Test - 2 Flashcards
(397 cards)
Question 397
A VPC public subnet is one that (Choose one of the correct option below):
A. Has at least one route in its associated routing table that uses an Internet gateway
B. Includes a route in its associated routing table via a Network Address Translation(NAT) instance.
C. Has a Network Access Control List (NACL) permitting outbound traffic to 0.0.0.0/0
D. Has the public Subnet option selected in its configuration
Answer: A
The public subnet has a route table that uses the internet gateway
For more information on public subnets please visit the below URL:
http: //docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Scenarioi.html
Question 398
What action is required to establish an VPC VPN connection between an on- premise data center and an VPC virtual private gateway?
A. Assign a static internet-routable IP Address to an Amazon VPC customer gateway
B. Modify the main route table to allow traffic to a network address translation instance.
C. Use a dedicated network address translation instance in the public subnet
D. Establish a dedicated networking connection using Direct Connect
Answer: A
When defining a VPN connection between the on-premise network and the VPC, you need to have a customer gateway defined. Since this is accessed over the internet, it needs to have a static internet-routable IP Address.
For more information on VPC VPN connections please visit the below URLs:
http: //docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Introduction.html
http: //docs.aws.amazon.com/AmazonVPC/latest/UserGuide/vpn-connections.html
Question 399
A startup company hired you to help them build a mobile application that will ultimately store billions of images and videos on S3. The company is lean on funding and wants to minimize operational costs however they have an aggressive marketing plan, and expect to double their current installation base every six months. Due to the nature of their business they are expecting a sudden and large increases in traffic to and from S3 and need to ensure that it can handle the performance needs of their application. What other information must you gather from this customer in order to determine whether S3 is the right option?
A. You must know how many customers the company has today because this is critical in understanding what their customer base will be in 2 years.
B. You must find out the total number of requests per second at peak usage.
C. You must know the size of the individual objects being written to S3, in order to properly design the key namespace.
D. In order to build the key namespace correctly you must understand the total amount of storage needs for each S3 bucket.
When you define an S3 bucket the billing is done on the requests.
If you go to the
URL: http://calculator.s3.amazonaws.com/index.html
which is the calculator for S3 costs, you can see that the cost is related to the total number of requests in addition to the storage. In order to find the estimated cost for the S3 storage, you should get a number of requests.
Question 400
You have configuring a solution which uses EC2 Instances and an Elastic Load Balancer. Which of the following protocols can be used to ensure that traffic is secure from the client machine to the Elastic Load Balancer. Choose 2 answers from the options given below
A. HTTP
B. HTTPS
C. TCP
D. SSL
Answer: B, D
The HTTPS protocol uses the SSL protocol to establish secure connections over the HTTP layer. You can also use the SSL protocol to establish secure connections over the TCP layer.
For more information on ELB Listener configuration please see the below link:
http: //docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-listener-config.html
Question 401
After creating a new AWS account, you use the API to request 40 on-demand EC2 instances in a single AZ. After 20 successful requests, subsequent requests failed. What could be a reason for this issue, and how can you resolve it?
A. You encountered a soft limit of 20 instances per region. Submit the limit increase form and retry the failed requests once approved.
B. AWS allows you to provision no more than 20 instances per AZ. Select a different AZ and retry the failed request.
C. You need to use VPC in order to provision more than 20 instances in a single AZ. Simply terminate the resources already provisioned and re-launch them all in a VPC.
D. You encountered an API throttling situation and should try the failed requests using an exponential decay retry algorithm.
Answer: A
There is a soft limits of 20 instances. Since this is across an instance family,
option B is wrong because it will not work even if you try another availability zone.
For more information on all service limits please visit the below URL:
https: //aws.amazon.com/ec2/faqs/#How_many_instances_can_I_run_in_Amazon_ECz2
http: //docs.aws.amazon.com/general/latest/gr/aws_service_limits.html
Question 402
You have been tasked with creating a VPC network topology for your company. The VPC network must support both internet facing applications and internally-facing applications accessed only over VPN. Both Internet-facing and internally- applications must be able to leverage at least 3 AZs for high availability. At a minimum, how many subnets must you create within your VPC to accommodate these requirements?
A.2
B.3
C4
D.6
Internet as well as intranet(private) applications must be able to make use of at least three Availability Zones for high availability. So 3 subnets for internet and 3 subnets for private is 6 subnets in total.
For more information on VPC and subnets please visit the below URL:
http: //docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Subnets.html
Question 403
You receive a Linux Spot Instance at a bid of $0.05/hr. After 30 minutes, the Spot prices increases to $0.06/hr and your Spot Instance is terminated by AWS. What was the total EC2 compute cost of running your Spot Instances?
