Udemy Lecture 3: EC2 Flashcards

1
Q

What does EC2 stand?

A

stands for elastic compute cloud & its a way todo infrastructure as a service on AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different things EC2 mainly used for?

A
  • Renting virtual machines (EC2)
    -Storing data on virtual drives (EBS)
    -Distributing load across machines (ELB)
    -Scaling the services using an auto-scaling group (ASG)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do you have to decide when it comes to EC2?

A

-Operating systems (OS): Linux, Windows or Mac OS
-How much compute power & cores (CPU)
-How much random- access memory (RAM)
-How much storage space (& do you want it networked attached with EBS & EFS or do you want it hardware with EC2 instance store)
-Network card ( speed of the card, public IP address)
-Firewall rules (what type of security group)
-Bootstrap script (configure at first launch called the EC2 user data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Its possible to bootstrap our instances using an EC2 user ________

A

data script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bootstrapping means what?

A

launching commands when a machine starts

That scripts is only run once at the instance first start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EC2 user data is used to automate boot tasks such as what?

A

Installing updates
Installing software
Downloading common files from the internet
Anything you can think of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The EC2 data script runs with the _________

A

root user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is AWS naming conventions for EC2 instance?

A

m5.2xlarge

-m: instance class
-5: generation of the instance (AWS improves them over time, so if its a newer version it will be m6 not m5)
-2xlarge: size within the instance class (the larger the size the larger the memory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are general Purpose instances best for?

A

greate for a diversity of workloads such as web servers or code repositories

Good balance between:
Compute
Memory
Networking
t2.micro (is a general purpose EC2 instance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Compute Optimized instance best for?

A

great for compute -intensive tasks that require high performance processors like (all the compute instances start with a C)

Can use for :
-Batch processing workloads
-Media transcoding
-High Performance webservers
-High performance computing (HPC)
-Scientific modeling & machine learning
-Dedicated gaming servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Memory optimized EC2 instance best for?

A

fast performance for workloads that process large data sets in memory like (all the memory instances start with R bc R stands for RAM)

Can use for:
-High performance, relational/non-rational databases
-Distributed web scale cache stores
-In-memory database optimized for BI (business Intelligence)
-Applications performing real-time processing of big unstructured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Storage optimized instances best for?

A

great for storage -intensive tasks that require high, sequential read & write access to large data sets on local storage (storage instances start with an I OR D)

Can use for:
-High frequency online transaction (OLTP) systems
-Relational & NoSQL databases
-Cache for in-memory databases (ex. redis)
-Data warehousing application
-Distributed file systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

________ are the fundamental of network security in AWS and they control how traffic is allowed into or out of our EC2 instance

A

Security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security groups only contain _________ rules

A

allow rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____________ rules can reference by IP or by other security groups

A

Security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does a security groups regulate?

A

-Access to Ports
-Authorized IP ranges - IPv4 & IPv6
-Control of inbound network (from other to the instance)
-Control of outbound network (from the instance to other)

17
Q

Security groups can be attached to ________ instances

A

multiple

18
Q

Security groups are locked down to a ________/ VPC combination

A

regions

19
Q

Its good to maintain one separate security group for ______ access

A

SSH

20
Q

If your application is not accessible (time out) then its a _________ issue

A

security group

21
Q

If your application gives a “connection refused” error then its an _________ or its not launched

A

application error

22
Q

By default all in bound traffic is _______ & all outbound traffic is ________ with security groups

A

blocked, authorized

23
Q

What are the different ports?

A

22= SSH
21=FTP
22=SFTP
80=HTTP
443= HTTPS
3389=RDP

24
Q

What is 22=SSH port?

A

(secure shell)- log into a linux instance

25
Q

What is the 21= FTP port?

A

(file transfer protocol) - upload files into a file share

26
Q

What is 22=SFTP port?

A

(secure file transfer protocol)- upload files using SSH

27
Q

What is 80=HTTP port?

A

access unsecure websites

28
Q

What is 443=HTTPS port?

A

access secured websites

29
Q

What is 3389= RDP port?

A

(remote desktop protocol) - log into a windows instance

30
Q

________ is usable on OS systems such as Mac, Linux, Windows 10+ , if your using a system that is window 10 or below then can use Putty

A

SSH

Putty does the same thing as SSH (& can also be used on window 10+)

31
Q

___________ can be used on all OS systems

A

EC2 instance connect

32
Q

What is the share responsibility model for EC2?

A

Aws is responsible for:
-Infrastructure (global network security)
-Isolation on physical host
-Replacing faulty hardware
-Compliance validation

You are responsible for:
-Security groups roles
-Operatin system patches & updates
-Software & utilities installed on the EC2 instance
-IAM roles assigned to EC2 & IAM user access management
-Data security on your instance

33
Q

EC2 instance is composed of what?

A

AMI (OS) + instance size (CPU + RAM) + Storage + security groups + EC2 user data

34
Q

________ starts a terminal into our EC2 instance (port 22)

A

SSH

35
Q

EC2 instance role link to ________

A

IAM roles

36
Q

What are the different EC2 purchasing options?

A

-On-demand
-Spot
-Reserved (standard & convertible)
-Dedicated host - get access to the physical sever itself
-Dedicated instance - instances that run on hardware thats dedicated to you, may share hardware with other instances in same account & no control over instance placement (can move hardware after stop/start)