Exam Q/A Flashcards

1
Q
  1. You have five CloudFormation templates; each template is for a different application architecture. This architecture varies between your blog apps and your gaming apps. What determines the cost of using the CloudFormation templates?

a. The time it takes to build the architecture with Cloud Formation.
b. Cloud Formation does not have any additional cost but you are charged for the underlying resources it builds.
c. 0.10$ per template per month
d. 0.1$ per template per month

A

b. Cloud Formation does not have any additional cost but you are charged for the underlying resources it builds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following correctly applies to changing the DB subnet group of your DB instance?
    a. An existing DB Subnet group can be updated to add more subnets for existing Availability Zones.
    b. An existing DB group cannot be updated to add more subnets for new Availability Zones.
    c. Removing subnets from an existing DB subnet group can cause unavailability.
    d. Updating an existing DB subnet group of a deployed DB instance is not currently allowed.
    e. Explicitly changing the DB Subnet group of a deployed DB instance is not currently allowed.
A

a. An existing DB Subnet group can be updated to add more subnets for existing Availability Zones.
c. Removing subnets from an existing DB subnet group can cause unavailability.
d. Updating an existing DB subnet group of a deployed DB instance is not currently allowed.
e. Explicitly changing the DB Subnet group of a deployed DB instance is not currently allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. If you want to use an SSL protocol but do not want to terminate the connection on your load balancer, you can use a __________ protocol for connection from the client to your load balancer.

a. HTTP
b. TSL
c. HTTPS
d. TCP

A

d. TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. If you want to build your own payments application, then you should take advantage of the richness and flexibility of _____________.

a. PayPal Payment service
b. EBay Payment service
c. Amazon AWS DevPay
d. Amazon AWS FPS

A

c. Amazon AWS DevPay

d. Amazon AWS FPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. You are building an automated transcription service in which “Amazon EC2 worker” instances process an uploaded audio file and generate a text file. You must store both of these files in the same durable storage until the text file is retrieved, but you do not know what the storage capacity requirements are. Which storage option is both cost-efficient and scalable?

a. Multiple Amazon EBS volume with snapshots
b. A single Amazon Glacier Vault
c. A single Amazon S3 bucket
d. Multiple instance stores

A

c. A single Amazon S3 bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following should be referred to if you want to map Amazon Elastic Block Store to an Amazon EC2 instance for AWS CloudFormation resources?

a. The logical IDs of the instance
b. Reference the logical IDs of both the block stores and the instance
c. Reference the physical IDs of the instance
d. Reference the physical IDs of the both the block stores and the instance

A

b. Reference the logical IDs of both the block stores and the instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. In the event of a planned or an unplanned outage of your primary DB instance, Amazon RDS automatically switches to a standby replica in another Availability Zone if you have enabled_________.

a. More than one read replica
b. More than one write replica
c. Multiple Availability Zones
d. Multi Region Deployment

A

c. Multiple Availability Zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following approaches provides the lowest cost for Amazon elastic block store snapshots while giving you the ability to fully restore data?
    a. Maintain two snapshots: the original snapshot and the latest incremental snapshot.
    b. Maintain a volume snapshot; subsequent snapshots will overwrite one another.
    c. Maintain a single snapshot; the latest snapshot is both incremental and complete.
    d. Maintain the most current snapshot; archive the original and increment to Amazon Glacier.
A

a. Maintain two snapshots: the original snapshot and the latest incremental snapshot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. You try to connect via SSH to a newly created Amazon EC2 instance and get one of the following error messages: ‘Network error: connection timed out” or “Error connecting to [instance], reason :-> Connection timed out: connect,’ you have confirmed that the network and security group rules are configured correctly and the instance is passing status checks. What steps should you take to identify the source of the behavior? (Select all that apply)
    a. Verify that the private key file corresponds to the Amazon EC2 key pair assigned at launch.
    b. Verify that your IAM user policy has permission to launch Amazon EC2 instances.
    c. Verify that you are connecting with the appropriate user name for your AMI.
    d. Verify that the Amazon EC2 instance was launched with the proper IAM role.
    e. Verify that your federation trust to AWS has been established.
A

a. Verify that the private key file corresponds to the Amazon EC2 key pair assigned at launch.
c. Verify that you are connecting with the appropriate user name for your AMI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. In a VPC network, access control lists (ACLs) act as a firewall for associated subnets, controlling both inbound and outbound traffic at the __________ level.

