test Flashcards
Scaling an EC2 instance from r4.large to r4.4xlarge is called …………………
a. Horizontal Scalability
b. Vertical Scalability
b. Vertical Scalability
Running an application on an Auto Scaling Group that scales the number of EC2 instances in and out is called …………………
a. Horizontal Scalability
b. Vertical Scalability
a. Horizontal Scalability
Elastic Load Balancers provide a …………………..
a. static IPv4 we can use in our application
b. static DNS name we can use in our application
c. static IPv6 we can use in our application
b. static DNS name we can use in our application
Only Network Load Balancer provides both static DNS name and static IP. While, Application Load Balancer provides a static DNS name but it does NOT provide a static IP. The reason being that AWS wants your Elastic Load Balancer to be accessible using a static endpoint, even if the underlying infrastructure that AWS manages changes.
You are running a website on 10 EC2 instances fronted by an Elastic Load Balancer. Your users are complaining about the fact that the website always asks them to re-authenticate when they are moving between website pages. You are puzzled because it’s working just fine on your machine and in the Dev environment with 1 EC2 instance. What could be the reason?
a. Your website must have an issue when hosted on multiple EC2 instances.
b. The EC2 instances log out users as they cant see their IP addresses, instead, they receive ELB IP addresses.
c. The Elastic Load Balancer does not have Sticky Sessions enabled
c. The Elastic Load Balancer does not have Sticky Sessions enabled
ELB Sticky Session feature ensures traffic for the same client is always redirected to the same target (e.g., EC2 instance). This helps that the client does not lose his session data.
You are using an Application Load Balancer to distribute traffic to your website hosted on EC2 instances. It turns out that your website only sees traffic coming from private IPv4 addresses which are in fact your Application Load Balancer’s IP addresses. What should you do to get the IP address of clients connected to your website?
a. Modify your website’s frontend so that users send their IP in every request.
b. Modify your website’s backend to get the client IP address from the X-Forwarded-For header.
c. Modify your website’s backend to get the client IP address from the X-Forwarded-Port heather.
d. Modify your website’s backend to get the client IP address from the X-Forwarded-Proto header
b. Modify your website’s backend to get the client IP address from the X-Forwarded-For header.
When using an Application Load Balancer to distribute traffic to your EC2 instances, the IP address you’ll receive requests from will be the ALB’s private IP addresses. To get the client’s IP address, ALB adds an additional header called “X-Forwarded-For” contains the client’s IP address.
You hosted an application on a set of EC2 instances fronted by an Elastic Load Balancer. A week later, users begin complaining that sometimes the application just doesn’t work. You investigate the issue and found that some EC2 instances crash from time to time. What should you do to protect users from connecting to the EC2 instances that are crashing?
a. Enable ELB Health Checks
b. Enable ELB Stickiness
c. Enable SSL Termination
d. Enable Cross-Zone Load Balancing
a. Enable ELB Health Checks
When you enable ELB Health Checks, your ELB won’t send traffic to unhealthy (crashed) EC2 instances.
You are working as a Solutions Architect for a company and you are required to design an architecture for a high-performance, low-latency application that will receive millions of requests per second. Which type of Elastic Load Balancer should you choose?
a. Application Load Balancer
b. Classic Load Balancer
c. Network Load Balancer
c. Network Load Balancer
Network Load Balancer provides the highest performance and lowest latency if your application needs it.
Application Load Balancers support the following protocols, EXCEPT:
a. HTTP
b. HTTPS
c. TCP
d. Websocket
c. TCP
Application Load Balancers support HTTP, HTTPS and WebSocket
Application Load Balancers can route traffic to different Target Groups based on the following, EXCEPT:
a. Client’s Location(Geography)
b. Hostname
c. Request URL Path
d. Source IP Address
a. Client’s Location(Geography)
ALBs can route traffic to different Target Groups based on URL Path, Hostname, HTTP Headers, and Query Strings.
