Practice Exam 7 Flashcards
A developer has developed a 3-tier web application that will be deployed directly on Amazon EC2. The developer is considering deploying the application to more than one Availability Zone. What advantages does this deployment approach offer?
(choose 3)
Higher performance and higher latency since Availability Zones are spread out
Increase in responsiveness when load balancing is used
Improves the availability of the application
Reduced operational costs because you’re spreading data transfer costs between Availability Zones
Enhances resiliency, allowing the application to recover from failure due to load
-Increase in responsiveness when load balancing is used
If 1 Availability Zone is constrained, the instances in another Availability Zone can handle the traffic.
-Improves the availability of the application
If 1 Availability Zone is completely destroyed, you will still have a completely functional web application running in a different Availability Zone.
-Enhances resiliency, allowing the application to recover from failure due to load
Resilient/fault-tolerant systems recover quickly and minimize application downtime. If 1 instance fails, another instance in a different Availability Zone can handle the request.
Which of the below is correct when looking at Regions, Availability Zones, edge locations, and data centers?
(choose 2)
Regions contain Availability Zones.
Availability Zones contain data centers.
Data centers contain Availability Zones.
Edge locations contain Availability Zones.
Regions contain Availability Zones.
Availability Zones contain data centers.
Regions contain 2 or more Availability Zones, which are themselves made up of 1 or more data centers. Edge locations are a part of AWS’ content distribution network and are separate from Regions and AZs.
Which of the following best describes a system that will remain operational even in the event of a component failure?
Fault tolerant
Scalable
Highly available
Elastic
Fault tolerant
A fault-tolerant system will remain operational even in the event of a component failure.
A solutions architect is designing a new web application to be highly available. There are regulatory requirements that require multiple EC2 instances to be provisioned in the same geographic location. Where should the EC2 instances be placed?
Multiple Regions
Cluster placement group
Multiple Availability Zones
Multiple subnets
Multiple Availability Zones
This solves the requirement for high availability and in the same geographic location.
You have a mission-critical application that must be globally available at all times. Which deployment strategy should you follow?
Multi-VPC in 2 AWS Regions
Deploy to all Availability Zones in your home region.
Multi-Region
Multi-Availability Zone
Multi-Region
A multi-Region deployment will best ensure global availability. While it can be the most expensive, as well as complex to configure, multi-Regional architectures will ensure that even if all Availability Zones in a single Region fail due to a catastrophic event, your data will remain accessible.
Which types of deployments offer high availability?
(choose 2)
Single-AZ deployments
Single-Region deployments
Multi-AZ deployments
Multi-Region deployments
Multi-AZ deployments
Multi-Region deployments
Multi-AZ deployments provide high availability. Systems that are highly available are dependable enough to operate continuously without failure.
With AWS services, you can use as many resources as you need, as well as use them when you need them. Which of the following terms can be applied to this concept?
Dedicated resources
Fixed resources
Temporary resources
Disposable resources
Temporary resources
Disposable resources
Working in a traditional infrastructure environment means you have to deal with fixed resources, which is comparatively costly and labor-intensive. By contrast, AWS services are much more convenient; the services provide the ability to use as many resources as you need and dispose of them when you no longer need them. That’s why such resources are both temporary and disposable.
In the AWS Global Infrastructure, what are edge locations responsible for?
Providing independent power grids to Availability Zones
Providing disaster recovery services
Providing redundant backup to your AWS services
Hosting a content delivery network called CloudFront
Hosting a content delivery network called CloudFront
Edge locations host a content delivery network called CloudFront.
When you access tools provided to build a storefront application that runs on another company’s server, which cloud computing model are you using?
Software as a Service (SaaS)
Platform as a Service (PaaS)
Function as a Service (FaaS)
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
PaaS is often used by developers to develop software using web-based tools.
You are gathering information to present to management on a potential move to the AWS Cloud. Can you identify advantages of cloud computing?
(choose 2)
Increase speed and agility.
Easily predict capacity.
Benefit from small economies of scale.
Trade capital expense for variable expense.
