Practitioner Flashcards

1
Q

When you launch an instance using Amazon EC2, you must specify a geographic region in which to launch the instance, and a corresponding ____, which is an isolated location in that region where the physical hardware on which the instance will be launched is located.

availability zone
sub-region
subnet
sector

A

availability zone

Amazon EC2 is hosted in multiple locations worldwide. These locations are composed of regions and Availability Zones. Each region is a separate geographic area. Each region has multiple, isolated locations known as Availability Zones. Each region is completely independent. Each Availability Zone is isolated, but the Availability Zones in a region are connected through low-latency links.

http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company has recently migrated its operations to AWS and wants to run its non-interruptable application workloads for three years. Which pricing model would provide the MOST savings?

Amazon EC2 Dedicated Instances
Amazon EC2 Spot Instances
Amazon EC2 On-Demand Instances
Amazon EC2 Reserved Instances

A

Amazon EC2 Reserved Instances

Amazon EC2 Reserved Instances provide up to 72% savings for a 1-3 year term. This is a greater cost saving per reserved capacity than the expense of a dedicated instance. Reserved Instance pricing represents up to 72% savings compared to On-Demand instance pricing, and while Spot Instances can provide the highest cost savings overall of all the instance types, they are not a good choice for regular workloads that need to run without interruption for a longer durations.

https://aws.amazon.com/ec2/pricing/reserved-instances/pricing/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is AWS Glacier best used for?

A durable storage for data archives and backup
An alternative to Amazon S3
An alternative to EBS
None of these are correct

A

A durable storage for data archives and backup

The AWS Glacier service is a great and durable storage for data archives and backup. It is primarily used for backups and archives or files that do not require realtime retrieval.

http://aws.amazon.com/glacier/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What principles does AWS recommend to remove single points of failure from your design? (Choose 2 answers.)

Remove redundancy
Data replication
Detect failure
Single data center resilience

A

Data replication
Detect failure

There are several types of data replication that can help reduce single points of failure: synchronous, asynchronous, and quorum-based. In addition, AWS systems should be set up to detect and repair issues that could potentially cause failures automatically.

The remaining choices could increase the single points of failure in a system’s design. While redundancy requires additional resource costs, it helps maintain service in the event of outages. Multi-datacenter resilience (not single) is a recommended design approach in the event of larger failures, such as a natural disaster, that could affect multiple availability zones.

https://docs.aws.amazon.com/wellarchitected/latest/framework/a-failure-management.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your company wants you to ensure that AWS provides infrastructure reviews as part of its support plan. Which of the following support levels should you choose to make sure that this is included?

Developer-level Support
Enterprise-level Support
Customer-level Support
Business-level Support

A

Enterprise-level Support

Enterprise-level Support customers have access to the following features:

White-glove case routing
Management business reviews
Application architecture guidance
Infrastructure event management
AWS Concierge
Technical account manager

http://docs.aws.amazon.com/awssupport/latest/user/getting-started.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company is deciding whether to migrate its applications to a VPC on AWS. Which of the following services or features will help the business compare the costs of on-premises data centers and AWS?

Detailed billing report
AWS Cost Explorer
AWS Pricing Calculator
Consolidated billing

A

AWS Pricing Calculator

AWS Pricing Calculator is a web-based planning tool that you can use to create estimates for your AWS use cases. You can use it to model your solutions before building them, explore the AWS service price points, and review the calculations behind your estimates. You can use it to help you plan how you spend, find cost saving opportunities, and make informed decisions when using Amazon Web Services.

https://aws.amazon.com/tco-calculator/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which statement about AWS Direct Connect is correct?

AWS Direct Connect establishes encrypted network connectivity between your intranet and Amazon VPC over the Internet.

AWS Direct Connect is a good solution if you have low to modest bandwidth requirements.

AWS Direct Connect does not involve the Internet and uses dedicated, private network connections between your intranet and Amazon VPC.

AWS Direct Connect is a good solution if you can tolerate the inherent variability in Internet-based connectivity.

A

AWS Direct Connect is different from IPSec VPN Connection. A VPC VPN Connection utilizes IPSec to establish encrypted network connectivity between your intranet and Amazon VPC over the Internet. VPN Connections can be configured in minutes and are a good solution if you have an immediate need, have low to modest bandwidth requirements, and can tolerate the inherent variability in Internet-based connectivity. AWS Direct Connect does not involve the Internet; instead, it uses dedicated, private network connections between your intranet and Amazon VPC.

http://docs.aws.amazon.com/directconnect/latest/UserGuide/Welcome.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What choice below accurately describes the ‘pilot light’ disaster recovery method?

A scaled-down version of your entire system in another region that can be scaled with minimal recovery time.

Backing up data to tape and to be sent offsite regularly, from which all data can be restored in the event of a disaster.

A very small replica of only your business-critical systems that is always running in another region, in case you need to divert your workloads there in the event of a disaster.

A complete duplicate of your entire system in another region, to which all traffic can be directed in the event of a disaster.

A

A very small replica of only your business-critical systems that is always running in another region, in case you need to divert your workloads there in the event of a disaster.