Registered targets in a Target Groups for an Application Load Balancer can be one of the following, EXCEPT:
a. EC2 Instances
b. Network Load Balancer
c. Private IP Addresses
d. Lambda Functions
b. Network Load Balancer
For compliance purposes, you would like to expose a fixed static IP address to your end-users so that they can write firewall rules that will be stable and approved by regulators. What type of Elastic Load Balancer would you choose?
a. Application Load Balancer with an Elastic IP attached to it.
b. Network Load Balancer
c. Classic Load Balancer
b. Network Load Balancer
Network Load Balancer has one static IP address per AZ and you can attach an Elastic IP address to it. Application Load Balancers and Classic Load Balancers have a static DNS name.
You want to create a custom application-based cookie in your Application Load Balancer. Which of the following you can use as a cookie name?
a. AWSALBAPP
b. APPUSERC
c. AWSALBTG
d. AWSALB
b. APPUSERC
The following cookie names are reserved by the ELB (AWSALB, AWSALBAPP, AWSALBTG).
You have a Network Load Balancer that distributes traffic across a set of EC2 instances in us-east-1. You have 2 EC2 instances in us-east-1b AZ and 5 EC2 instances in us-east-1e AZ. You have noticed that the CPU utilization is higher in the EC2 instances in us-east-1b AZ. After more investigation, you noticed that the traffic is equally distributed across the two AZs. How would you solve this problem?
a. Enable Cross-Zone Load Balancing
b. Enable Sticky Sessions
c. Enable ELB Health Checks
d. Enable SSL Termination
a. Enable Cross-Zone Load Balancing
When Cross-Zone Load Balancing is enabled, ELB distributes traffic evenly across all registered EC2 instances in all AZs.
Which feature in both Application Load Balancers and Network Load Balancers allows you to load multiple SSL certificates on one listener?
a. TLS Termination
b. Server Name Indication(SNI)
c. SSL Security Policies
d. Host Headers
b. Server Name Indication(SNI)
You have an Application Load Balancer that is configured to redirect traffic to 3 Target Groups based on the following hostnames: users.example.com, api.external.example.com, and checkout.example.com. You would like to configure HTTPS for each of these hostnames. How do you configure the ALB to make this work?
a. Use an HTTP to HTTPS redirect rule
b. Use a security group SSL certificate
c. Use Server Name Indication(SNI)
c. Use Server Name Indication(SNI)
Server Name Indication (SNI) allows you to expose multiple HTTPS applications each with its own SSL certificate on the same listener. Read more here: https://aws.amazon.com/blogs/aws/new-application-load-balancer-sni/
You have an application hosted on a set of EC2 instances managed by an Auto Scaling Group that you configured both desired and maximum capacity to 3. Also, you have created a CloudWatch Alarm that is configured to scale out your ASG when CPU Utilization reaches 60%. Your application suddenly received huge traffic and is now running at 80% CPU Utilization. What will happen?
a. Nothing
b. The desired capacity will go up to 4 and the maximum capacity will stay at 3
c. The desired capacity will go up to 4 and the maximum capacity will stay at 4
a. Nothing
The Auto Scaling Group can’t go over the maximum capacity (you configured) during scale-out events.
You have an Auto Scaling Group fronted by an Application Load Balancer. You have configured the ASG to use ALB Health Checks, then one EC2 instance has just been reported unhealthy. What will happen to the EC2 instance?
a. The ASG will keep the instance running and re-start the application
b. The ASG will detach the EC2 instance and leave it running
c. The ASG will terminate the EC2 instance
c. The ASG will terminate the EC2 instance
You can configure the Auto Scaling Group to determine the EC2 instances’ health based on Application Load Balancer Health Checks instead of EC2 Status Checks (default). When an EC2 instance fails the ALB Health Checks, it is marked unhealthy and will be terminated while the ASG launches a new EC2 instance.
