Exam flashcards 1

1
Q

What is IAM?

A

AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are IAM Policies?

A

IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the principle of least privilege?

A

The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you secure the root account?

A

To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is AWS Shield?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is AWS WAF?

A

AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is VPC?

A

Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Security Groups?

A

Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is CloudTrail?

A

AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the AWS Well-Architected Framework?

A

The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the five pillars of the AWS Well-Architected Framework?

A

The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Operational Excellence pillar in the AWS Well-Architected Framework?

A

Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Security pillar in the AWS Well-Architected Framework?

A

The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Reliability pillar in the AWS Well-Architected Framework?

A

Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Performance Efficiency pillar in the AWS Well-Architected Framework?

A

Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Cost Optimization pillar in the AWS Well-Architected Framework?

A

Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of Auto Scaling?

A

Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an Elastic Load Balancer?

A

Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an Availability Zone?

A

An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Route 53?

A

Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an RDS Read Replica?

A

An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Multi-AZ in RDS?

A

Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the difference between horizontal and vertical scaling?

A

Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is S3 Cross-Region Replication?
S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.
26
What is an EC2 Auto Scaling Group?
An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.
27
What is AWS Global Accelerator?
AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.
28
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
29
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
30
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
31
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
32
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
33
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
34
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
35
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
36
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
37
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
38
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
39
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
40
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
41
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
42
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
43
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
44
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
45
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
46
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
47
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
48
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
49
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
50
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
51
What is the difference between horizontal and vertical scaling?
Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.
52
What is S3 Cross-Region Replication?
S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.
53
What is an EC2 Auto Scaling Group?
An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.
54
What is AWS Global Accelerator?
AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.
55
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
56
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
57
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
58
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
59
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
60
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
61
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
62
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
63
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
64
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
65
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
66
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
67
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
68
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
69
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
70
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
71
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
72
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
73
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
74
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
75
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
76
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
77
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
78
What is the difference between horizontal and vertical scaling?
Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.
79
What is S3 Cross-Region Replication?
S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.
80
What is an EC2 Auto Scaling Group?
An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.
81
What is AWS Global Accelerator?
AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.
82
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
83
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
84
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
85
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
86
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
87
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
88
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
89
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
90
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
91
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
92
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
93
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
94
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
95
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
96
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
97
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
98
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
99
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
100
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
101
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
102
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
103
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
104
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
105
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
106
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
107
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
108
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
109
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
110
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
111
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
112
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
113
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
114
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
115
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
116
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
117
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
118
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
119
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
120
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
121
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
122
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
123
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
124
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
125
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
126
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
127
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
128
What is the difference between horizontal and vertical scaling?
Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.
129
What is S3 Cross-Region Replication?
S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.
130
What is an EC2 Auto Scaling Group?
An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.
131
What is AWS Global Accelerator?
AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.
132
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
133
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
134
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
135
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
136
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
137
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
138
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
139
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
140
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
141
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
142
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
143
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
144
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
145
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
146
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
147
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
148
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
149
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
150
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
151
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
152
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
153
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
154
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
155
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
156
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
157
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
158
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
159
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
160
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
161
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
162
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
163
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
164
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
165
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
166
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
167
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
168
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
169
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
170
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
171
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
172
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
173
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
174
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
175
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
176
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
177
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
178
What is the difference between horizontal and vertical scaling?
Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.
179
What is S3 Cross-Region Replication?
S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.
180
What is an EC2 Auto Scaling Group?
An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.
181
What is AWS Global Accelerator?
AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.
182
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
183
