AWS Certified Cloud Practitioner Practice Exam (1) Flashcards
(64 cards)
Which of the following helps a customer view the Amazon EC2 billing activity for the past month?
1) AWS Cost & Usage Reports
2) AWS Systems Manager
3) AWS Budgets
4) AWS Pricing Calculator
AWS Cost & Usage Reports
The AWS Cost & Usage Report is your one-stop shop for accessing the most detailed information available about your AWS costs and usage.The AWS Cost & Usage Report lists AWS usage for each service category used by an account and its IAM users in hourly or daily line items, as well as any tags that you have activated for cost allocation purposes.
What is the AWS feature that provides an additional level of security above the default authentication mechanism of usernames and passwords?
1) AWS MFA
2) Email verification
3) AWS KMS
4) Encrypted keys
AWS MFA
AWS Multi-Factor Authentication (MFA) is a simple best practice that adds an extra layer of protection on top of your user name and password. With MFA enabled, when a user signs in to an AWS website, they will be prompted for their user name and password (the first factor—what they know), as well as for an authentication code from their AWS MFA device (the second factor—what they have). Taken together, these multiple factors provide increased security for your AWS account settings and resources.
An organization has decided to purchase an Amazon EC2 Reserved Instance (RI) for three years in order to reduce costs. It is possible that the application workloads could change during the reservation period.
What is the EC2 Reserved Instance (RI) type that will allow the company to exchange the purchased reserved instance for another reserved instance with higher computing power if they need to?
1) Standard RI
2) Elastic RI
3) Convertible RI
4) Premium RI
Convertible RI
When your needs change, you can exchange your Convertible Reserved Instances and continue to benefit from the reservation’s pricing discount. With Convertible RIs, you can exchange one or more Reserved Instances for another Reserved Instance with a different configuration, including instance family, operating system, and tenancy. There are no limits to how many times you perform an exchange, as long as the new Convertible Reserved Instance is of an equal or higher value than the original Convertible Reserved Instances that you are exchanging.
Which of the following is an example of horizontal scaling in the AWS Cloud?
1) Adding more RAM capacity to an EC2 instance
2) Increasing the compute capacity of a single EC2 instance to address the growing demands of an application
3) Replacing an existing EC2 instance with a larger, more powerful one
4) Adding more EC2 instances of the same size to handle an increase in traffic
Adding more EC2 instances of the same size to handle an increase in traffic
As part of the Enterprise support plan, who is the primary point of contact for ongoing support needs?
1) AWS Identity and Access Management (IAM) user
2) AWS Countdown engineer
3) Technical Account Manager (TAM)
4) AWS Partner Network (APN)
Technical Account Manager (TAM)
For Enterprise-level customers, a TAM (Technical Account Manager) provides technical expertise for the full range of AWS services and obtains a detailed understanding of your use case and technology architecture. TAMs work with AWS Solution Architects to help you launch new projects and give best practices recommendations throughout the implementation life cycle. Your TAM is the primary point of contact for ongoing support needs, and you have a direct telephone line to your TAM.
A company is planning to host an educational website on AWS. Their video courses will be streamed all around the world. Which of the following AWS services will help achieve high transfer speeds?
1) Amazon Kinesis Video Streams
2) Amazon CloudFront
3) Amazon SNS
4) AWS CloudFormation
Amazon CloudFront
Amazon CloudFront is a fast content delivery network (CDN) service that securely delivers data, videos, applications, and APIs to customers globally with low latency, high transfer speeds, all within a developer-friendly environment.
The use cases of Amazon CloudFront include:
1- Accelerate static website content delivery.
CloudFront can speed up the delivery of your static content (for example, images, style sheets, JavaScript, and so on) to viewers across the globe. By using CloudFront, you can take advantage of the AWS backbone network and CloudFront edge servers to give your viewers a fast, safe, and reliable experience when they visit your website.
2- Live & on-demand video streaming.
The Amazon CloudFront CDN offers multiple options for streaming your media – both pre-recorded files and live events – at sustained, high throughput required for 4K delivery to global viewers.
3- Security.
CloudFront integrates seamlessly with AWS Shield for Layer 3/4 DDoS mitigation and AWS WAF for Layer 7 protection.
4- Customizable content delivery with Lambda@Edge.
Lambda@Edge is a feature of Amazon CloudFront that lets you run code closer to users of your application, which improves performance and reduces latency.
What is the AWS service that enables AWS architects to manage infrastructure as code?
