AWIT Flashcards
(202 cards)
6 Benefits of Cloud Computing
Trade capital expense for variable expense
Benefit from massive economies of scale
Stop guessing capacity
Increase speed and agility
Stop spending money running and maintaining data centers
Go global in minutes
Horizontal
Scaling
Adding more things. Example: when an EC2 micro instance gets overloaded, auto-scale 3
more to handle the load. AWS excels at this.
Vertical Scaling
Replacing with a larger thing. Example: when an EC2 micro instance gets overloaded,
replace it with an EC2 large instance. This generally requires a reboot that disrupts
workloads.
Which AWS service provides the ability to detect inadvertent data leaks of personally identifiable information (PII) and user credential data?
Amazon Macie
AWS Shield
Amazon Inspector
Amazon GuardDuty
Amazon Macie
Amazon Macie is the correct answer. Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in Amazon S3, including PII and user credential data.
Which pricing model will interrupt a running Amazon EC2 instance if capacity becomes temporarily unavailable?
Convertible Reserved Instances
On-Demand Instances
Standard Reserved Instances
Spot Instances
Spot Instances is the correct answer. Amazon EC2 Spot Instances let you take advantage of unused EC2 capacity in the AWS cloud. Spot Instances are available at up to a 90% discount compared to On-Demand prices. When AWS need to reclaim the capacity you get a 2 minute warning and then your instances are terminated. With all other pricing models your instances will not be terminated by AWS once they are running.
Which of the following are NOT features of AWS IAM? (Select TWO)
Identity federation
PCI DSS compliance
Charged for what you use
Logon using local user accounts
Shared access to your AWS account
Charged for what you use is the correct answer. You are also not charged for what you use because IAM is free to use.
Logon using local user accounts
Question 4
Which of the authentication options below can be used to authenticate using AWS APIs? (Select TWO)
Security groups
Server Passwords
Key Pairs
Server Certificates
Access Keys
Server Certificates
Access Keys
Server certificates are SSL/TLS certificates that you can use to authenticate with some AWS services.
Access keys are long-term credentials for an IAM user or the AWS account root user. You can use access keys to sign programmatic requests to the AWS CLI or AWS API (directly or using the AWS SDK).
What is the name for the top-level container used to hold objects within Amazon S3?
Bucket
Folder
Directory
Instance Store
Bucket
Amazon S3 is an object-based storage system. You upload your objects into buckets.
In which ways does AWS’ pricing model benefit organizations?
Eliminates licensing costs
Reduce the cost of maintaining idle resources
Focus spend on capital expenditure, rather than operational expenditure
Reduces the people cost of application development
Reduce the cost of maintaining idle resources
Using AWS you can provision only what you need and adjust resources automatically and elastically. This reduces the amount of resources that are sitting idle which reduces cost.
Which of the statements below does NOT characterize cloud computing?
Cloud computing is the on-demand delivery of compute power
With cloud computing you can increase your speed and agility
With cloud computing you get to benefit from massive economies of scale
Cloud computing allows you to swap variable expense for capital expense
Cloud computing allows you to swap variable expense for capital expense
Cloud computing is not a one-off capital expense, it is an ongoing operating expense. The caveat to this is that if you purchase reserved capacity you have an option to partially or fully pay upfront. However, it is still an operating cost as you do not own and depreciate the assets.
Which type of AWS data warehouse is ideally suited to analytics using SQL queries?
Amazon RedShift
Amazon RDS
Amazon DynamoDB
Amazon S3
Amazon RedShift
What do you need to log into the AWS console? ?
User name and password
Access key and secret ID
Certificate
Key pair
User name and password is the correct answer. You can log into the AWS console using a user name and password. You cannot log in to the AWS console using a key pair, access key & secret ID or certificate.
How can a systems administrator specify a script to be run on an EC2 instance during launch?
User Data
AWS Config
Metadata
Run Command
AWS Config
Which type of AWS data warehouse is ideally suited to analytics using SQL queries?
Amazon RedShift
Amazon RDS
Amazon DynamoDB
Amazon S3
Amazon RedShift
Your company has recently migrated to AWS. How can your CTO monitor the organization’s costs?
AWS Cost Explorer
AWS CloudTrail
AWS Simple Monthly calculator
AWS Consolidated Billing
AWS Cost Explorer – enables you to visualize your usage patterns over time and to identify your underlying cost drivers.