Your boss asked you to scale your Auto Scaling Group based on the number of requests per minute your application makes to your database. What should you do?
a. Create a CloudWatch custom metric then create a CloudWatch Alarm on this metric to scale your ASG
b. You Politely tell him its impossible
c. Enable Detailed Monitoring then create a CloudWatch Alarm to scale your ASG
a. Create a CloudWatch custom metric then create a CloudWatch Alarm on this metric to scale your ASG
There’s no CloudWatch Metric for “requests per minute” for backend-to-database connections. You need to create a CloudWatch Custom Metric, then create a CloudWatch Alarm.
An application is deployed with an Application Load Balancer and an Auto Scaling Group. Currently, you manually scale the ASG and you would like to define a Scaling Policy that will ensure the average number of connections to your EC2 instances is around 1000. Which Scaling Policy should you use?
a. Simple Scaling Policy
b. Step Scaling Policy
c. Target Tracking Policy
d. Schedule Scaling Policy
c. Target Tracking Policy
You have an ASG and a Network Load Balancer. The application on your ASG supports the HTTP protocol and is integrated with the Load Balancer health checks. You are currently using the TCP health checks. You would like to migrate to using HTTP health checks, what do you do?
a. Migrate to an Application Balancer
b. Migrate the heath check to HTTP
b. b. Migrate the heath check to HTTP
You have a website hosted in EC2 instances in an Auto Scaling Group fronted by an Application Load Balancer. Currently, the website is served over HTTP, and you have been tasked to configure it to use HTTPS. You have created a certificate in ACM and attached it to the Application Load Balancer. What you can do to force users to access the website using HTTPS instead of HTTP?
a. Send an email to all customers to use HTTPS instead of HTTP
b. Configure the Application Load Balancer to redirect HTTP to HTTPS
c. Configure the DNS record to redirect HTTP to HTTPS
b. Configure the Application Load Balancer to redirect HTTP to HTTPS
What is a proper definition of an IAM Role?
a. IAM Users in multiple User Groups
b. An IAM entity that defines a password policy for IAM Users
c. An IAM entity that defines a set of permissions for making requests to AWS services, and will be used by an AWS service
d. Permissions assigned to IAM Users to perform actions
c. An IAM entity that defines a set of permissions for making requests to AWS services, and will be used by an AWS service
Some AWS services need to perform actions on your behalf. To do so, you assign permissions to AWS services with IAM Roles.
Which of the following is an IAM Security Tool?
a. IAM Credentials Report
b. IAM Root Account Manager
c. IAM Services Report
d. IAM Security Advisor
a. IAM Credentials Report
IAM Credentials report lists all your AWS Account’s IAM Users and the status of their various credentials.
Which answer is INCORRECT regarding IAM Users?
a. IAM Users can belong to multiple User Groups
b. IAM Users don’t have to belong to a User Group
c. IAM Policies can be attached directly to IAM Users
d. IAM Users access AWS services using root account credentials
d. IAM Users access AWS services using root account credentials
IAM Users access AWS services using their own credentials (username & password or Access Keys).
Which of the following is an IAM best practice?
a. Create several IAM Users for one physical person
b. Don’t use the root user account
c. Share your AWS account credentials with your colleague, so she can perform a task for you
d. Do not enable MFA for easier access
b. Don’t use the root user account
Use the root account only to create your first IAM User and a few account/service management tasks. For everyday tasks, use an IAM User.
What are IAM Policies?
a. A set of policies that defines how AWS accounts interact with each other
b. JSON documents that define a set of permissions for making requests to AWS services and can be used by IAM Users, User Groups and IAM Roles
c. A set of policies that define a password for IAM Users
d. A set of policies defined by AWS that show how customers interact with AWS
b. JSON documents that define a set of permissions for making requests to AWS services and can be used by IAM Users, User Groups and IAM Roles
Which principle should you apply regarding IAM Permissions?
a. Grant most privilege
b. Grant more permissions if your employee asks you to
c. Grant least privilege
d. Restrict root account permissions
c. Grant least privilege
That’s right! Don’t give more permissions than the user needs.
