MyCloudGuru Flashcards
Which of the following are a part of AWS’ Networking & Content Delivery services?
(Choose 2)
A) Lambda
B) EC2
C) CloudFront
D) VPC
C) CloudFront
D) VPC
The VPC service is a member of which group of AWS services in the ‘All services’ view of the AWS Portal?
A) Networking & Content Delivery
B) Database Services
C) Global Infrastructure
D) Compute Services
A) Networking & Content Delivery
A Virtual Private Cloud (VPC) is a virtual network dedicated to a single AWS account. It is logically isolated from other virtual networks in the AWS cloud. VPC is found in the “Networking & Content Delivery” section of the AWS Portal.
The AWS Global Infrastructure comprises Regions, Availability Zones, and edge locations, and there is a different number of each infrastructure element. Select the option that shows the correct order from greatest to least.
A) Number of Availability Zones > Number of Regions > Number of Edge Locations
B) Number of Edge Locations > Number of Availability Zones > Number of Regions
C) Number of Availability Zones > Number of Edge Locations > Number of Regions
D) Number of Regions > Number of Availability Zones > Number of Edge Locations
B) Number of Edge Locations > Number of Availability Zones > Number of Regions
Currently, there are more Edge Locations in the Global Cloud Infrastructure than Availability Zones; in turn, there are more Availability Zones than Regions. Reference: Global Infrastructure.
What is an AWS region?
A) A region is a geographical area divided into Availability Zones. Each region contains at least two Availability Zones.
B) A region is a collection of Edge Locations available in specific countries.
C) A region is a subset of AWS technologies. For example, the Compute region consists of EC2, ECS, Lambda, etc.
D) A region is an independent data center, located in different countries around the globe.
A) A region is a geographical area divided into Availability Zones. Each region contains at least two Availability Zones.
In which of the following is CloudFront content cached?
A) Region
B) Edge Location
C) Availability Zone
D) Data Center
B) Edge Location
What does an AWS Region consist of?
A) A collection of databases that can only be accessed from a specific geographic region.
B) Each AWS Region consists of multiple, isolated, and physically separate Availability Zones within a geographic area.
C) A collection of data centers that is spread evenly around a specific continent.
D) A console that gives you a quick, global picture of your cloud computing environment.
B) Each AWS Region consists of multiple, isolated, and physically separate Availability Zones within a geographic area.
AWS has the concept of a Region, which is a physical location around the world where data centers are clustered. Each group of logical data centers is called an Availability Zone. Each AWS Region consists of multiple, isolated, and physically separate AZ’s within a geographic area.
What is an Amazon VPC?
A) Virtual Public Compute
B) Virtual Private Cloud
C) Virtual Private Compute
D) Virtual Public Cloud
B) Virtual Private Cloud
Which of the below are storage services in AWS?
(Choose 2)
A) EC2
B) S3
C) EFS
D) VPC
B) S3
C) EFS
S3 and EFS both provide the ability to store files in the cloud. EC2 provides compute, and is often augmented with other storage services. VPC is a networking service.
Which of the below are AWS compute services?
(Choose 2)
A) S3
B) Lambda
C) VPC
D) EC2
B) Lambda
AWS Lambda lets you run code without provisioning or managing servers. You pay only for the compute time you consume.
D) EC2
Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. It is designed to make web-scale computing easier for developers.
Which of the below are factors that have helped make public cloud so powerful?
(Choose 2)
A) No special skills required
B) The ease of trying new solutions.
C) Traditional methods that are used for on-premise infrastructure always work just as well in cloud
D) Pay-as-you-go approach for pricing
B) The ease of trying new solutions.
D) Pay-as-you-go approach for pricing
10,000 Foot Overview
Which of the below are database services from AWS?
(Choose 2)
A) S3
B) DynamoDB
C) EC2
D) Amazon RDS
B) DynamoDB
DynamoDB is a fast and flexible non-relational database service for any scale. DynamoDB enables customers to offload the administrative burdens of operating and scaling distributed databases to AWS so that they don’t have to worry about hardware provisioning, setup and configuration, throughput capacity planning, replication, software patching, or cluster scaling.
D) Amazon RDS
Amazon Relational Database Service (Amazon RDS) is a managed service that makes it easy to set up, operate, and scale a relational database in the cloud. Amazon RDS gives you access to the capabilities of a familiar MySQL, MariaDB, Oracle, SQL Server, or PostgreSQL database.