A. $0.025
B. $0.03
C. $0.05
D. $0.06
Answer: A
From 2nd October 2017, per second billing has come into effect for some EC2 instances and EBS. AWS per-second billing will apply to Linux. On-Demand, Reserved, and Spot EC2 instances. However, Per-second billing is not applicable to Microsoft Windows instances or to all Linux distributions, so some Linux AMIs may still have an hourly charge.
https://aws.amazon.com/blogs/aws/new-per-second-billing-for-ec2-instances-and-ebs-volumes/
With per-second billing effect, if AWS stops your instance, you will be billed for exactly what you have used. For example, if your you after a half an hour of use, you only pay for the 30 mins instead of a full hour.
For more information on spot instance pricing please visit the below URL:
https://aws.amazon.com/ec2/spot/pricing/
Question 404
Which of the following is a durable key-value store?
A. Amazon Simple Storage Service
B. Amazon Simple Queue Service
C. Amazon Simple Workflow Service
D. Amazon Simple Notification Service
Answer: A
This is clearly given in the AWS documentations:
For more information on S3 please visit the below URLs:
http: //docs.aws.amazon.com/AmazonS3/latest/dev/UsingObjects.html
https: //aws.amazon.com/s3/details
Question 405
In reviewing the Auto-Scaling events for your application you notice that your application is scaling up and down multiple times in the same hour. What design choice could you make to optimize for costs while preserving elasticity? Select 2 options.
A. Modify the Auto Scaling policy to use scheduled scaling actions
B. Modify the Auto Scaling Group cool down timers
C. Modify the Amazon Cloudwatch alarm period that triggers your AutoScaling scale down policy.
D. Modify the Auto Scaling group termination policy to terminate the newest instance first.
Answer: B, C
The Auto Scaling cooldown period is a configurable setting for your Auto Scaling group that helps to ensure that Auto Scaling doesn’t launch or terminate additional instances before the previous scaling activity takes effect. After the Auto Scaling group dynamically scales using a simple scaling policy, Auto Scaling waits for the cool down period to complete before resuming scaling activities. When you manually scale your Auto Scaling group, the default is not to wait for the cool down period, but you can override the default and honor the cooldown period. Note that if an instance becomes unhealthy, Auto Scaling does not wait for the cooldown period to complete before replacing the unhealthy instance.
For more information on Autoscale cool down timers please visit the URL:
http: //docs.aws.amazon.com/autoscaling/latest/userguide/Cooldown.html
You can also modify the CloudWatch triggers to ensure the thresholds are appropriate for the scale down policy.
For more information on Autoscaling user guide please visit the URL:
http://docs.aws.amazon.com/autoscaling/latest/userguide/as-scale-based-on-demand.html
Question 406
Which route must be added to your routing table in order to allow connections to the internet from your subnet?
A. Destination:0.0.0.0/0–>Target:your internet gateway
B. Destination:192.168.1.257/0–>Target:your internet gateway
C. Destination:0.0.0.0/33–>Target:your virtual private gateway
D. Destination:0.0.0.0/0–> Target:0.0.0.0/24
Answer: A
The question indicates a public subnet. The public subnet has a route table that uses the internet gateway.
For more information on public subnets please visit the below URL:
http: //docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Scenarioi.html
Question 407
You are deploying an application on Amazon EC2 that must call AWS API’s. What is the method for securely passing credentials to the application that you use?
A. Embed the API credentials into your JAR files.
B. Use the AWS Identity and Access Management (IAM) roles for EC2 instances
C. Store API credentials as an object in S3.
D. Pass API credentials to the instance using instance userdata.
Answer: B
An IAM role is similar to a user, in that it is an AWS identity with permission policies that determine what the identity can and cannot do in AWS. However, instead of being uniquely associated with one person, a role is intended to be assumable by anyone who needs it. Also, a role does not have any credentials (password or access keys) associated with it. Instead, if a user is assigned to a role, access keys are created dynamically and provided to the user.
For more information on IAM role please visit the below URL:
http: //docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
Question 408 What are some of the metrics that are monitored by AWS Lambda? Choose 3 answers from the options given below.
A. Invocations
B. Duration
C. Errors
D. Database Changes
Answer: A, B, C
AWS Lambda automatically monitors functions on your behalf, reporting metrics through Amazon CloudWatch. These metrics include Invocations, Duration, and Errors.
