test 2 Flashcards

1
Q

Which of the following AWS Cloud services is designed according to the Multi-AZ principle? (Choose 2 answers)

a. Amazon Simple Storage Service (Amazon S3)
b. Amazon DynamoDB
c. Amazon ElastiCache
d. Elastic Load Balancing
e. Amazon Virtual Private Cloud (Amazon VPC)

A

a. Amazon Simple Storage Service (Amazon S3)
b. Amazon DynamoDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following security features is associated with a subnet in a VPC to protect against incoming traffic requests?

a.
AWS Inspector
b.
Subnet Groups
c.
NACL
d.
Security Groups

A

c.
NACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company currently uses VM Templates to spin up virtual machines on their on-premise infrastructure. Which of the following can be used in a similar way to spin up EC2 instances on the AWS Cloud?

a.
Amazon VMware
b.
EBS Snapshots
c.
Amazon Machine Images
d.
EBS Volumes

A

c.
Amazon Machine Images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are planning to offload some of the batch processing workloads on to AWS. These jobs can be interrupted and resumed at any time. Which of the following instance types would be the most cost effective to use?

a.
Partial UpFront Reserved
b.
Full UpFront Reserved
c.
On-Demand
d.
Spot

A

d.
Spot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following AWS services can be used as a compute resource? (Choose two)

a. Amazon EC2
b. Amazon S3
c. AWS Lambda
d. Amazon VPC

A

a. Amazon EC2
c. AWS Lambda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your company wants to migrate their website to AWS. Security is a major concern to them, so they need to host their website on an exclusive hardware that is NOT shared with any other AWS customers. Which of the following EC2 instance types would be more appropriate?

a.
Distinct Instances
b.
Dedicated Instances
c.
Reserved Instances
d.
Independent Instances

A

b.
Dedicated Instances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following services is a fully managed, PetaByte-scale data warehouse service in the AWS Cloud?

a.
Amazon Redshift
b.
Amazon DynamoDB
c.
Amazon Aurora
d.
Amazon ElastiCache

A

a.
Amazon Redshift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following will impact the price you pay for an EC2 instance? (Select all that apply)

a. How long you can use the instance for.
b. Amazon Machine Image (AMI)
c. Instance Type
d. Storage Capacity
e. None of the above

A

a. How long you can use the instance for.

b. Amazon Machine Image (AMI)

c. Instance Type

d. Storage Capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your company is planning to host its applications on the AWS Cloud. Which of the following services can be used to decouple distributed software systems and components? (Select all that apply)

a. AWS Glacier
b. AWS SQS
c. AWS SES
d. AWS EBS
e. AWS SNS

A

b. AWS SQS

e. AWS SNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the feature provided by AWS that enables fast and secure transfer of files over long distances between your client and your Amazon S3 bucket?

a.
File Transfer Accelerator
b.
S3 Transfer Acceleration
c.
Snowball
d.
HTTP Snowball Transfer

A

b.
S3 Transfer Acceleration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company needs to host a database for at least 1 year. Which of the following would be the most cost-effective solution?

a.
Spot Instances
b.
Partial Upfront costs Reserved
c.
No UpFront costs Reserved
d.
On-Demand

A

b.
Partial Upfront costs Reserved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you access your EC2 instances?

a.
Using Route Tables
b.
Using the Instance Password
c.
Using MFA
d.
Using Key Pairs

A

d.
Using Key Pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What service helps you to aggregate logs from your EC2 instance?

a.
Cloudtrail
b.
SQS
c.
S3
d.
Cloudwatch Logs

A

d.
Cloudwatch Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where can you store files on AWS? (Choose 3 answers)

a. Amazon Elastic File System
b. Amazon Elastic Block Store (Amazon EBS)
c. Amazon Simple Storage Aervice (Amazon S3)
d. Amazon Chime
e. Amazon CloudFormation

A

a. Amazon Elastic File System
b. Amazon Elastic Block Store (Amazon EBS)
c. Amazon Simple Storage Aervice (Amazon S3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following AWS services are free to use? (Choose 2)

a. EC2
b. Route53
c. Security Groups
d. Auto-scaling

A

c. Security Groups

d. Auto-scaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What AWS service uses Edge Locations for content caching?

a.
AWS Glacier
b.
AWS KMS
c.
AWS CloudFront
d.
AWS Inspector

A

c.
AWS CloudFront

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following needs a username and password to access AWS resources?