a. Full VPC
b. Customer Gateway
c. EC2 instance
d. Subnet

A

d. Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which of the following is NOT true about the local secondary index?
    a. The key of a local secondary index consists of a hash key and a range key.
    b. For each hash key, the total size of all indexed items must be 10 GB or less.
    c. The local secondary index allows you query over the entire table, across all partitions.
    d. When you query a local secondary index, you can choose either eventual consistency or strong consistency.
A

c. The local secondary index allows you query over the entire table, across all partitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A user has created multiple data points for the CloudWatch metrics with the dimensions, Box=UAT, App = Document and Box = UAT, App = Notes. If the user queries CloudWatch with the dimensions parameter as, Server=prod, what data will he get?
    a. The last value of the email and sms metric
    b. It will not return any data as the dimension for Box=UAT does not exist
    c. All values specified for the dimension Box=UAT, App=Document
    d. All values specified for the dimension Box=UAT, App=Notes
A

b. It will not return any data as the dimension for Box=UAT does not exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. For Dynamo DB, which of the following statements are correct? (Select all that apply)
    a. By using proxy, it is not possible for a developer to achieve item level access control.
    b. By using FGAC, it is possible for a developer to achieve item level access control.
    c. By using Per-Client Embedded Token, it is possible for a developer to achieve item level access control.
    d. By using secret key, it is possible for a developer to achieve item level access control.
A

a. By using proxy, it is not possible for a developer to achieve item level access control.
b. By using FGAC, it is possible for a developer to achieve item level access control.
c. By using Per-Client Embedded Token, it is possible for a developer to achieve item level access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. You try to enable lifecycle policies on one of the S3 buckets created by you, but you are not able to do so on that particular bucket. What could be the reason?

a. Bucket is corrupted.
b. Versioning is not enabled on that bucket.
c. Bucket type is not correct.
d. Versioning is enabled on the bucket.

A

b. Versioning is not enabled on that bucket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Each EC2 instance has a default network interface that is assigned a primary private IP address on your Amazon VPC network. What is the name given to the additional network interfaces that can be created and attached to any Amazon EC2 instance in your VPC?

a. Elastic IP
b. Elastic Network Interface
c. AWS Elastic Interface
d. AWS Network ACL

A

b. Elastic Network Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which IAM policy condition key should be used if you want to check whether the request was sent using SSL?

a. AWS: secure transport
b. AWS: secure IP
c. AWS: source IP
d. AWS: user agent

A

a. AWS: secure transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. What does the following policy for Amazon EC2 do? { “Statement”: [{ “Effect”:”Allow”, “Action”:”ec2: Describe”, “Resource”:”” }
    a. Allow users to use all actions on an EC2 instance.
    b. Allow users to use actions that start with ‘Describe’ across all the EC2 resources.
    c. Allow users to use actions that does not have the keyword “Describe’ across all the EC2 resources.
    d. Allow a group to be able to Describe with run, stop, start, and terminate instances.
A

b. Allow users to use actions that start with ‘Describe’ across all the EC2 resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. For what purpose is the string “create image” API action used?
    a. To create an Amazon EBS-backed AMI from an Amazon EBS-backed instance that is either running or has stopped
    b. To initiate the copy of an AMI from the specified source region to the current region
    c. To deregister the specified AMI. After you deregister an AMI, It can’t be used to launch new instances.
    d. To describes one or more of the images (AMIS, AKIS, and ARIS) available to you
A

a. To create an Amazon EBS-backed AMI from an Amazon EBS-backed instance that is either running or has stopped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. If you launch an instance into a VPC that has an instance tenancy of a ______________, your instance is automatically a Dedicated Instance, regardless of the tenancy of the instance.

