Practice Exam - 2 Flashcards
Which EBS RAID configuration you will use when I/O performance is more important than fault tolerance; for example, as in a heavily used database (where data replication is already set up separately)?
- RAID 0
- RAID 1
- RAID 5
- RAID 6
- RAID 0
- RAID 1
- RAID 5
- RAID 6
What are the reasons to enable cross region replication on your S3 buckets?
- Comply with compliance requirements
- Minimize latency
- Increase operational efficiency
- Maintain object copies under different ownership
- All of the above
- Comply with compliance requirements
- Minimize latency
- Increase operational efficiency
- Maintain object copies under different ownership
- All of the above
You purchased a t2.medium default tenancy Amazon Linux/Unix Reserved Instance in the US East (N. Virginia) region and you have two running t2.small instances in your account in that Region.
How will the reserved instance billing benefit applied?
- You will not get any benefit as you don’t have running instance type matching to reserved instance type bought.
- You will get benefit applied to usage of only one running t2.small.
- You will get benefit applied to usage of both running t2.small
- You will get benefit applied to 75% usage of both running t2.small
- You will not get any benefit as you don’t have running instance type matching to reserved instance type bought.
- You will get benefit applied to usage of only one running t2.small.
- You will get benefit applied to usage of both running t2.small
- You will get benefit applied to 75% usage of both running t2.small
You are the solution architect for a media company which is planning to migrate on-premise applications to AWS. You are analyzing the workflows like video editing, studio production, broadcast processing, sound design, and rendering which uses an existing shared storage to process large files. Which Amazon service you will use that provides a:
- strong data consistency model with high throughput
- scale on demand to petabytes without disrupting applications
- growing and shrinking automatically as you add and remove files
- shared file access which can cut the time it takes to perform these jobs
- ability to consolidate multiple local file repositories into a single location accessible by application deployed on multiple EC2 instances
- Amazon EFS
- Amazon EBS
- Amazon S3
- Amazon RDS
- Amazon EFS
- Amazon EBS
- Amazon S3
- Amazon RDS
Your company has an intranet application for employees to fill up their weekly timesheet. Usage pattern analysis depicts a surge in traffic on Friday evening and Wednesday evening from 4-6 pm. Which auto scaling policy would you use to add and remove instances?
- Schedule based auto scaling policy
- Demand based auto scaling policy
- Maintain current instance levels at all times
- Manual Scaling by specifying change in the max, min and desired capacity
- Schedule based auto scaling policy
- Demand based auto scaling policy
- Maintain current instance levels at all times
- Manual Scaling by specifying change in the max, min and desired capacity
What are two ways that you can customize how AWS Global Accelerator sends traffic to your endpoints?
- Change the traffic dial to limit the traffic for one or more endpoint groups.
- Change the traffic dial to limit the traffic for endpoints in a group.
- Specify weights to change the proportion of traffic to the endpoint group.
- Specify weights to change the proportion of traffic to the endpoints in a group.
- Change the traffic dial to limit the traffic for one or more endpoint groups.
- Change the traffic dial to limit the traffic for endpoints in a group.
- Specify weights to change the proportion of traffic to the endpoint group.
- Specify weights to change the proportion of traffic to the endpoints in a group.
Your online gaming application gets steady traffic apart from first three days of month when you run promotion giving discounts and bonus points to gamers. During those three days the traffic triples because of new users joining and existing users playing more. Currently you have six instances on which your application runs. What is the cost effective way to plan your instances to handle this periodic traffic surge?
- Run 6 on demand instances then add 12 more on-demand only for first three days of the month
- Run 6 on demand instances then add 12 more as spot instances
- Use 18 reserved instances i.e. three time the normal demand all the time
- Run 6 reserved instance and then add 12 on demand instances for three days every month.
- Run 6 on demand instances then add 12 more on-demand only for first three days of the month
- Run 6 on demand instances then add 12 more as spot instances
- Use 18 reserved instances i.e. three time the normal demand all the time
- Run 6 reserved instance and then add 12 on demand instances for three days every month.
Select the features of Elastic Fabric Adapter (EFA)? Choose 3.
- Brings the scalability, flexibility, and elasticity of cloud to tightly-coupled High Performance Computing (HPC) applications and machine learning applications.
- Tightly-coupled HPC applications have access to lower and more consistent latency and higher throughput than traditional TCP channels, enabling them to scale better.
- Provide all ENA devices functionalities plus a new OS bypass hardware interface that allows user-space applications to communicate directly with the hardware-provided reliable transport functionality.
- EFA and ENA are same.
- Brings the scalability, flexibility, and elasticity of cloud to tightly-coupled High Performance Computing (HPC) applications and machine learning applications.
