Linux Academy Questions Flashcards
You have a critical application that must be able to be optimized for high disaster recovery. Ideally, which deployment mechanism would you choose?
A) Deployment to multiple data centers
B) Deployment to multiple facilities
C) Deployment to multiple AZs
D) Deployment to multiple regions
D) Deployment to multiple regions
Regions represent different geographic locations and are best for disaster recovery.
In the AWS Shared Responsibility Model, what does AWS perform on your behalf for EBS volumns?
A) Replication of the EBS volume across multiple regions
B) Replication of the EBS volume across multiple EC2 instances
C) Replication of the EBS volume across multiple Availability Zones
D) Replication of the EBS volume across the same Availability Zone
D) Replication of the EBS volume across the same Availability Zone
When you create an EBS volume, it is automatically replicated in the same Availability Zone to help prevent data loss in the event of a single hardware component failure.
What helps you aggregate your logs from your EC2 instance?
A) SNS
B) CloudWatch logs
C) CloudTrail
D) S3
B) CloudWatch logs
You can use Amazon CloudWatch Logs to monitor, store, and access your log files from Amazon Elastic Compute Cloud (Amazon EC2) instances, AWS CloudTrail, Route 53, and other sources.
What service would be most useful in a disaster recovery situation?
A) Route 53
B) AWS EC2
C) AWS Guard Duty
D) AWS S3 transfer acceleration
A) Route 53
When you have more than one resource performing the same function—for example, more than one HTTP server or mail server—you can configure Amazon Route 53 to check the health of your resources. For example, suppose your website, example.com, is hosted on six servers, two each in three data centers around the world. You can configure Route 53 to check the health of those servers and to respond to DNS queries for example.com using only the servers that are currently healthy. You can also use Route 53 to switch DNS addresses.
You manage and maintain a web server and a cluster of databases that host the results of scientific experiments for new requests for funding and proposals. Most of the time, these resources are idle but become extremely busy when funding is awarded. What is the best choice for a cost-efficient architecture?
A) Configure an Elastic Load Balancer between your web server and databases.
B) Configure your web server to use an EC2 spot instance.
C) Configure the database cluster to be an RDS cluster with multiple Availability Zones.
D) Configure a serverless architecture using AWS Lambda functions.
D) Configure a serverless architecture using AWS Lambda functions.
AWS Lambda automatically scales out to meet demand for the database cluster, provides a platform to run code without the need of a dedicated web server, and you only pay for the compute time you use.
For auditing purposes, your company now wants to monitor all API activity for all regions in your AWS environment. What can you use to fulfill this new requirement? Please select the best answer out of the available choices.
A) Enable CloudTrail for all Availability Zones.
B) Use AWS Config to enable the trail for all regions.
C) For each region, enable CloudTrail and send all logs to a bucket in each region.
D) Make sure you have CloudTrail created in all Regions.
D) Make sure you have CloudTrail created in all Regions.
Turn on CloudTrail for all regions in your environment and CloudTrail can deliver all log files from all regions to one S3 bucket.
Which of the following tools can best assist with identifying common security vulnerabilities?
A) AWS Inspector
B) AWS Config
C) AWS Guard Duty
D) AWS Trusted Advisor
A) AWS Inspector
AWS Inspector can check your EC2 instances for common security vulnerabilities.
You receive an alert an issue between an application and the database servers. What should you check to ensure communication is working?
A) AWS KMS
B) Security group rules
C) NACL rules
D) AWS IAM roles
B) Security group rules
Since the issue is communication between the application and server, you should check security group rules since security groups control access at the instance ENI level.
Which option below cannot be used to import data into Amazon Glacier?
A) AWS S3 lifecycle policies
B) AWS Management Console
C) AWS Glacier API
D) AWS Glacier SDK
B) AWS Management Console
The AWS Management Console cannot be used to upload data to Glacier; the management console can only be used to create a Glacier vault that can be used to upload data.
What acts as a virtual firewall that controls traffic to your EC2 instances?
A) Security group
B) IAM
C) NACL
D) AWS WAF
A) Security group
AWS security groups (SGs) are associated with EC2 instances and provide security at the protocol and port access level. Each security group—working much the same way as a firewall—contains a set of rules that filter traffic coming into and out of an EC2 instance.
How can you make sure your organization does not exceed its monthly budget?
A) Sign up for the free alert under billing preferences in the AWS Management Console.
B) Set a schedule to regularly review the Billing and Cost Management dashboard each month.
C) Create an email alert in AWS Budgets.
D) In CloudWatch, create an alarm that triggers each time the limit is reached.
C) Create an email alert in AWS Budgets.
AWS Budgets gives you the ability to set custom budgets that alert you when your costs or usage exceed (or are forecasted to exceed) your budgeted amount. You can also use AWS Budgets to set reservation utilization or coverage targets and receive alerts when your utilization drops below the threshold you define. Reservation alerts are supported for Amazon EC2, Amazon RDS, Amazon Redshift, Amazon ElastiCache, and Amazon Elasticsearch reservations.
Budgets can be tracked at the monthly, quarterly, or yearly level, and you can customize the start and end dates. You can further refine your budget to track costs associated with multiple dimensions, such as AWS service, linked account, tag, and others. Budget alerts can be sent via email and/or Amazon Simple Notification Service (SNS) topic.
Budgets can be created and tracked from the AWS Budgets dashboard or via the Budgets API.
What AWS service provides you infrastructure as code?
A) CloudFormation
B) OpsWorks
C) Elastic Beanstalk
D) VPC
A) CloudFormation
AWS CloudFormation is infrastructure as code and provides a common language for you to describe and provision all the infrastructure resources in your cloud environment.
Which of the following is not a disaster recovery deployment technique?
A) Pilot light
B) Multi-site
C) Warm standby
D) Single site
D) Single site
This is not a real solution.
What is Glacier designed for? (Choose 3).
A) Data archives B) A replacement for tape archives C) On demand access for archives D) Infrequently accessed data E) Cached data
A) Data archives
B) A replacement for tape archives
D) Infrequently accessed data
Glacier is low-cost storage for backup and archival data that is often used to replace tape archives.
Glacier is low-cost storage for infrequently accessed data.
Which statements below are correct regarding scalability?
A) A scalable system diverts traffic to multiple regions.
B) A scalable system distributes traffic based on demand.
C) A scalable system distributes traffic to instances with the highest capacity.
D) A scalable system distributes traffic to instances with the least load.
B) A scalable system distributes traffic based on demand.
D) A scalable system distributes traffic to instances with the least load.
Scalability scales up with an increased number of instances and scales down automatically based on demand, as well as diverts traffic to the instances with the least load.
Which security feature is associated with a subnet in your VPC to protect incoming traffic requests?
A) GuardDuty
B) NACL
C) Internet Gateway
D) Subnet group
B) NACL
A network access control list (NACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets.
After installing SSL/TLS for security, you were alerted that there is a consistent spike in one of your company’s web servers hosting a large application. This increased activity slowed down your application. Which of the following is the best and most cost-effective option for resolving the slow speed and getting your application to respond quickly again?
A) Create a custom CloudWatch script to monitor the resources and alert you when the application begins to degrade
B) Offload the SSL/TLS from running locally on your application to AWS CloudHSM
C) Migrate the application to a larger EC2 instance with more computing and networking capability
D) Create an auto-scaling group to scale out traffic based on demand
B) Offload the SSL/TLS from running locally on your application to AWS CloudHSM
AWS CloudHSM can take the SSL/TLS processing for the web servers. This will reduce the burden on the web server and add extra security by storing the web server’s private key in CloudHSM.