a.
AWS CLI
b.
AWS Management Console
c.
AWS Application Programming Interface (API)
d.
AWS Software Development

A

b.
AWS Management Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You can monitor the accepted and rejected IP traffic going to and from your VPC instances by creating

a.
Access Log
b.
Flow Log
c.
Monitor Log
d.
Security Log

A

b.
Flow Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How much data can you store in S3?

a.
Storage capacity is virtually unlimited.
b.
You can store up to 1 PetaByte of data, then you are required to pay an additional fee.
c.
You can store up to 1 PetaByte of data.
d.
Each account is given 50 gigabytes of storage capacity and no more can be used.

A

a.
Storage capacity is virtually unlimited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following features of Amazon RDS allows for better availability for databases? (Choose 2 answers)

a. VPC Peering
b. Automatic Patching
c. Multi-AZ
d. Read Replica’s

A

c. Multi-AZ
d. Read Replica’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

There is a need to automate the creation of sandbox accounts for developers and grant entities in those accounts access only to the necessary AWS services. Which of the following would help?

a.
AWS Cost Explorer
b.
AWS Dev Pay
c.
AWS Trusted Advisor
d.
AWS Organizations

A

d.
AWS Organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You have the following options for protecting data in transit in Amazon S3 (Choose two)

a. Use Client-side Encryption
b. User Server-side Encryption
c. Use SSL
d. RDS Encryption

A

a. Use Client-side Encryption
c. Use SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following storage options is used to store the Amazon RDS DB instances?

a.
Amazon EFS
b.
Amazon EBS
c.
Amazon Glacier
d.
Amazon S3

A

b.
Amazon EBS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is a compatible MySQL database that also has the ability to grow in storage size on its own?