The idea of the pilot light is an analogy that comes from gas heating. In that scenario, a small flame that’s always on can quickly ignite the entire furnace to heat up a house. In this DR approach, you simply replicate part of your IT structure for a limited set of core services so that the AWS cloud environment seamlessly takes over in the event of a disaster. A small part of your infrastructure is always running simultaneously syncing mutable data (as databases or documents), while other parts of your infrastructure are switched off and used only during testing. Unlike a backup and recovery approach, you must ensure that your most critical core elements are already configured and running in AWS (the pilot light). When the time comes for recovery, you can rapidly provision a full-scale production environment around the critical core.

https://aws.amazon.com/blogs/publicsector/rapidly-recover-mission-critical-systems-in-a-disaster/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Amazon CloudFront?

A global content delivery network
A web service to schedule regular data movement
A development front-end to Amazon Web Services
An encrypted endpoint to upload files to the cloud

A

A global content delivery network

Amazon CloudFront is a global content delivery network (CDN) service that accelerates delivery of your websites, APIs, video content or other web assets through CDN caching. It integrates with other Amazon Web Services products to give developers and businesses an easy way to accelerate content to end users with no minimum usage commitments.

https://aws.amazon.com/cloudfront/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which statements below regarding AWS pricing are true? (Choose 2 answers)

You can pay less for a service when you reserve it in advance.
Discounted rates are available for high volume service usage.
Reserved payment options are available for all AWS services
In general, payments are a set rate per month regardless of usage

A

You can pay less for a service when you reserve it in advance.
Discounted rates are available for high volume service usage.

Discounts are available for service reservations, and you can pay less per unit by using a higher ‘volume’ of the service. However, reserved services are only available for certain services, and payments are not a set rate. They are generally based on usage, or ‘on demand.’

https://d0.awsstatic.com/whitepapers/aws_pricing_overview.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Auto Scaling provides which of the following benefits for your application?

Your application gains better fault tolerance.
Your application and IT staff are held to compliance requirements you have set.
Your application reduces its latency in delivering content to a global market.
You acquire clarity on prototypes in your application.

A

Your application gains better fault tolerance.

When you use Auto Scaling, your applications gain better fault tolerance. Auto Scaling can detect when an instance is unhealthy, terminate it, and launch an instance to replace it. You can also configure Auto Scaling to use multiple Availability Zones. If one Availability Zone becomes unavailable, Auto Scaling can launch instances in another one to compensate.

http://docs.aws.amazon.com/AutoScaling/latest/DeveloperGuide/how-as-works.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the Elastic Load Balancing service?

Deny incoming or outgoing requests that fail to meet a set of provided rules

Transmit network messages outside of the VPC without the use of the public internet

Improve system fault tolerance by distributing traffic across multiple AWS resources

Connect external clients to the correct resource based upon the assigned domain or subdomain

A

Improve system fault tolerance by distributing traffic across multiple AWS resources

Elastic Load Balancing is a network service that distributes application traffic across multiple EC2 instances and availability zones. It provides network fault tolerance by automatically scaling up or down based on network traffic requirements.

https://docs.aws.amazon.com/elasticloadbalancing/latest/application/introduction.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key Management Service (KMS) is used to manage encryption keys in your AWS environment. How can you audit the changes made on KMS?

KMS provides full audit details as part of KMS console which can be accessed through web interface and APIs.

KMS provides history to each key changes; you can track the changes done on each key using key history.

KMS will log all changes in a special S3 bucket that is created the first time KMS service is being used.

KMS has full audit and compliance integration with CloudTrail; this is where you can audit all changes performed on KMS.

A

KMS has full audit and compliance integration with CloudTrail; this is where you can audit all changes performed on KMS.

KMS is fully integrated with CloudTrail which provides audit and compliance features on all actions performed in KMS.

/amazon-web-services/amazon-web-services-key-management-service-kms-course/key-management-service-basics.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which tool within Billing and Cost Management allows you to view historical billing information in a graphical format?

AWS Cost Explorer
AWS Budgets
Consolidated Billing
Cost Allocation Tags

A

AWS Cost Explorer

Cost Explorer is a useful and powerful tool in Billing and Cost Management. It allows you to view historical billing information in a graphical format giving you greater insight into your AWS spending. A valuable tool that can help to identify where you should be focusing your cost optimization efforts. It also can forecast your estimated spending up to two months ahead using existing data as a reference. If you can see that your estimated future bills are becoming too high, you have the time now to identify where you can make and initiate cost reduction mechanisms to help mitigate the risk.

Cost Explorer comes configured with three pre-defined views which are commonly used to analyze spending across your account:

Monthly Spend by Service view - this covers the current and previous two months and is grouped by AWS services

Monthly Spend by Linked Account View - this covers the current and previous two months and is grouped by linked accounts

Daily Spend view - this covers the daily spend over the previous sixty days

http://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/cost-explorer-what-is.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which two of the four Amazon S3 storage classes listed below charge a per GB retrieval fee? (Choose 2 answers)

Amazon S3 Standard
Amazon S3 Standard-IA
Amazon S3 Glacier Storage
Amazon S3 Reduced Redundancy Storage

A

Amazon S3 Standard-IA
Amazon S3 Glacier Storage

Amazon Glacier and S3 Standard-IA are both designed for storing infrequently accessed data. This is why the data storage fees are roughly one-half to one-sixth the cost of Standard Storage. Retrieval fees will quickly add up if the data is retrieved too often, so planning or correctly setting your object lifecycle based on how often you or your company will need the data is important.