- Tightly-coupled HPC applications have access to lower and more consistent latency and higher throughput than traditional TCP channels, enabling them to scale better.
- Provide all ENA devices functionalities plus a new OS bypass hardware interface that allows user-space applications to communicate directly with the hardware-provided reliable transport functionality.
- EFA and ENA are same.
Which of the following are correct statements as when should you use Amazon FSx Windows File Servers vs. Amazon EFS vs. Amazon FSx for Lustre? Choose 3.
- For Windows-based applications, Amazon FSx provides fully managed Windows file servers with features and performance optimized for “lift-and-shift” business-critical application workloads including home directories (user shares), media workflows, and ERP applications via SMB protocol.
- If you have Linux-based applications, Amazon EFS is a cloud-native fully managed file system that provides simple, scalable, elastic file storage accessible from Linux instances via the NFS protocol.
- For compute-intensive and fast processing workloads, like high performance computing (HPC), machine learning, EDA, and media processing, Amazon FSx for Lustre, provides a file system that’s optimized for performance, with input and output stored on Amazon S3.
- If you have Windows-based applications, Amazon EFS is a cloud-native fully managed file system that provides simple, scalable, elastic file storage accessible from EC2 windows instances via the NFS protocol
- For Windows-based applications, Amazon FSx provides fully managed Windows file servers with features and performance optimized for “lift-and-shift” business-critical application workloads including home directories (user shares), media workflows, and ERP applications via SMB protocol.
- If you have Linux-based applications, Amazon EFS is a cloud-native fully managed file system that provides simple, scalable, elastic file storage accessible from Linux instances via the NFS protocol.
- For compute-intensive and fast processing workloads, like high performance computing (HPC), machine learning, EDA, and media processing, Amazon FSx for Lustre, provides a file system that’s optimized for performance, with input and output stored on Amazon S3.
- If you have Windows-based applications, Amazon EFS is a cloud-native fully managed file system that provides simple, scalable, elastic file storage accessible from EC2 windows instances via the NFS protocol
You need to prevent users in specific countries from accessing your content stored in S3 and distributed through CloudFront. How can you achieve this?
- Use the S3 geo restriction feature.
- Use the CloudFront geo restriction feature.
- Use the CloudFront ip restriction feature.
- You cannot restrict the access based on countries.
- Use the S3 geo restriction feature.
- Use the CloudFront geo restriction feature.
- Use the CloudFront ip restriction feature.
- You cannot restrict the access based on countries.
You have launched a new instance for a test environment using Amazon Linux 2, with a public DNS name that is reachable from the internet. You plan to use this server to deploy a dynamic PHP application that reads and writes information to a database. You did following procedures to install an Apache web server with PHP and MariaDB (a community-developed fork of MySQL) support on your Amazon Linux 2 instance (sometimes called a LAMP web server or LAMP stack).
- Update the distribution software packages.
- Installed the necessary web server, php, and mariadb packages.
- Start httpd service and turned on via systemctl.
- Add ec2-user to the apache group.
- The appropriate ownership and file permissions are set for the web directory and the files contained within it. A simple web page is created to test the web server and PHP engine.
How can you automate the above steps when you launch instances for QA, Integration and production environment?
- Convert the tasks into a shell script and a set of cloud-init directives that executes when the instance launches using instance meta data.
- Convert the tasks into a shell script and a set of cloud-init directives that executes when the instance launches using user data.
- Convert the tasks into a shell script and a set of cloud-init directives that executes when the instance launches using AWS Config.
- Convert the tasks into a shell script and a set of cloud-init directives that executes when the instance launches using AWS CloudFormation.
- Convert the tasks into a shell script and a set of cloud-init directives that executes when the instance launches using instance meta data.
- Convert the tasks into a shell script and a set of cloud-init directives that executes when the instance launches using user data.
- Convert the tasks into a shell script and a set of cloud-init directives that executes when the instance launches using AWS Config.
- Convert the tasks into a shell script and a set of cloud-init directives that executes when the instance launches using AWS CloudFormation.
What is the main characteristics of two SSD based EBS volume? Choose 2.
- General purpose SSD volume balances price and performance for a wide variety of workloads
- Provisioned IOPS SSD is highest-performance SSD volume for mission-critical low-latency or high-throughput workloads
- Provisioned IOPS SSD volume balances price and performance for a wide variety of workloads
- General purpose is highest-performance SSD volume for mission-critical low-latency or high-throughput workloads
- General purpose SSD volume balances price and performance for a wide variety of workloads
- Provisioned IOPS SSD is highest-performance SSD volume for mission-critical low-latency or high-throughput workloads
- Provisioned IOPS SSD volume balances price and performance for a wide variety of workloads
- General purpose is highest-performance SSD volume for mission-critical low-latency or high-throughput workloads
You are the solution architect of a financial services company. You are planning to use Amazon SQS while designing a distributed trading application. Key functional requirements pertaining to message queue are: processing of the messages in a sequential order, message should be processed only once and there should not be duplicate messages in the queue. How will you ensure the above requirements? Choose 3 options.