a.
DynamoDB
b.
RDS PostgreSQL
c.
Aurora
d.
RDS Microsoft SQL Server

A

c.
Aurora

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
When creating security groups, one of the best practices is to _____________ . a. Allow only the required traffic, which is denied by default. b. Allow only port 80,443 for HTTP,HTTPS request. c. Deny IPv6 traffic for all your public EC2 instances. d. Deny all unwatned traffic, which is allowed by default.
a. Allow only the required traffic, which is denied by default.
26
Which of the following are important principles when designing cloud-based systems? (Choose 2 answers) a. Build tightly-coupled components b. Assume everything will fail c. Build loosely-coupled components d. Use as many services as possible
b. Assume everything will fail c. Build loosely-coupled components
27
You are working on two projects that require a completely different network configuration. Which of the following would allow you to isolate resources and network configuration for each of them? a. Virtual Public Cloud b. Virtual Private Cloud c. Edge Locations d. Security Groups
b. Virtual Private Cloud
28
Which of the following allows you to use a drag-and-drop interface to edit CloudFormation templates? a. CloudFormation Maker b. CloudFormation Designer c. CloudFormation Editor d. CloudFormation Visualizer
b. CloudFormation Designer
29
Sarah has created a web application, placing its underlining infrastructure in the N. Virginia (US-East-1) region. After several months, Sarah notices that much of her website’s traffic is coming from Japan. What can she do to (best) help reduce latency for her users in Japan? a. Change to a Japanese hosting service. b. Recreate the website content. c. None of the Above. d. Create a CDN using CloudFront, making sure the proper content is cached at Edge Locations closest to Japan.
d. Create a CDN using CloudFront, making sure the proper content is cached at Edge Locations closest to Japan.
30
What does Amazon Elastic Beanstalk provide? a. A service by this name doesn't exist. b. A scalable cluster of EC2 instances. c. An application container on top of Amazon Web Services. d. A scalable storage appliance on top of Amazon Web Services.
c. An application container on top of Amazon Web Services.
31
When you create an S3 bucket, what rules must be followed regarding the bucket name? (Select all that apply) a. Bucket names must be unique across all of AWS. b. Bucket name can be formatted as an IP address. c. Bucket names must contain uppercase letters. d. Bucket names must be between 3-63 characters in length.
a. Bucket names must be unique across all of AWS. d. Bucket names must be between 3-63 characters in length.
32
What makes Cloud computing better than traditional data centers? a. Distributed Infrastructure b. All of the Above c. Eliminating SPOFs d. On-demand Infrastructure for scaling applications or tasks. e. Cost Savings
b. All of the Above
33
Which statement is NOT correct in relation to service limits? a. You can use the AWS trusted advisor to monitor your service limits. b. You can contact support to increase the service limits. c. The AWS Limited Monitor is responsible for sending email notifications when usage approaches a service limit. d. There is no service limits on AWS.
d. There is no service limits on AWS.
34
Which of the following reserved instances’ payment options provides a discounted hourly rate for the duration of the term? (choose two) a. Percentage Upfront option b. All Upfront option c. No Upfront option d. Partial Upfront option
c. No Upfront option d. Partial Upfront option
35
One of the main benefits of AWS as a cloud computing service is its reliability. What does it actually mean? (Choose 2) a. Ability to recover quickly from failures. b. Automatically provision new resources to meet demand. c. Applying the principle of least privilege to all of its resources. d. Provide compensation to the customers if an issue occurred.
a. Ability to recover quickly from failures. b. Automatically provision new resources to meet demand.
36
Which of the following storage mechanisms can be used to store messages effectively across distributed systems? a. Amazon EBS Volumes b. Amazon SQS c. Amazon EBS Snapshots d. Amazon Glacier
b. Amazon SQS
37
Your company is trying to deploy a two-tier, highly available web application to AWS. The application needs a storage layer to store artifacts such as photos and videos. Which of the following services can be used as the underlying storage mechanism? a. Amazon EC2 Instance Store b. Amazon RDS Instance c. Amazon S3 d. Amazon EBS Volume
c. Amazon S3
38
Which of the following services allows you to analyze EC2 Instances against pre-defined security templates to check for vulnerabilities? a. AWS WAF b. AWS Inspector c. AWS Trusted Advisor d. AWS Shield
b. AWS Inspector
39
Which AWS network feature can help you make a private connection between AWS and your data center? a. AWS Direct Connect b. Amazon CloudFront c. AWS Route 53 d. AWS SnowBall
a. AWS Direct Connect
40
You have developed a microservices application. Which of the following should you use to make sure that each EC2 instance in a system gets the same amount of traffic? a. Classic Load Balancer b. Auto Scaling c. Application Load Balancer d. Network Load Balancer
c. Application Load Balancer
41
AWS provides a storage option known as Amazon Glacier, which is designed for____________ and ______________. Please specify 2 correct options. a. Cached Session Data b. Data Archives c. Infrequently Accessed Data d. Active Database Storage
b. Data Archives c. Infrequently Accessed Data
42
Which of the following can be used to automate multiple AWS services through scripts? a. AWS Console b. AWS CLI c. AWS Powershell d. AWS Bash
b. AWS CLI
43
You decided to pay a low upfront fee and get a significantly discounted hourly rate. What is the payment model you are going to use? a. Save when you reserve. b. Pay less as AWS grows. c. Custom Pricing d. Pay as you go.
a. Save when you reserve.
44
Your company requires that all the data on your EBS-backed EC2 volumes be encrypted. How would you go about doing this? a. None of the Above. b. Encryption can be done on the OS layer of the EBS volume. c. AWS allows you to encrypt the file system on an EBS volume on EBS volume setup. d. You cannot enable EBS encryption on a specific volume.