If the name of the storage class has “Infrequent-Access” “IA” or “Glacier” in the name, there is a retrieval fee because these are the infrequent access and archive classes.

http://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does AWS define cloud computing?

The on-demand delivery of IT resources through a cloud services platform via the Internet with pay-as-you-go pricing.

A pool of servers offering compute resources that are designed to be issued exclusively to individual users and organizations.

The term used by cloud architects to describe virtualized technology.

A secure pool of compute, storage, and network resources that are accessible only on-premises.

A

The on-demand delivery of IT resources through a cloud services platform via the Internet with pay-as-you-go pricing.

AWS cloud computing is described as the on-demand delivery of IT resources through a cloud services platform via the Internet with pay-as-you-go pricing.

https://aws.amazon.com/what-is-cloud-computing/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Important functions of your application are unavailable. You cannot work around the problem, and your business is significantly impacted. You decide that you need support from AWS. Which of the following severity levels do you think would be an appropriate choice for this issue?

Guidance
Production system impaired
Production system down
Business-critical system down

A

Production system down

In the context of AWS support, if you have a problem that meets any of the following criteria, the severity level will be ‘Production system down’.

You can’t work around the problem, and your business is significantly impacted.
Important functions of your application are unavailable. (Business and Enterprise)

http://docs.aws.amazon.com/awssupport/latest/user/getting-started.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following statements is true of an Auto Scaling group?

An Auto Scaling group cannot span multiple regions.
An Auto Scaling group delivers log files within 30 minutes of an API call.
Auto Scaling publishes new log files about every 15 minutes.
An Auto Scaling group cannot be configured to scale automatically.

A

An Auto Scaling group cannot span multiple regions.

An Auto Scaling group can contain EC2 instances that come from one or more Availability Zones within the same region. However, an Auto Scaling group cannot span multiple regions.

http://docs.aws.amazon.com/AutoScaling/latest/DeveloperGuide/US_AddAvailabilityZone.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is NOT a feature of Amazon Inspector?

built-in rules library
expandable rules library allowing for custom policy rules
ability to publish findings through SNS
automate via API

A

expandable rules library allowing for custom policy rules

Amazon Inspector has a fixed built-in library of best practices and rules. Currently it doesn’t support any custom rules beyond this default set.

https://docs.aws.amazon.com/inspector/latest/userguide/inspector_introduction.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How often does Amazon CloudWatch report metrics for AWS WAF?

AWS maintains all networks
AWS monitors facilities and hardware
AWS monitors platform security
AWS encrypts all data in the cloud

A

AWS monitors facilities and hardware

When using the AWS cloud, AWS is responsible for monitoring and maintaining the security of facilities and hardware, so that the customer can focus on security within the cloud. Network, platform, and data security within the cloud are all the responsibility of the customer.

https://docs.aws.amazon.com/whitepapers/latest/aws-overview/security-and-compliance.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How often does Amazon CloudWatch report metrics for AWS WAF?

1 minute
3 minutes
5 minutes
10 minutes

A

1 minute

WAF integrates well with Amazon CloudWatch allowing you to monitor set metrics for the service. WAF CloudWatch metrics are reported in one minute intervals by default.

http://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/waf-metricscollected.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Are generators and cooling equipment shared across Availability Zones?

Yes
No
Availability zones share the same data center and so the same equipments
It depends on the region

A

No

Each Availability Zone is engineered to be isolated from failures in other Availability Zones and to provide inexpensive, low-latency network connectivity to other zones in the same region. By launching instances in separate Availability Zones, you can protect your applications from the failure of a single location.

http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/RDSFAQ.MultiAZ.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In regards to disaster recovery, what is a recovery point objective (RPO)?

The time it takes after a disruption to restore a system to its service level.

It is the acceptable amount of data loss measured in time.

The time it takes to scale a functioning resource horizontally to adapt to increased demand.

The time it takes to scale a functioning resource vertically to adapt to increased demand.

A

It is the acceptable amount of data loss measured in time.

The recovery point objective (RPO) is the amount of acceptable data loss measured in time. For example, a transactional business cannot afford a great deal of data loss, so its RPO is likely less than one hour because an hour is a great expense in terms of data loss. However, for a more isolated website with minimal customer interaction, an RPO of a day may be acceptable because this represents a tolerable amount of data loss.

https://d1.awsstatic.com/whitepapers/Storage/Backup_and_Recovery_Approaches_Using_AWS.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

To ensure secure services, AWS offers shared responsibility models for each of the different type of services that they offer which you need to be aware of. Which of the following services are the responsibility of AWS? (Choose 3 answers)

Operating systems
Virtualization infrastructure
Network infrastructure
Physical security of hardware

A

Virtualization infrastructure
Network infrastructure
Physical security of hardware

Explanation
AWS is responsible for what is known as Security ‘of’ the Cloud. This covers their global infrastructure elements – Regions, Availability Zones, and Edge Locations, and also the foundations of their services covering Compute, Storage, Database, and Network

/blog/aws-shared-responsibility-model-security/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

VPC security groups operate at the instance level, whereas _____ are an optional layer of security that operate at the subnet level.

network ACLs
DB security groups
proxy servers
IAM rules

A

network ACLs

Network ACLs operate at the subnet level (second layer of defense), whereas security groups operate at the instance level (first layer of defense).

http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Security.html#VPC_Security_Comparison

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is true of CloudWatch alarms?

