Set 1 Flashcards

1
Q

Metrics readily available in CloudWatch

A
CPU Utilization
Disk Reads Activity 
Disk Writes Activity 
Network packets IN
Network packets OUT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Custom CloudWatch Metrics that can be set up (Using CloudWatch Agent)

A
Memory utilization
Disk swap utilization
Disk space utilization
Page file utilization
Log collection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hot storage refers to

A

the storage that keeps frequently accessed data (hot data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Warm storage refers to

A

the storage that keeps less frequently accessed data (warm data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cold storage refers to

A

the storage that keeps rarely accessed data (cold data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A popular open-source parallel file system, which stores data across multiple network file servers

A

Amazon FSx For Lustre:

A high-performance file system for fast processing of workloads. Lustre is a popular open-source parallel file system which stores data across multiple network file servers to maximize performance and reduce bottlenecks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What kind of data (hot/warm/cold) is EBS - Provisioned IOPS SSD (io1) volumes designed to store?

A

hot data (data that are frequently accessed) used in I/O-intensive workloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Does Amazon Elastic File System (EFS) have high-performance ability that is required for machine learning workloads

A

No. Although EFS supports concurrent access to data, it does not have the high-performance ability that is required for machine learning workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A cryptocurrency trading platform is using an API built in AWS Lambda and API Gateway. Due to the recent news and rumors about the upcoming price surge of Bitcoin, Ethereum and other cryptocurrencies, it is expected that the trading platform would have a significant increase in site visitors and new users in the coming days ahead.

In this scenario, how can you protect the backend systems of the platform from traffic spikes?

A

Enable throttling limits and result caching in API Gateway.

Amazon API Gateway provides throttling at multiple levels including global and by service call. Throttling limits can be set for standard rates and bursts. For example, API owners can set a rate limit of 1,000 requests per second for a specific method in their REST APIs, and also configure Amazon API Gateway to handle a burst of 2,000 requests per second for a few seconds. Amazon API Gateway tracks the number of requests per second. Any request over the limit will receive a 429 HTTP response. The client SDKs generated by Amazon API Gateway retry calls automatically when met with this response.

You can add caching to API calls by provisioning an Amazon API Gateway cache and specifying its size in gigabytes. The cache is provisioned for a specific stage of your APIs. This improves performance and reduces the traffic sent to your back end. Cache settings allow you to control the way the cache key is built and the time-to-live (TTL) of the data stored for each method. Amazon API Gateway also exposes management APIs that help you invalidate the cache for each stage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the most suitable EBS type to use for I/O-intensive database workloads such as MongoDB, Oracle, MySQL?

A

Provisioned IOPS SSD (io1)

Provisioned IOPS SSD (io1) volumes are designed to meet the needs of I/O-intensive workloads, particularly database workloads, that are sensitive to storage performance and consistency. Unlike gp2, which uses a bucket and credit model to calculate performance, an io1 volume allows you to specify a consistent IOPS rate when you create the volume, and Amazon EBS delivers within 10 percent of the provisioned IOPS performance 99.9 percent of the time over a given year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A database that can scale globally and handle frequent schema changes

A

Amazon DynamoDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do you use to monitor how the different processes or threads on a DB instance use the CPU, including the percentage of the CPU bandwidth and total memory consumed by each process in Amazon RDS?

A

Enable Enhanced Monitoring in RDS.

Amazon RDS provides metrics in real time for the operating system (OS) that your DB instance runs on. You can view the metrics for your DB instance using the console, or consume the Enhanced Monitoring JSON output from CloudWatch Logs in a monitoring system of your choice.

Take note that there are certain differences between CloudWatch and Enhanced Monitoring Metrics. CloudWatch gathers metrics about CPU utilization from the hypervisor for a DB instance, and Enhanced Monitoring gathers its metrics from an agent on the instance. Although you can use CloudWatch to monitor the CPU Utilization of your database instance, it does not provide the percentage of the CPU bandwidth and total memory consumed by each database process in your RDS instance, unlike Enhanced Monitoring metrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Solutions Architect is working for a company which has multiple VPCs in various AWS regions. The Architect is assigned to set up a logging system which will track all of the changes made to their AWS resources in all regions, including the configurations made in IAM, CloudFront, AWS WAF, and Route 53. In order to pass the compliance requirements, the solution must ensure the security, integrity, and durability of the log data. It should also provide an event history of all API calls made in AWS Management Console and AWS CLI.

What solution best fit this scenario?