What should you do to increase your root account security?
a. Remove permissions from the root account
b. Only access AWS services through AWS Command Line Interface(CLI)
c. Don’t create IAM Users, only access your AWS account using the root account
d. Enable Multi-Factor Authentication (MFA)
d. Enable Multi-Factor Authentication (MFA)
When you enable MFA, this adds another layer of security. Even if your password is stolen, lost, or hacked your account is not compromised.
IAM User Groups can contain IAM Users and other User Groups.
a. True
b. False
b. False
IAM User Groups can contain only IAM Users.
An IAM policy consists of one or more statements. A statement in an IAM Policy consists of the following, EXCEPT:
a. Effect
b. Principal
c. Version
d. Action
e. Resource
c. Version
A statement in an IAM Policy consists of Sid, Effect, Principal, Action, Resource, and Condition. Version is part of the IAM Policy itself, not the statement.
Which EC2 Purchasing Option can provide you the biggest discount, but it is not suitable for critical jobs or databases?
a. Convertible Reserved Instances
b. Dedicated Hosts
c. Spot Instances
c. Spot Instances
Spot Instances are good for short workloads and this is the cheapest EC2 Purchasing Option. But, they are less reliable because you can lose your EC2 instance.
What should you use to control traffic in and out of EC2 instances?
a. Network Access Control List (NACL)
b. Security Groups
c. IAM Policies
b. Security Groups
Security Groups operate at the EC2 instance level and can control traffic.
How long can you reserve an EC2 Reserved Instance?
a. 1 or 3 years
b. 2 or 4 years
c. 6 months or 1 year
d. Anytime between 1 and 3 years
a. 1 or 3 years
EC2 Reserved Instances can be reserved for 1 or 3 years only.
You would like to deploy a High-Performance Computing (HPC) application on EC2 instances. Which EC2 instance type should you choose?
a. Storage Optimized
b. Compute Optimized
c. Memory Optimized
d. General Purpose
b. Compute Optimized
Compute Optimized EC2 instances are great for compute-intensive workloads requiring high-performance processors (e.g., batch processing, media transcoding, high-performance computing, scientific modeling & machine learning, and dedicated gaming servers).
Which EC2 Purchasing Option should you use for an application you plan to run on a server continuously for 1 year?
a. Reserved Instances
b. Spot Instances
c. On-Demand Instances
a. Reserved Instances
Reserved Instances are good for long workloads. You can reserve EC2 instances for 1 or 3 years.
You are preparing to launch an application that will be hosted on a set of EC2 instances. This application needs some software installation and some OS packages need to be updated during the first launch. What is the best way to achieve this when you launch the EC2 instances?
a. Connect to each EC2 instance using SSH, then install the required software and update your OS packages manually
b. Write a bash script that installs the required software and updates to your OS, then contact AWS Support and provide them with the script. They will run it on your EC2 instances at launch
c. Write a bash script that installs the required software and updates to your OS, then use this script in EC2 User Data when you launch your EC2 instances
c. Write a bash script that installs the required software and updates to your OS, then use this script in EC2 User Data when you launch your EC2 instances
EC2 User Data is used to bootstrap your EC2 instances using a bash script. This script can contain commands such as installing software/packages, download files from the Internet, or anything you want.
Which EC2 Instance Type should you choose for a critical application that uses an in-memory database?
a. Compute Optimized
b. Storage Optimized
c. Memory Optimized
d. General Purpose
c. Memory Optimized
Memory Optimized EC2 instances are great for workloads requiring large data sets in memory.
You have an e-commerce application with an OLTP database hosted on-premises. This application has popularity which results in its database has thousands of requests per second. You want to migrate the database to an EC2 instance. Which EC2 Instance Type should you choose to handle this high-frequency OLTP database?
a. Compute Optimized
b. Storage Optimized
c. Memory Optimized
d. General Purpose
b. Storage Optimized
Storage Optimized EC2 instances are great for workloads requiring high, sequential read/write access to large data sets on local storage.
Security Groups can be attached to only one EC2 instance.
a. True
b. False
b. False
Security Groups can be attached to multiple EC2 instances within the same AWS Region/VPC.