Which statement best describes Availability Zones?
A) A Content Distribution Network used to distribute content to users.
B) Distinct locations from within an AWS region that are engineered to be isolated from failures.
C) Restricted areas designed specifically for the creation of Virtual Private Clouds.
D) Two zones containing compute resources that are designed to automatically maintain synchronized copies of each other’s data.
B) Distinct locations from within an AWS region that are engineered to be isolated from failures.
An Availability Zone (AZ) is a distinct location within an AWS Region. Each Region comprises at least two AZs.
You are a security administrator working for a hotel chain. You have a new member of staff who has started as a systems administrator, and she will need full access to the AWS console. You have created the user account and generated the access key id and the secret access key. You have moved this user into the group where the other administrators are, and you have provided the new user with their secret access key and their access key id. However, when she tries to log in to the AWS console, she cannot. Why might that be?
A) You have not applied the “log in from console” policy document to the user. You must apply this first so that they can log in.
B) Your user is trying to log in from the AWS console from outside the corporate network. This is not possible.
C) You cannot log in to the AWS console using the Access Key ID / Secret Access Key pair. Instead, you must generate a password for the user, and supply the user with this password and your organization’s unique AWS console login URL.
D) You have not yet activated multi-factor authentication for the user, so by default they will not be able to log in.
C) You cannot log in to the AWS console using the Access Key ID / Secret Access Key pair. Instead, you must generate a password for the user, and supply the user with this password and your organization’s unique AWS console login URL.
You have created a new AWS account for your company, and you have also configured multi-factor authentication on the root account. You are about to create your new users. What strategy should you consider in order to ensure that there is good security on this account.
A) Require users only to be able to log in using biometric authentication.
B) Enact a strong password policy: user passwords must be changed every 45 days, with each password containing a combination of capital letters, lower case letters, numbers, and special symbols.
C) Give all users the same password so that if they forget their password they can just ask their co-workers.
D) Restrict login to the corporate network only.
B) Enact a strong password policy: user passwords must be changed every 45 days, with each password containing a combination of capital letters, lower case letters, numbers, and special symbols.
A password policy to set a minimum standard is good practice and is generally a top requirement for any industry compliance endorsement.
Which statement best describes IAM?
A) IAM allows you to manage users, groups, roles, and their corresponding level of access to the AWS Platform.
B) IAM allows you to manage permissions for AWS resources only.
C) IAM stands for Improvised Application Management, and it allows you to deploy and manage applications in the AWS Cloud.
D) IAM allows you to manage users’ passwords only. AWS staff must create new users for your organization. This is done by raising a ticket.
A) IAM allows you to manage users, groups, roles, and their corresponding level of access to the AWS Platform.
When you create a new user, that user ____.
A) Will be able to interact with AWS using their access key ID and secret access key using the API, CLI, or the AWS SDKs assuming programmatic access was enabled.
B) Will only be able to log in to the console in the region in which that user was created.
C) Will be able to log in to the console anywhere in the world, using their access key ID and secret access key.
D) Will be able to log in to the console only after multi-factor authentication is enabled on their account.
A) Will be able to interact with AWS using their access key ID and secret access key using the API, CLI, or the AWS SDKs assuming programmatic access was enabled.
To access the console you use an account and password combination. To access AWS programmatically you use a Key and Secret Key combination
Power User Access allows ____.
A) Read Only access to all AWS services and resources.
B) Users to inspect the source code of the AWS platform
C) Full Access to all AWS services and resources.
D) Access to all AWS services except the management of groups and users within IAM.
D) Access to all AWS services except the management of groups and users within IAM.
Which of the following is not a feature of IAM?
A) IAM integrates with existing active directory account allowing single sign-on.
B) IAM allows you to set up biometric authentication, so that no passwords are required.
C) IAM offers centralized control of your AWS account.
D) IAM offers fine-grained access control to AWS resources.
B) IAM allows you to set up biometric authentication, so that no passwords are required.
AWS makes use of Accounts & Passwords, or Keys and Secret keys, and MFA, to prove identity. You may have a 3rd party device that uses BioMetrics to initiate and exchange of the password or secret key with AWS, but that is not an AWS / IAM service.
