EC2 - Fundamentals/Instance Types/Security Groups Flashcards

1
Q

What does EC2 stand for?

A

Elastic Compute Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is EC2 User Data?

A

A script that is bootstrapped only once when the EC2 instance is first launched. It is a script used to automate boot tasks such as:

Installing updates
Installing Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are EC2 Instance Types?

A

They are types of instances that are optimised for different use cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dissect the following example instance type:

m5.2xlarge

A

m = instance class e.g. general purpose

5 = Generation (AWS improves this over time)

2xlarge = Size within the instance class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the General Purpose instance type best used for and provide an example?

A

It’s great for diverse workloads such as web servers or code repositories.

It has a good balance of compute power, memory and networking.

Example: t2.micro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Compute Optimised instance type best used for?

A

Great for compute-intensive tasks that require high performance processors.

Use cases include:

Machine Learning
Dedicated gaming servers
High performance web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Memory Optimised instance type best used for?

A

Provides fast performance for workloads that process large data sets in memory.

Use cases include:

In memory databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Storage Optimised instance type best used for?

A

Great for storage intensive tasks that require high, sequential read and write access to large data sets on local storage.

Use cases include:

Distributed file systems
Data warehousing applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are security groups?

A

Security Groups act as a “firewall” on instances that control the inbound and outbound traffic for an EC2 Instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False? Security Groups only contain allow rules

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List four things that security groups regulate for an EC2 Instance?

A

Access to ports
Authorised IP ranges (IPv4 and IPv6)
Control of inbound network
Control of outbound network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False? Security groups can only be attached to a single EC2 Instance.

A

False. They can be attached to multiple instances. Also, instances can have multiple security groups attached to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False? Security groups are locked down to a region?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How would you know if issues accessing the application is caused by the security group or not?

A

If there is a time out error, then it’s a security group issue.

If there’s a “connection refused” error, then it’s an application error or it’s not launched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the default action for all inbound and outbound traffic?

A

All inbound traffic is blocked by default.

All outbound traffic is authorised by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How would you allow other instances to be granted access to your main Instance?

A

By referencing the security groups attached to those instances in your security group e.g. authorise access from security group 1

17
Q

What are the two tools that use port 22? Explain what they are also

A

SSH (Secure Shell) - Log into a Linux instance

SFTP (Secure File Transfer Protocol) - Upload files using SSH

18
Q

What is FTP and what port does it use?

A

File Transfer Protocol allows you to upload files into a file share through port 21.

19
Q

What port allows you to access unsecured websites?

A

80 - HTTP

20
Q

What port allows you to access secured websites?

A

443 - HTTPS

21
Q

What is RDP and what port does it use?

A

Remote Desktop Protocol allows you to log into a Windows instance through port 3389.