Round 1 Flashcards
- Introduction - Course Fundamentals and AWS Accounts - Cloud Computing Fundamentals
What is the Account Root User?
The account root user has full control over an AWS Account and any resources created within it. This user can not be restricted.
What is IAM and what is it’s purpose?
IAM is an IDP (Identity Provider).
Used to:
1 - Manage Identities - Users, Groups, and Roles which can have policies assigned to them in order to control their permissions.
2- Authenticate - Prove you are who you claim to be and become an “authenticated identity)
3 - Authorize - Allow or deny access to resources
IAM identities start with no permissions on an AWS Account, but can be granted permissions (almost) up to those held by the Account Root User.
List 4 MFA Factors
Multi-factor Authentication can use the following factors among others:
KIPoL
- Knowledge - Something you know
- Inherent - Something you are… fingerprints, face, voice, iris, etc.
- Possession - Something you have (bank card, MFA device/app)
- Location - A location (physical), which network (corp or wifi)
What are the general steps to creating a new AWS account?
1 - Use a unique email
2 - Add MFA to the account root user
3 - Billing
a - Set billing preferences so that you receive emails and alerts
b - Add a billing ALARM to the AWS Account.
c - Enable billing access for IAM users
4 - Set account contacts
What is PoLP?
The principle of least privilege (PoLP) refers to an information security concept in which a user (or identity) is given the minimum levels of access – or permissions – needed to perform his/her job functions.
Is IAM shared across AWS accounts?
Every AWS account has its own IAM database. It is a “globally resilient service” so any data is always secure across all AWS regions.
What is an IAM policy?
You manage access in AWS by creating policies and attaching them to IAM identities (users, groups of users, or roles) or AWS resources. A policy is an object in AWS that, when associated with an identity or resource, defines their permissions.
https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
Give an example aws command to configure a new profile?
aws configure –profile training-general-iamadmin
Give an example aws command to list files in s3 bucket using a profile.
aws s3 ls –profile training-general-iamadmin
What is required for “Cloud Computing”
NIST (National Institute of Standards and Technology) defines it as follows:
1 - On-Demand Self-Service - Provision and Terminate using a UI/CLI without human interaction.
2 - Broad Network Access - Access services over any network, on any devices, using standard protocols and methods.
3 - Resource Pooling - Economies of scale, cheaper service.
4 - Rapid Elasticity - Scale UP (OUT) and DOWN (IN) automatically in response to system load.
5 - Measured Service - Usage is measured. Pay for what you consume.
https://learn.cantrill.io/courses/730712/lectures/14040936
OBRRM
When speaking about Cloud Computing, what is “On-Demand Self-Service”?
“…you can provision capabilities as needed without requiring human interaction from the cloud provider”
When speaking about Cloud Computing, what is “Broad Network Access”?
“Capabilities are available over the network and accessed through standard mechanisms…”
When speaking about Cloud Computing, what is “Resource Pooling”?
a - There is a sense of location independence… no control or knowledge over exact location of the resources
b - …resources are pooled to serve multiple customers using a multi-tenant model
When speaking about Cloud Computing, what is “Rapid Elasticity”?
a - Capabilities can be elastically provisioned and released to scale rapidly outward and inward with demand.
b - To consumer, the capabilities available for provisioning often appear to be unlimited.
This is one of the most important aspects of Cloud Computing
When speaking about Cloud Computing, what is “Measured Service”?
“Resource usage can be monitored, controlled, reported, and billed”
What is “Public Cloud”?
Using only ONE “Cloud” platform. This platform must be available to the general public. (AWS, Azure, Google Cloud)
What is “Private Cloud”?
Using just one real “Cloud” platform which is dedicated to you. It must be on-premises. (AWS Outposts, Azure Stack, Google Anthos) It still needs to meet the 5 essential characteristics of Cloud Computing to be considered “Private Cloud”.
What is Multi-Cloud?
Using MORE THAN ONE “Public Cloud” vendor (AWS, Azure, Google)
What is Hybrid Cloud?
Using both Public Cloud and Private Cloud offerings from ONE specific vendor.
What is XaaS
X as a Sevice
What makes up an Infrastructure Stack (or Application Stack)?
Application Data Runtime Container OS Virtualization Servers Infrastructure Facilities
9 parts
ADRCOVSIF
What is the difference between On-Premise, DC Hosted, IaaS, PaaS, SaaS, etc?
On-Premise
DC (Data Center) Hosted
IaaS (Infrastructure as a Service)
PaaS (Platform as a Service) - Heroku - This model is used mostly by Developers
SaaS - Software as a Service - Netflix, Dropbox, Gmail, etc.
AWS has IaaS, Paas, SaaS, etc.
https://learn.cantrill.io/courses/730712/lectures/14040947
What does YAML stand for?
“YAML Ain’t Markup Language”
What does JSON stand for?
JavaScript Object Notation
What are the layers of the OSI 7 Layer Networking Model?
Layer 1 - Physical Layer 2 - Data Link Layer 3 - Network Layer 4 - Transport Layer 5 - Session Layer 6 - Presentation Layer 7 - Application
A layer ‘x’ device contains functionality for that layer and below. For example, a layer 3 device contains functionality from layers 1, 2, and 3.
What are the physical mediums used in networking?
Copper (electrical), Fibre (light), and WiFi (Radio Frequency)
Describe Layer 1 of a Network as defined by the OSI 7 Layer Networking Model.
Physical Layer
Defines the transmission and reception of RAW BIT STREAMS between a device and a SHARED physical medium. It defines things like voltage levels, timing, rates, distances, modulation, and connectors.
https://learn.cantrill.io/courses/730712/lectures/25094904
What are the issues with a solely Layer 1 network? A hub?
- Anything received on any port, is transmitted on every other port. This includes error and collisions.
- No device addressing, all data is processed by all devices.
- If multiple devices transmit at once - a collision occurs
- L1 has no media (physical medium) access control and no collision detection