AWS Cloud Practiioner Flashcards
Describe the role of Security Groups in AWS.
Security Groups are fundamental to network security in AWS, controlling inbound and outbound traffic to EC2 instances.
What do Security Groups in AWS primarily consist of?
Security groups in AWS primarily consist of rules that dictate how traffic is allowed into or out of EC2 instances.
How can Security Group rules in AWS be referenced?
Security Group rules in AWS can be referenced by IP or by another Security Group.
Define Inbound traffic in the context of Security Groups in AWS.
Inbound traffic in Security Groups refers to traffic coming into the EC2 instance.
Explain the significance of Outbound traffic in Security Groups in AWS.
Outbound traffic in Security Groups determines the traffic leaving the EC2 instance.
Describe the role of security groups in EC2 instances.
Security groups as a ‘firewall’ on EC2 instances, regulating access to ports, authorized IP ranges (IPv4 and IPv6), inbound network control, and outbound network control.
What aspects of network traffic do security groups regulate in AWS EC2 instances?
Security groups in AWS EC2 instances regulate access to ports, authorized IP ranges (IPv4 and IPv6), inbound network traffic (from other to the instance), and outbound network traffic (from the instance to other).
What is the purpose of Security Groups in AWS?
Security Groups in AWS act as virtual firewalls that control inbound and outbound traffic for EC2 instances.
Describe the concept of Inbound and Outbound rules in Security Groups.
Inbound rules in Security Groups control the incoming traffic to an EC2 instance, while Outbound rules manage the outgoing traffic from the instance.
How do Security Groups in AWS help in enhancing network security?
Security Groups in AWS help enhance network security by allowing users to define rules that filter traffic based on IP addresses and ports, thereby restricting unauthorized access to EC2 instances.
Describe Security Groups in AWS.
Security Groups in AWS can be attached to multiple instances, are locked down to a region/VPC combination, and control inbound and outbound traffic.
How does a security group function in relation to EC2 instances?
A security group in AWS functions outside the EC2 instance; if traffic is blocked by the security group, the EC2 instance won’t receive it.
What is the recommended practice regarding SSH access in security groups?
It is recommended to maintain a separate security group specifically for SSH access.
What could be the issue if an application is not accessible and times out?
If an application is not accessible and times out, it could be due to a security group issue.
What is the default setting for inbound and outbound traffic in security groups?
All inbound traffic is blocked by default, while all outbound traffic is authorized by default.
Describe the concept of referencing other security in AWS.
Referencing security groups in AWS involves allowing inbound traffic from instances associated with one security group to instances associated with another security group.
Define an EC2 Instance in AWS.
An EC2 Instance is a virtual server in the Amazon Elastic Compute Cloud (EC2) service that can run applications and host data on the AWS infrastructure.
How can security groups be used to control inbound traffic in AWS?
Security groups in AWS can be used to control inbound traffic by specifying rules that allow or deny traffic based on protocols, ports, and source/destination IP addresses.
Do security groups in AWS support cross-referencing each other?
Yes, security groups in AWS support cross-referencing each other, allowing instances associated with one security group to communicate with instances associated with another security group by authorizing the necessary inbound rules.
Describe the relationship between EC2 instances and security groups in AWS.
In AWS, EC2 instances can be associated with one or more security groups, which act as virtual firewalls to control inbound and outbound traffic to the instances based on defined rules.
Describe SSH and its typical use.
SSH stands for Secure Shell and is used to log into a Linux instance securely.
What is the purpose of FTP and how is it commonly used?
FTP, or File Transfer Protocol, is used to upload files into a file share.
Define SFTP and explain its relationship with SSH.
SFTP stands for Secure File Transfer Protocol and is used to upload files using SSH for added security.
How is HTTP typically used and what does it allow users to do?
HTTP is used to access unsecured websites, allowing users to view web content.