-Increase speed and agility.
In a cloud computing environment, new IT resources are only a click away, which means you reduce the time to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization since the cost and time it takes to experiment and develop is significantly lower.
-Trade capital expense for variable expense.
Instead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources and you only pay for how much you consume.
When you pay a subscription fee to a hosting company to serve your website on an instance you manage, which cloud computing model are you using?
Platform as a Service (PaaS)
Function as a Service (FaaS)
Infrastructure as a Service (IaaS)
Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
IaaS offers building blocks that can be rented. When you pay a web hosting fee, you’re using IaaS.
Which of the following is a shared control of the AWS shared responsibility model?
Firmware upgrades
Security group configuration
Hardware maintenance
Patch management
Patch management
Shared controls are elements of the shared responsibility model where both AWS and the customer have shared responsibilities within their own contexts. Patch management is a shared control, since AWS is responsible for patching and fixing flaws within the infrastructure, including managed services like RDS, but customers are responsible for patching their guest OS and applications.
A person new to the cloud is learning about the services that offer compute power. Which AWS services offer computing resources in the cloud?
Amazon Cognito
AWS Elastic Beanstalk
Amazon Elastic Compute Cloud (EC2)
Amazon Simple Storage Service (S3)
AWS Lambda
-AWS Elastic Beanstalk
Elastic Beanstalk allows you to deploy your web applications and web services to AWS. Although we covered Elastic Beanstalk in the “Deployment and Infrastructure Management Services” lesson, it is a compute service.
-Amazon Elastic Compute Cloud (EC2)
EC2 allows you to rent and manage virtual servers in the cloud.
-AWS Lambda
Lambda is a serverless compute service that lets you run code without managing servers.
Which of the following is NOT part of the AWS Global infrastructure?
Availability Zones
Regions
Security groups
Edge locations
Security groups
Regions, AZs, and edge locations are part of the AWS Global Infrastructure.
When you access your personal email through a web browser using an application like Gmail, which cloud computing model are you using?
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Function as a Service (FaaS)
Software as a Service (SaaS)
SaaS allows you to use a complete application on demand. When you access your personal email through a web browser, you’re using SaaS.
Which of the following is a shared control of the AWS shared responsibility model?
Awareness and training
Identity and Access Management
EC2 instance application configuration
Data center security
Awareness and training
Shared controls are elements of the shared responsibility model where both AWS and the customer have shared responsibilities within their own contexts. Awareness and training is a shared control, since AWS trains AWS employees, but a customer must train their own employees.
Which of the following statements is true of AWS Regions?
They are composed of Availability Zones.
They automatically replicate resources among each other.
There are no charges for data transferred between them.
They are independent geographical areas.
-They are composed of Availability Zones.
AWS Regions are geographical areas that consist of locations called Availability Zones.
-They are independent geographical areas.
AWS Regions are independent, geographically isolated areas.
An IAM user with administrative access is attempting to close the AWS account. After troubleshooting, the admin user uncovers they need to sign in with root user credentials in order to perform this task. What other tasks require root user credentials?
Create a user with administrative access
Configuring an Amazon S3 bucket to enable MFA (multi-factor authentication) delete
Modifying the support plan
Changing the email address associated with the account
Activate IAM access to the Billing and Cost Management console
- Configuring an Amazon S3 bucket to enable MFA (multi-factor authentication) delete
- Activate IAM access to the Billing and Cost Management console
This task can only be performed when you sign in as the root user of an account. This task was presented in the additional reading, “Tasks that require root user credentials,” provided with the lesson.
- Modifying the support plan
- Changing the email address associated with the account
This task can only be performed when you sign in as the root user of an account.
Which of the following are focuses of the cost optimization pillar of the Well-Architected Framework?
Implement cloud financial management.
Pay for extra resources to cover demand.
Utilize consumption-based pricing.
Measure overall efficiency.
- Implement cloud financial management.
- Utilize consumption-based pricing.
- Measure overall efficiency.
This is a focus of the cost optimization pillar. This pillar focuses on delivering optimum and resilient solutions at the least cost to the user.