A

Set up a new CloudTrail trail in a new S3 bucket using the AWS CLI and also pass both the –is-multi-region-trail and –include-global-service-events parameters then encrypt log files using KMS encryption. Apply Multi Factor Authentication (MFA) Delete on the S3 bucket and ensure that only authorized users can access the logs by configuring the bucket policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A business has recently migrated its applications to AWS. The audit team must be able to assess whether the services the company is using meet common security and regulatory standards. A solutions architect needs to provide the team with a report of all compliance-related documents for their account.

Which action should a solutions architect consider?

A

Use AWS Artifact to view the security reports as well as other AWS compliance-related information.

AWS Artifact is your go-to, central resource for compliance-related information that matters to you. It provides on-demand access to AWS’ security and compliance reports and select online agreements. Reports available in AWS Artifact include our Service Organization Control (SOC) reports, Payment Card Industry (PCI) reports, and certifications from accreditation bodies across geographies and compliance verticals that validate the implementation and operating effectiveness of AWS security controls. Agreements available in AWS Artifact include the Business Associate Addendum (BAA) and the Nondisclosure Agreement (NDA).

All AWS Accounts have access to AWS Artifact. Root users and IAM users with admin permissions can download all audit artifacts available to their accounts by agreeing to the associated terms and conditions. You will need to grant IAM users with non-admin permissions access to AWS Artifact using IAM permissions. This allows you to grant a user access to AWS Artifact while restricting access to other services and resources within your AWS Account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Amazon Inspector is for _________________.

A

Amazon Inspector is simply a security tool for detecting vulnerabilities in AWS workloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When do you use signed URLs?

A
  • When you want to use an RTMP (Real Time Messaging Protocol) distribution. Signed cookies aren’t supported for RTMP distributions.
  • When you want to restrict access to individual files, for example, an installation download for your application.
  • When your users are using a client (for example, a custom HTTP client) that doesn’t support cookies.
17
Q

When do you use signed cookies?Field-Level Encryption

A
  • When you want to provide access to multiple restricted files, for example, all of the files for a video in HLS format or all of the files in the subscribers’ area of a website.
  • When you don’t want to change your current URLs.
18
Q

What is Field-Level Encryption?

A

Field-Level Encryption only allows you to securely upload user-submitted sensitive information to your web servers. It does not provide access to download multiple private files.

19
Q

A company hosted an e-commerce website on an Auto Scaling group of EC2 instances behind an Application Load Balancer. The Solutions Architect noticed that the website is receiving a large number of illegitimate external requests from multiple systems with IP addresses that constantly change. To resolve the performance issues, the Solutions Architect must implement a solution that would block the illegitimate requests with minimal impact on legitimate traffic.

What solution fulfills this requirement?

A

Answer: Create a rate-based rule in AWS WAF and associate the web ACL to an Application Load Balancer.

Explanation: AWS WAF is tightly integrated with Amazon CloudFront, the Application Load Balancer (ALB), Amazon API Gateway, and AWS AppSync – services that AWS customers commonly use to deliver content for their websites and applications. When you use AWS WAF on Amazon CloudFront, your rules run in all AWS Edge Locations, located around the world close to your end-users. This means security doesn’t come at the expense of performance. Blocked requests are stopped before they reach your web servers. When you use AWS WAF on regional services, such as Application Load Balancer, Amazon API Gateway, and AWS AppSync, your rules run in the region and can be used to protect Internet-facing resources as well as internal resources.

A rate-based rule tracks the rate of requests for each originating IP address and triggers the rule action on IPs with rates that go over a limit. You set the limit as the number of requests per 5-minute time span. You can use this type of rule to put a temporary block on requests from an IP address that’s sending excessive requests.

Based on the given scenario, the requirement is to limit the number of requests from the illegitimate requests without affecting the genuine requests. To accomplish this requirement, you can use AWS WAF web ACL. There are two types of rules in creating your own web ACL rule: regular and rate-based rules. You need to select the latter to add a rate limit to your web ACL. After creating the web ACL, you can associate it with ALB. When the rule action triggers, AWS WAF applies the action to additional requests from the IP address until the request rate falls below the limit.

20
Q

What are Amazon S3 access points?

A

Amazon S3 access points simplify data access for any AWS service or customer application that stores data in S3. Access points are named network endpoints that are attached to buckets that you can use to perform S3 object operations, such as GetObject and PutObject.

Each access point has distinct permissions and network controls that S3 applies for any request that is made through that access point. Each access point enforces a customized access point policy that works in conjunction with the bucket policy that is attached to the underlying bucket. You can configure any access point to accept requests only from a virtual private cloud (VPC) to restrict Amazon S3 data access to a private network. You can also configure custom block public access settings for each access point.

21
Q

What does S3 Object Lock prevent?

A

Object Lock can help prevent objects from being deleted or overwritten for a fixed amount of time or indefinitely.