For more information on Lambda metrics please visit the below URL:
https: //docs.aws.amazon.com/lambda/latest/dg/monitoring-functions-metrics.html
http: //docs.aws.amazon.com/lambda/latest/dg/monitoring-functions-access-metrics.html
Question 409
There is a new facility from AWS which allows for fast, easy, and secure transfers of files over long distances between your client and your Amazon S3 bucket. What is this service called?
A. File Transfer
B. HTTP Transfer
C. S3 Transfer Acceleration
D. Kinesis Acceleration
Answer: C
To know more about S3 transfer acceleration, please visit the below URL:
http: //docs.aws.amazon.com/AmazonS3/latest/dev/transfer-acceleration.html
Question 410
What are the languages currently supported by AWS Lambda? Choose 3 answers from the options given below.
A. Node.js
B. Angular.js
C. Java
D. C#
Answer: A, C, D
AWS Lambda runs your code on a high-availability compute infrastructure and performs all of the administration of the compute resources, including server and operating system maintenance, capacity provisioning and automatic scaling, code monitoring and logging. All you need to do is supply your code in one of the languages that AWS Lambda supports (currently Node.js, Java, C# and Python).
For more information on Lamda please visit the below URL:
http: //docs.aws.amazon.com/lambda/latest/dg/welcome.html
Question 411
Your company has an application hosted in AWS which makes use of DynamoDB. There is a requirement from the IT security department to ensure that all source IP addresses which make calls to the DynamoDB tables are recorded. Which of the following services can be used to ensure this requirement is fulfilled.
A. AWS Code Commit
B. AWS Code Pipeline
C. AWS CloudTrail
D. AWS Cloudwatch
Answer: C
The AWS Documentation mentions the following DynamoDB is integrated with CloudTrail, a service that captures low-level API requests made by or on behalf of DynamoDB in your AWS account and delivers the log files to an Amazon S3 bucket that you specify. CloudTrail captures calls made from the DynamoDB console or from the DynamoDB low-level API. Using the information collected by CloudTrail, you can determine what request was made to DynamoDB, the source IP address from which the request was made, who made the request, when it was made, and so on.
For more information on DynamoDB and Cloudtrail, please refer to the below link:
http: //docs.aws.amazon.com/amazondynamodb/latest/developerguide/logging-using-cloudtrail.html
Question 412
Which of the following statements are false about Amazon Glacier. Choose one answer from the options given below.
A. It supports archive operations of Upload, Download and Delete
B. The archives are mutable
C. Uploading an archive is a synchronous operation
D. Archives can be as large at 40TB
Answer: B
This is clearly given in the AWS documentation. A single archive can be as large as 40 terabytes. You can store an unlimited number of archives and an unlimited amount of data in Amazon Glacier. Each archive is assigned a unique archive ID at the time of creation, and the content of the archive is immutable, meaning that after an archive is created it cannot be updated.
For more information on AWS Glacier please visit the below URL:
https://aws.amazon.com/glacier/details/
Question 413
Your company currently has a web application hosted on a single EC2 Instance.
The load on the application has increased over time and now the users are complaining
of slow response time. Which of the following implementations can help alleviate this
issue.
A. Attach an additional EBS Volume to the EC2 Instance and direct the application to make the reads from this new volume.
B. Attach an additional network interface with an Elastic IP so that requests can be made onto multiple IP’s.
C. Launch additional EC2 Instances in a web server farm type configuration and place them behind an Elastic Load Balancer.
D. Launch additional EC2 Instances in a web server farm type configuration and place them behind Routes53.
Answer: C
The AWS mentions the following about the Elastic Load balancer that can be used to help in this issue A load balancer distributes incoming application traffic across multiple EC2 instances in multiple Availability Zones. This increases the fault tolerance of your applications. Elastic Load Balancing detects unhealthy instances and routes traffic only to healthy instances. Your load balancer serves as a single point of contact for clients. This increases the availability of your application. You can add and remove instances from your load balancer as your needs change, without disrupting the overall flow of requests to your application. Elastic Load Balancing scales your load balancer as traffic to your application changes over time. Elastic Load Balancing can scale to the vast majority of workloads automatically.
For more information on the Elastic Load Balancer, please refer to the below link:
http: //docs.aws.amazon.com/elasticloadbalancing/latest/classic/introduction.html
Question 414
Which of the following are used to get data records from Amazon Kinesis? Choose an answer from the options below
A. Consumer
B. Stream
C. Producer
D. None of the above
Answer: A
Aconsumer gets data records from Amazon Kinesis streams. A consumer, known
as an Amazon Kinesis Streams application, processes the data records from a stream.