In what language/format are policy documents written?
A) Python
B) Node.js
C) Java
D) JSON
D) JSON
JavaScript Object Notation is a human-readable and easily parsed structured data format used to pass blocks of data into and between systems.
What level of access does the “root” account have?
A) Administrator Access
B) Read-only Access
C) Power User Access
D) No Access
A) Administrator Access
The root account in an AWS account represents the Owner of the account and can do anything including changing billing details and even close the account. The details for this account should be locked away and only used when absolutely necessary.
Every user you create in the IAM systems starts with ____.
A) No Permissions
B) Partial Permissions
C) Inherited Permissions
D) Full Permissions
A) No Permissions
AWS systems are designed to be secure first. The system administrator needs to add permissions to allow accounts to take actions.
What is the default level of access a newly created IAM User is granted?
A) Read-only access to all AWS services.
B) Power user access to all AWS services.
C) No access to any AWS services.
D) Administrator access to all AWS services.
C) No access to any AWS services.
By default new IAM Users have no permissions to AWS services. They must be explicitly granted.
You are a solutions architect working for a large engineering company that are moving from a legacy infrastructure to AWS. You have configured the company’s first AWS account and you have set up IAM. Your company is based in Andorra, but there will be a small subsidiary operating out of South Korea, so that office will need its own AWS environment. Which of the following statements is true?
A) You will need to configure your policy documents regionally, however your users are global.
B) You will then need to configure Users and Policy Documents for each region, respectively.
C) You will need to configure Users and Policy Documents only once, as these are applied globally.
D) You will need to configure your users regionally, however your policy documents are global.
C) You will need to configure Users and Policy Documents only once, as these are applied globally.
IAM is a Global service.
You can have regional conditions in policies, however by default users & policies are Global.
What is an additional way to secure the AWS accounts of both the root account and new users alike?
A) Implement Multi-Factor Authentication for all accounts.
B) Configure the AWS Console so that you can only log in to it from your internal network IP address range.
C) Store the access key id and secret access key of all users in a publicly accessible plain text document on S3 of which only you and members of your organization know the address.
D) Configure the AWS Console so that you can only log in to it from a specific IP Address range
A) Implement Multi-Factor Authentication for all accounts.
MFA provides an additional requirement for the person signing on to prove that they are who they claim to be. Username & password are things you ‘know’ the MFA is something that you ‘have’. e.g. you have the only device that can generate the token.
A __ is an object in AWS stored as a JSON document that provides a formal statement of one or more permissions.
A) User
B) Role
C) Group
D) Policy
D) Policy
A policy is an object in AWS that, when associated with an identity or resource, defines their permissions. Most policies are stored in AWS as JSON documents.
Which of the following is not a component of IAM?
A) Organizational Units
B) Roles
C) Groups
D) Users
A) Organizational Units
Correct. Organization Units, or ‘OUs’ are a feature of AWS Organizations.
Identity Access Management & S3
You are a developer at a fast-growing startup. Until now, you have used the root account to log in to the AWS console. However, as you have taken on more staff, you will need to stop sharing the root account to prevent accidental damage to your AWS infrastructure. What should you do so that everyone can access the AWS resources they need to do their jobs?
(Choose 2)
A) Create an additional AWS root account for each new user.
B) Give your users the root account credentials so that they can also sign in.
C) Create individual user accounts with minimum necessary rights and tell the staff to log in to the console using the credentials provided.
D) Create a customized sign-in link such as “yourcompany.signin.aws.amazon.com/console” for your new users to use to sign in with.
C) Create individual user accounts with minimum necessary rights and tell the staff to log in to the console using the credentials provided.
D) Create a customized sign-in link such as “yourcompany.signin.aws.amazon.com/console” for your new users to use to sign in with.
Read the AWS Security Best Practice white paper. Also note that the IAM account signin URL is different from the Root account signin URL
Your company has launched a new app. To access the app files, the development team needs access to a bucket that is located within your team’s AWS account. The development team is using a different account and requires programmatic and console level access to your team’s S3 bucket. How would you share this bucket with the development team’s account?
A) Setting up a cross account IAM Role
B) Setting up a resource-based policy
C) Setting up a Resource Based Access Control List (ACL)
D) Setting up a shared IAM policy
A) Setting up a cross account IAM Role
Setting up a cross account IAM role is currently the only method that will allow IAM users to access cross account S3 buckets both programmatically and via the AWS console.