You’re planning to migrate on-premises applications to AWS. Your company has strict compliance requirements that require your applications to run on dedicated servers. You also need to use your own server-bound software license to reduce costs. Which EC2 Purchasing Option is suitable for you?
a. Convertible Reserved Instances
b. Dedicated Hosts
c. Spot Instances
b. Dedicated Hosts
Dedicated Hosts are good for companies with strong compliance needs or for software that have complicated licensing models. This is the most expensive EC2 Purchasing Option available.
You would like to deploy a database technology on an EC2 instance and the vendor license bills you based on the physical cores and underlying network socket visibility. Which EC2 Purchasing Option allows you to get visibility into them?
a. Spot Instances
b. On-Demand
c. Dedicated Hosts
d. Reserved Instances
c. Dedicated Hosts
Spot Fleet is a set of Spot Instances and optionally ……………
a. Reserved Instances
b. On-Demand Instances
c. Dedicated Hosts
d. Dedicated Instances
b. On-Demand Instances
Spot Fleet is a set of Spot Instances and optionally On-demand Instances. It allows you to automatically request Spot Instances with the lowest price.
You have launched an EC2 instance that will host a NodeJS application. After installing all the required software and configured your application, you noted down the EC2 instance public IPv4 so you can access it. Then, you stopped and then started your EC2 instance to complete the application configuration. After restart, you can’t access the EC2 instance, and you found that the EC2 instance public IPv4 has been changed. What should you do to assign a fixed public IPv4 to your EC2 instance?
a. Allocate an Elastic IP and assign it to your EC2 instance
b. From inside you EC2 instance OS, change network configuration from DHCP to static and assign it a public IPc4
c. Contact AWS Support and request a fixed IPv4 to your EC2 instance
d. This can’t be done, you can only assign a fixed private IPv4 to your EC2 instance
a. Allocate an Elastic IP and assign it to your EC2 instance
Elastic IP is a public IPv4 that you own as long as you want and you can attach it to one EC2 instance at a time.
You have an application performing big data analysis hosted on a fleet of EC2 instances. You want to ensure your EC2 instances have the highest networking performance while communicating with each other. Which EC2 Placement Group should you choose?
a. Spread Placement Group
b. Cluster Placement Group
c. Partition Placement Group
b. Cluster Placement Group
Cluster Placement Groups place your EC2 instances next to each other which gives you high-performance computing and networking.
You have a critical application hosted on a fleet of EC2 instances in which you want to achieve maximum availability when there’s an AZ failure. Which EC2 Placement Group should you choose?
a. Cluster Placement Group
b. Partition Placement Group
c. Spread Placement Group
c. Spread Placement Group
You have a critical application hosted on a fleet of EC2 instances in which you want to achieve maximum availability when there’s an AZ failure. Which EC2 Placement Group should you choose?
Elastic Network Interface (ENI) can be attached to EC2 instances in another AZ.
a. True
b. False
b. False
Elastic Network Interfaces (ENIs) are bounded to a specific AZ. You can not attach an ENI to an EC2 instance in a different AZ.
The following are true regarding EC2 Hibernate, EXCEPT:
a. EC2 instance Root Volume must be an Instance Store Volume
b. Supports On-Demand and Reserve Instances
c. EC2 Instance RAM must be less than 150GB
d. EC2 Instance Root Volume type must be an EBS volume
a. EC2 instance Root Volume must be an Instance Store Volume
To enable EC2 Hibernate, the EC2 Instance Root Volume type must be an EBS volume and must be encrypted to ensure the protection of sensitive content.
You have just terminated an EC2 instance in us-east-1a, and its attached EBS volume is now available. Your teammate tries to attach it to an EC2 instance in us-east-1b but he can’t. What is a possible cause for this?
a. He’s missing IAM permissions
b. EBS volumes are locked to an AWS Region
c. EBS volumes are locked to an Availability Zone
c. EBS volumes are locked to an Availability Zone
EBS Volumes are created for a specific AZ. It is possible to migrate them between different AZs using EBS Snapshots.