They automatically make changes to the rules based on monitored resource.

They automatically make changes to the resources monitored based on rules defined.

They only monitor the timeout metric for numerous AWS services

They are only configured through CloudWatch APIs.

A

They automatically make changes to the resources monitored based on rules defined.

CloudWatch alarms send notifications or automatically make changes to the resources you are monitoring based on rules that you define.

http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/WhatIsCloudWatch.html

27
Q

Which of the following best describes the relationship between regions and Availability Zones?

Each region is completely independent and each Availability Zone is isolated, but the Availability Zones in a region are connected through low-latency links.

Each region is completely independent and Availability Zones are never isolated, but the Availability Zones in a region are connected through low-latency links.

Each region may be dependent on another region, each Availability Zone is isolated, and the Availability Zones in a region are not connected.

Each region may be dependent on another region, and each Availability Zone is completely independent.

A

Each region is completely independent and each Availability Zone is isolated, but the Availability Zones in a region are connected through low-latency links.

http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html

28
Q

You have a time-sensitive development question involving system issues and you decide that you need some support from AWS.

Which is the most appropriate of the following severity levels to assist you in resolving the issue?
Guidance
System impaired
Production system impaired
Business-critical system down

A

System impaired

In regards to AWS support, if you have a problem which meets any of the following, it is considered a system impaired priority.

You can work around the problem
Non-critical functions of your application are behaving abnormally.
You have a time-sensitive development question. (Developer, Business, and Enterprise)

http://docs.aws.amazon.com/awssupport/latest/user/getting-started.html

29
Q

If your AWS data must meet specific regulations such as the EU Data protection laws, what must you do?

Be aware that they exist and comply with them when and if you have time to do so

Move your data somewhere else so you don’t have to worry about extra security

Architect your environment to meet these security requirements

Keep that data on-premise and do not move it to the cloud under any circumstance

A

Architect your environment to meet these security requirements

Some laws require specific security controls, retention requirements, etc, dependent on the data being stored. Other legislations exist where certain data may have to remain within a specific region and can not be transferred out of those boundaries. You need to architect your environment to meet these security requirement and mitigate the risk of data being stored in a geographic location that’s restricted. Breaches to this legislation could have a legal impact and lead to additional risks against your organization, so it’s fundamental that you are aware of your data privacy and storage location laws and regulations.

/cloud-computing/internal-business-effects-of-the-cloud-course/business-risks.html

30
Q

Which AWS disaster recovery method has the lowest RTO and RPO, but the highest cost required to maintain resources?

Backup and restore
Pilot light
Warm standby
Multi-site

A

Multi-site

Multi-site is the quickest disaster recovery method, with minimal time to recover and minimal data loss, but with the highest overall cost in comparison to backup and restore, pilot light or warm standby methods. This method is ideal for highly transactional online businesses, whose potential losses in terms of revenue and reputation far outweigh any costs required to maintain a duplicate production environment in a separate AWS region.

https://d1.awsstatic.com/whitepapers/Storage/Backup_and_Recovery_Approaches_Using_AWS.pdf

31
Q

Network Access Control Lists (NACLs) are _______.

stateless
stateful
synchronous
asynchronous

A

stateless

Network ACLs are stateless; responses to allowed inbound traffic are subject to the rules for outbound traffic (and vice versa).

http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html

32
Q

All AWS customers automatically have around-the-clock access to certain features. Which of the following is not one of those?

Email response
Customer Service
Support forums
Documentation, whitepapers, and best-practice guides

A

Email response

All AWS customers automatically have around-the-clock access to the following.

Customer Service
Support forums
Service health checks
Documentation, whitepapers, and best-practice guides
Client-side diagnostic tools are for Developer-level Support customers.<

http://docs.aws.amazon.com/awssupport/latest/user/getting-started.html

33
Q

There are many access control methods on AWS to build network segments. Which choice below defines an isolated network for each workload or organizational entity?

Amazon VPC
Network Access Control Lists (NACLs)
Host-based firewalls
Security groups

A

Amazon VPC

On AWS, you can build network segments using Amazon VPC to define an isolated network for each workload or organizational entity. For AWS accounts created after December 4, 2013, all instances are launched into the VPC environment. The previously available method is known as EC2-Classic, but is only available to AWS accounts created before this date.

https://d0.awsstatic.com/whitepapers/aws-security-best-practices.pdf

34
Q

hen deploying a new environment within AWS, what does “think parallel” mean?

Test with new deployments and eliminate existing systems to confirm desired outcomes before scaling fully.

Test changes and validate the results at all lifecycle stages to confirm new features and minimize failed deployments.

Maintain the prior environment until there is confirmation of successful deployment.

Automate testing of deployed environments to confirm desired outcomes.

A

Maintain the prior environment until there is confirmation of successful deployment.

When deploying a new environment within AWS, one aspect of the concept “think parallel” means maintaining the prior environment while testing and deploying a new one in order to reduce various risks associated with architecting the new environment.

http://aws001.s3.amazonaws.com/trailhead/TrailHead_ArchitectingInTheCloud.pdf

35
Q

Which of the following is true of Amazon CloudWatch?

