AWS General Practitioner Flashcards

(112 cards)

1
Q

What are the EC2 instance types? (5 total)

A
General Purpose
Compute Optimized
Memory Optimized
Accelerated Computing
Storage Optimized
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which EC2 type is best for “[providing] a balance of compute, memory and networking resources, and can be used for a variety of diverse workloads”?

A

General Purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which EC2 instance is best for batch processing workloads?

A

Compute Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which EC2 instance is best for media transcoding?

A

Compute Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which EC2 instance is best for high performance web servers?

A

Compute Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which EC2 instance is best for High Performance Computing?

A

Compute Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which EC2 instance is best for scientific modeling?

A

Compute Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which EC2 instance is best for dedicated gaming servers?

A

Compute Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which EC2 instance is best for machine learning inference?

A

Compute Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which EC2 instance is best for workloads that process large data sets in memory?

A

Memory Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which EC2 instance is best for floating point number calculations?

A

Accelerated Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which EC2 instance is best for graphics processing?

A

Accelerated Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which EC2 instance is best for data pattern matching?

A

Accelerated Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which EC2 instance uses hardware accelerators or co-processors?

A

Accelerated Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which EC2 instance uses GPUs?

A

Accelerated Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which EC2 instance is best for workloads that require high, sequential read and write access to very large data sets on local storage?

A

Storage Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which EC2 instance is best for optimizing tens of thousands of low-latency, random I/o operations per second?

A

Storage Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What AWS feature would I use to put resources like Compute and Storage in locations closer to end users?

A

Local Zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is “a site that CloudFront uses to cache copies of your content for faster delivery to users at any location.”

A

Edge Location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What feature is used for visibility in resource performance and availability of AWS services and accounts

A

AWS Health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What service is used to monitor and block/allow web requests forwarded to edge locations?

A

Amazon WAF - Web Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How many elastic IP addresses are enabled to your AWS account?

A

Five

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

If you want different regions to communicate with each other using privateIP addresses without gateways or VPNs, what would you use?

A

VPC Peering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What Amazon Database instance would be best for content management, catalogs, or user profiles?

