Storage & Data Management Flashcards

1
Q

It can be used to manage your objects so that they are stored using the most cost effective S3 option throughout their lifecycle.

A

S3 Lifecycle Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should you use in order to protect against accidental or malicious deletions of your version-controlled S3 buckets?

A

MFA Delete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do you need a valid code from your MFA device?

A
  • to enable permanent deletion of an S3 object.

- to suspend or reactivate versioning on the S3 bucket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can be used to Encrypt data in transit to s3?

A

SSL/TLS

Encrypts data between your PC and S3. (https)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two different types of Encryption At-Rest for S3?

A

Server Side Encryption

Client Side Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three ways of Server Side Encryption for S3:

A

SSE-S3
SSE-KMS
SSE-C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can a client encrypt data before uploading it to s3?

A

Yes!

By using Client side encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Characteristics of SSE-S3:

A
  • AWS Takes care of everything, you don’t need to worry about it.
  • S3 Managed Keys
  • AES256
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Characteristics of SSE-KMS:

A
  • KMS managed Keys
  • Envelope key → The key that encrypts your data’s encryption key.
  • Audit trail → records the use of your encryption key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Characteristics of SSE-C:

A
  • AWS manages the encryption and decryption activities
  • Client manages the keys used.
  • Rotation and all.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • x-amz-server-side-encryption: AES256
  • x-amz-server-side-encryption: ams:kms

What do these parameters do?

A

When these parameters are included in the header of the PUT request, it simply tells S3 to encrypt the objects at the time of upload and using the specified encryption method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you enforce the use of SSE for S3?

A

By using a bucket policy which denies any S3 PUT request which doesn’t include the x-amz-server-side-encryption parameter in the request header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

S3

Durable, immediately available, frequently accessed

A

S3 Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

S3

Durable, immediately available, infrequently accessed

A

S3 IA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

S3

Durable, immediately available, infrequently accessed, data store in a single AZ

A

S3 One Zone IA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

S3

Data that is easily reproducible, such as thumbnails

A

S3 Reduced Redundancy Storage

17
Q

S3

Archived data, where you can wait 3 - 5 hours before accessing the data

A

S3 Glacier

18
Q

What do these represent?

  • Key (name)
  • Value (data)
  • Version ID
  • Metadata
  • Subresources - bucket specific configuration:
    • Bucket policies, ACL
    • CORS - used to enable different resources within AWS to access your S3 buckets
A

Core fundamentals of an S3 object

19
Q

Which types of root volumes can be used for EC2 instances?

A

EBS

Instance Store

20
Q

True or False

The only time instance store persists data is when the instance is rebooted intentionally or not.

A

True

21
Q

What’s the best practice to follow when changing EC2 volume type?

A
  1. Stop the instance
  2. Take a snapshot of the volume
  3. Use the snapshot to create a new volume
22
Q

KMS or CloudHSM?

  • Shared hardware, multi-tenant managed service
  • Suitable for applications for which multi-tenancy is not an issue
  • Free-tier eligible
  • Encrypt data store in AWS, including EBS volumes, S3, RDS, DynamoDB, etc.
  • Symmetric Keys only.
A

KMS

23
Q

KMS or CloudHSM?

  • Dedicated Hardware Security Module instance, hardware is not shared with other tenants, no Free-tier
  • It’s under your exclusive control within your own VPC
  • FIPS 140-2 Level 3 Compliance (US Government standard for HSMs)
    • Includes tamper-evident physical security mechanisms
  • Suitable for applications which have a contractual or regulatory requirement for dedicated hardware managing cryptographic keys
  • Symmetric or Asymmetric keys.
A

CloudHSM

24
Q

What is Block device mapping?

A

specifies which EBS volumes to attach to the instance at launch time

25
Q

True or False

AMIs are global, you can use it anywhere.

A

False

AMIs are regional, in order to use the AMI in another region, one must copy the AMI before using it.