- Use SQS Standard Queues.
- Use SQS FIFO queues.
- Use SWF FIFO.
- Enable content-based deduplication.
- Explicitly provide the message deduplication ID (or view the sequence number) for the message.
- Use SQS Standard Queues.
- Use SQS FIFO queues.
- Use SWF FIFO.
- Enable content-based deduplication.
- Explicitly provide the message deduplication ID (or view the sequence number) for the message.
You have a blog site that is only used for a few minutes several times per day. You want to design the application on Serverless architecture so that you consume resources on usage basis. You also don’t want to compromise on scalability and performance. Which AWS services you will use? Choose 2
- Lambda
- Aurora Serverless
- S3
- RDS MySQL
- Lambda
- Aurora Serverless
- S3
- RDS MySQL
Agrim uses S3 to store all his personal photos. He has a bucket name “personalgallery” in us-east-1 region. After he came back from a vacation in Alaska, he uploads all camera snaps in his laptop desktop folder “alaskaphotos”. The photos have file name photo1.jpg, photo2.jpg etc. He logs into his AWS account and opens the S3 console. He then drags the desktop folder “alaskaphotos” inside the “personalgallery” bucket to upload files. Which of the following is correct? Choose 2.
- All the snap files photo1.jpg, photo2.jpg etc. will be visible in the S3 console inside the main bucket folder “personalgallery”
- All the snap files photo1.jpg, photo2.jpg etc. will be visible in the S3 console inside another folder “alaskaphotos” under the main bucket folder “personalgallery”
- The key name of the photos files will be “photo1.jpg” “photo2.jpg” etc.
- The key name of the photos files will be “/alaskaphotos/photo1.jpg” “/alaskaphotos/photo2.jpg” etc.
- All the snap files photo1.jpg, photo2.jpg etc. will be visible in the S3 console inside the main bucket folder “personalgallery”
- All the snap files photo1.jpg, photo2.jpg etc. will be visible in the S3 console inside another folder “alaskaphotos” under the main bucket folder “personalgallery”
- The key name of the photos files will be “photo1.jpg” “photo2.jpg” etc.
- The key name of the photos files will be “/alaskaphotos/photo1.jpg” “/alaskaphotos/photo2.jpg” etc.
What protection AWS Shield provide?
- Block common attack patterns, such as SQL injection or cross-site scripting
- Protection against Distributed Denial of Service (DDoS) attacks
- Protection against In-Transit data spoofing
- Protection against EC2 hacking
- Protection against encryption key loss
- Block common attack patterns, such as SQL injection or cross-site scripting
- Protection against Distributed Denial of Service (DDoS) attacks
- Protection against In-Transit data spoofing
- Protection against EC2 hacking
- Protection against encryption key loss
Your web application is hosted on EC2 instances inside a VPC. You are writing a shell scrip which will run in the instance based on following instance attributes: VPC id, Subnet id, private ip address, public ip address, security groups, public hostname. How will your script get this information?
- Using cURL to get instance meta data information from http://169.254.169.254/latest/user-data/
- Using Cloudtrail
- Using cURL to get instance meta data information from http://169.254.169.254/latest/meta-data/
- Using CloudWatch
- Using cURL to get instance meta data information from http://169.254.169.254/latest/user-data/
- Using Cloudtrail
- Using cURL to get instance meta data information from http://169.254.169.254/latest/meta-data/
- Using CloudWatch
How can you encrypt your Amazon RDS DB instances and snapshots at rest? Choose 2.
- No configuration required as Amazon RDS always encrypts the data at rest.
- You can encrypt data in RDS DB instance but cannot encrypt snapshots.
- Enabling the encryption option for your Amazon RDS DB instances while creation.
- While database creation supply the AWS KMS key identifier for your encryption key otherwise Amazon RDS uses your default encryption key for your new DB instance.
- No configuration required as Amazon RDS always encrypts the data at rest.
- You can encrypt data in RDS DB instance but cannot encrypt snapshots.
- Enabling the encryption option for your Amazon RDS DB instances while creation.
- While database creation supply the AWS KMS key identifier for your encryption key otherwise Amazon RDS uses your default encryption key for your new DB instance.
John hosts his personal blog website as static website on S3. The bucket name he uses to store his website files is ‘west-bucket’ in ‘us-west-2’ region. The photos are uploaded under the main bucket folder using the S3 console. What is the url of john’s static website?
