Assessment Test Flashcards
True/false: The Developer Support plan provides access to a support application programming interface (API).
True
False
B. The Business plan offers access to a support API, but the Developer plan does not. See Chapter 1 for more information.
True/false: AWS is responsible for managing the network configuration of your EC2 instances.
True
False
B. Customers are responsible for managing the network configuration of EC2 instances. AWS is responsible for the physical network infrastructure. See Chapter 1 for more information.
Which of the following services is most useful for decoupling the components of a monolithic application?
SNS
KMS
SQS
Glacier
C. Simple Queue Service (SQS) allows for event‐driven messaging within distributed systems that can decouple while coordinating the discrete steps of a larger process. See Chapter 1 for more information.
An application you want to run on EC2 requires you to license it based on the number of physical CPU sockets and cores on the hardware you plan to run the application on. Which of the following tenancy models should you specify?
Dedicated host
Dedicated instance
Shared tenancy
Bring your own license
A.The dedicated host option lets you see the number of physical CPU sockets and cores on a host. See Chapter 2 for more information.
True/false: Changing the instance type of an EC2 instance will change its elastic IP address.
True
False
B. An elastic IP address will not change. A public IP address attached to an instance will change if the instance is stopped, as would happen when changing the instance type. See Chapter 2 for more information.
True/false: You can use a Quick Start Amazon Machine Image (AMI) to create any instance type.
True
False
A.A Quick Start AMI is independent of the instance type. See Chapter 2 for more information.
Which S3 encryption option does not require AWS persistently storing the encryption keys it uses to decrypt data?
Client‐side encryption
SSE‐KMS
SSE‐S3
SSE‐C
D.With SSE‐C you provide your own keys for Amazon to use to decrypt and encrypt your data. AWS doesn’t persistently store the keys. See Chapter 3 for more information.
True/false: Durability measures the percentage of likelihood that a given object will not be inadvertently lost by AWS over the course of a year.
True
False
A. Durability corresponds to an average annual expected loss of objects stored on S3, not including objects you delete. Availability measures the amount of time S3 will be available to let you retrieve those objects. See Chapter 3 for more information.
True/false: After uploading a new object to S3, there will be a slight delay (one to two seconds) before the object is available.
True
False
B. S3 uses a read‐after‐write consistency model for new objects, so once you upload an object to S3, it’s immediately available. See Chapter 3 for more information.
You created a Virtual Private Cloud (VPC) using the Classless Inter‐Domain Routing (CIDR) block 10.0.0.0/24. You need to connect to this VPC from your internal network, but the IP addresses in use on your internal network overlap with the CIDR. Which of the following is a valid way to address this problem?
Remove the CIDR and use IPv6 instead.
Change the VPC’s CIDR.
Create a new VPC with a different CIDR.
Create a secondary CIDR for the VPC.
C. You can’t change the primary CIDR for a VPC, so you must create a new one to connect it to your internal network. See Chapter 4 for more information.
True/false: An EC2 instance must be in a public subnet to access the Internet.
True
False
B. An EC2 instance can access the Internet from a private subnet provided it uses a NAT gateway or NAT instance. See Chapter 4 for more information.
True/false: The route table for a public subnet must have a default route pointing to an Internet gateway as a target.
True
False
A. The definition of a public subnet is a subnet that has a default route pointing to an Internet gateway as a target. Otherwise, it’s a private subnet. See Chapter 4 for more information.
Which of the following use cases is well suited for DynamoDB?
Running a MongoDB database on AWS
Storing large binary files exceeding 1 GB in size
Storing JSON documents that have a consistent structure
Storing image assets for a website
C. DynamoDB is a key‐value store that can be used to store items up to 400 KB in size. See Chapter 5 for more information.
True/false: You can create a DynamoDB global secondary index for an existing table at any time.
True
False
A.You can create a global secondary index for an existing table at any time. You can create a local secondary index only when you create the table. See Chapter 5 for more information.
True/false: Enabling point‐in‐time RDS snapshots is sufficient to give you a recovery point objective (RPO) of less than 10 minutes.
True
False
A. Enabling point‐in‐time recovery gives you an RPO of about five minutes. The recovery time objective (RTO) depends on the amount of data to restore. See Chapter 5 for more information.
Which of the following steps does the most to protect your AWS account?
Deleting unused Identity and Access Management (IAM) policies
Revoking unnecessary access for IAM users
Rotating root access keys
Restricting access to S3 buckets
Rotating Secure Shell (SSH) key pairs
B. Revoking unnecessary access for IAM users is the most effective of the listed measures for protecting your AWS account. See Chapter 6 for more information.
Which of the following can be used to encrypt the operating system of an EC2 instance?
AWS Secrets Manager
CloudHSM
AWS Key Management Service (KMS)
AWS Security Token Service (STS)
C. KMS can be used to encrypt Elastic Block Store (EBS) volumes that store an instance’s operating system. See Chapter 6 for more information.
What is a difference between a token generated by the AWS Security Token Service (STS) and an IAM access key?
The token generated by STS can’t be used by an IAM principal.
An IAM access key is unique.
The token generated by STS can be used only once.
The token generated by STS expires.
D. STS tokens expire and IAM access keys do not. An STS token can be used more than once. IAM access keys and STS tokens are both unique. An IAM principal can use an STS token. See Chapter 6 for more information.
True/false: EC2 sends instance memory utilization metrics to CloudWatch every five minutes.
True
False
B. EC2 doesn’t track instance memory utilization. See Chapter 7 for more information.
You configured a CloudWatch alarm to monitor CPU utilization for an EC2 instance. The alarm began in the INSUFFICIENT_DATA state and then entered the ALARM state. What can you conclude from this?
The instance recently rebooted.
CPU utilization is too high.
The CPU utilization metric crossed the alarm threshold.
The instance is stopped.
C. The transition to the ALARM state simply implies that the metric crossed a threshold but doesn’t tell you what the threshold is. Newly created alarms start out in the INSUFFICIENT_DATA state. See Chapter 7 for more information.
Where do AWS Config and CloudTrail store their logs?
S3 buckets
CloudWatch Logs
CloudTrail Events
DynamoDB
Amazon Athena
A. Both store their logs in S3 buckets. See Chapter 7 for more information.
True/false: An EC2 instance in a private subnet can resolve an “A” resource record for a public hosted zone hosted in Route 53.
True
False
A. An EC2 instance in a private subnet still has access to Amazon’s private DNS servers, which can resolve records stored in public hosted zones. See Chapter 8 for more information.
You want to use Route 53 to send users to the application load balancer closest to them. Which of the following routing policies lets you do this with the least effort?
Latency routing
Geolocation routing
Geoproximity routing
Edge routing
C. Geoproximity routing routes users to the location closest to them. Geolocation routing requires you to create records for specific locations or create a default record. See Chapter 8 for more information.
True/false: You can use an existing domain name with Route 53 without switching its registration to AWS.
True
False
A. Route 53 is a true DNS service in that it can host zones for any domain name. You can also register domain names with or transfer them to Route 53. See Chapter 8 for more information.