Practice 1 Flashcards

1
Q

ASG Dynamic Scaling Plan

A

add/remove resources to maintain resource utilization at the specified target value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ASG Predictive Scaling Plan

A

> forecast future load demands by analyzing historical records for a metric (allows you to schedule accordingly)
only available for EC2 ASG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IAM DB Authentication

A

> you don’t need to use a password when you connect to a DB instance. Instead, you use an authentication token

  • a unique string of characters thatAmazon RDSgenerates on request ;
  • Each token has a lifetime of 15 minutes. You don’t need to store user credentials in the database, because authentication is managed externally using IAM.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AWS Security Token Service (STS)

A

> generate temporary tokens
web service that enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users or for users that you authenticate (federated users)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AWS Budgets

A

gives you the ability to set custom budgets that alert you when your costs or usage exceed (or are forecasted to exceed) your budgeted amount

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When using ssh:
Error: Server refused our keyor
Error: No supported authentication methods

A

> appropriate user name for your AMI

> private key (.pem) file has been correctly converted to the format recognized by PuTTY (.ppk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Amazon DynamoDB advantage over RDS

A

> schemaless

> low latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud watch Custom Metric

A
  1. Memory utilization
  2. Disk swap utilization
  3. Disk space utilization
  4. Page file utilization
    5 Log collection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Default Cloudwatch metric

A
  1. Disk reads
  2. CPU utilization
  3. Network utilization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AWS Lambda encrypts environment variables using

A

the AWS Key Management Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AWS CloudHSM

A

is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AWS CloudHSM vs AWS KMS

A

You should consider using AWS CloudHSM if you require:
• Keys stored in dedicated, third-party validated hardware security modules under your exclusive control.
• FIPS 140-2 compliance.
• Integration with applications using PKCS#11, Java JCE, or Microsoft CNG interfaces.
High-performance in-VPC cryptographic acceleration (bulk crypto).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To calculate the total number of IP addresses of a given CIDR Block

A
1. Subtract32with the mask number :
(32 - 27) =5
2. Raisethe number2to the power of the answer in Step #1 :
2^5= (2 * 2 * 2 * 2 * 2)
 =32
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Amazon Athena

A

is an interactive query service that makes it easy to analyze data in Amazon S3 using standard SQL. Athena is serverless, so there is no infrastructure to manage, and you pay only for the queries that you run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

S3 Select is

A

an Amazon S3 feature that makes it easy to retrieve specific data from the contents of an object using simple SQL expressions without having to retrieve the entire object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Amazon Redshift Spectrum

A

is a feature of Amazon Redshift that enables you to run queries against exabytes of unstructured data in Amazon S3 with no loading or ETL required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Amazon Elasticsearch Service (Amazon ES)

A

is a managed service that makes it easy to deploy, operate, and scale Elasticsearch clusters in the AWS Cloud. Elasticsearch is a popular open-source search and analytics engine for use cases such as log analytics, real-time application monitoring, and clickstream analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Route Origin Authorization (ROA)

A

is a document that you can create through your Regional internet registry (RIR), such as the American Registry for Internet Numbers (ARIN) or Réseaux IP Européens Network Coordination Centre (RIPE). It contains the address range, the ASNs that are allowed to advertise the address range, and an expiration date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IP match condition in CloudFront

A

primarily used in allowing or blocking the incoming web requests based on the IP addresses that the requests originate from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Elastic IP address

A

static IPv4 address designed for dynamic cloud computing. An Elastic IP address is associated with your AWS account. With an Elastic IP address, you can mask the failure of an instance or software by rapidly remapping the address to another instance in your account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AWS WAF

A

web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources. AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Amazon DynamoDB Accelerator (DAX)

A

fully managed, highly available, in-memory cache that can reduce Amazon DynamoDB response times from milliseconds to microseconds, even at millions of requests per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

AWS Device Farm

A

app testing service that lets you test and interact with your Android, iOS, and web apps on many devices at once, or reproduce issues on a device in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RAID 0

A

increase the write performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RAID 1

A

provide mirroring, redundancy, and fault-tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Linux Amazon Machine Images use one of two types of virtualization

A
  1. paravirtual (PV) - slower

2. hardware virtual machine (HVM) - faster boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Public Data Set Volume Encryption

A

public data sets are designed to be publicly accessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Cost for transferring data from an EC2 instance to Amazon S3, Amazon Glacier, Amazon DynamoDB, Amazon SES, Amazon SQS, or Amazon SimpleDB in the same AWS Region

A

None

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

AWS Directory Service AD Connector

A

If the company is using a corporate Active Directory, it is best to useAWS Directory Service AD Connector for easier integration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

