and to identify the best EC2 billing model for your company’s intranet. You must keep costs low and to be able to scale at particular times of day. You must maintain availabilty of the intranet throughout office hours. Management do not want to be locked in to any contracts in case for some reason they want to go back to hosting internally. What EC2 billing model should you recommend?

Spot Instances.

Dedicated Instances.

Reserved Instances.

On-demand.

A

On-demand.