You have a client who is considering a move to AWS. In establishing a new account, what is the first thing the company should do?
A) Set up an account via SNS (Simple Notification Service)
B) Set up an account using Cloud Search.
C) Set up an account using their company email address.
D) Set up an account via SQS (Simple Queue Service).
C) Set up an account using their company email address.
This email address is a key part of linking the AWS account to your company. Using a private email address may make it harder to establish ownership if your need help from AWS.
A new employee has just started work, and it is your job to give her administrator access to the AWS console. You have given her a user name, an access key ID, a secret access key, and you have generated a password for her. She is now able to log in to the AWS console, but she is unable to interact with any AWS services. What should you do next?
A) Tell her to log out and try logging back in again.
B) Grant her Administrator access by adding her to an Administrators’ group.
C) Ensure she is logging in to the AWS console from your corporate network and not the normal internet.
D) Require multi-factor authentication for her user account.
B) Grant her Administrator access by adding her to an Administrators’ group.
By default new user accounts come with no permission to interact with services. These must be explicitly assigned by adding a Policy or adding them to a Group. The admin user should have also been configured with MFA as best practice, but MFA would not be related to the permission issue itself.
To retrieve instance metadata or user data you will need to use the following IP Address:
A) http://192.168.0.254
B) http://127.0.0.1
C) http://10.0.0.1
D) http://169.254.169.254
D) http://169.254.169.254
This IP Address is specific to AWS, where you can use it on any instance to acquire information about that instance. It is a specific type of address called a ‘link-local address’, and is only accessible from that particular instance. You can also disable the metadata service to prevent it’s misuse
To help you manage your Amazon EC2 instances, you can assign your own metadata in the form of ____.
A) Wildcards
B) Certificates
C) Notes
D) Tags
D) Tags
Tagging is a key part of managing an environment. Even in a lab, it is easy to lose track of the purpose of resources, and tricky determine why it was created and if it is still needed. This can rapidly translate into lost time and lost money.
Which AWS CLI command should I use to create a snapshot of an EBS volume?
A) aws ec2 new-snapshot
B) aws ec2 create-snapshot
C) aws ec2 fresh-snapshot
D) aws ec2 deploy-snapshot
B) aws ec2 create-snapshot
When looking at the AWS CLI, remember the verbs, like ‘create’, which are used as part of commands. This helps you build the necessary command in your head, without referring to the documentation. For example, we might create a new image along with this snapshot. From this, we could understand that the command would likely be ‘aws ec2 create-image’.
If an Amazon EBS volume is attached as an additional disk (not the root volume), can I detach it without stopping the instance?
A) Yes, although it may take some time.
B) No, you will need to stop the instance.
A) Yes, although it may take some time.
Since the additional disk does not contain the operating system, you can detach it in the EC2 Console while the instance is running. However, any data on that drive would become inaccessible, and possibly cause problems for the EC2 instance.
When creating a new security group, all inbound traffic is allowed by default.
TRUE / FALSE
FALSE
There are slight differences between a normal ‘new’ Security Group and a ‘default’ security group in the default VPC. For a ‘new’ security group nothing is allowed in by default.
EBS Snapshots are backed up to S3 in what manner?
A) Exponentially
B) Differentially
C) Incrementally
D) EBS snapshots are NOT stored on S3.
C) Incrementally
EBS snapshots use incremental backups and are stored in S3. Restores can be done from any of the snapshots. The original full snapshot can be safely deleted without impacting the ability to use the other related incremental backups.
Can Spread Placement Groups be deployed across multiple Availability Zones?
A) No.
B) Yes.
C) Yes, but only using the AWS API.
D) Only in Us-East-1.
B) Yes.
Spread Placement Groups can be deployed across availability zones since they spread the instances further apart. Cluster Placement Groups can only exist in one Availability Zone since they are focused on keeping instances together, which you cannot do across Availability Zones.
Is it possible to perform API actions on an existing Amazon EBS Snapshot?
A) Yes, it possible to perform API actions on an existing Amazon EBS Snapshots.
B) It depends on the region.
C) EBS does not have snapshot functionality.
D) No
A) Yes, it possible to perform API actions on an existing Amazon EBS Snapshots.
