Compute Service Flashcards

(37 cards)

1
Q

what can you use as a firewall?

A

security group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what kind of service is EC2?

A

infrastructure as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which instance types do you know?

A

general purpose, compute optimized, memory optimized, storage optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

name a few examples for compute optimized instances

A
  • batch processing workloads
  • media transcoding
  • high performance web servers
  • high performance computing (HPC)
  • scientific modeling & machine learning
  • dedicated gaming servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

name a few examples for memory optimized instances

A
  • floating point number calculations
  • graphic processing
  • data pattern matching
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

name a few examples for storage optimized instances

A
  • high frequency online transaction processing (OLTP) systems
  • relational and NoSQL databases
  • cache for in-memory databases (redis)
  • data warehousing applications
  • distributed file systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what can you use to customize the software installation when the instance is launched?

A

apply an AMI to an instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what can you use to balance the traffic to several instances?

A

Elastic Load Balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what can you use to automatically add or remove instances (scale horizontaly)?

A

EC2 Auto Scaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What service runs code in response to an event (trigger), without you needing to provide (or manage) a server?

A

AWS Lambda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name a few examples of triggers for AWS Lambda

A

click on a website, an api-call, an image upload, output from a connected device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is IAM a global service?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can you say about the root user?

A
  • is created by default

- shouldn’t be used or shared!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are user?

A

Users are people within your organization and can be grouped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Can groups contain other groups?

A

No, groups can only contain users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two rules for groups regarding users?

A

Users don’t have to belong to a group and user can belong to multiple groups

17
Q

What are policies?

A

Policies are JSON documents, which can be assigned to users or groups and define the permissions of the users

18
Q

What is the principle you should use regarding policies?

A

Least privilege principle

19
Q

What password policy can you set up?

A
  • minimum password length
  • lowercase letters, numbers, non-alphanumeric characters
  • prevent password re-use
20
Q

What can you use to make your account more safe?

A

multifactor autorization (MFA)

21
Q

Name the three options to access AWS and how they are protected:

A
  • AWS Management Console (protected by password + MFA)
  • AWS Command Line Interface (CLI) (protected by access key)
  • AWS Software Developer Kit (SDK) - for code: protected by access keys
22
Q

Where can you get access keys and who manages the access keys?

A

Access Keys are generated through the AWS Console and users manage their own access keys

23
Q

Can you share your access keys with others?

A

No! Like passwords you should keep them secret!

24
Q

With what can you compare Access Key ID and Secret Access Key?

A

Access Key ID is like username and Secret Access Key is like password

25
Can you assign IAM Roles to Services?
Yes, because some services need to perform actions on your behalf and you have to assign permissions to these services with IAM Roles
26
Who provides (or can provide) AMIs?
- AWS (public AMI) - AWS marketplace (made and maintained by a user) - your own AMI (made and maintained by yourself)
27
What stand AMI for?
Amazon Machine Image
28
Can EC2 Auto Scaling scale across zones?
Yes
29
What are the keywords for EC2 Auto Scaling?
dynamic scaling -> responds to changing demands | predictive scaling -> automatically schedules the right number of instances based on predicted demands
30
What is the usage of ELB health check?
The health check is used to only send requests to healthy instances
31
What are the three types of ELBs and what are they used for?
- Application Load Balancer -> specially designed for web applications with http and https traffic and operates at the application layer - Network Load Balancer -> operate at the network layer and are more resilient to sudden traffic spikes - Classic Load Balancer -> are the previous generation of Load Balancers designed for Amazon EC2 Classic instances
32
name six reasons for ELB
- spread load across multiple downstream instances - expose a single point of access (DNS) to your application - seamlessly handle failure of downstreams instances - do regular health checks to your instances - provide SSL termination (HTTPS) for your websites - high availability across zones
33
What is Amazon Machine Image?
AMI is a customization of an EC2 instances
34
What can you do with AMI?
You can add own software, configuration, operating system, monitoring etc.
35
Are AMIs built for a specific region?
Yes, but they can be copied across regions
36
What is the EC2 Image Builder for?
- automate the creation of Virtual Machines or container images - automate the creation, maintain, validate and test EC2 AMIs - can be run on a schedule (for example weekly or whenever packages are updated etc.)
37
What are the prices for EC2 Image Builder?
This service is free (only pay for underlying services)