Exam Q/A Flashcards
- You have five CloudFormation templates; each template is for a different application architecture. This architecture varies between your blog apps and your gaming apps. What determines the cost of using the CloudFormation templates?
a. The time it takes to build the architecture with Cloud Formation.
b. Cloud Formation does not have any additional cost but you are charged for the underlying resources it builds.
c. 0.10$ per template per month
d. 0.1$ per template per month
b. Cloud Formation does not have any additional cost but you are charged for the underlying resources it builds.
- Which of the following correctly applies to changing the DB subnet group of your DB instance?
a. An existing DB Subnet group can be updated to add more subnets for existing Availability Zones.
b. An existing DB group cannot be updated to add more subnets for new Availability Zones.
c. Removing subnets from an existing DB subnet group can cause unavailability.
d. Updating an existing DB subnet group of a deployed DB instance is not currently allowed.
e. Explicitly changing the DB Subnet group of a deployed DB instance is not currently allowed.
a. An existing DB Subnet group can be updated to add more subnets for existing Availability Zones.
c. Removing subnets from an existing DB subnet group can cause unavailability.
d. Updating an existing DB subnet group of a deployed DB instance is not currently allowed.
e. Explicitly changing the DB Subnet group of a deployed DB instance is not currently allowed.
- If you want to use an SSL protocol but do not want to terminate the connection on your load balancer, you can use a __________ protocol for connection from the client to your load balancer.
a. HTTP
b. TSL
c. HTTPS
d. TCP
d. TCP
- If you want to build your own payments application, then you should take advantage of the richness and flexibility of _____________.
a. PayPal Payment service
b. EBay Payment service
c. Amazon AWS DevPay
d. Amazon AWS FPS
c. Amazon AWS DevPay
d. Amazon AWS FPS
- You are building an automated transcription service in which “Amazon EC2 worker” instances process an uploaded audio file and generate a text file. You must store both of these files in the same durable storage until the text file is retrieved, but you do not know what the storage capacity requirements are. Which storage option is both cost-efficient and scalable?
a. Multiple Amazon EBS volume with snapshots
b. A single Amazon Glacier Vault
c. A single Amazon S3 bucket
d. Multiple instance stores
c. A single Amazon S3 bucket
- Which of the following should be referred to if you want to map Amazon Elastic Block Store to an Amazon EC2 instance for AWS CloudFormation resources?
a. The logical IDs of the instance
b. Reference the logical IDs of both the block stores and the instance
c. Reference the physical IDs of the instance
d. Reference the physical IDs of the both the block stores and the instance
b. Reference the logical IDs of both the block stores and the instance
- In the event of a planned or an unplanned outage of your primary DB instance, Amazon RDS automatically switches to a standby replica in another Availability Zone if you have enabled_________.
a. More than one read replica
b. More than one write replica
c. Multiple Availability Zones
d. Multi Region Deployment
c. Multiple Availability Zones
- Which of the following approaches provides the lowest cost for Amazon elastic block store snapshots while giving you the ability to fully restore data?
a. Maintain two snapshots: the original snapshot and the latest incremental snapshot.
b. Maintain a volume snapshot; subsequent snapshots will overwrite one another.
c. Maintain a single snapshot; the latest snapshot is both incremental and complete.
d. Maintain the most current snapshot; archive the original and increment to Amazon Glacier.
a. Maintain two snapshots: the original snapshot and the latest incremental snapshot.
- You try to connect via SSH to a newly created Amazon EC2 instance and get one of the following error messages: ‘Network error: connection timed out” or “Error connecting to [instance], reason :-> Connection timed out: connect,’ you have confirmed that the network and security group rules are configured correctly and the instance is passing status checks. What steps should you take to identify the source of the behavior? (Select all that apply)
a. Verify that the private key file corresponds to the Amazon EC2 key pair assigned at launch.
b. Verify that your IAM user policy has permission to launch Amazon EC2 instances.
c. Verify that you are connecting with the appropriate user name for your AMI.
d. Verify that the Amazon EC2 instance was launched with the proper IAM role.
e. Verify that your federation trust to AWS has been established.
a. Verify that the private key file corresponds to the Amazon EC2 key pair assigned at launch.
c. Verify that you are connecting with the appropriate user name for your AMI.
- In a VPC network, access control lists (ACLs) act as a firewall for associated subnets, controlling both inbound and outbound traffic at the __________ level.
a. Full VPC
b. Customer Gateway
c. EC2 instance
d. Subnet
d. Subnet
- Which of the following is NOT true about the local secondary index?
a. The key of a local secondary index consists of a hash key and a range key.
b. For each hash key, the total size of all indexed items must be 10 GB or less.
c. The local secondary index allows you query over the entire table, across all partitions.
d. When you query a local secondary index, you can choose either eventual consistency or strong consistency.
c. The local secondary index allows you query over the entire table, across all partitions.