Amazon CloudWatch monitors Amazon Web Services (AWS) resources and the applications that run on AWS in real-time.
Amazon CloudWatch is a web service that gives businesses an easy and cost-effective way to distribute content with low latency and high data transfer speeds.
Amazon CloudWatch runs code without provisioning or managing servers.
None of these are true.

A

Amazon CloudWatch monitors Amazon Web Services (AWS) resources and the applications that run on AWS in real-time.

Amazon CloudWatch monitors your Amazon Web Services (AWS) resources and the applications you run on AWS in real-time.

You can use CloudWatch to collect and track metrics, which are variables you can measure for your resources and applications. CloudWatch alarms send notifications or automatically make changes to the resources you are monitoring based on rules that you define.

For example, you can monitor the CPU usage and disk reads and writes of your Amazon EC2 instances and then use this data to determine whether you should launch additional instances to handle an increased load. You can also use this data to stop under-used instances to save money. In addition to monitoring the built-in metrics that come with AWS, you can monitor your own custom metrics. With CloudWatch, you gain system-wide visibility into resource utilization, application performance, and operational health.

http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/WhatIsCloudWatch.html

36
Q

Which of the following describes operational excellence, one of the five pillars of the AWS’s Well-Architected Framework?

Prepare, operate, and evolve
Infrastructure and data protection
Change management and failure management
Review, monitoring, and trade-offs

A

Prepare, operate, and evolve

Prepare, operate and evolve are interwoven in the following 6 design principles that make up this pillar

Perform operations as code: This explains how to deploy, respond to events and perform automated operational procedures using code to help prevent human error

Annotate documentation: This defines how it’s possible to automatically create and annotate documentation when provisioning AWS resources

Make frequent, small, reversible changes: The focus of this principle is to implement your changes at small scale, and frequently to allow you to easily roll-back the change without affecting a wide customer base if there are issues

Refine operations procedures frequently: This focuses on the importance of consistently refining your operational procedures, evolving them as your business evolves

Anticipate failure: The focus here is to understand and define your potential points of failure and how these can be mitigated

Learn from all operational failures: This principle explains how knowledge sharing is key and how to learn from issues and failures that have occurred.

https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf

37
Q

Which of the following is specifically an AWS security best practice?

Applying the principle of least privilege
Applying the principle of mechanical sympathy
To democratize advanced technologies
To design for failure

A

Applying the principle of least privilege

Applying the ‘principle of least privilege’ is a security best practice that essentially focuses on only granting the level of access an identity requires to perform its role. This also looks at how to prevent and eliminate identities with long-term credentials.

https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf

38
Q

Which of the following costs associated with on-premises labor are significantly reduced when an organization migrates to AWS?

Application development
Server maintenance
Software design
Network encryption

A

Server maintenance

When an organization migrates from on-premises to AWS, the responsibility of server maintenance shifts to AWS. Costs associated with application development, software design, and network encryption remain the responsibility of the organization.

https://aws.amazon.com/blogs/enterprise-strategy/rightsizing-infrastructure-can-cut-costs-36/

39
Q

_______ are objects created within IAM which have policy permissions associated to them. While they can be associated with users as groups are, they can also be assigned to instances at the time of launch.

IAM roles
IAM groups
IAM users
IAM organizations

A

IAM roles

IAM Roles are objects created within IAM which have Policy permissions associated to them. However, instead of just being associated with users as groups are, roles can be assigned to instances at the time of launch. This allows the instance to adopt the permissions given by the role without the need to have access keys stored locally on the instance.

IAM Users are account objects that allow an individual user to access your AWS environment with a set of credentials. You can issue user accounts to anyone you want to view or administer objects and resources within your AWS environment. Permissions can be applied individually to a user, but the best practice for permission assignments is to add the user to an IAM Group.

IAM Groups are objects that have permissions assigned to them via Policies allowing the members of the Group access to specific resources. Having Users assigned to these groups allows for a uniform approach to access management and control.

http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html

40
Q

Complete the three definitions:___________ is the process of defining an identity and the verification of that identity___________ determines what resources an identity can access within a system once it has been authenticated.___________ is the method and process of how access is granted to a secure resource.

Authentication; Authorization; Access Control
Authorization; Authentication; Access Control
Access Control; Authentication; Authorization
Authentication; Access Control; Authorization

A

Authentication; Authorization; Access Control

Authentication: Process of defining an identity and the verification of that identity

Example - username and password

Authorization: Determines what an identity can access within a system once it’s been authenticated to it

Example - An identities permissions to access specific AWS services

Access Control: The method and process of how access is granted to a secure resource

Example: Multi-Factor Authentication

/amazon-web-services/understanding-aws-authentication-authorization-accounting-course/authentication-authorization-and-access-control.html

41
Q

Which choice is correct regarding changing the security groups for instances in a VPC?

You can change an instance’s security groups anytime after the instance is launched.
You cannot change an instance’s security groups after the instance is launched.
You can change an instance’s security groups, but the instances must be stopped.
You can change an instance’s security groups, but you must reboot the instance for the changes to take effect.

A

You can change an instance’s security groups anytime after the instance is launched.