c. AWS allows you to encrypt the file system on an EBS volume on EBS volume setup.
45
Kim is managing a web application running on the AWS Cloud. The application is currently utilizing eight EC2 servers for its computing platform. Earlier today, two of those web servers crashed; however, none of her customers were affected. What has Kim done correctly in this scenario? a. Properly built and elastic system. b. None of the Above. c. Properly built a scalable system. d. Properly build a fault tolerant system.
d. Properly build a fault tolerant system.
46
There is a need to analyze and process a large number of data sets. Which of the following services can help fulfill this requirement? a. Storage Gateway b. EMR c. Glacier d. S3
b. EMR
47
A company is hosting a web application in the AWS Cloud using a set of EC2 instances. Which of the following can help to protect them from DDoS attacks? (Select all that apply) a. Using the Internet Gateway b. Using Security Groups c. Using AWS Config d. Using Network Access Control Lists
b. Using Security Groups d. Using Network Access Control Lists
48
What are the services/features required to have highly available and fault-tolerant architecture in AWS? (Choose two) a. Amazon EC2 Auto-Scaling b. AWS NACL c. Elastic Load Balancer d. CloudFormation
a. Amazon EC2 Auto-Scaling c. Elastic Load Balancer
49
You are trying to calculate the Total Cost of Ownership (TCO) for the AWS Cloud. Which of the following should you provide? a. The number of servers migrated to AWS. b. The number of applications migrated to AWS. c. The number of end-users you are currently serving. d. The number of active passwords.
a. The number of servers migrated to AWS.
50
Which of the following services allows you to run containerized applications on a cluster of EC2 instances? a. Amazon Elastic Container Service b. Amazon Elastic Docker Service c. Amazon Elastic Compute Service d. AWS Docker Manager
a. Amazon Elastic Container Service
51
Which of the following is one of the benefits of AWS Security? a. Free for AWS Premium members. b. Scale Quickly c. Starts automatically once you upload your data. d. None of the Above.
b. Scale Quickly
52
Which of the following features of RDS allows for data redundancy across regions and improves disaster recovery? a. Using Snapshots b. Creating Read Replicas c. Multi-Region Replication d. Multi-AZ
b. Creating Read Replicas
53
Which service allows the customer to retain full administrative privileges of the underlying virtual infrastructure? a. Amazon DynamoDB b. Amazon EC2 c. Amazon S3 d. Amazon Lambda
b. Amazon EC2
54
What does Amazon ElastiCache provide? a. A managed in-memory cache service. b. An Amazon EC2 instance with the Memcached software already pre-installed. c. A virtual server with a huge amount of memory. d. A service by this name doesn't exist. Perhaps you mean Amazon CloudCache.
a. A managed in-memory cache service.
55
An organization has multiple running systems that use different AWS products. Which of the following services allow them to control access to each of these products? a. AWS Integrity Management b. Amazon RDS c. Amazon EMR d. AWS Identity and Access Management
d. AWS Identity and Access Management
56
Which of the following is NOT a feature of an edge location? a. Distribute Content to Users b. Used in conjunction with the Cloudfront service. c. Distribute load across multiple resources. d. Cache Common Responses
c. Distribute load across multiple resources.
57
Miller is working with a large data set, and he needs to import it into a relational database service. What AWS service will meet his needs? a. Neptune b. RDS c. ElastiCache d. DynamoDB
b. RDS
58
Which of the following security requirements is managed by AWS? (Select all that apply) a. VPC Security b. Hardware Patching c. User Permissions d. Password Policies e. Disk Disposal
b. Hardware Patching e. Disk Disposal
59
What are the pillars of the AWS well-architected framework? (Select all that apply) a. Reliability b. Agility c. Validity d. Performance Efficiency
a. Reliability d. Performance Efficiency
60
Which of the following is your responsibility when dealing with the PCI DSS? (Select all that apply) a. You are responsible for validating compliance annually and document results in an AOC document. b. You are responsible for the network and firewall configuration. c. You are responsible for the identity and access management. d. You are responsible for Protecting Stored Cardholder Data. e. You are responsible for designing, building, and maintaining a compliant environment in AWS.
a. You are responsible for validating compliance annually and document results in an AOC document. c. You are responsible for the identity and access management. d. You are responsible for Protecting Stored Cardholder Data. e. You are responsible for designing, building, and maintaining a compliant environment in AWS.
61
Which of the following services can help protect your web applications from SQL injection and other vulnerabilities in your application code? a. AWS Web Application Firewall b. Amazon Aurora c. IAM d. Amazon Cognito
a. AWS Web Application Firewall
62
What does S3 stand for? a. Simple Storage Service b. Service for Simple Storage c. Simplified Storage Service d. Simple Store Service
a. Simple Storage Service
63
Which of the following is a Cloud Computing model that removes the need for your organization to manage the operating systems? a. None of the Above. b. IaaS c. PaaS d. SaaS
c. PaaS
64
Using Amazon RDS is under the shared responsibility model. Which of the following would be the customer responsibilities? (Select all that apply) a. Managing the database settings. b. Buildign the relational schema. c. Installing the database software. d. Performing backups.a. Managing the database settings.
a. Managing the database settings. b. Buildign the relational schema.
65
Which of the following services allows you to run your application when needed, without having to own a server running all the time? a. AWS LightSail b. AWS Lambda c. AWS RDS Instances d. AWS EC2 Instances
b. AWS Lambda