You have launched an EC2 instance with two EBS volumes, Root volume type and the other EBS volume type to store the data. A month later you are planning to terminate the EC2 instance. What’s the default behavior that will happen to each EBS volume?
a. Both the root volume type and the EBS volume type will be deleted
b. The Root volume type will be deleted and the EBS volume type will not be deleted
c. The Root volume type will not be deleted and the EBS volume type will be deleted
d. Both the root volume type and the EBS volume type will not be deleted
b. The Root volume type will be deleted and the EBS volume type will not be deleted
By default, the Root volume type will be deleted as its “Delete On Termination” attribute checked by default. Any other EBS volume types will not be deleted as its “Delete On Termination” attribute disabled by default.
You can use an AMI in N.Virginia Region us-east-1 to launch an EC2 instance in any AWS Region.
a. True
b. False
b. False
AMIs are built for a specific AWS Region, they’re unique for each AWS Region. You can’t launch an EC2 instance using an AMI in another AWS Region, but you can copy the AMI to the target AWS Region and then use it to create your EC2 instances.
Which of the following EBS volume types can be used as boot volumes when you create EC2 instances?
a. gp2, gp3, st1, sc1
b. gp2, gp3, io1, io2
c. io1, io2, st1, sc1
b. gp2, gp3, io1, io2
When creating EC2 instances, you can only use the following EBS volume types as boot volumes: gp2, gp3, io1, io2, and Magnetic (Standard).
What is EBS Multi-Attach?
a. Attach the same EBS volume to multiple EC2 instances in multiple AZs
b. Attach multiple EBS volumes in the same AZ to the same EC2 instance
c. Attach the same EBS volume to multiple EC2 instances in the same AZ
d. Attach multiple EBS volume in multiple AZs to the same EC2 instance
c. Attach the same EBS volume to multiple EC2 instances in the same AZ
Using EBS Multi-Attach, you can attach the same EBS volume to multiple EC2 instances in the same AZ. Each EC2 instance has full read/write permissions.
You would like to encrypt an unencrypted EBS volume attached to your EC2 instance. What should you do?
a. Create an EBS snapshot of your EBS volume. Copy the snapshot and tick the option to encrypt the copied snapshot. Then, use the encrypted snapshot to create a new EBS volume
b. Select your EBS volume, choose Edit Attributes, then tick the Encrypt using KMS option
c. Create a new encrypted EBS volume, then copy data from your unencrypted EBS volume to the new EBS volume
d. Submit a request to AWS Support to encreypt your EBS volume
a. Create an EBS snapshot of your EBS volume. Copy the snapshot and tick the option to encrypt the copied snapshot. Then, use the encrypted snapshot to create a new EBS volume
You have a fleet of EC2 instances distributes across AZs that process a large data set. What do you recommend to make the same data to be accessible as an NFS drive to all of your EC2 instances?
a. Use EBS
b. Use EFS
c. Use Instance Store
b. Use EFS
EFS is a network file system (NFS) that allows you to mount the same file system on EC2 instances that are in different AZs.
You would like to have a high-performance local cache for your application hosted on an EC2 instance. You don’t mind losing the cache upon the termination of your EC2 instance. Which storage mechanism do you recommend as a Solutions Architect?
a. EBS
b. EFS
c. Instance Store
c. Instance Store
EC2 Instance Store provides the best disk I/O performance.
You are running a high-performance database that requires an IOPS of 310,000 for its underlying storage. What do you recommend?
a. Use an EBS gp2 drive
b. Use an EBS io1 drive
c. Use an EC2 Instance Store
d. Use an EBS io2 Block Express drive
c. Use an EC2 Instance Store
You can run a database on an EC2 instance that uses an Instance Store, but you’ll have a problem that the data will be lost if the EC2 instance is stopped (it can be restarted without problems). One solution is that you can set up a replication mechanism on another EC2 instance with an Instance Store to have a standby copy. Another solution is to set up backup mechanisms for your data. It’s all up to you how you want to set up your architecture to validate your requirements. In this use case, it’s around IOPS, so we have to choose an EC2 Instance Store.