For more information on AWS Kinesis consumers please visit the below URL:
http: //docs.aws.amazon.com/streams/latest/dev/amazon-kinesis-consumers.html
Question 415
What is the maximum possible retention period for data in Kinesis Streams? Choose an answer from the options below.
A. 5 days
B. 7 days
C. 10 days
D. 24 hours
Answer: B
For more information on AWS Kinesis consumers please visit the below URL:
http: //docs.aws.amazon.com/streams/latest/dev/amazon-kinesis-consumers.html
Data records are accessible for a default of 24 hours from the time they are added toa stream. This time frame is called the retention period and is configurable in hourly increments from 24 to 168 hours (1 to 7 days).
Question 416
Which of the following is false when you create an encrypted EBS volume?
Data is encrypted at rest inside the volume
B. Data is encrypted when it is moved from one instance to another in the same subnet.
C. Data is encrypted when data is moved between the volume and the instance
D. All snapshots created from the volume are encrypted
Answer: B
The AWS mentions the following about EBS Encryption Amazon EBS encryption offers you a simple encryption solution for your EBS volumes without the need for you to build, maintain, and secure your own key management infrastructure. When you create an encrypted EBS volume and attach it to a supported instance type, the following types of data are encrypted: -
Data at rest inside the volume -
All data moving between the volume and the instance -
All snapshots created from the volume
For more information on EBS Encryption, please refer to the below link:
http: //docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption. html
Question 417
In AWS what constitutes temporary security credentials? Choose 3 answers from the options given below
A. AWS Access Key ID
B. Secret Access Key
C. Security Token
D. SSL Keys
Answer: A, B, C
This is given in the AWS documentation:
For more information on LAM please visit the below URL:
https://aws.amazon.com/iam/faqs/
Question 418
Your company has a set of resources hosted in AWS. Your IT Supervisor is concerned with the costs being incurred with the current set of AWS resources and wants to monitor the cost usage. Which of the following mechanisms can be used to monitor the costs of the AWS resources and also look at the possibility of cost optimization. Choose 3 answers from the options given below
A. Use the Cost Explorer to see the costs of AWS resources
B. Create budgets in billing section so that budgets are set beforehand
C. Send all logs to Cloudwatch logs and inspect the logs for billing details
D. Consider using the Trusted Advisor
Answer: A, B, D
The AWS Documentation mentions the following
1) For a quick, high-level analysis use Cost Explorer, which is a free tool that you can use to view graphs of your AWS spend data. It includes a variety of filters and preconfigured views, as well as forecasting capabilities. Cost Explorer displays data from the last 13 months, the current month, and the forecasted costs for the next three months, and it updates this data daily.
2) Consider using budgets if you have a defined spending plan for a project or service and you want to track how close your usage and costs are to exceeding your budgeted amount. Budgets use data from Cost Explorer to provide you with a quick way to see your usage-to-date and current estimated charges from AWS. You can also set up notifications that warn you if you exceed or are about to exceed your budgeted amount.
3) Visit the AWS Trusted Advisor console regularly. Trusted Advisor works like a customized cloud expert, analyzing your AWS environment and providing best practice recommendations to help you save money, improve system performance and reliability, and close security gaps.
For more information on cost optimization, please visit the below URL:
https://aws.amazon.com/answers/account-management/cost-optimization-monitor/
Question 419
Who are federated users when it comes to AWS? Choose an answer from the options given below
A. These are LAM users in aws
B. These are IAM groups in aws
C. These are Federated users (external identities) are users you manage outside of AWS in your corporate directory
D. None of the above
Answer: C
This is given in the AWS documentation: For more information on IAM please visit
the below URL: https://aws.amazon.com/iam/faqs/
Question 420
As a solution architect, you have been asked to decide on whether to use Amazon EBS-backed or instance-store backed instance. What is one key difference between an Amazon EBS-backed and an instance-store backed instance that you need to keep in mind.
A. Amazon EBS-backed instances can be stopped and restarted.
B. Instance-store backed instances can be stopped and restarted.
C. Auto scaling requires using Amazon EBS-backed instances.
D. Virtual Private Cloud (VPC) requires EBS backed instances.
Answer: A
Amazon EBS-backed instances can be stopped and restarted.
Please visit the below URL for the key differences between EBS and instance store volumes:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ComponentsAMIs.html
Amazon EBS-backed AMI can be placed in stopped state where instance is not running, but the root volume is persisted in Amazon EBS. Amazon Instance store -backed AMI cannot be in stopped state; instances are running or terminated