In a VPC, you are allowed to change the security groups an instance belongs to, even after it has been launched.

http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_SecurityGroups.html

42
Q

Which of the following statements is true of automation in RDS?

Amazon RDS automatically manages the database settings that are specific to your application.

Amazon RDS automatically performs backups and patches the database software that powers your DB Instance.

Amazon RDS automatically builds the relational schema that best fits your use case.

Amazon RDS automatically performs system construction activities such as performance tuning to optimize your database for your application’s workflow.

A

Amazon RDS automatically performs backups and patches the database software that powers your DB Instance.

Amazon RDS manages the work involved in setting up a relational database: from provisioning the infrastructure capacity you request to installing the database software. Once your database is running on its own DB Instance, Amazon RDS automates common administrative tasks, such as performing backups and patching the database software that powers your DB Instance. For optional Multi-AZ deployments (currently supported for MySQL and Oracle database engines), Amazon RDS also manages synchronous data replication across Availability Zones and automatic failover.

Since Amazon RDS provides native database access, you interact with the relational database software as you normally would. This means you’re still responsible for managing the database settings that are specific to your application. You’ll need to build the relational schema that best fits your use case and are responsible for any performance tuning to optimize your database for your application’s workflow.

http://aws.amazon.com/rds/faqs/#3

43
Q

What is a “rule” in the context of Amazon Inspector?

A set of conditions that when met in a specific target, this target will be considered for assessment
A potential security issue discovered during the Amazon Inspector assessment run
A security goal or objective that you might have for your environment
A security check that the AWS agent performs during an assessment run

A

A security check that the AWS agent performs during an assessment run

In the context of Amazon Inspector, a security check that the agent performs during an assessment run.

https://docs.aws.amazon.com/inspector/latest/userguide/inspector_concepts.html

44
Q

How is Key Management Service (KMS) priced?

KMS is priced per KMS key; you are charged for the number of master keys maintained in KMS.

KMS is priced per data encryption keys; you are charged for the number of individual data keys maintained in KMS.

KMS is priced per number of encryption/decryption requests received from all services per month.

KMS is priced per KMS key and the number of requests received per month.

A

KMS is priced per KMS key and the number of requests received per month.

KMS is priced per two factors: the number of KMS keys maintained in KMS and the number of requests received within a month.

/amazon-web-services/amazon-web-services-key-management-service-kms-course/key-management-service-basics.html

45
Q

Your company is considering moving its operations to the AWS cloud and is concerned about data resiliency. Which of the following would you recommend as an example of resiliency within AWS?

The ability to provision extra capacity

The ability to monitor hardware security

The ability to use access control mechanisms

The ability to use multiple Availability Zones

A

The ability to use multiple Availability Zones

One benefit of the AWS cloud is its ability to architect for resilience. In this case, using multiple Availability Zones could improve the resilience of data centers.

https://aws.amazon.com/blogs/architecture/it-resilience-within-aws-cloud-part-ii-architecture-and-patterns/

46
Q

Which of the following is not a pillar of the Well-Architected Framework developed by AWS?

Operational excellence
Security
Reliability
Profitability

A

Profitability

To understand the elements of the well-architected framework you must be aware of the 5 pillars that the framework is based and built upon:

Operational excellence
Security
Reliability
Performance efficiency
Cost optimization

https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf

47
Q

What types of identities do Amazon Cognito identity pools support?

They support only unauthenticated identities.
They support both authenticated and unauthenticated identities.
They support only authenticated identities.
They support neither authenticated nor unauthenticated identities.

A

They support both authenticated and unauthenticated identities.

Amazon Cognito identity pools support both authenticated and unauthenticated identities.

Authenticated identities belong to users who are authenticated by a public login provider or your own backend authentication process. Unauthenticated identities typically belong to guest users.

https://docs.aws.amazon.com/cognito/latest/developerguide/identity-pools.html

48
Q

When using Amazon’s CloudTrail, which service is used to publish a notification?

Amazon Simple Message Delivery
Amazon Simple Notification Service
Amazon Message Transmission Service
Amazon Delivery Services

A

Amazon Simple Notification Service

CloudTrail uses Amazon’s Simple Notification Service to publish the notification. It is possible to configure CloudTrail to publish notifications for each log file entry.

https://aws.amazon.com/cloudtrail/

49
Q

You are reviewing AWS Elastic Beanstalk and considering how it can support versions of an application. Which statement below is correct?

AWS Elastic Beanstalk allows you to run multiple versions of an application at the same time.

AWS Elastic Beanstalk allows one version of an application to run at a time.

AWS Elastic Beanstalk can store unlimited application versions, but only one application version can run at a time.

The number of application versions you can run simultaneously depends on which environment type you select.

A

AWS Elastic Beanstalk allows you to run multiple versions of an application at the same time.

AWS Elastic Beanstalk is designed to support multiple running environments such as one for integration testing, one for pre-production, and one for production. Each environment is independently configured and runs on its own separate AWS resources.

https://aws.amazon.com/elasticbeanstalk/faqs/

50
Q

You have been asked to perform some penetration testing on your company’s AWS infrastructure. However, you are not sure who is responsible for this. Which statement describing the AWS policy regarding penetration testing is correct?

Permission is required from AWS for all penetration testing.

You need to employ a third-party specialist to do the testing.

