SIMPLE STORAGE SERVICE (S3) Flashcards

1
Q

Is s3 private by default?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A form of resource policies used for S3

A

Bucket Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can resource policies effect different accounts?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can bucket policies allow/deny anonymous principals

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Policies used for the identities in the same account or multiple resources

A

Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Policies used for cross-account or just controlling S3

A

Bucket policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allows access to S3 via HTTP once index and error documents are set

A

Static Web Hosting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Specific address that the bucket can be access from using HTTP

A

Website Endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Storage is one of the cost components of S3

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Requests and Data retrievals are one of the cost components of S3

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Transfer is one of the cost components of S3

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lets you keep a copy of an object whenever it is overwritten as its versions also protects your objects from accidental deletions

A

versioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

markers on an object version to mark it as removed, rather than permanently deleting it from your S3 bucket

A

Delete Markers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Can you disable versioning off after enabling it?

A

No only suspended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Charged and space is consumed by all version of an object

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a security feature that is used together with S3 Versioning to prevent unauthorized
or accidental deletions in your S3 bucket

A

MFA delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The bucket owner must include two forms of authentication in any request to delete an object version or change the versioning state of the bucket

A

MFA delete

18
Q

single data stream to S3, if the stream fails upload fails

A

Single Put Upload

19
Q

Max file size per single upload

A

5 gb

20
Q

Data is broken up into parts for uploading, parts can fail and be restarted

A

Multipart Upload

21
Q

Uses the network of Edge locations to upload to optimize long distance transfers from your client to Amazon S3

A

Transfer Acceleration

22
Q

Buckets are not encrypted by objects inside buckets are

A

True

23
Q

Data is first encrypted on the client-side before uploaded to Amazon
S3. You manage the encryption process, the encryption keys, and related tools

A

Client-Side encryption (CSE)

24
Q

Amazon S3 encrypts your object before saving it on disks in its data
centers and then decrypts it when you download the objects

A

Server-Side encryption (SSE)

25
Q

You manage the encryption keys and S3 manages the encryption and decryption process

A

SSE-C

26
Q

S3 uses AES-256 encryption keys to encrypt your objects, and each object is encrypted with a unique key

A

SSE-S3 (AES256)

27
Q

S3 uses AES-256 encryption keys to encrypt your
objects but the key is managed in a different service, which is AWS KMS

A

SSE-KMS

28
Q

Share objects or allow your customers/users to upload objects to buckets without AWS security credentials or permissions. Takes on the realtime permissions of the creator when used

A

Presigned URL

29
Q

Grants others time-limited permission to download or upload objects
from and to the owner’s S3 buckets

A

Presigned URL

30
Q

Used in serverless architectures where access to a private s3 bucket is controlled

A

Presigned URL

31
Q

Can you create a presigned url you have no access to?

A

Yes

32
Q

Used to retrieve parts of objects instead of whole objects using SQL like statements

A

S3 Select

33
Q

feature to receive notifications when certain events happen in your S3 bucket such as creating, deleting, restoring or replicating an object

A

Amazon S3 Event Notifications

34
Q

Can S3 Event Notifications be delivered to EC2?

A

No SQS, SNS, Lambda only

35
Q

Provides detailed records for the requests that are made to an Amazon S3 bucket used for security and access audits

A

S3 server access logging

36
Q

Store objects using a write-once-read-many (WORM) model which requires versioning

A

Object Lock

37
Q

object is WORM-protected and can’t be overwritten or deleted and remains in place until you explicitly remove it

A

Legal Hold

38
Q

Retention mode where certain permissions can be granted to adjust the lock settings

A

Governance

39
Q

named network endpoints that are attached to buckets that you can use to perform S3 object operations

A

Access points

40
Q

Used to monitor malicious activity on S3 such as unauthorized access or suspicious access patterns

A

AWS Guard Duty