A

DocumentDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How many security groups can you assign to an instance in a VPC?
5
26
In the Shared Responsibility model, whose responsibility is it to secure customer data? The customer or AWS?
Customer
27
In the Shared Responsibility model, whose responsibility is it to manage platform, applications, and IAM?
Customer
28
In the Shared Responsibility model, whose responsibility is it to maintain the operating system, network, and firewall configuration?
Customer
29
In the Shared Responsibility model, whose responsibility is it to employ client-side data encryption?
Customer
30
In the Shared Responsibility model, whose responsibility is it to do server-side encryption?
Customer
31
In the Shared Responsibility model, whose responsibility is it to protect the network traffic with encryption, integrity, and identity?
Customer
32
In the Shared Responsibility model, whose responsibility is it to manage the physical hardware?
AWS
33
What are the three types of elastic load balancers?
Application Load Balancer Network Load Balancer Classic Load Balancer
34
What Elastic Load Balancer (ELB) would make routing decisions at the application layer?
Application Load Balancer
35
hat Elastic Load Balancer (ELB) would support path-based routing?
Application Load Balancer
36
hat Elastic Load Balancer (ELB) can route requests to one or more ports on each container instance in your cluster?
Application Load Balancer
37
What Elastic Load Balancer makes routing decisions at the transport layer?
Network Load Balancer
38
What Elastic Load Balancer can handle millions of requests per second?
Network Load Balancer
39
What Elastic Load Balancer makes routing decisions at either the transport layer (TCP/SSL) or the application layer (HTTP/HTTPS)?
Classic Load Balancer
40
What are the 4 values of the AWS Value Proposition?
Agility Elasticity Flexibility Security
41
Which value in the AWS value proposition does Speed of Implementation of services go under?
Agility
42
Which value in the AWS value proposition does "Experimentation" go under?
Agility
43
Which value in the AWS value proposition does "Innovation" fall under?
Agility
44
Which value in the AWS value proposition does "Scale on demand" go under?
Elasticity
45
Which value in the AWS value proposition does "Eliminate wasted capacity" go under?
Elasticity
46
Which value in the AWS value proposition does "Broad set of products" go under?
Flexibility
47
Which value in the AWS value proposition does "Low to no cost to entry" go under?
Flexibility
48
Which value in the AWS value proposition does "Amazon has acquired many certifications" go under?
Security
49
Which value in the AWS value proposition does "Shared Responsibility Model" go under?
Security
50
What are the events where an EC2 instance store will lose its data?
stop hibernate termination
51
What are the events where an EC2 store will not dump its instance store?
reboot
52
What are the 3 route tables associated with VPCs?
Subnet Gateway Local Gateway
53
What are the 6 pillars of the Well-Architected Framework?
``` Operational Excellence Security Reliability Performance Efficiency Cost Optimization Sustainability ```
54
Which pillar of Well-Architected AWS frameworks has attribute "perform operations as code"?
Operational Excellence
55
Which pillar of Well-Architected AWS frameworks has attribute "Make frequent, small, reversible changes"?
Operational Excellence
56
Which pillar of Well-Architected AWS frameworks has attribute "Refine Operations Procedures Frequently"?
Operational Excellence
57
Which pillar of Well-Architected AWS frameworks has attribute "Anticipate Failure"
Operational Excellence
58
Which pillar of Well-Architected AWS frameworks has attribute "Learn from all operational failures"?
Operational Excellence
59
Which aspect of the Well-Architected framework involves "collecting metrics that are used to measure the achievement of desired business outcomes"?
Operational Excellence
60
Which pillar of Well-Architected AWS frameworks has attribute "Enable Traceability"?
Security
61
Which pillar of Well-Architected AWS frameworks has attribute "Keep people away from data"?
Security
62
Which pillar of Well-Architected AWS frameworks has attribute "Implement a strong identity foundation"?
Security
63
Which pillar of Well-Architected AWS frameworks has attribute "Automatically recover from failure"?
Reliability
64
Which pillar of Well-Architected AWS frameworks has attribute "Test recovery procedures"?
Reliability
65
Which pillar of Well-Architected AWS frameworks has attribute "Scale horizontally to increase aggregate workload availability"?
Reliability
66
Which pillar of Well-Architected AWS frameworks has attribute "Stop guessing capacity"?
Reliability
67
Which pillar of Well-Architected AWS frameworks has attribute "Manage change in automation"?
Reliability
68
Which pillar of Well-Architected AWS frameworks has attribute "Democratize advanced technologies"?
Performance Efficiency
69
Which pillar of Well-Architected AWS frameworks has attribute "Go global in minutes"
Performance Efficiency
70
Which pillar of Well-Architected AWS frameworks has attribute "Use serverless architectures"?
Performance Efficiency
71
Which pillar of Well-Architected AWS frameworks has attribute "Experiment more often"?
Performance Efficiency
72
Which pillar of Well-Architected AWS frameworks has attribute "Consider mechanical sympathy"
Performance efficiency
73
Which pillar of Well-Architected AWS frameworks has attribute "implement cloud financial management"?
Cost optimization
74
Which pillar of Well-Architected AWS frameworks has attribute "understand your impact"?
Sustainability
75
Which pillar of Well-Architected AWS frameworks has attribute "maximize utilization"?
Sustainability
76
Which pillar of Well-Architected AWS frameworks has attribute "use managed services"?
Sustainability
77
Which pillar of Well-Architected AWS frameworks has attribute "Implement software and architecture patterns to perform load smoothing and maintain consistent high utilization of deployed resources"?