Amazon RDS supports the following databases, EXCEPT:
a. MongoDB
b. MySQL
c. MariaDB
d. Microsoft SQL Server
a. MongoDB
RDS supports MySQL, PostgreSQL, MariaDB, Oracle, MS SQL Server, and Amazon Aurora.
You’re planning for a new solution that requires a MySQL database that must be available even in case of a disaster in one of the Availability Zones. What should you use?
a. Create Read Replicas
b. Enable Encryption
c. Enable Multi-AZ
c. Enable Multi-AZ
Multi-AZ helps when you plan a disaster recovery for an entire AZ going down. If you plan against an entire AWS Region going down, you should use backups and replication across AWS Regions.
We have an RDS database that struggles to keep up with the demand of requests from our website. Our million users mostly read news, and we don’t post news very often. Which solution is NOT adapted to this problem?
a. An ElastiCache Cluster
b. RDS Multi-AZ
c. RDS Read Replicas
b. RDS Multi-AZ
Be very careful with the way you read questions at the exam. Here, the question is asking which solution is NOT adapted to this problem. ElastiCache and RDS Read Replicas do indeed help with scaling reads
You have set up read replicas on your RDS database, but users are complaining that upon updating their social media posts, they do not see their updated posts right away. What is a possible cause for this?
a. There must be a bug in your application
b. Read Replicas have Asynchronous Replication, therefore it’s likely your users will only read Eventual Consistency
c. You should have setup Multi-AZ instead
b. Read Replicas have Asynchronous Replication, therefore it’s likely your users will only read Eventual Consistency
Which RDS (NOT Aurora) feature when used does not require you to change the SQL connection string?
a. Multi-AZ
b. Read Replicas
a. Multi-AZ
Multi-AZ keeps the same connection string regardless of which database is up.
Your application running on a fleet of EC2 instances managed by an Auto Scaling Group behind an Application Load Balancer. Users have to constantly log back in and you don’t want to enable Sticky Sessions on your ALB as you fear it will overload some EC2 instances. What should you do?
a. Use your own custom Load Balancer on EC2 instances instead of using ALB
b. Store sessions data in RDS
c. Store session data in ElastiCache
d. Store session data in a shared EBS volume
c. Store session data in ElastiCache
Storing Session Data in ElastiCache is a common pattern to ensuring different EC2 instances can retrieve your user’s state if needed.
An analytics application is currently performing its queries against your main production RDS database. These queries run at any time of the day and slow down the RDS database which impacts your users’ experience. What should you do to improve the users’ experience?
a. Setup a Read Replica
b. Setup Multi-AZ
c. Run the analytics queries at night
a. Setup a Read Replica
Read Replicas will help as your analytics application can now perform queries against it, and these queries won’t impact the main production RDS database.
You would like to ensure you have a replica of your database available in another AWS Region if a disaster happens to your main AWS Region. Which database do you recommend to implement this easily?
a. RDS Read Replicas
b. RDS Multi-AZ
c. Aurora Read Replicas
d. Aurora Global Database
d. Aurora Global Database
Aurora Global Databases allows you to have an Aurora Replica in another AWS Region, with up to 5 secondary regions.
How can you enhance the security of your ElastiCache Redis Cluster by allowing users to access your ElastiCache Redis Cluster using their IAM Identities (e.g., Users, Roles)?
a. Using Redis Authentication
b. Using IAM Authentication
c. Use Security Groups
b. Using IAM Authentication
Your company has a production Node.js application that is using RDS MySQL 5.6 as its database. A new application programmed in Java will perform some heavy analytics workload to create a dashboard on a regular hourly basis. What is the most cost-effective solution you can implement to minimize disruption for the main application?
a. Enable Multi-AZ for the RDS database and run the analytics workload on the standby database
b. Create a Read Replica in a different AZ and run the analytics workload on the replica database
c. Create a Read Replica in a different AZ and run the analytics workload on the source database
b. Create a Read Replica in a different AZ and run the analytics workload on the replica database