What does a developer need in order to log in to an EC2 instance via SSH from their local machine?
API key
Private key
Public key
SSH client
Key Management System (KMS) generated key
-Private key
A key pair, consisting of a private key and a public key, is a set of security credentials you use to prove your identity when connecting to an instance. You store the private key locally typically as a pem file.
-Public key
A key pair, consisting of a private key and a public key, is a set of security credentials you use to prove your identity when connecting to an instance. Amazon EC2 stores the public key.
-SSH client
An SSH client is a program that allows establishing a secure connection from your local laptop to an EC2 instance.
How is data defined when it is moving from one location to another?
On the move
At rest
In flight (or in transit)
In traffic
In flight (or in transit)
Data in flight (or in transit) describes data that is moving from one location to another.
According to the Shared Responsibility Model, which of the following is AWS responsible for?
Subnets
Network access control lists
Security groups
Elastic Cloud Compute (EC2) infrastructure
Amazon Virtual Private Cloud infrastructure
- Elastic Cloud Compute (EC2) infrastructure
- Amazon Virtual Private Cloud infrastructure
Protecting the infrastructure that runs all of the services in the AWS Cloud is the responsibility of AWS. Such services include EC2 infrastructure — the hardware compute platform for running EC2 instances and Amazon Virtual Private Cloud — or VPC, which enables customers to provision a logically isolated section of the AWS Cloud to launch their resources. The subnets, security groups, and network access control lists configured in the VPC are the responsibility of the customer.
Developers in your company need to interact with AWS from the Command Line Interface. Which security item will you need to provide to the developers?
Root password
Login ID
Security token
Access key
Access key
When working with AWS from the CLI, you need to provide an access key and secret access key.
Which of the following are programmatic access types enabling users to interact with AWS services?
AWS SDKs
Python
API calls
AWS CLI
-AWS SDKs
AWS SDKs allow IAM users to make programmatic API calls AWS services. The AWS SDKs consist of libraries and sample code for various programming languages and platforms (for example, Java, Ruby, .NET, iOS, and Android). The SDKs provide a convenient way to create programmatic access to IAM and AWS. For example, the SDKs take care of tasks such as cryptographically signing requests, managing errors, and retrying requests automatically.
-API calls
IAM users can make API calls for programmatic access to AWS services.
-AWS CLI
The AWS Command Line Interface (CLI) is a unified tool to manage your AWS services. With just one tool to download and configure, you can control multiple AWS services from the command line and automate them through scripts.
For which services is DDoS protection via AWS Shield Advanced supported?
CloudFront
Elastic Load Balancing
GuardDuty
Route 53
- CloudFront
- Elastic Load Balancing
- Route 53
DDoS protection via AWS Shield Advanced is supported for this service.
As an AWS account administrator, you are in charge of creating AWS accounts and securing those accounts. What steps can you take?
Add IP restrictions for all accounts.
Create functional groups for each department and use a common password for each group.
Store the root account credentials in SharePoint.
Create multi-factor authentication for the root account.
Grant admin access to all users.
-Add IP restrictions for all accounts.
This would greatly limit who can access your environment and from where.
-Create multi-factor authentication for the root account.
This will add an additional layer of security to the root account.
Which of the below are you responsible for managing when storing data in S3?
Who has access to the network hardware
Who has access to the storage hardware
Who has access to data you stored on the S3 service
Who has access to the S3 service
Who has access to the S3 infrastructure software
- Who has access to data you stored on the S3 service
- Who has access to the S3 service
Under the Shared Responsibility Model for managed services, AWS takes responsibility for managing all the hardware (including access, patching, and other maintenance). When it comes to S3, the customer is responsible for all aspects of the data being stored on S3, and who has access to manage the S3 service for that account.
Which pillar of the Well-Architected Framework encourages the use of CloudFormation?
Performance efficiency
Security
Operational excellence
Reliability
Operational excellence
Operational excellence focuses on creating applications that effectively support production workloads. Scripting operations as code is a part of this pillar, which includes the use of CloudFormation.