Your organization has offices around the world and some employees travel between offices. How should their accounts be setup?
Create a separate account in IAM within each region in which they will travel
IAM is a global service, just create the users in one place
Set the user account as a “global” account when created
Enable MFA for the accounts
IAM is a global service, just create the users in one place is the correct answer. IAM is a global service and all users that are created are able to login to the AWS Management Console from any location.
What is an example of scaling vertically?
AWS Lambda adding concurrently executing functions
Increasing the instance size with Amazon RDS
Adding read replicas to an Amazon RDS database
AWS Auto Scaling adding more EC2 instances
Increasing the instance size with Amazon RDS is the correct answer. A good example of vertical scaling is changing the instance size of an EC2 instance or RDS database to one with more CPU and RAM. All of the other options are examples of scaling horizontally.
You are evaluating AWS services that can assist with creating scalable application environments. Which of the statements below best describes the Elastic Load Balancer service?
A highly available and scalable Domain Name System (DNS) service
Helps you ensure that you have the correct number of Amazon EC2 instances available to handle the load for your application
A network service that provides an alternative to using the Internet to connect customers’ on-premise sites to AWS
Automatically distributes incoming application traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses
Automatically distributes incoming application traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses is the correct answer. Elastic Load Balancing automatically distributes incoming application traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses.
What are the advantages of running a database service such as Amazon RDS in the cloud versus deploying on-premise? (Select TWO)
ou have full control of the operating system and can install your own operational tools
High availability is easier to implement due to built-in functionality for deploying read replicas and multi-AZ
Scalability is improved as it is quicker to implement and there is an abundance of capacity
You can use any database engine or software you like, allowing greater flexibility
There are no costs for replicating data between DBs in different data centers or regions
High availability is easier to implement due to built-in functionality for deploying read replicas and multi-AZ is also a correct answer. Amazon RDS allows you to replicate data between AZs and regions so this must be taken into account in any cost analysis.
Scalability is improved as it is quicker to implement and there is an abundance of capacity is a correct answer. The advantages of using Amazon RDS include being able to easily scale by increasing your instance type without having to go through a long procurement cycle for getting new hardware or worrying about whether capacity exists on your existing private cloud infrastructure. You can also implement fault tolerance and scalability features through multi-AZ and read replicas easily
Based on the shared responsibility model, which of the following security and compliance tasks is AWS responsible for?
Updating Amazon EC2 host firmware
Updating operating systems
Granting access to individuals and services
Encrypting data in transit
Updating Amazon EC2 host firmware is the correct answer. AWS are responsible for updating Amazon EC2 host firmware. This is considered “security of the cloud”. All other tasks are the responsibility of the customer.
Which AWS service or feature helps restrict the AWS service, resources, and individual API actions the users and roles in each member account can access?
Amazon Cognito
AWS Organizations
AWS Firewall Manager
AWS Shield
tbd I think it is AWS Organizations
Under the shared responsibility model, which of the following tasks are the responsibility of the AWS customer? (Select TWO)
Ensuring that access to data centers is restricted
Ensuring that AWS Network Time Protocol (NTP) servers are set to the correct time
Ensuring that application data is encrypted at rest
Ensuring that data center hardware is disposed of properly
Ensuring that users have received security training in the use of AWS services
Ensuring that application data is encrypted at rest is a correct answer. As a customer on AWS you take responsibility for encrypting data. This includes encrypting data at rest and data in transit
Ensuring that users have received security training in the use of AWS services is also a correct answer. It’s also a customer’s responsibility to properly train their staff in security best practices and procedures for the AWS services they use.
Under the AWS shared responsibility model, which of the following are customer responsibilities? (Select TWO)
Physical security of data center facilities
Compute capacity availability
Network and firewall configurations
Setting up server-side encryption on an Amazon S3 bucket
Amazon RDS instance patching
Network and firewall configurations is also a correct answer. Another security responsibility the customer owns is setting network and firewall configurations. For instance, you must configure Network ACLs and Security Groups, and any operating system-level firewalls on your EC2 instances.
Setting up server-side encryption on an Amazon S3 bucket is a correct answer. As a customer on AWS you take responsibility for encrypting data. This includes encrypting data at rest and data in transit.
Which AWS service is designed to be used for operational analytics?
Amazon Elasticsearch Service(OpenSearch)
Amazon EMR
Amazon QuickSight
Amazon Athena
Amazon QuickSight