a. secured instance
b. dedicated instance
c. default instance
d. new instance

A

b. dedicated instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. In DynamoDB you can issue a scan request. By default, the scan operation processes data sequentially. DynamoDB returns data to the application in _________ increments, and an application performs additional scan operations to retrieve the next ___________ of data.

a. 0, 1 MB
b. 1, 10 MB
c. 1, 1 MB
d. 5, 5 MB

A

c. 1, 1 MB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. AWS requires ____________ when you need to specify a resource uniquely across all of AWS, such as in IAM policies, Amazon Relational Database Service (Amazon RDS) tags, and API calls.

a. IAM Used Id
b. Account Id
c. IAM policy
d. Amazon Resource Names

A

d. Amazon Resource Names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. ___________ is a task coordinator and state management service for cloud applications.

a. Amazon SWF
b. Amazon SNS
c. Amazon SQS
d. Amazon SES

A

a. Amazon SWF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Which of the following IP address mechanisms are supported by ELB?

a. IPv4
b. IPv5
c. IPv6
d. IPv3

A

a. IPv4

c. IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. A ___________ is a physical device or software application on your side of the VPN connection.

a. Customer gateway
b. Gateway level
c. Gateway table
d. Virtual private gateway

A

a. Customer gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. You are currently hosting multiple applications in a VPC and have logged numerous port scans coming in from a specific IP address block. Your security team has requested that all access to the offending IP address block be denied for the next 24 hours. Which of the following is the best method to quickly and temporarily deny access to the specified IP address block?
    a. Create an AD policy to modify Windows Firewall settings on all hosts in the VPC to deny access to the IP address block.
    b. Modify the Network ACLs (NACLs) associated with all public subnets in the VPC to deny access from the IP address block.
    c. Modify the Windows Firewall settings on all Amazon Machine Images (AMIs) which your organization uses in that VPC to deny access from the IP address block.
A

b. Modify the Network ACLs (NACLs) associated with all public subnets in the VPC to deny access from the IP address block.

26
Q
  1. Which ELB component is responsible for monitoring the Load Balancers?

a. Controller service
b. Load Balancer
c. Auto Scaling
d. Load Manager

A

a. Controller service

27
Q
  1. Which disaster recovery method involves running your site in AWS and on your existing on-site infrastructure in an active-active configuration?

a. Multi-site solution
b. Active-passive solution
c. Pilot light
d. Warm standby solution

A

a. Multi-site solution

28
Q
  1. An application hosted at the EC2 instances receives HTTP requests through the ELB. Each request has an X-Forwarded-For request header, having three IP addresses. Which of the following IP address will be a part of this header?

a. IP address of ELB
b. IP address of Forward Request
c. IP address of client
d. IP address of CloudWatch

A

c. IP address of client

29
Q
  1. You have launched an instance in EC2-Classic and you want to make some change to the security group rule. How will these changes be effective?
    a. Security group rules cannot be changed.
    b. Changes are automatically applied to all instances that are associated with the security group.
    c. Changes will be effective after rebooting the instances in that security group.
    d. Changes will be effective after 24-hours.
A

b. Changes are automatically applied to all instances that are associated with the security group.

30
Q
  1. You have an application running on Amazon Web Services. The application has 4 EC2 instances in Availability Zone us-east-1c. You’re using Elastic Load Balancer to load balance traffic across your four instances. What changes would you make to create a fault tolerant architecture?

a. Create EBS backups to ensure data is not lost.
b. Move all four instances to a different Availability Zone.
c. Move two instances to another Availability Zone.
d. Use CloudWatch to distribute the load evenly.

A

c. Move two instances to another Availability Zone.

31
Q
  1. The load balancer does not distribute traffic across ________.

a. One Availability Zone
b. Domains
c. Availability Zones within a region
d. Regions

A

d. Regions

32
Q
  1. In context of CloudFormation, which of the following information do you get from the AWS Cloud Formation list-stacks Command?
    a. A list of any of the stacks you have created.
    b. A list of any of the stacks you have created or have deleted up to 90 days ago.
    c. A list of any of the stacks that have been created or deleted up to 60 days ago.
    d. A 90 days history list of all your activity on stacks.
A

b. A list of any of the stacks you have created or have deleted up to 90 days ago.