- A. http:// s3-us-west-2.amazonaws.com/ west-bucket
- B. http://west-bucket.s3-us-west-2.amazonaws.com/
- C. http://west-bucket.s3-website-us-west-2.amazonaws.com/
- D. http:// s3-website-us-west-2.amazonaws.com/west-bucket
- A. http:// s3-us-west-2.amazonaws.com/ west-bucket
- B. http://west-bucket.s3-us-west-2.amazonaws.com/
- C. http://west-bucket.s3-website-us-west-2.amazonaws.com/
- D. http:// s3-website-us-west-2.amazonaws.com/west-bucket
Your solution architect has configured following scaling policy in the auto scaling group for your web server instances: Scaling policy to keep the average aggregate CPU utilization of your Auto Scaling group at 40 percent. Scaling policy to keep the request count per target of your Elastic Load Balancing target group at 1000 for your Auto Scaling group. Which type of dynamic scaling policy is this?
- Cloudwatch Scaling
- Target tracking scaling
- Step scaling
- Simple scaling
- Cloudwatch Scaling
- Target tracking scaling
- Step scaling
- Simple scaling
What are the two types of Enhanced Networking Types?
- AMD 82599 Virtual Function (VF) interface
- Elastic Network Adapter (ENA)
- Intel 82599 Virtual Function (VF) interface
- Elastic Network Interface (ENI)
- AMD 82599 Virtual Function (VF) interface
- Elastic Network Adapter (ENA)
- Intel 82599 Virtual Function (VF) interface
- Elastic Network Interface (ENI)
You are a solution architect for a global steel manufacturing company having plants across the globe. Recently an analytical and reporting application was launched in us-west region which involves each manufacturing plant uploading their weekly production data across the globe to a S3 bucket in us-west-1 region. The size of weekly production data file ranges from gigabytes to petabytes. After the first week of release feedback came from plants in countries other than US that they are experiencing slow upload times. How can you make the process of uploading the files to S3 faster?
- Use S3 multipart upload
- Change you design to first upload the data in region closest to the plan , then replicate it to us-west-1 central bucket using cross-region replication.
- Use S3 Transfer Acceleration
- Use Amazon Cloudfront
- Use S3 multipart upload
- Change you design to first upload the data in region closest to the plan , then replicate it to us-west-1 central bucket using cross-region replication.
- Use S3 Transfer Acceleration
- Use Amazon Cloudfront
Your company has SaaS product which provides different kind of reports to various subscribed customers. The reports ranges from adhoc, daily and monthly on various metrics. This is resulting in very high read traffic to underlying Amazon RDS MySQL instance. What can you do to improve the performance without affecting the user experience?
- Ensure that underlying RDS MySQL instance is Multi-AZ enabled.
- Create a read replica for underlying RDS MySQL.
- Change the RDS instance from MySQL to PostgreSQL.
- Analyze and improve the performance of read queries.
- Ensure that underlying RDS MySQL instance is Multi-AZ enabled.
- Create a read replica for underlying RDS MySQL.
- Change the RDS instance from MySQL to PostgreSQL.
- Analyze and improve the performance of read queries.
You are planning a strategy to migrate over 600 terabytes (TB) of data from on-premises storage system to Amazon S3 and Amazon EFS. You don’t want to use other AWS offline data transfer services. You need to move data from their on-premises storage to AWS via Direct Connect or VPN, without traversing the public internet, to further increase the security of the copied data. Which AWS service you will use?
- AWS Snowball
- AWS Snowball Edge
- AWS Snowmobile
- AWS DataSync
- AWS AppSync
- AWS Snowball
- AWS Snowball Edge
- AWS Snowmobile
- AWS DataSync
- AWS AppSync
What are the different IAM Roles you have to create for your ECS to work properly? Choose 5.
- Amazon ECS Task Execution IAM Role
- Amazon ECS Container Instance IAM Role
- Amazon ECS Instance Agent IAM Role
- Amazon ECS CodeDeploy IAM Role
- Amazon ECS CloudWatch Events IAM Role
- Amazon ECS Cluster IAM Role
- Amazon ECS Task Execution IAM Role
- Amazon ECS Container Instance IAM Role
- Amazon ECS Instance Agent IAM Role
- Amazon ECS CodeDeploy IAM Role
- Amazon ECS CloudWatch Events IAM Role
- Amazon ECS Cluster IAM
You have on-premise distributed applications connected through message broker supporting JMS APIs and AMQP/ MQTT Protocols. You are planning to migrate the whole application portfolio to AWS and re-develop using native AWS services. Which AWS service should you use to replace the message broker architecture layer?
- Amazon Message Broker
- Amazon SQS
- Amazon SWF
- Amazon MQ
- Amazon Message Broker
- Amazon SQS
- Amazon SWF
- Amazon MQ