Sustainability
78
What AWS feature "allocates resources automatically allowing an organization to quickly deploy applications"?
Beanstalk
79
What AWS feature "enables requests for temporary, limited-privilege credentials for AWS IAM users"?
AWS Security Token Service (STS)
80
What are 3 AWS features built on EC2?
Redshift Elasticache ElasticSearch
81
What AWS tool would you use to find EC2 instances with low utilization?
Cost Explorer
82
What are the 4 key strategic benefits critical to implementing an optimal security posture?
Prevent Detect Respond Remediate
83
Which key strategic benefit does this file under? "Define user permissions and identities, infrastructure protection and data protection measures for a smooth and planned AWS adoption strategy."
Prevent
84
Which key strategic benefit does this file under? "Gain visibility into your organization’s security posture with logging and monitoring services. Ingest this information into a scalable platform for event management, testing, and auditing."
Detect
85
Which key strategic benefit does this file under? "Automated incident response and recovery to help shift the primary focus of security teams from response to analyzing root cause."
Respond
86
Which key strategic benefit does this file under? "Leverage event driven automation to quickly remediate and secure your AWS environment in near real-time."
Remediate
87
What AWS service is used to replace Microsoft Active Directory?
AWS Directory Service
88
What are the 6 AWS Security, Identity, and Compliance service categories?
``` Identity & access management Detection Infrastructure Protection Data Protection Incidence Response Compliance ```
89
Which AWS Security, Identity, and Compliance service does the following statement fall under? "Cloud single-sign-on (SSO) service"
Identity and Access Management | AWS Single Sign-On
90
Which AWS Security, Identity, and Compliance service does the following statement fall under? "Manage user access and encryption keys"
Identity and Access Management | AWS Identity & Access Management (IAM)
91
Which AWS Security, Identity, and Compliance service does the following statement fall under? "Identity management for your apps"
Identity and Access Management | Amazon Cognito
92
Which AWS Security, Identity, and Compliance service does the following statement fall under? "Simple, secure service to share AWS resources"
Identity and Access Management | AWS Resource Access Manager
93
Which AWS Security, Identity, and Compliance service does the following statement fall under? "Central governance and management across AWS accounts"
Identity and Access Management | AWS Organizations
94
Which AWS Security, Identity, and Compliance service does the following statement fall under? "Unified Security and Compliance Center"
Detection | AWS Security Hub
95
Which AWS Security, Identity, and Compliance service does the following statement fall under? "Managed threat detection service"
Detection | Amazon GuardDuty
96
Which AWS Security, Identity, and Compliance service does the following statement fall under? "Analyze application security"
Detection | Amazon Inspector
97
Which AWS Security, Identity, and Compliance service does the following statement fall under? "Record and evaluate configurations of your AWS resources"
Detection | AWS Config
98
Which AWS Security, Identity, and Compliance service does the following statement fall under? Track user activity and API usage
Detection | AWS CloudTrail
99
Which AWS Security, Identity, and Compliance service does the following statement fall under? Security management for IoT devices
Detection | AWS IoT Device Defender
100
Which AWS Security, Identity, and Compliance service does the following statement fall under? Network security
Infrastructure Protection | AWS Network Firewall
101
Which AWS Security, Identity, and Compliance service does the following statement fall under? DDoS protection
Infrastructure Protection | AWS Shield
102
Which AWS Security, Identity, and Compliance service does the following statement fall under? Filter malicious web traffic
Infrastructure Protection | AWS Web Application Firewall (WAF)
103
Which AWS Security, Identity, and Compliance service does the following statement fall under? Central management of firewall rules
Infrastructure Protection | AWS Firewall Manager
104
Which AWS Security, Identity, and Compliance service does the following statement fall under? Discover and protect your sensitive data at scale
Data Protection | Amazon Macie
105
Which AWS Security, Identity, and Compliance service does the following statement fall under? Key storage and management
Data Protection | AWS Key Management Service (KMS)
106
Which AWS Security, Identity, and Compliance service does the following statement fall under? Hardware based key storage for regulatory compliance
Data Protection | AWS CloudHSM
107
Which AWS Security, Identity, and Compliance service does the following statement fall under? Provision, manage, and deploy public and private SSL/TLS certificates
Data Protection | AWS Certificate Manager
108
Which AWS Security, Identity, and Compliance service does the following statement fall under? Rotate, manage and retrieve secrets
Data Protection | AWS Secrets Manager
109
Which AWS Security, Identity, and Compliance service does the following statement fall under? Investigate potential security issues
Incidence Response | Amazon Detective
110
Which AWS Security, Identity, and Compliance service does the following statement fall under? Fast, automated, cost- effective disaster recovery
Incidence Response | CloudEndure Disaster Recovery
111
Which AWS Security, Identity, and Compliance service does the following statement fall under? No cost, self-service portal for on-demand access to AWS’ compliance reports
Compliance | AWS Artifact
112
Which AWS Security, Identity, and Compliance service does the following statement fall under? Continuously audit your AWS usage to simplify how you assess risk and compliance
Compliance | AWS Audit Manager