AWS CLF-C02 Practice Set 2 Flashcards

(39 cards)

1
Q

Deploying AWS Server in an on-premise location

A

outpost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AWS services for data storage

A

Kinesis, AWS Glue, AWS EMR(Elastic Map Reduce), AWS Redshift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which AWS service combines multiple data sources into one?

A

AWS Glue service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the abbreviation of NoSQL

A

Not Only SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the examples of NoSQL database systems

A

MongoDB, DynamoDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which service we use for saving telemetry data coming from sensors

A

Kinesis database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some Big Data Technologies

A

Hadoop & Spark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can Big Data and unstructured data are same

A

No, they are not same, but they are related.,
Big data include both structured and unstructured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the examples of Unstructured Data

A

Examples of Unstructured Data:
> Text files (e.g., emails, reports, social media posts)
> Multimedia (e.g., images, audio, video)
> Web content (e.g., blogs, forums, web pages)
> Sensor data (e.g., IoT device logs)
> Chat logs and transcripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how we can access block storage

A

Block storage can be accessed by mounting it as a drive volume within the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Base Region of AWS

A

North Virginia (United States )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to verify your AWS account is Fully Activated

A
  1. Change the region to Base region - North Virginia
  2. Search for EC2 instance in search area

If an account is fully active, there are no warnings here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to obtain details about the available limits for services.

A

Go to the section “Service Quotas” in AWS console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of computing service allows you to pay by the hour or second?

A

On-demand standard instances

A type of EC2 instance where you pay for computing capacity by the hour or second, You pay only for what you use, and the instance automatically scales up or down with changing workloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to access free tier billing dashboard

A
  1. Navigate to your username on the right-hand side,
  2. Click on Billing and cost management,
  3. Now go for the free tier on left-hand side
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of key-pair file is used by putty

17
Q

What is AWS region

A
  • Collection of AZs Availability Zones
  • Its an Logical Entity
  • A Geographic Area
18
Q

What are Availability Zones

A

Geographically separated data centers within a region
They are physically and logically isolated from each other, with independent power, cooling, and networking infrastructure

19
Q

What is the statdard distance between data centers within a Availability Zone

A

Distance between data center in an AZ is not more than 100 kms,
to achieve single digit mili second latency

20
Q

What are some Global services in AWS

A

Route 53,
CloudFront,
IAM

21
Q

What is the use of API in AWS

A

Each service in AWS has its own API. These APIs make it possible to configure AWS services remotely.

22
Q

Can SSH key-pair can be re-downloaded

A

No,
You have to create new

23
Q

What are the ways to define IAM Policy in AWS

A

IAM Policies are defined in two ways:
1. Identity-Based Policy
2. Resource-Based Policy

24
Q

Identity based policy defines what ?

A

It defines the user’s authorities to access the resources

25
Resource-based policy defines what
It defines who can access the resources
26
What is an IAM policy
Permissions for identity and resources are combined to form a policy.
27
What is an Inline policy
The policy linked to a single identity is an addition to an already-existing policy; it cannot be applied to another identity.
28
Types of IAM policies
AWS Managed Policies Customer-Managed Policies Inline Policies (It is only created under user management section under IAM )
29
What are the components of IAM Policy
Principal, Service, Actions, Effect, Condition Principal - Who this policy attached to , to user or to to resource . Service - For which service you creating this policy Action - Several actions are associated with AWS services Effect - Allow or deny actions on services Conditions - Actions on resources depend on whether specific conditions are met.
30
How to create an Inline police
1, Login to AWS console, and go for IAM 2. Click on users under Access Management in the pane on the left. 3. Click on the user for which you want to make inline policy 4. In the permissions tab, select the Add permissions drop-down menu. Next, select Inline policy and create the policy.
31
What is IAM Role ?
An **IAM role** in AWS is a set of permissions that define what actions trusted entities can perform on AWS resources. These entities include: 1. AWS services 2. Users from other AWS accounts (Cross Account Access) 3. External identity providers (e.g., Google, Facebook) 4. Applications or scripts Roles are used when a service needs to access another AWS service. Instead of assigning policies directly to the service, you create a role, attach the necessary policies, and assign the role to the service. **Note:** Roles are mainly designed for use by AWS services, not individual users.
32
By which IAM policy a user get full permission on EC2 instance
AmazonEC2FullAccess
33
What are the actions of AWS EC2 service in IAM policy, to start stop & get list of running instances
1. StartInstance, 2. StopInstance, 3. DescribeInstance
34
How to login with two AWS accounts in same browser
Login to first account in normal browser, & login to second user in private window
35
Where identity-based policies are attached
Identity-based policies are attached to IAM users, groups, or roles (identities) and define what those identities can do
36
Where resource-based policies are attached
Resource-based policies are attached to AWS Services
37
Distance Between AWS Regions
AWS regions are typically hundreds to thousands of kilometers Ex. Mumbai ↔ Singapore: ~3,900 km
38
Best practice to Name a new Bucket
Use region name combined with user Ex. hemant-bucket-in-mumbai-region
39
Can you rename a user in AWS
No