1) Amazon EMR
2) AWS CloudFormation
3) AWS Config
4) Amazon SES
AWS CloudFormation
AWS CloudFormation allows you to use programming languages or a simple text file to model and provision, in an automated and secure manner, all the resources needed for your applications across all regions and accounts. You create a template that describes all the AWS resources that you want (like Amazon EC2 instances or Amazon RDS DB instances), and AWS CloudFormation takes care of provisioning and configuring those resources for you. You don’t need to individually create and configure AWS resources and figure out what’s dependent on what; AWS CloudFormation handles all that for you.
Which service provides object-level storage in AWS?
1) Amazon EFS
2) Amazon EBS
3) Amazon Instance Store
4) Amazon S3
Amazon S3
Amazon S3 is an object level storage built to store and retrieve any amount of data from anywhere – web sites and mobile apps, corporate applications, and data from IoT sensors or devices. It is designed to deliver 99.999999999% durability, and stores data for millions of applications used by market leaders in every industry.
Which of the following must an IAM user provide to interact with AWS services using the AWS Command Line Interface (AWS CLI)?
1) User ID
2) Access keys
3) Secret token
4) User name and password
Access keys
Access keys consist of an access key ID and secret access key, which are used to sign programmatic requests to AWS using the CLI or the SDK.
What does AWS Health provide? (Choose TWO)
1) Personalized view of AWS service health
2) Health checks for Auto Scaling instances
3) A dashboard detailing vulnerabilities in your applications
4) Detailed troubleshooting guidance to address AWS events impacting your resources
5) Recommendations for Cost Optimization
1) Personalized view of AWS service health
4) Detailed troubleshooting guidance to address AWS events impacting your resources
AWS Health (previously AWS Personal Health Dashboard) is the single place to learn about the availability and operations of AWS services. You can view the overall status of all AWS services, and you can sign in to access a personalized view of the health of the specific services that are powering your workloads and applications. AWS Health proactively notifies you when AWS experiences any events that may affect you, helping provide quick visibility and guidance to minimize the impact of events in progress, and plan for any scheduled changes, such as AWS hardware maintenance.
The benefits of the AWS Health include:
- A personalized View of Service Health: AWS Health gives you a personalized view of the status of the AWS services that power your applications, enabling you to quickly see when AWS is experiencing issues that may impact you. For example, in the event of a lost EBS volume associated with one of your EC2 instances, you would gain quick visibility into the status of the specific service you are using, helping save precious time troubleshooting to determine root cause.
- Proactive Notifications: The dashboard also provides forward looking notifications, and you can set up alerts across multiple channels, including email and mobile notifications, so you receive timely and relevant information to help plan for scheduled changes that may affect you. In the event of AWS hardware maintenance activities that may impact one of your EC2 instances, for example, you would receive an alert with information to help you plan for, and proactively address any issues associated with the upcoming change.
- Detailed Troubleshooting Guidance: When you get an alert, it includes remediation details and specific guidance to enable you to take immediate action to address AWS events impacting your resources. For example, in the event of an AWS hardware failure impacting one of your EBS volumes, your alert would include a list of your affected resources, a recommendation to restore your volume, and links to the steps to help you restore it from a snapshot. This targeted and actionable information reduces the time needed to resolve issues.
You have noticed that several critical Amazon EC2 instances have been terminated. Which of the following AWS services would help you determine who took this action?
1) AWS Trusted Advisor
2) EC2 Instance Usage Report
3) AWS CloudTrail
4) Amazon Inspector
AWS CloudTrail
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This event history simplifies security analysis, resource change tracking, and troubleshooting.
In order to implement best practices when dealing with a “Single Point of Failure,” you should attempt to build as much automation as possible in both detecting and reacting to failure. Which of the following AWS services would help? (Choose TWO)
1) ELB
2) Amazon EC2
3) Auto Scaling
4) Amazon Athena
5) ECR
1) ELB
3) Auto Scaling
You should attempt to build as much automation as possible in both detecting and reacting to failure. You can use services like ELB and Amazon Route53 to configure health checks and mask failure by only routing traffic to healthy endpoints. In addition, Auto Scaling can be configured to automatically replace unhealthy nodes. You can also replace unhealthy nodes using the Amazon EC2 auto-recovery feature. It won’t be possible to predict every possible failure scenario on day one. Make sure you collect enough logs and metrics to understand normal system behavior. After you understand that, you will be able to set up alarms that trigger automated response or manual intervention.
According to the AWS Acceptable Use Policy, which of the following statements is true regarding penetration testing of EC2 instances?