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
184
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
185
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
186
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
187
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
188
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
189
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
190
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
191
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
192
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
193
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
194
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
195
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
196
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
197
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
198
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
199
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
200
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
201
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
202
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
203
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
204
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
205
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
206
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
207
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
208
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
209
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
210
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
211
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
212
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
213
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
214
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
215
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
216
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
217
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
218
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
219
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
220
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
221
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
222
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
223
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
224
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
225
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
226
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
227
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
228
What is the difference between horizontal and vertical scaling?
Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.
229
What is S3 Cross-Region Replication?
S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.
230
What is an EC2 Auto Scaling Group?
An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.
231
What is AWS Global Accelerator?
AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.
232
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
233
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
234
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
235
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
236
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
237
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
238
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
239
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
240
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
241
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
242
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
243
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
244
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
245
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
246
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
247
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
248
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
249
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
250
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
251
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
252
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
253
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
254
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
255
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
256
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
257
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
258
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
259
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
260
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
261
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
262
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
263
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
264
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
265
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
266
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
267
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
268
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
269
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
270
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
271
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
272
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
273
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
274
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
275
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
276
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
277
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
278
What is the difference between horizontal and vertical scaling?
Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.
279
What is S3 Cross-Region Replication?
S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.
280
What is an EC2 Auto Scaling Group?
An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.
281
What is AWS Global Accelerator?
AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.
282
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
283
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
284
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
285
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
286
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
287
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
288
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
289
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
290
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
291
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
292
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
293
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
294
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
295
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
296
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
297
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
298
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
299
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
300
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
301
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
302
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
303
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
304
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
305
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
306
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
307
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
308
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
309
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
310
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
311
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
312
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
313
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
314
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
315
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
316
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
317
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
318
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
319
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
320
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
321
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
322
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
323
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
324
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
325
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
326
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
327
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
328
What is the difference between horizontal and vertical scaling?
Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.
329
What is S3 Cross-Region Replication?
S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.
330
What is an EC2 Auto Scaling Group?
An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.
331
What is AWS Global Accelerator?
AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.
332
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
333
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
334
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
335
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
336
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
337
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
338
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
339
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
340
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
341
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
342
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
343
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
344
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
345
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
346
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
347
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
348
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
349
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
350
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
351
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
352
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
353
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
354
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
355
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
356
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
357
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
358
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
359
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
360
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
361
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
362
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
363
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
364
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
365
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
366
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
367
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
368
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
369
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
370
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
371
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
372
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
373
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
374
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
375
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
376
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
377
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
378
What is the difference between horizontal and vertical scaling?
Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.
379
What is S3 Cross-Region Replication?