26
Q

How does sharing AWS AMIs work?

A
  • The sharing account still has control and ownership of the AMI
  • The owner is still charged for storage of the AMI within their AWS account
  • It’s normally stored on S3
27
Q

How does copying AWS AMIs work?

A
  • The owner of the source AMI must grant you read permissions for the storage that backs the AMI (EBS snapshot or S3)
  • If you copy the AMI, you are going to be charged for storing that copy.
28
Q

What are two limitations for copying AMIs?

A
  1. You cannot directly copy an encrypted AMI shared by another account.
    - Copy the snapshot and re-encrypt using your own key
    - The sharing account must also share with you the underlying snapshot and encryption key used to create the AMI.
  2. You cannot directly copy an AMI with an associated billingProducts code (license fee)
    - Launch an EC2 instance using the shared AMI and create an AMI from that instance.
29
Q

What’s the difference between Snowball and Snowball Edge?

A
Snowball:
- Only used for transport 
- TB or PB of data
Snowball edge:
- 100TB device
- Add additional capability to run simple computing functions on the device
30
Q

__________ _____________ consists of an on-premises software appliance, and this connects with AWS cloud-based storage to give you a seamless and secure integration between your on-premises IT environment and AWS.

A

Storage Gateway

31
Q

Three types of Storage Gateway:

A

File Gateway
Volume Gateway
Tape Gateway

32
Q

Which type of Storage Gateway is this?

  • Store and retrieve objects in S3 Buckets
  • Access using NFS or SMB protocols
  • The software appliance, or gateway, is deployed into your on-premises environment as a virtual machine running on VMware ESXi or Microsoft Hyper-V hypervisor.
  • All the benefits of S3: bucket policies, S3 versioning, lifecycle management, replication, etc.
  • Low-cost alternative to on-premises storage.
A

File Gateway

33
Q

Which type of Storage Gateway is this?

  • Provides block storage to your on-premises apps with low-latency via the iSCSI
  • It uses S3 buckets for point-in-time snapshots of your EBS Volumes
  • Two types of Volume Gateways:
    1. Stored volumes
    2. Cached volumes
A

Volume Gateway

34
Q
  • Store all your data locally and only backup to AWS
  • Low-latency access to your entire dataset.
  • You will need your own storage infrastructure as all data is stored locally in your data center
  • It provides async backups in the form of EBS snapshots which are stored in S3.
A

Volume Gateway - Stored volumes

35
Q
  • Store your data in S3 and cache frequently accessed data locally (in your storage gateway)
  • You only need enough local storage capacity to store the frequently accessed data
  • Application still get low-latency access to frequently used data
A

Volume Gateway - Cached volumes

36
Q

Which type of Storage Gateway is this?

  • It’s a Virtual Tape Library which provides cost effective data archiving in the cloud using Glacier
  • It integrates with existing tape backup infrastructure - NetBackup, Backup Exec, Veeam, etc. which connect to the VTL using iSCSI
  • Data is stored on virtual tapes which are stored in Glacier and accessed using the VTL
A

Tape Gateway

37
Q
  • Interactive query service
  • Enables you to analyse and query data located in S3 using standard SQL
  • Serverless
  • Pay per query/ per TB scanned
  • No need for ETL processes
  • Works directly with data stored in S3
A

Athena

38
Q

Which AWS service should you use in order to:

  • Query log files stored in S3
    • ELB logs
    • S3 access logs
  • Generate business reports on data stored in S3
  • Analyse AWS costs and Usage reports
  • Run queries on click-stream data
A

Athena

39
Q

Characteristics of EFS:

A
  • Managed Network File System
  • Standard NFS Protocol
  • Used by Linux Systems
  • Multiple EC2 Instances can access
  • Great for applications that need to access shared files
  • Lifecycle Management
  • Automatically moves files that have not beed accessed recently to EFS IA storage class
  • Encryption
  • At rest
  • in transit