It possible to perform API actions on an existing Amazon EBS Snapshot through the AWS APIs, CLI, and AWS Console. You can use AWS APIs, CLI or the AWS Console to copy snapshots, share snapshots, and create volumes from snapshots.
You need to know both the private IP address and public IP address of your EC2 instance. You should ____.
A) Use the following command: AWS EC2 DisplayIP.
B) Retrieve the instance Metadata from http://169.254.169.254/latest/meta-data/local-ipv4 and http://169.254.169.254/latest/meta-data/public-ipv4.
C) Run IPCONFIG (Windows) or IFCONFIG (Linux).
D) Retrieve the instance User Data from http://169.254.169.254/latest/user-data/.
B) Retrieve the instance Metadata from http://169.254.169.254/latest/meta-data/local-ipv4 and http://169.254.169.254/latest/meta-data/public-ipv4.
Instance Metadata and User Data can be retrieved from within the instance via a special URL. Similar information can be extracted by using the API via the CLI or an SDK. The ipconfig and ifconfig tools don’t have the ability to see the Public IP Address directly, since it’s attached dynamically inside the AWS Software Defined Network which has to be queried by the API.
What type of storage are Amazon’s EBS volumes based on?
A) Object-based
B) File-based
C) Block-based
D) Database-based
C) Block-based
EBS uses Block-based storage, where the data is stored on a virtual disk managed by the Operating System. EFS uses File-based storage, where the underlying filesystem is managed by AWS. S3 uses Object-based storage, where files are kept in a flat structure.
The use of a cluster placement group is ideal ___
A) When you need to distribute content on a CDN network.
B) When you need to deploy EC2 instances that require high disk IO.
C) Your fleet of EC2 Instances requires low latency and high network throughput across multiple availability zones.
D) Your fleet of EC2 instances requires high network throughput and low latency within a single availability zone.
D) Your fleet of EC2 instances requires high network throughput and low latency within a single availability zone.
Cluster Placement Groups are primarily about keeping you compute resources within one network hop of each other on high speed rack switches. This is only helpful when you have compute loads with network loads that are either very high or very sensitive to latency.
Standard Reserved Instances can be moved between regions
TRUE / FALSE
FALSE
Standard Reserved Instances cannot be moved between regions. You can choose if a Reserved Instance applies to either a specific Availability Zone, or an Entire Region, but you cannot change the region.
Will an Amazon EBS root volume persist independently from the life of the terminated EC2 instance to which it was previously attached? In other words, if I terminated an EC2 instance, would that EBS root volume persist?
A) Yes - But only for certain instance types
B) Yes - It will always persist until deleted manually
C) No - Unless ‘Delete on Termination’ is unchecked for the root volume
D) No - It will always be deleted immediately on termination
C) No - Unless ‘Delete on Termination’ is unchecked for the root volume
You can control whether an EBS root volume is deleted when its associated instance is terminated. The default delete-on-termination behavior depends on whether the volume is a root volume, or an additional volume. By default, the DeleteOnTermination attribute for root volumes is set to ‘true.’ However, this attribute may be changed at launch by using either the AWS Console or the command line. For an instance that is already running, the DeleteOnTermination attribute must be changed using the CLI.
In order to enable encryption at rest using EC2 and Elastic Block Store, you must ____.
A) Configure encryption using the appropriate Operating Systems file system
B) Configure encryption using X.509 certificates
C) Mount the EBS volume in to S3 and then encrypt the bucket using a bucket policy.
D) Configure encryption when creating the EBS volume
D) Configure encryption when creating the EBS volume
The use of encryption at rest is default requirement for many industry compliance certifications. Using AWS managed keys to provide EBS encryption at rest is a relatively painless and reliable way to protect assets and demonstrate your professionalism in any commercial situation.
When updating the policy used by an IAM Role attached to an EC2 instance, what needs to happen for the changes to take effect?
A) Reattach the IAM Role to the EC2 instance
B) Wait up to 15 minutes for the change to take effect
C) Nothing - It will take effect almost immediately
D) Reboot the instance to force the change
C) Nothing - It will take effect almost immediately
Changes to IAM Policies take effect almost immediately (with maybe a few seconds delay). No substantial waiting time is required, nor changes to the system. This is because the IAM Policy exists in the AWS API, rather than on the instance itself. As a way to remember it in a scenario, if you think about a compromised system, you would need to revoke the access immediately, without waiting for changes to take effect.
