Practice Exam Answer Explanations Flashcards
Loose Coupling
- Loose Coupling helps reduce the risk of cascading failures between components.
- Loosely coupled components are connected but not dependent on each other.
IaC
Infrastructure as Code (IaC) is a key implementation of automation in cloud – using Infrastructure as Code allows you to deploy and manage your environment without reliance on humans to complete all the tasks quickly and easily.
Application Code
Application code is a form of programmatic access. Programmatic access provides access to your AWS resources through an application or tool like the CLI.
AWS CLI
The AWS CLI allows you to access your AWS account through a terminal or command window.
AWS Management Console
The AWS Management Console allows you to access your AWS account and manage applications running in your account from a web browser.
AWS Person Health Dashboard
AWS Personal Health Dashboard provides alerts and guidance for AWS events that might affect your environment.
Shared Controls
Shared controls are elements of the shared responsibility model where both AWS and the customer have shared responsibilities within their own contexts. Patch management is a shared control, since AWS is responsible for patching and fixing flaws within the infrastructure, including managed services like RDS, but customers are responsible for patching their guest OS and applications.
Amazon WorkSpaces
Amazon WorkSpaces is a managed, secure Desktop-as-a-Service (DaaS) solution. You can use Amazon WorkSpaces to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe.
Amazon Inspector
You will need to turn to Amazon Inspector for security assessment. Not only does it identify vulnerabilities in your application, it will also spot deviations from security best practices. AWS Shield and WAF protect the application from attacks that exploit vulnerabilities, rather than identify them. Trusted Advisor only provides recommendations on how to improve security.
Authentication
Authentication defines the “who” in regard to access. Authentication is where you present your identity (username) and provide verification (password).
Access Keys
Access keys provide programmatic access to AWS and should not be embedded in code or shared with other users.
Root User
- You should not use the root user for daily tasks.
- You should enable multi-factor authentication (MFA) for the root user and other administrative users.
Least Privilege
You should only grant the least privilege needed to perform a task.
SSH Client
An SSH client is a program that allows establishing a secure connection from your local laptop to an EC2 instance.
Key Pair
A key pair, consisting of a private key and a public key, is a set of security credentials you use to prove your identity when connecting to an instance. Amazon EC2 stores the public key. You store the private key locally typically as a pem file.
S3 Glacier
Glacier offers extremely inexpensive data archival but requires a 3- to 5-hour data-retrieval window for standard retrievals – though this time can be reduced for a price.
CloudFront
CloudFront is a CDN that delivers data and applications globally with low latency.
EBS
EBS volumes are “virtual hard disks” for your EC2 instance.
Athena
Athena allows the company to query data in S3 using standard SQL.