33
Q
  1. When you use the wizard in the console to create a VPC with a gateway, the wizard automatically __________ to use the gateway.

a. updates the route tables
b. updates the IP tables
c. updates the protocol tables
d. updates the IP tables and the protocol tables

A

a. updates the route tables

34
Q
  1. You’ve created production architecture on AWS. It consists of one load balancer, one route53 domain, two Amazon S3 buckets, Auto Scaling policy, and Amazon CloudFront for content delivery. Your manager asks you to duplicate this architecture by using a JSON based template. Which of the following AWS service would you use to achieve this?

a. Amazon DynamoDB
b. Amazon Simple DB
c. Amazon CloudFormation
d. Amazon Bootstrap

A

c. Amazon CloudFormation

35
Q
  1. You have configured a website www.abc.com and hosted it on WebLogic Server and you are using ELB with the EC2 instances for load balance. Which of the following would you configure to ensure that the EC2 instances accept requests only from ELB?
    a. Configure the security group of EC2, which allows access to the ELB source security group.
    b. Configure the EC2 instance so that it only listens on the ELB port.
    c. Configure the security group of EC2, which allows access only to the ELB listener.
    d. Open the port for an ELB static IP in the EC2 security group.
A

a. Configure the security group of EC2, which allows access to the ELB source security group.

36
Q
  1. You have written a CloudFormation template that creates one Elastic Load Balancer fronting two EC2 instances. Which section of the template should you edit so that the DNS of the load balancer is returned upon creation of the stack?

a. Outputs
b. Resources
c. Parameters
d. Mappings

A

a. Outputs

37
Q
  1. What does a ‘Domain” refer to in Amazon SWF?
    a. Set of predefined fixed IP addresses
    b. A Security group in which internal tasks can communicate with each other
    c. A collection of related Workflows
    d. A collection of related topics
A

c. A collection of related Workflows

38
Q
  1. A customer has a website which is accessible over the Internet and he wants to secure the communication and decides to implement HTTPS instead of HTTP. He has configured EC2 instance behind an ELB. Where should you configure the SSL certificate?
    a. Not possible in AWS
    b. SSL certificate will be installed at ELB and the listener port should be changed from 80 to 443 to allow the traffic to reach EC2
    c. SSL certificate will be installed at EC2 and listener port should be changed from 80 to 443
    d. SSL certificate will be installed at EC2 and listener port can remain at 443
A

b. SSL certificate will be installed at ELB and the listener port should be changed from 80 to 443 to allow the traffic to reach EC2

39
Q
  1. Once you’ve successfully created a Microsoft windows stack on AWS CloudFormation, you can log in to your instance with _______ to configure it manually.

a. AWS Command Line Interface
b. Remote Desktop
c. Power shell
d. Windows Command prompt

A

b. Remote Desktop

40
Q
  1. You have created a custom configured Amazon instance using Linux, containing all your software and applications. If you want to use the same setup again, what is the best way to do it?

a. Create a back up copy of the EBS service
b. Create a backup of the EC2 instances only
c. Create a snapshot of the AMI only
d. Create an EBS Image (AMI)

A

d. Create an EBS Image (AMI)

41
Q
  1. With regards to VPC, what is the default maximum number of virtual private gateways allowed per region?

a. 10
b. 15
c. 5
d. 1

A

c. 5

42
Q
  1. Elasticity is a fundamental property of the cloud. Which of the following best describes elasticity?

a. The power to scale computing resources up and down easily with minimal friction
b. Ability to create services without having to administer resources
c. Process by which scripts notify you of resource so you can fix them manually.
d. Power to scale computing resources up easily but not scale down.

