EC2 Flashcards
What are the principles behind the AWS philosophy on pricing?
a. pay as you go
b. pay for what you use
c. pay less as you use more
d. pay even less when you reserve capacity
What are the available EC2 pricing models
a. On Demand
b. Reserved
c. Spot
d. Dedicated Hosts
When is On Demand pricing appropriate
a. desire for low cost and flexibility without upfront costs or long-term commitment
b. applications are short-term, spiky, or have unpredictable workloads that cannot be interrupted
c. applications being tested for the first time
When is Reserved pricing model appropriate
a. applications are steady state and have predictable usage
b. applications require reserved capacity
c. able to make upfront payment to reduce TCO
What are the available Reserved pricing models
a. Standard Reserved
b. Convertible Reserved
c. Scheduled
When is Spot pricing model appropriate
a. applications have flexible start & end times
b. applications are only feasible at very low compute prices
c. urgent and large amounts of additional computing capacity are needed
When is Dedicated Hosting pricing appropriate
a. restrictions due to regulatory requirements such as multi-tenant virtualization
b. licensing restrictions that don’t support multi-tenancy or cloud deployments
What are the purchase options for Dedicated Hosting
a. desire hourly on-demand hosting
b. reserved at a discounted price
What is EC2
a. host virtualization in the cloud
How is Spot pricing calculated for EC2
a. terminated by customer - charged for the full hour
b. terminated by AWS - charged for partial hour
The default setting for Termination Protection on an EC2 instance is
turned off
On an EBS-backend instance, the default action for the root EBS volume to ____ when the instance is terminated.
be deleted
The Root Volumes of your DEFAULT AMI can/can not be encrypted.
can not, but it can be encrypted later
Which volumes of and EC2 instance can be encrypted
root; but only after up an running
EBS volumes at instantiation
Other additional volumes at instantiation
Changes to security groups take effect
immediately