When can you attach/replace an IAM role on an EC2 instance?
A) Anytime, but only if there isn’t already an attached IAM Role
B) Only during launch and cannot be changed once the instance is launched
C) To attach an IAM role to an instance that has no role, the instance can be in the stopped or running state. To replace the IAM role on an instance that already has an attached IAM role, the instance must be in the running state.
D) Anytime, but the instance must be stopped
C) To attach an IAM role to an instance that has no role, the instance can be in the stopped or running state. To replace the IAM role on an instance that already has an attached IAM role, the instance must be in the running state.
IAM Roles can be attached to instances in the stopped or running state, or replaced for instances in the running state. Prior to early 2017, you would only be able to attach an IAM role at launch, and if you wanted to attach a role, you would have to terminate and re-launch the instance.
Specifically, where in the AWS Global Infrastructure are EC2 instances provisioned?
A) In Availability Zones
B) Globally
C) In Regions
A) In Availability Zones
When you’re setting up an EC2 instance, you select which subnet you’d like to place your EC2 instance in. Each subnet is tied to a specific availability zone. You cannot move an instance between Availability Zones, without setting up a copied version of the instance. Whilst they exist in Regions, they are not portable across the whole region, nor across the whole globe.
TRUE / FALSE
Spread Placement Groups can be deployed across multiple Availability Zones.
TRUE
Spread Placement Groups can be deployed across availability zones since they spread the instances further apart. Cluster Placement Groups can only exist in one Availability Zone since they are focused on keeping instances together, which you cannot do across Availability Zones.
Which service would you use to run a general Windows File Server with minimal overhead?
A) EBS Multi Attach
B) S3
C) FSx for Windows
D) EFS
C) FSx for Windows
Amazon FSx for Windows File Server provides a fully managed native Microsoft Windows file system so you can easily move your Windows-based applications that require shared file storage to AWS. EBS Multi Attach allows you to attach a volume to up to 16 instances, but would have issues across multiple availability zones, and could not use NTFS natively. EFS uses the NFS protocol, and is explicitly not supported on Windows. S3 is object-based storage, and would not be suitable as the backend for a file server.
Which of the following provide the least expensive EBS options?
(Choose 2)
A) Cold (sc1)
B) Throughput Optimized (st1)
C) Provisioned IOPS (io1)
D) General Purpose (gp2)
A) Cold (sc1)
B) Throughput Optimized (st1)
Of all the EBS types, both current and of the previous generation, HDD based volumes will always be less expensive than SSD types. Therefore, of the options available in the question, the Cold (sc1) and Throughout Optimized (st1) types are HDD based and will be the least expensive options.
Can I delete a snapshot of the root device of an EBS volume used by a registered AMI?
A) Only via the Command-Line.
B) No.
C) Yes.
D) Only using the AWS API.
B) No.
If the original snapshot was deleted, then the AMI would not be able to use it as the basis to create new instances. For this reason, AWS protects you from accidentally deleting the EBS Snapshot, since it could be critical to your systems. To delete an EBS Snapshot attached to a registered AMI, first remove the AMI, then the snapshot can be deleted.
Which EC2 feature uses SR-IOV?
A) IAM Roles
B) Bootstrap Scripts (User Data)
C) Enhanced networking
D) CloudWatch Agent
C) Enhanced networking
Enhanced networking uses single root I/O virtualization (SR-IOV) to provide high-performance networking capabilities on supported instance types. SR-IOV is a method of device virtualization that provides higher I/O performance and lower CPU utilization when compared to traditional virtualized network interfaces. Enhanced networking provides higher bandwidth, higher packet per second (PPS) performance, and consistently lower inter-instance latencies.
What are the valid underlying hypervisors for EC2?
(Choose 2)
A) ESX
B) Xen
C) OVM
D) Hyper-V
E) Nitro
B) Xen
E) Nitro
AWS originally used a modified version of the Xen Hypervisor to host EC2. In 2017, AWS began rolling out their own Hypervisor called Nitro.
TRUE / FALSE
When creating a single-AZ Amazon RDS instance, you can select the Availability Zone into which you deploy it.