1) Penetration testing is performed automatically by AWS to determine vulnerabilities in your AWS infrastructure
2) Penetration testing can be performed by the customer on their own instances without prior authorization from AWS
3) Penetration testing is not allowed in AWS
4) AWS customers are only allowed to perform penetration testing on services managed by AWS
Penetration testing can be performed by the customer on their own instances without prior authorization from AWS
AWS customers are allowed to carry out security assessments and penetration tests against their AWS infrastructure without prior approval for 15 services (no need to memorize these services):
1- Amazon EC2 instances, WAF, NAT Gateways, and Elastic Load Balancers.
2- Amazon RDS.
3- Amazon CloudFront.
4- Amazon Aurora.
5- Amazon API Gateways.
6- AWS Lambda and Lambda Edge functions.
7- Amazon Lightsail resources.
8- Amazon Elastic Beanstalk environments.
9- AWS AppSync
10- Amazon Elastic Container Service
11- AWS Fargate
12- Amazon Elasticsearch
13- Amazon FSx
14- Amazon Transit Gateway
15- S3 hosted applications (targeting S3 buckets is strictly prohibited)
What does Amazon CloudFront use to distribute content to global users with low latency?
1) AWS Edge Locations
2) AWS Regions
3) AWS Global Accelerator
4) AWS Availability Zones
AWS Edge Locations
To deliver content to global end users with lower latency, Amazon CloudFront uses a global network of Edge Locations and Regional Edge Caches in multiple cities around the world. Amazon CloudFront uses this network to cache copies of your content close to your end-users. Amazon CloudFront ensures that end-user requests are served by the closest edge location. As a result, end-user requests travel a short distance, improving performance for your end-users, while reducing the load on the origin servers.
In the AWS Shared responsibility Model, which of the following are the responsibility of the customer? (Choose TWO)
1) Patching the Network infrastructure
2) Disk disposal
3) Configuring network access rules
4) Controlling physical access to compute resources
5) Setting password complexity rules
3) Configuring network access rules
5) Setting password complexity rules
The customer is responsible for securing their network by configuring Security Groups, Network Access control Lists (Network ACLs), and Routing Tables. The customer is also responsible for setting a password policy on their AWS account that specifies the complexity and mandatory rotation periods for their IAM users’ passwords.
You want to run a questionnaire application for only one day (without interruption), which Amazon EC2 purchase option should you use?
1) Spot instances
2) On-demand instances
3) Dedicated instances
4) Reserved instances
On-demand instances
With On-Demand instances, you pay for compute capacity by the hour or second (minimum of 60 seconds) with no long-term commitments. You can increase or decrease your compute capacity depending on the demands of your application and only pay for what you use.
The use of On-Demand instances frees you from the costs and complexities of planning, purchasing, and maintaining hardware and transforms what are commonly large fixed costs into much smaller variable costs. On-Demand instances also remove the need to buy “safety net” capacity to handle periodic traffic spikes.
Which statement is true regarding the AWS Shared Responsibility Model?
1) Patching the guest OS is always the responsibility of AWS
2) Responsibilities vary depending on the services used
3) Security of the managed services is the responsibility of the customer
4) Security of the IaaS services is the responsibility of AWS
Responsibilities vary depending on the services used
Customers should be aware that their responsibilities may vary depending on the AWS services chosen. For example, when using Amazon EC2, you are responsible for applying operating system and application security patches regularly. However, such patches are applied automatically when using Amazon RDS.
Adjusting compute capacity dynamically to reduce cost is an implementation of which AWS cloud best practice?
1) Parallelize tasks
2) Adopt monolithic architecture
3) Implement elasticity
4) Build security in every layer
Implement elasticity
In the traditional data center-based model of IT, once infrastructure is deployed, it typically runs whether it is needed or not, and all the capacity is paid for, regardless of how much it gets used. In the cloud, resources are elastic, meaning they can instantly grow ( to maintain performance) or shrink ( to reduce costs).
Which of the following can be described as a global content delivery network (CDN) service?
1) AWS Regions
2) AWS Direct Connect
3) AWS VPN
4) Amazon CloudFront
Amazon CloudFront
Amazon CloudFront is a global content delivery network (CDN) service that gives businesses and web application developers an easy and cost effective way to distribute content (such as videos, data, applications, and APIs) with low latency and high data transfer speeds. Like other AWS services, Amazon CloudFront is a self-service, pay-per-use offering, requiring no long term commitments or minimum fees. With CloudFront, your files are delivered to end-users using a global network of edge locations. CloudFront is integrated with other AWS services such as AWS Shield for DDoS mitigation, Amazon S3, Elastic Load Balancing or Amazon EC2 as origins for your applications, and Lambda@Edge to run custom code close to your viewers.
