Exam flashcards 1

1
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is S3 Cross-Region Replication?

A

S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is an EC2 Auto Scaling Group?

A

An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is AWS Global Accelerator?

A

AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is S3 Cross-Region Replication?

A

S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is an EC2 Auto Scaling Group?

A

An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is AWS Global Accelerator?

A

AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is S3 Cross-Region Replication?

A

S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is an EC2 Auto Scaling Group?

A

An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is AWS Global Accelerator?

A

AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

What is S3 Cross-Region Replication?

A

S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

What is an EC2 Auto Scaling Group?

A

An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

What is AWS Global Accelerator?

A

AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

What is S3 Cross-Region Replication?

A

S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

What is an EC2 Auto Scaling Group?

A

An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

What is AWS Global Accelerator?

A

AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

202
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

203
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

204
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

205
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

206
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

207
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

208
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

209
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

210
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

211
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

212
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

213
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

214
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

215
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

216
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

217
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

218
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

219
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

220
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

221
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

222
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

223
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

224
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

225
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

226
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

227
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

228
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

229
Q

What is S3 Cross-Region Replication?

A

S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.

230
Q

What is an EC2 Auto Scaling Group?

A

An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.

231
Q

What is AWS Global Accelerator?

A

AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.

232
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

233
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

234
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

235
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

236
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

237
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

238
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

239
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

240
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

241
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

242
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

243
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

244
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

245
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

246
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

247
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

248
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

249
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

250
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

251
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

252
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

253
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

254
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

255
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

256
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

257
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

258
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

259
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

260
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

261
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

262
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

263
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

264
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

265
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

266
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

267
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

268
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

269
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

270
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

271
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

272
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

273
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

274
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

275
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

276
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

277
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

278
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

279
Q

What is S3 Cross-Region Replication?

A

S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.

280
Q

What is an EC2 Auto Scaling Group?

A

An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.

281
Q

What is AWS Global Accelerator?

A

AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.

282
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

283
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

284
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

285
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

286
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

287
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

288
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

289
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

290
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

291
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

292
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

293
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

294
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

295
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

296
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

297
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

298
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

299
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

300
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

301
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

302
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

303
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

304
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

305
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

306
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

307
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

308
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

309
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

310
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

311
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

312
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

313
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

314
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

315
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

316
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

317
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

318
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

319
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

320
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

321
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

322
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

323
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

324
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

325
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

326
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

327
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

328
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

329
Q

What is S3 Cross-Region Replication?

A

S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.

330
Q

What is an EC2 Auto Scaling Group?

A

An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.

331
Q

What is AWS Global Accelerator?

A

AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.

332
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

333
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

334
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

335
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

336
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

337
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

338
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

339
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

340
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

341
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

342
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

343
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

344
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

345
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

346
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

347
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

348
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

349
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

350
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

351
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

352
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

353
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

354
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

355
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

356
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

357
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

358
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

359
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

360
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

361
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

362
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

363
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

364
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

365
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

366
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

367
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

368
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

369
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

370
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

371
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

372
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

373
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

374
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

375
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

376
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

377
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

378
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

379
Q

What is S3 Cross-Region Replication?

A

S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.

380
Q

What is an EC2 Auto Scaling Group?

A

An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.

381
Q

What is AWS Global Accelerator?

A

AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.

382
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

383
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

384
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

385
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

386
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

387
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

388
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

389
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

390
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

391
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

392
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

393
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

394
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

395
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

396
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

397
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

398
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

399
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

400
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

401
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

402
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

403
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

404
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

405
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

406
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

407
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

408
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

409
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

410
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

411
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

412
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

413
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

414
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

415
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

416
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

417
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

418
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

419
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

420
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

421
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

422
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

423
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

424
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

425
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

426
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

427
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

428
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

429
Q

What is S3 Cross-Region Replication?

A

S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.

430
Q

What is an EC2 Auto Scaling Group?

A

An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.

431
Q

What is AWS Global Accelerator?

A

AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.

432
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

433
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

434
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

435
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

436
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

437
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

438
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

439
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

440
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

441
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

442
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

443
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

444
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

445
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

446
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

447
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

448
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

449
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

450
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

451
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

452
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

453
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

454
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

455
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

456
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

457
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

458
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

459
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

460
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

461
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

462
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

463
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

464
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

465
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

466
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

467
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

468
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

469
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

470
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

471
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

472
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

473
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

474
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

475
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

476
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

477
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

478
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

479
Q

What is S3 Cross-Region Replication?

A

S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.

480
Q

What is an EC2 Auto Scaling Group?

A

An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.

481
Q

What is AWS Global Accelerator?

A

AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.

482
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

483
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

484
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

485
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

486
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

487
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

488
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

489
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

490
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

491
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

492
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

493
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

494
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

495
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

496
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

497
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

498
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

499
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

500
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.