S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.
380
What is an EC2 Auto Scaling Group?
An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.
381
What is AWS Global Accelerator?
AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.
382
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
383
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
384
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
385
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
386
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
387
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
388
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
389
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
390
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
391
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
392
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
393
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
394
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
395
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
396
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
397
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
398
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
399
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
400
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
401
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
402
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
403
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
404
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
405
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
406
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
407
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
408
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
409
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
410
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
411
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
412
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
413
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
414
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
415
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
416
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
417
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
418
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
419
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
420
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
421
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
422
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
423
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
424
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
425
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
426
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
427
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
428
What is the difference between horizontal and vertical scaling?
Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.
429
What is S3 Cross-Region Replication?
S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.
430
What is an EC2 Auto Scaling Group?
An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.
431
What is AWS Global Accelerator?
AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.
432
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
433
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
434
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
435
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
436
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
437
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
438
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
439
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
440
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
441
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
442
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
443
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
444
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
445
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
446
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
447
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
448
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
449
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
450
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
451
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
452
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
453
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
454
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
455
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
456
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
457
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
458
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
459
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
460
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
461
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
462
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
463
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
464
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
465
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
466
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
467
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
468
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
469
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
470
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
471
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
472
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
473
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.
474
What is an Availability Zone?
An Availability Zone is an isolated data center within an AWS Region, connected to other zones with low-latency links. Using multiple Availability Zones improves fault tolerance and disaster recovery.
475
What is Route 53?
Amazon Route 53 is a scalable DNS web service designed to route end-user requests to infrastructure in AWS and other domains, and to check the health of resources.
476
What is an RDS Read Replica?
An RDS Read Replica is a read-only copy of your database that you can use to offload read traffic. It helps improve database performance and is ideal for scaling read-heavy workloads.
477
What is Multi-AZ in RDS?
Multi-AZ (Availability Zone) in RDS ensures high availability by automatically replicating data to a standby instance in another Availability Zone. In the event of a failure, it automatically switches to the standby instance.
478
What is the difference between horizontal and vertical scaling?
Horizontal scaling involves adding more instances to distribute the load, while vertical scaling increases the resources of a single instance, such as CPU or memory.
479
What is S3 Cross-Region Replication?
S3 Cross-Region Replication automatically replicates S3 objects to a different AWS Region. It helps improve performance by keeping data close to users and ensures compliance with regional data storage regulations.
480
What is an EC2 Auto Scaling Group?
An EC2 Auto Scaling Group maintains a specified number of running EC2 instances, automatically adjusting the capacity based on predefined conditions like CPU utilization.
481
What is AWS Global Accelerator?
AWS Global Accelerator improves the availability and performance of your applications by directing traffic to the optimal endpoint using AWS global network, reducing latency.
482
What is IAM?
AWS Identity and Access Management (IAM) is a service that helps you securely control access to AWS services and resources. Using IAM, you can create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.
483
What are IAM Policies?
IAM policies are JSON documents that specify permissions for users, groups, and roles. They define what actions are allowed or denied for specific AWS services and resources. Policies are crucial for applying the principle of least privilege.
484
What is the principle of least privilege?
The principle of least privilege means granting users only the permissions they need to perform their tasks. This minimizes the security risk of unauthorized access or data breaches.
485
How can you secure the root account?
To secure the root account, enable Multi-Factor Authentication (MFA), limit its use to essential tasks, and avoid using it for everyday operations. Instead, create separate IAM users for daily activities.
486
What is AWS KMS?
AWS Key Management Service (KMS) is a managed service that allows you to create, control, and manage cryptographic keys used to encrypt your data. It integrates with other AWS services like S3, EBS, and RDS for encryption at rest.
487
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. It provides two tiers of protection: Shield Standard, which is automatically included at no cost, and Shield Advanced for additional protections.
488
What is AWS WAF?
AWS Web Application Firewall (WAF) helps protect your web applications by filtering and monitoring HTTP and HTTPS requests. It lets you control access based on conditions such as IP addresses, query string parameters, or specific headers.
489
What is VPC?
Amazon Virtual Private Cloud (VPC) allows you to define a logically isolated network in AWS. You have full control over IP addressing, subnets, route tables, and gateways, and can create secure connections between your on-premises network and AWS.
490
What are Security Groups?
Security Groups are virtual firewalls that control the traffic to and from AWS resources like EC2 instances. They allow or deny traffic based on inbound and outbound rules.
491
What is CloudTrail?
AWS CloudTrail records API calls made on your AWS account, including calls from the AWS Management Console, SDKs, and command-line tools. This enables auditing, monitoring, and troubleshooting of AWS resource usage.
492
What is the AWS Well-Architected Framework?
The AWS Well-Architected Framework helps you build secure, high-performing, resilient, and efficient infrastructure for your applications. It consists of five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
493
What are the five pillars of the AWS Well-Architected Framework?
The five pillars are: 1) Operational Excellence, 2) Security, 3) Reliability, 4) Performance Efficiency, and 5) Cost Optimization.
494
What is the Operational Excellence pillar in the AWS Well-Architected Framework?
Operational Excellence focuses on running and monitoring systems to deliver business value, and continually improving processes and procedures.
495
What is the Security pillar in the AWS Well-Architected Framework?
The Security pillar focuses on protecting data, systems, and assets by using strong access control, data protection mechanisms, and security automation.
496
What is the Reliability pillar in the AWS Well-Architected Framework?
Reliability focuses on ensuring that workloads can recover from infrastructure or service failures, meet availability requirements, and scale as needed.
497
What is the Performance Efficiency pillar in the AWS Well-Architected Framework?
Performance Efficiency focuses on using IT and computing resources efficiently to meet system requirements, while maintaining scalability.
498
What is the Cost Optimization pillar in the AWS Well-Architected Framework?
Cost Optimization involves avoiding unnecessary costs while maintaining the required performance, and using resources efficiently.
499
What is the purpose of Auto Scaling?
Auto Scaling ensures that you have the right amount of compute resources available to handle the load for your application. It automatically adjusts the number of EC2 instances based on traffic or demand.
500
What is an Elastic Load Balancer?
Elastic Load Balancer (ELB) automatically distributes incoming application traffic across multiple EC2 instances, containers, or IP addresses, ensuring high availability and fault tolerance.