A

a. The power to scale computing resources up and down easily with minimal friction

43
Q
  1. With regards to RDS, the standby should be in the same ______________ as the primary instance.

a. Availability Zone
b. Region
c. VPC
d. Subnet

A

b. Region

44
Q
  1. AWS Identity and Access Management is available through which of the following interfaces?

a. AWS Management Console
b. Command line interface (CLI)
c. IAM QUERY API
d. Elastic Load Balancer
e. Cloud Formation

A

a. AWS Management Console
b. Command line interface (CLI)
c. IAM QUERY API

45
Q
  1. Scalability is a fundamental property of a good AWS system. Which of the following best describes scalability on AWS?

a. Scalability is the concept of planning ahead for what maximum resources will be required and building your infrastructure based on that capacity plan.
b. The law of diminishing returns will apply to resources as they are increased with workload.
c. Increasing resources result in a proportional increase in performance.
d. Scalability is not a fundamental property of the cloud.

A

c. Increasing resources result in a proportional increase in performance.

46
Q
  1. Which technique can be used to integrate AWS IAM (Identity and Access Management) with an on-premises LDAP (Light Weight Directory Access Protocol) directory service?

a. Use an IAM policy that references the LDAP account identifiers and the AWS credentials.
b. Use SAML (Security Assertion Markup Language) to enable single sign-on between AWS and LDAP.
c. Use AWS security Token Service from an identity broker to issue short-lived AWS credentials.
d. Use IAM roles to automatically rotate the IAM credentials when LDAP credentials are updated.
e. Use the LDAP credentials to restrict a group of users from launching specific EC2 instance types.

A

b. Use SAML (Security Assertion Markup Language) to enable single sign-on between AWS and LDAP.

47
Q
  1. If you are using a non-transactional engine such as My ISAM, which of the following steps need to be performed to successfully set up your Read Replica so it has a consistent copy of your data?

a. Stop all DML and DDL operations on non-transactional tables and wait for them to complete
b. Flush and lock those tables
c. Create the Read Replica using the Create DB instance Read Replica API
d. Check the progress of the Replica creation using the describe DB instances API
e. Set AWS IAM and KMS

A

a. Stop all DML and DDL operations on non-transactional tables and wait for them to complete
b. Flush and lock those tables
c. Create the Read Replica using the Create DB instance Read Replica API
d. Check the progress of the Replica creation using the describe DB instances API

48
Q
  1. In CloudFront, if you add a CNAME for www.abc.com to your distribution, you also need to create (or update) a CNAME record with your DNS service to route queries for ___________.

a. www.abc.comto d111111abcdef8.cloudfront.com
b. d111111abcdef8.cloudfront.com to www.abc.com
c. www.abc.com to d111111abcdef8.cloudfront.net
d. d111111abcdef8.cloudfront.net to www.abc.com

A

c. www.abc.com to d111111abcdef8.cloudfront.net

49
Q
  1. Your manager has asked you to build a MongoDB replica set in the Cloud. Amazon Web Services does not provide a MongoDB service. How would you go about setting up the MongoDB replica set?

a. You have to build it on another data center.
b. Request AWS to add a Mongo DB service.
c. Build the replica set using EC2 instances and manage the Mongo DB instances yourself.
d. It is not possible to do it.

A

c. Build the replica set using EC2 instances and manage the Mongo DB instances yourself.

50
Q
  1. Your company has an application that requires access to a NoSQL database. Your IT departments have no desire to manage the NoSQL servers. Which Amazon service provides a fully managed and highly available NoSQL service?

a. Elastic Map Reduce
b. Amazon RDS
c. Simple DB
d. DynamoDB

A

d. DynamoDB

51
Q
  1. How many requests per second can Amazon CloudFront handle?

a. 10,000
b. 100
c. 1000
d. 500

A

c. 1000

52
Q
  1. When you need to use CloudFront to distribute your content you need to create a distribution. You also need to specify the configuration settings. Which of the following configuration settings would you specify?

a. You can configure the environment variables.
b. You can specify the number of files that you can serve per distribution.
c. You can specify whether you want the files to be available to everyone or you want to restrict access to selected users.
d. You can specify your origin Amazon S3 bucket or HTTP server.

A

d. You can specify your origin Amazon S3 bucket or HTTP server.