- A user has created multiple data points for the CloudWatch metrics with the dimensions, Box=UAT, App = Document and Box = UAT, App = Notes. If the user queries CloudWatch with the dimensions parameter as, Server=prod, what data will he get?
a. The last value of the email and sms metric
b. It will not return any data as the dimension for Box=UAT does not exist
c. All values specified for the dimension Box=UAT, App=Document
d. All values specified for the dimension Box=UAT, App=Notes
b. It will not return any data as the dimension for Box=UAT does not exist
- For Dynamo DB, which of the following statements are correct? (Select all that apply)
a. By using proxy, it is not possible for a developer to achieve item level access control.
b. By using FGAC, it is possible for a developer to achieve item level access control.
c. By using Per-Client Embedded Token, it is possible for a developer to achieve item level access control.
d. By using secret key, it is possible for a developer to achieve item level access control.
a. By using proxy, it is not possible for a developer to achieve item level access control.
b. By using FGAC, it is possible for a developer to achieve item level access control.
c. By using Per-Client Embedded Token, it is possible for a developer to achieve item level access control.
- You try to enable lifecycle policies on one of the S3 buckets created by you, but you are not able to do so on that particular bucket. What could be the reason?
a. Bucket is corrupted.
b. Versioning is not enabled on that bucket.
c. Bucket type is not correct.
d. Versioning is enabled on the bucket.
b. Versioning is not enabled on that bucket.
- Each EC2 instance has a default network interface that is assigned a primary private IP address on your Amazon VPC network. What is the name given to the additional network interfaces that can be created and attached to any Amazon EC2 instance in your VPC?
a. Elastic IP
b. Elastic Network Interface
c. AWS Elastic Interface
d. AWS Network ACL
b. Elastic Network Interface
- Which IAM policy condition key should be used if you want to check whether the request was sent using SSL?
a. AWS: secure transport
b. AWS: secure IP
c. AWS: source IP
d. AWS: user agent
a. AWS: secure transport
- What does the following policy for Amazon EC2 do? { “Statement”: [{ “Effect”:”Allow”, “Action”:”ec2: Describe”, “Resource”:”” }
a. Allow users to use all actions on an EC2 instance.
b. Allow users to use actions that start with ‘Describe’ across all the EC2 resources.
c. Allow users to use actions that does not have the keyword “Describe’ across all the EC2 resources.
d. Allow a group to be able to Describe with run, stop, start, and terminate instances.
b. Allow users to use actions that start with ‘Describe’ across all the EC2 resources.
- For what purpose is the string “create image” API action used?
a. To create an Amazon EBS-backed AMI from an Amazon EBS-backed instance that is either running or has stopped
b. To initiate the copy of an AMI from the specified source region to the current region
c. To deregister the specified AMI. After you deregister an AMI, It can’t be used to launch new instances.
d. To describes one or more of the images (AMIS, AKIS, and ARIS) available to you
a. To create an Amazon EBS-backed AMI from an Amazon EBS-backed instance that is either running or has stopped
- If you launch an instance into a VPC that has an instance tenancy of a ______________, your instance is automatically a Dedicated Instance, regardless of the tenancy of the instance.
a. secured instance
b. dedicated instance
c. default instance
d. new instance
b. dedicated instance
- In DynamoDB you can issue a scan request. By default, the scan operation processes data sequentially. DynamoDB returns data to the application in _________ increments, and an application performs additional scan operations to retrieve the next ___________ of data.
a. 0, 1 MB
b. 1, 10 MB
c. 1, 1 MB
d. 5, 5 MB
c. 1, 1 MB
- AWS requires ____________ when you need to specify a resource uniquely across all of AWS, such as in IAM policies, Amazon Relational Database Service (Amazon RDS) tags, and API calls.
a. IAM Used Id
b. Account Id
c. IAM policy
d. Amazon Resource Names
d. Amazon Resource Names
- ___________ is a task coordinator and state management service for cloud applications.
a. Amazon SWF
b. Amazon SNS
c. Amazon SQS
d. Amazon SES
a. Amazon SWF
- Which of the following IP address mechanisms are supported by ELB?
a. IPv4
b. IPv5
c. IPv6
d. IPv3
a. IPv4
c. IPv6
- A ___________ is a physical device or software application on your side of the VPN connection.
a. Customer gateway
b. Gateway level
c. Gateway table
d. Virtual private gateway
a. Customer gateway