AWS Directory Service Simple AD

A

provides a subset of the features offered by AWS Managed Microsoft AD, including the ability to manage user accounts and group memberships, create and apply group policies, securely connect to Amazon EC2 instances, and provide Kerberos-based single sign-on (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Multi-AZ deployment

A

synchronous replication - highly durable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Read Replica

A

asynchronous replication - highly scalable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Enable Enhanced Monitoring in RDS

A

monitor how the different processes or threads on a DB instance use the CPU, including the percentage of the CPU bandwidth and total memory consumed by each process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Amazon EMR (Elastic Map Reduce)

A

> is an Amazon Web Services (AWS) tool for big data processing and analysis. Amazon EMR offers the expandable low-configuration service as an easier alternative to running in-house cluster computing.
not a fully managed Service (you can access your OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Amazon Neptune

A

fast, reliable, fully managed graph database service that makes it easy to build and run applications that work with highly connected datasets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

110.238.98.71/32 denotes

A

1 IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

110.238.98.71/0 denotes

A

refers to the entire network

38
Q

Amazon Redshift workload management (WLM)

A

define the number of query queues that are available, and how queries are routed to those queues for processing. WLM is part of parameter group configuration. A cluster uses the WLM configuration that is specified in its associated parameter group

39
Q

A web application that you developed stores sensitive information on a non-boot, unencrypted Amazon EBS data volume attached to an Amazon EC2 instance. How can you provide protection to the sensitive data of your Amazon EBS volume?

A

Create and mount a new, encrypted Amazon EBS volume. Move the data to the new volume and finally, delete the old Amazon EBS volume.
(Correct)

40
Q

EBS encryption is done during

A

volume creation not after

41
Q

Amazon Redshift Enhanced VPC Routing

A

> forces all COPY and UNLOAD traffic between your cluster and your data repositories through your Amazon VPC.
you can use standard VPC features, such as VPC security groups, network access control lists (ACLs), VPC endpoints, VPC endpoint policies, internet gateways, and Domain Name System (DNS) servers

42
Q

Kinesis Client Library (KCL)

A

using this, you can develop a consumer application for Amazon Kinesis Data Streams

43
Q

DynamoDB Streams Kinesis Adapter

A

recommended way to consume Streams from DynamoDB

44
Q

Amazon Elastic Container Service (Amazon ECS)

A

highly scalable, high-performancecontainerorchestration service that supportsDockercontainers and allows you to easily run and scale containerized applications on AWS. Amazon ECS eliminates the need for you to install and operate your own container orchestration software, manage and scale a cluster of virtual machines, or schedule containers on those virtual machines.

45
Q

AWS Secrets Manager

A

helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.

46
Q

AWS Systems Manager Parameter Store

A

provides secure, hierarchical storage for configuration data management and secrets management.

47
Q

Amazon Inspector

A

automated security assessment service that helps you test the network accessibility of your Amazon EC2 instances and the security state of your applications running on the instances. It does not provide a custom metric to track the memory and disk utilization of each and every EC2 instance in your VPC

48
Q

you cannot directly assign an EIPto an Auto Scaling - group - true or false

A

True

49
Q

Match Viewer

A

Origin Protocol Policy which configures CloudFront to communicate with your origin using HTTP or HTTPS, depending on the protocol of the viewer request. CloudFront caches the object only once even if viewers make requests using both HTTP and HTTPS protocols

50
Q

CloudFront signed URLs and signed cookies provide the same basic functionality:

A

they allow you to control who can access your content

51
Q

Usesigned URLsfor

A

• -You want to use an RTMP distribution. Signed cookies aren’t supported for RTMP distributions.
• -You want to restrict access to individual files, for example, an installation download for your application.
-Your users are using a client (for example, a custom HTTP client) that doesn’t support cookies.

52
Q

Usesigned cookiesfor

A
  • You want to provide access to multiple restricted files, for example, all of the files for a video in HLS format or all of the files in the subscribers’ area of a website.
    • -You don’t want to change your current URLs.
53
Q

Termination policy for the scale in in ASG

A

If there are multiple instances to terminate based on the above criteria, determine which unprotected instances are closest to the next billing hour. (This helps you maximize the use of your EC2 instances and manage your Amazon EC2 usage costs.) If there is one such instance, terminate it.

54
Q

pre-signed URLs

A

> grant time-limited permission to download the objects.
When you create a pre-signed URL for your object, you must provide your security credentials, specify a bucket name, an object key, specify the HTTP method (GET to download the object) and expiration date and time.
The pre-signed URLs are valid only for the specified duration.