Which of the below options are related to the reliability of AWS? (Choose TWO)
1) Applying the principle of least privilege to all AWS resources
2) Automatically provisioning new resources to meet demand
3) All AWS services are considered Global Services, and this design helps customers serve their international users
4) Ability to recover quickly from failures
5) Providing compensation to customers if issues occur
2) Automatically provisioning new resources to meet demand
4) Ability to recover quickly from failures
The reliability term encompasses the ability of a system to recover from infrastructure or service disruptions, dynamically acquire computing resources to meet demand, and mitigate disruptions such as misconfigurations or transient network issues. The automatic provisioning of resources and the ability to recover from failures meet these criteria.
A developer is planning to build a two-tier web application that has a MySQL database layer. Which of the following AWS database services would provide automated backups for the application?
1) A MySQL database installed on an EC2 instance
2) Amazon Aurora
3) Amazon Neptune
4) Amazon DynamoDB
Amazon Aurora
Amazon Aurora is a MySQL and PostgreSQL-compatible relational database built for the cloud. Amazon Aurora combines the performance and availability of traditional enterprise databases with the simplicity and cost-effectiveness of open source databases. It delivers up to five times the throughput of standard MySQL and up to three times the throughput of standard PostgreSQL. Amazon Aurora is designed to be compatible with MySQL and with PostgreSQL, so that existing applications and tools can run without requiring modification. It is available through Amazon Relational Database Service (RDS), freeing you from time-consuming administrative tasks such as provisioning, patching, backup, recovery, failure detection, and repair.
A company is deploying a new two-tier web application in AWS. Where should the most frequently accessed data be stored so that the application’s response time is optimal?
1) Amazon ElastiCache
2) Amazon FSx
3) AWS Storage Gateway
4) Amazon EBS volume
Amazon ElastiCache
Amazon ElastiCache is a web service that makes it easy to deploy, operate, and scale an in-memory data store or cache in the cloud. The service improves the performance of web applications by allowing you to retrieve information from fast, managed, in-memory data stores, instead of relying entirely on slower disk-based databases.
The primary purpose of an in-memory data store is to provide ultrafast (submillisecond latency) and inexpensive access to copies of data. Querying a database is always slower and more expensive than locating a copy of that data in a cache. Some database queries are especially expensive to perform. An example is queries that involve joins across multiple tables or queries with intensive calculations. By caching (storing) such query results, you pay the price of the query only once. Then you can quickly retrieve the data multiple times without having to re-execute the query.
What are the benefits of having infrastructure hosted in AWS? (Choose TWO)
1) Increasing speed and agility
2) All of the physical security and most of the data/network security are taken care of for you
3) There is no need to worry about security
4) Gaining complete control over the physical infrastructure
5) Operating applications on behalf of customers
1) Increasing speed and agility
2) All of the physical security and most of the data/network security are taken care of for you
All of the physical security are taken care of for you. Amazon data centers are surrounded by three physical layers of security. “Nothing can go in or out without setting off an alarm”. It’s important to keep bad guys out, but equally important to keep the data in which is why Amazon monitors incoming gear, tracking every disk that enters the facility. And “if it breaks we don’t return the disk for warranty. The only way a disk leaves our data center is when it’s confetti.”
Most (not all) data and network security are taken care of for you. When we talk about the data/network security, AWS has a “shared responsibility model” where AWS and the customer share the responsibility of securing them. For example, the customer is responsible for creating rules to secure their network traffic using the security groups and is also responsible for protecting data with encryption. "Increasing speed and agility" is also a correct answer because in a cloud computing environment, new IT resources are only a click away, which means it requires less time to make those resources available to developers - from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.
What is the advantage of the AWS-recommended practice of “decoupling” applications?
1) Allows updates of any monolithic application quickly and easily
2) Reduces inter-dependencies so that failures do not impact other components of the application
3) Allows tracking of any API call made to any AWS service
4) Allows treating an application as a single, cohesive unit
Reduces inter-dependencies so that failures do not impact other components of the application
As application complexity increases, a desirable attribute of an IT system is that it can be broken into smaller, loosely coupled components. This means that IT systems should be designed in a way that reduces interdependencies—a change or a failure in one component should not cascade to other components. On the other hand if the components of an application are tightly coupled and one component fails, the entire application will also fail. Therefore when designing your application, you should always decouple its components.