53
Q
  1. You currently operate a web application in the AWS US-East region. The application runs on an auto-scaled layer of EC2 instances and an RDS Multi-AZ database. Your IT security compliance officer has tasked you to develop a reliable and durable logging solution to track changes made to your EC2, IAM, and RDS resources. The solution must ensure the integrity and confidentiality of your log data. Which of these solutions would you recommend?

a. Create a new Cloud Trail with one new S3 bucket to store the logs and with the global services option selected. Use IAM roles S3 bucket policies and Multi Factor Authentication (MFA) delete on the S3 bucket that stores your logs.
b. Create a new Cloud Trail with one new S3 bucket to store the logs. Configure SNS to send log file delivery notifications to your management system. Use IAM roles and S3 bucket policies on the S3 bucket that stores your logs.
c. Create a new Cloud Trail with an existing S3 bucket to store the logs and with the global services option selected. Use S3 ACLs and Multi Factor Authentication (MFA) delete on the S3 bucket that stores your logs.
d. Create three new Cloud trails with three new S3 buckets to store the logs-one for the AWS management console, one for AWS SDKs ,and one for command line tools. Use IAM roles and S3 bucket policies on the S3 buckets that store your logs.

A

a. Create a new Cloud Trail with one new S3 bucket to store the logs and with the global services option selected. Use IAM roles S3 bucket policies and Multi Factor Authentication (MFA) delete on the S3 bucket that stores your logs.

54
Q
  1. Which of the following metrics can have a CloudWatch Alarm?

a. RRS lost object
b. EC2 instance status Check Failed
c. EC2 CPU utilization
d. Auto Scaling group CPU utilization

A

b. EC2 instance status Check Failed
c. EC2 CPU utilization
d. Auto Scaling group CPU utilization

55
Q
  1. Which of the following payment options are associated with Reserved Instances?

a. Partial Upfront
b. No Upfront
c. Annual Upfront
d. All Upfront

A

a. Partial Upfront
b. No Upfront
d. All Upfront

56
Q
  1. You have a website www.abc.com which is used quite frequently. Therefore, you decide to use 50 EC2 instances, with two availability zones in two regions, each with 25 instances. However, while starting the servers, you are able to start only 20 servers and then the requests start failing. Why?

a. There is a limit of 20 EC2 instances in each region; you can request to increase the limit.
b. There is a limit of 20 EC2 instances in each availability zone, you can request to increase the limit.
c. You might have exhausted the free space available and need to select paid version of storage.
d. You cannot have more than one availability zone in a region.

A

a. There is a limit of 20 EC2 instances in each region; you can request to increase the limit.

57
Q
  1. www.picsee.com website has millions of photos and also thumbnails for each photo. Thumbnails can easily be reproduced from the actual photo. However, a thumbnail takes less space than actual photo. Which of the following is the best solution to store thumbnails?

a. S3
b. Reduced Redundancy Storage
c. DynamoDB
d. Elastic Cache
e. Amazon Glacier

A

b. Reduced Redundancy Storage

58
Q
  1. You want your Hadoop job to be triggered based on the event notification of a file upload action. Which of the following components can help you implement this in AWS?

a. S3
b. SQS
c. SNS
d. EC2
e. IAM

A

a. S3
b. SQS
c. SNS

59
Q
  1. www.dropbag.com is a website where you have file sharing and storing services like Google Drive and Google Dropbox. During the sync up from desktop you accidently deleted an important file. Which of the simple storage service will help you retrieve the deleted file?

a. Versioning in S3
b. Secured signed URLs for S3 data access
c. Don’t allow delete objects from S3 (only soft delete is permitted)
d. S3 Reduced Redundancy Storage.

A

a. Versioning in S3

60
Q
  1. www.picnic.com is a photo and video hosting website and they have millions of users. Which of the following is a good solution for storing big data object, by reducing costs, scaling to meet demand, and increasing the speed of innovation?

a. AWS S3
b. AWS RDS
c. AWS Glaciers
d. AWS Redshift

A

a. AWS S3