55
Q

Oracle Recovery Manager (RMAN) and Oracle Real Application Clusters (RAC) are supported in RDS - true or false

A

false

56
Q

Amazon MQ

A

recommended if you’re using messaging with existing applications and want to move your messagingservice to the cloud quickly and easily

57
Q

If you are building brand new applications in the cloud, then it is highly recommended that you consider ? for messaging queue:

A

Amazon SQS and Amazon SNS

58
Q

How to protect back end spikes if using API Gateway and lambda

A

use throttling limits in API Gateway

59
Q

Aurora cluster endpoint

A

> also known as a writer endpoint for an Aurora DB cluster simply connects to the current primary DB instance for that DB cluster.
This endpoint is the only one that can perform write operations in the database such as DDL statements, which is perfect for handling production traffic but not suitable for handling queries for reporting.

60
Q

Lambda@Edge

A

lets you run Lambda functions to customize the content that CloudFront delivers, executing the functions in AWS locations closer to the viewer.

61
Q

AWS Serverless Application Model (SAM) service

A

open-source framework that you can use to buildserverless applicationson AWS

(Aserverless applicationis a combination of Lambda functions, event sources, and other resources that work together to perform tasks.)

62
Q

How to improve the DynamoDB performance by distributing the workload evenly and using the provisioned throughput efficiently

A

use of partition keys with high-cardinality attributes, which have a large number of distinct values for each item.

63
Q

How to secure the session data in the portal by requiring them to enter a password before they are granted permission to execute Redis commands.

A

Using RedisAUTHcommand can improve data security by requiring the user to enter a password before they are granted permission to execute Redis commands on a password-protected Redis server

64
Q

(DDoS)attack

A

A distributed denial-of-service (DDoS)attackis a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

65
Q

AWS Shield Advanced

A

In addition to the network and transport layer protections that come with Standard, AWS Shield Advanced provides additional detection and mitigation against large and sophisticated DDoS (distributed denial-of-service) attacks, near real-time visibility into attacks, and integration with AWS WAF, a web application firewall.

66
Q

AWS Firewall Manager

A

is mainly used to simplify your AWS WAF administration and maintenance tasks across multiple accounts and resources. It does not protect your VPC against DDoS attacks.

67
Q

AWS WAF

A

can help you block common attack patterns to your VPC such as SQL injection or cross-site scripting, this is still not enough to withstand DDoS attacks

68
Q

Lifecycle hook

A

you can add it o your ASG to perform custom actions when instances launch or terminate

69
Q

Target tracking scaling

A

increase or decrease the current capacity of the group based on target value for specific metric

70
Q

Step scaling

A

increase or decrease current capacity of the group based on a set of scaling adjustments know as step adjustments, that vary based on size of the alarm breach

71
Q

simple scaling

A

increase or decrease the current capacity of the group based on the a single scaling adjustment

72
Q

scale out cooldown period

A

amount of time in seconds after a scale out activity completes before another scale out activity can start

73
Q

scale in cooldown period

A

amount of time in seconds after a scale in activity completes before another scale in activity can start

74
Q

permission policy

A

describes who has access to what

75
Q

identity based policies

A

IAM policies

76
Q

resource based policies

A

policies attached to a resource

77
Q

Amazon RDS supports only which policies?

A

identity based policies (IAM)

78
Q

You need to associate an Elastic IP address with your instance to enable communication with the internet - T or F

A

true

79
Q

every instance in a vpc has a default network interface called

A

primary network interface (eth0)

80
Q

DynamoDB Streams

A

optional feaure that captures data modification events in DynamoDB tables

81
Q

Cloudwatch log Insights

A

enables you to interactively search and analyze your log data in Cloudwatch logs using queries

82
Q

Cloudwatch Vended logs

A

logs that are natively published by AWS services on behalf of the Customer (VPC flow logs) is the first vended log type that will benefit from this tiered model

83
Q

VPN connection consists of

A
  1. VPG

2. Customer Gateway

84
Q

Amazon Kinesis can load streaming data into

A

Amazon ElasticSearch service

85
Q

Amazon Kinesis agent

A

a pre built java application that offers an easy way to collect and send data to your Amazon Kinesis data stream

86
Q

Blue/Green deployment

A

refers to the practice of running 2 production environments, one live and one idle, and switching the 2 as you make software changes

87
Q

DynamoDB and Cloudfront do not have a Read Replica Feature - T or F

A

True

88
Q

Multi-AZ deployments are available for

A

MySQL, MariaDB, Oracle, and PostgreSQL

89
Q

CloudWatch gathers metrics about CPU utilization from

A

the hypervisor for a DB instance

90
Q

Enhanced Monitoring gathers its metrics from

A

an agent on the instance