TRUE
When you create a DB instance, you can choose an Availability Zone or have AWS choose one for you. An Availability Zone is represented by an AWS Region code followed by a letter identifier (for example, us-east-1a).
What data transfer charge is incurred when replicating data between Availability Zones for your Amazon RDS MySQL in a Multi-AZ deployment?
A) The charge is half of the standard data transfer charge.
B) The charge is double the standard data transfer charge.
C) There is no charge associated with this action.
D) The charge is the same as the standard data transfer charge.
C) There is no charge associated with this action.
Data transferred between Availability Zones for replication of Multi-AZ deployments is free.
In RDS, what is the maximum value I can set for my backup retention period?
A) 30 Days
B) 15 Days
C) 45 Days
D) 35 Days
D) 35 Days
Which set of RDS database engines is currently available?
A) Amazon Aurora, MySQL, MariaDB, Oracle, SQL Server, and PostgreSQL
B) Aurora, MySQL, SQL Server, Cassandra
C) MariaDB, SQL Server, MySQL, Cassandra
D) PostgreSQL, MariaDB, MongoDB, Aurora
A) Amazon Aurora, MySQL, MariaDB, Oracle, SQL Server, and PostgreSQL
Amazon RDS supports Amazon Aurora, MySQL, MariaDB, Oracle, SQL Server, and PostgreSQL database engines.
If you are using Amazon RDS Provisioned IOPS storage with a Microsoft SQL Server database engine, what is the maximum size RDS volume you can have by default?
A) 16TB
B) 32TB
C) 500GB
D) 6TB
E) 1TB
A) 16TB
You can create Amazon RDS for SQL Server database instances with up to 16TB of storage. The 16TB storage limit is available when using the Provisioned IOPS and General Purpose (SSD) storage types.
TRUE / FALSE
RDS Reserved instances are available for multi-AZ deployments.
TRUE
Reserved DB instance benefits apply for both Multi-AZ and Single-AZ configurations.
Which of the following is NOT a feature supported by DynamoDB?
A) The primary key can be either a single-attribute or a composite partition-sort key
B) The ability to perform operations by using a user-defined primary key
C) Data reads that are either eventually consistent or strongly consistent
D) Amazon DynamoDB supports MongoDB workloads.
D) Amazon DynamoDB supports MongoDB workloads.
This is not a feature supported by DynamoDB. Amazon DocumentDB (with MongoDB compatibility) is a fast, scalable, highly available, and fully managed document database service that supports MongoDB workloads.
Which SQL-based relational database is suitable for high-performance OLTP (Online Transactional Processing) workloads?
A) Amazon DynamoDB
B) Amazon RDS with Provisioned IOPS (SSD) Storage
C) Amazon ElastiCache
D) Amazon Redshift
B) Amazon RDS with Provisioned IOPS (SSD) Storage
Amazon RDS with provisioned IOPS (SSD) storage allows you to implement a SQL-based relational database solution for your high-performance OLTP workloads.
Which of the following AWS services is a non-relational database?
A) Amazon DynamoDB
B) Amazon Redshift
C) Amazon ElastiCache
D) Amazon RDS
A) Amazon DynamoDB
Amazon DynamoDB is a non-relational database that delivers reliable performance at any scale. It’s a fully managed, multi-region, multi-master database that provides consistent single-digit millisecond latency, and offers built-in security, backup and restore, and in-memory caching.
Under what circumstances would I choose provisioned IOPS over standard storage when creating an RDS instance?
A) If you have workloads that are not sensitive to latency/lag.
B) If this was a test Database.
C) If you need to run an I/O-intensive relational database for a mission-critical application in production.
D) If your business was trying to save money.
C) If you need to run an I/O-intensive relational database for a mission-critical application in production.
Provisioned IOPS becomes important when you are running production environments requiring rapid responses, such as those which run e-commerce websites. Without high performant responses from an RDS instance page loads of the website could suffer resulting in loss of business. If your workloads are not latency sensitive or you are running a test environment the additional cost of provisioned IOPS will not be cost beneficial to your project.
TRUE / FALSE
You can SSH into and control the operating system where your Amazon RDS MySQL instance is running.
FALSE
Amazon RDS provides a managed database offering, so you can’t SSH and have control over the underlying operating system configurations where your Amazon RDS MySQL instance is running. You can only have such control when you deploy and manage your databases on EC2 instances.