You can always perform penetration testing with no prior AWS approval.

Penetration testing is possible without AWS approval depending on the services in use.

A

Penetration testing is possible without AWS approval depending on the services in use.

There are several important things to note about penetration testing requests:

Permission may be required for penetration testing, depending on which AWS services are in use.
To request permission, you must be logged into the AWS portal using the root credentials associated with the instances you wish to test, otherwise the form will not pre-populate correctly.

http://aws.amazon.com/security/penetration-testing/

51
Q

Which of the following best defines the AWS Key Management Service?

A secure cryptographic key storage for customers

A managed service that makes it easy for you to create and control the encryption keys used to encrypt your data

A detailed view of the resources associated with your AWS account

A web service that enables Amazon Web Services (AWS) customers to manage users and user permissions in AWS

A

A managed service that makes it easy for you to create and control the encryption keys used to encrypt your data

The AWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data.

http://docs.aws.amazon.com/kms/latest/developerguide/overview.html

52
Q

You want to copy an Amazon Machine Image (AMI) to a different region. What should you ensure prior to copying the AMI?

You should ensure that the contents of the source AMI are EBS store-backed.

You should ensure that the contents of the source AMI can only set credentials received from an identity provider.

You should ensure that the contents of the source AMI are updated to support running in a different region.

You should ensure that the contents of the source AMI are not public.

A

You should ensure that the contents of the source AMI are updated to support running in a different region.

You must confirm that the contents of the source Amazon Machine Image (AMI) are updated to support running in a different region prior to copying an AMI.

http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/CopyingAMIs.html

53
Q

As it relates to Amazon EC2 instances, what is the function of key pairs?

To encrypt the login information for Linux and Windows EC2 instances and then decrypt the same information, allowing you to authenticate into the instance.

To encrypt data held on EBS volumes using AES-256 cryptography and then decrypt the data to be read again

To encrypt and decrypt passwords for AWS user accounts

To safely make programmatic API calls over an encrypted channel

A

To encrypt the login information for Linux and Windows EC2 instances and then decrypt the same information, allowing you to authenticate into the instance.

A key pair, as the name implies, is made up of two components: a public key and a private key. These keys are 2048-bit SSH-2 RSA keys.

The function of key pairs is to encrypt the login information for Linux and Windows EC2 instances, and then decrypt the same information allowing you to authenticate onto the instance.

The public key uses public-key cryptography to encrypt data such as the username and password. For Windows instances, the private key is used to decrypt this data, allowing you to gain access to the login credentials including the password. For Linux instances, the private key is used to SSH into the instance.

The public key is held and kept by AWS. The private key is your responsibility to keep and ensure that it is not lost.

http://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/ec2-key-pairs.html

54
Q

What does the AWS best practice “designing for failure” mean?

To develop cloud systems that never fail
To design systems to anticipate failure and recover automatically
To develop systems with single points of failure
To back up your cloud environment with an on-premises environment

A

To design systems to anticipate failure and recover automatically

Designing for failure means assuming that what can go wrong will go wrong. Design your infrastructure to respond to potential outages of multiple kinds with an automated recovery process in place.

https://github.com/deep1224/AWS-Training-Docs/blob/master/AWS_Cloud_Best_Practices.pdf

55
Q

Which description of a Recovery Time Objective (RTO) is correct?

It is the maximum acceptable amount of time a system can be offline.

It is the maximum acceptable amount of data loss measured in time.

It is the maximum acceptable amount of income loss measured in transactions.

It is the minimum amount of data loss before a system can fully recover measured in time.

A

It is the maximum acceptable amount of time a system can be offline.

A recovery time objective (RTO) is the maximum acceptable time to restore system service after a disruption, while a recovery point objective (RPO) is the maximum acceptable amount of data loss measured in time. The two concepts are interrelated. The amount of data loss a business can tolerate usually determines the desired recovery time objective. The desired RTO then generally determines the disaster recovery method.

https://en.wikipedia.org/wiki/Recovery_point_objective

56
Q

AWS Lambda monitors Lambda functions and reports metrics through which Amazon service?

Amazon Kinesis
Amazon CloudWatch
Amazon Elastic Compute Cloud
Amazon CloudTrail

A

Amazon CloudWatch

AWS Lambda automatically monitors Lambda functions on your behalf, reporting metrics through Amazon CloudWatch.

http://docs.aws.amazon.com/lambda/latest/dg/monitoring-functions.html

57
Q

A user is uploading a backup of data to S3 Glacier as part of a disaster recovery plan. The data stored in S3 Glacier is part of a larger data recovery plan that involves other AWS services.There is a relatively small set of data (100 MB) that needs to be restored immediately when a disaster recovery plan is executed, and the organization is planning a recovery time objective (RTO) of 1 hour.

Assuming the data size meets the requirements for any of the given retrieval options below, which S3 Glacier data retrieval option would you plan in the event of a disaster?
Use Expedited retrievals without Provisioned Capacity

Use Expedited Retrievals with Provisioned Capacity

Use Bulk retrievals

Use Standard retrievals

A

Use Expedited Retrievals with Provisioned Capacity

There are three retrieval options with Amazon S3 Glacier:

Expedited — There are two types of Expedited retrievals: On-Demand and Provisioned. On-Demand requests are similar to EC2 On-Demand instances and are available most of the time. Provisioned requests are guaranteed to be available when you need them, which is recommended for a DR plan.
Standard — Standard retrievals allow you to access any of your archives within several hours.
Bulk — Bulk retrievals are Amazon S3 Glacier’s lowest-cost retrieval option, which you can use to retrieve large amounts, even petabytes, of data inexpensively in a day. Bulk retrievals typically complete within 5–12 hours.

http://docs.aws.amazon.com/amazonglacier/latest/dev/introduction.html

58
Q

An AWS account manager wants to find a cost-effective way to procure and deploy fully-managed products from software vendors. Which AWS service or feature will meet these requirements?

Amazon Sagemaker
AWS Developer Support plan
AWS CloudFormation template
AWS Marketplace

A

AWS Marketplace

AWS Marketplace is a curated digital catalog that makes it easy for organizations to discover, procure, entitle, provision, and govern third-party software. With AWS Marketplace, you can also explore and buy professional services to configure, deploy, and manage your third-party software.

Amazon Sagemaker is a service that helps data scientists and developers to prepare, build, train, and deploy high-quality machine learning models quickly by bringing together a broad set of capabilities purpose-built for machine learning. Sagemaker allows you to deploy Machine Learning software. It is not a location for finding managed software from third-party vendors.

The AWS Developer Support plan is a support tier that is appropriate to use if you are testing or doing early development on AWS and want the ability to get technical support during business hours as well as general architectural guidance as you build and test. The support included in the Developer plan does not include providing information about third-party software vendors.

AWS CloudFormation template is a feature within the CloudFormation service for quick and reliable provisioning of the services or applications you use, including software purchased from AWS Marketplace. It is not a location to find information about third-party software vendors.

https://aws.amazon.com/mp/marketplace-service/overview/

59
Q

Amazon CloudWatch can also integrate with other AWS services that provide similar monitoring features. What other AWS offering can CloudWatch integrate with to provide monitoring of API calls as well as perform aggregation of CloudWatch log(s)?

AWS CloudFormation
AWS CloudTrail
AWS OpsWorks
Amazon IAM

A

AWS CloudTrail

AWS CloudTrail is a service that captures API calls made by or on behalf of your AWS account. This information is collected and written to log files that are stored in an Amazon S3 bucket that you specify. API calls are logged whenever you use the API, the console, or the AWS CLI. Using the information collected by CloudTrail, you can determine what request was made, the source IP address the request was made from, who made the request, when it was made, and so on.

http://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/logging_cw_api_calls.html

60
Q

Which of the following have access to billing support?

All AWS customer accounts
Enterprise support plans
Business support plans
Basic support plans

A

All AWS customer accounts

Account and billing case support is available to all AWS customers.

https://docs.aws.amazon.com/awssupport/latest/user/case-management.html

61
Q

What is a benefit of the AWS design concept “decoupling”?

It minimizes the interdependency of applications.

It breaks large data processing tasks into several small, separate tasks.

It provides an identity only enough access to complete its assigned tasks.

It automates system recovery processes.

A

It minimizes the interdependency of applications.

Decoupling means that complex applications should be broken down into small, loosely coupled components with as few interdependencies as possible. This way, a change in one component does not cause failures in a cascading manner through other system components.

/course/decoupling-architecture-within-aws/what-decoupled-and-event-driven-architecture/

62
Q

Which Amazon EC2 pricing model allows a user to host instances on physical servers that are completely separate from any other AWS accounts?

On-Demand
Dedicated Hosts
Savings Plans
Spot Instances

A

Dedicated Hosts

The dedicated hosts are Amazon physical servers dedicated for your use, so you can help address corporate compliance requirements by specifying your own licensing rules and instance placement options on a physical server. On-Demand Instances, Savings Plans, Savings Plans, and Spot Instances all represent pricing plans for shared tenancy EC2 instances.

https://aws.amazon.com/ec2/dedicated-hosts/

63
Q

_______ gives developers and systems administrators an easy way to create and manage a collection of related AWS resources, provisioning and updating them in an orderly and predictable fashion.

Amazon AppStream
AWS CloudFormation
Amazon Cognito
AWS Lambda

A

AWS CloudFormation

AWS CloudFormation gives developers and systems administrators an easy way to create and manage a collection of related AWS resources, provisioning and updating them in an orderly and predictable fashion.

http://aws.amazon.com/cloudformation/

64
Q

Which choice below accurately describes the ‘warm standby’ disaster recovery method?

Keeping data backed up to tape and sent offsite regularly, from which all data can be restored in the event of a disaster.
Storing critical systems as a template, from which resources can be scaled out in the event of a disaster.
A duplicate version of only your business-critical systems that is always running, in case you need to divert your workloads to them in the event of a disaster.
A complete duplicate of your entire system, to which all traffic can be directed in the event of a disaster.

A

A duplicate version of only your business-critical systems that is always running, in case you need to divert your workloads to them in the event of a disaster.

Warm standby is essentially ready to go with all key services running in the most minimal possible way, essentially a smaller version of the production environment. In the event of a disaster, the standby environment will be scaled up for production load quickly and easily. DNS records will be changed to route all traffic to the AWS environment.
https://d1.awsstatic.com/whitepapers/aws-disaster-recovery.pdf