Main Flashcards

1
Q

What are the four Disaster Recover Strategies by increasing RPO / RTO ?

A
  1. Backup & Restore (RPO / RTO = Hours)
  2. Pilot Light (RPO / RTO) = 10s of Minutes
  3. Warm Standby (RPO / RTO) = Minutes
  4. Multi-site Active / Active (RPO / RTO) = Realtime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ENA and EFA? What are the differences

A

ENA = Elastic Network Adapter
Custom network interface optimized to deliver high throughput and packet per second

EFA = Elastic FIber Adapter
Network device that you can attach to your Amazon EC2 instance to accelerate High Performance Computing (HPC) and machine learning applications

Difference:
EFA provides a OS-bypass functionality. OS-bypass is an access model that allows HPC and machine learning applications to communicate directly with the network interface hardware to provide low-latency, reliable transport functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the (4) S3 Encryption Types and their descriptions?

A
  1. SSE-S3 - Amazon S3 manage the data and the encryption keys
  2. SSE-KMS - AWS manages the data key but you manage the AWS KMS keys in AWS KMS
  3. SSE-C - you manage the encryption key, passing it as part of the request
  4. Client side Encryption - Data is encrypted locally before its passed to the Amazon S3 service. The Amazon S3 service receives your encrypted data; it does not play a role in encrypting or decrypting it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the ways (6) to control and manage access to a REST API in API Gateway ?

A

Resource policies
Lets you create resource-based policies to allow or deny access to your APIs and methods from specified source IP addresses or VPC endpoints.

Standard AWS IAM roles and policies
Offers flexible and robust access controls that can be applied to an entire API or individual methods. IAM roles and policies can be used for controlling who can create and manage your APIs, as well as who can invoke them.

IAM tags
Can be used together with IAM policies to control access.

Endpoint policies for interface VPC endpoints
Allows you to attach IAM resource policies to interface VPC endpoints to improve the security of your private APIs

Lambda authorizers
Lambda functions that control access to REST API methods using bearer token authentication—as well as information described by headers, paths, query strings, stage variables, or context variables request parameters. Lambda authorizers are used to control who can invoke REST API methods. (SAML, oAuth)

Amazon Cognito user pools
Lets you create customizable authentication and authorization solutions for your REST APIs. Amazon Cognito user pools are used to control who can invoke REST API methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the different types (4) of services that return temporary security credentials ?

A

AssumeRole
Returns a set of temporary security credentials that you can use to access AWS resources that you might not normally have access to.

AssumeRoleWithSAML
Returns a set of temporary security credentials for users who have been authenticated via a SAML authentication response.

AssumeRoleWithWebIdentity
Returns a set of temporary security credentials for users who have been authenticated in a mobile or web application with a web identity provider. Example providers include Amazon Cognito, Login with Amazon, Facebook, Google, or any OpenID Connect-compatible identity provider.

GetSessionToken
Returns a set of temporary credentials for an AWS account or IAM user. (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

S3 Security Types (4)

A

IAM Policies
Bucket Policies
Object Access Control List
Bucket Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is EFS ?

A
Elastic File System
Managed NFS
Only Linux
Web Server
Data Sharing
NFS 4.1
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the different types (3) of EFS Performance Modes ?

A

General Purpose
Latency-sensitive use cases, like web serving environments, content management systems, home directories, and general file serving

Max I/O
Highly parallelized applications and workloads, such as big data analysis, media processing, and genomic analysis, can benefit from this mode.

Throughput Mode
File system's throughput scales as the amount of data stored in the EFS Standard or One Zone storage class grows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some of the EC2 Placement Group Strategies (3) ?

A

Cluster – packs instances close together inside an Availability Zone. This strategy enables workloads to achieve the low-latency network performance necessary for tightly-coupled node-to-node communication that is typical of HPC applications.

Partition – spreads your instances across logical partitions such that groups of instances in one partition do not share the underlying hardware with groups of instances in different partitions. This strategy is typically used by large distributed and replicated workloads, such as Hadoop, Cassandra, and Kafka.

Spread – strictly places a small group of instances across distinct underlying hardware to reduce correlated failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens during EC2 Hibernate?

A

The instance moves to the stopping state.

Amazon EC2 signals the operating system to perform hibernation (suspend-to-disk).

The hibernation freezes all of the processes, saves the contents of the RAM to the EBS root volume, and then performs a regular shutdown.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is EC2 Nitro ?

A

The next generation of EC2 instances

Faster innovation
The Nitro System is a rich collection of building blocks that can be assembled in many different ways, giving us the flexibility to design and rapidly deliver EC2 instance types with an ever-broadening selection of compute, storage, memory, and networking options. This innovation also leads to bare metal instances where customers can bring their own hypervisor or have no hypervisor.

Enhanced security
The Nitro System provides enhanced security that continuously monitors, protects, and verifies the instance hardware and firmware. Virtualization resources are offloaded to dedicated hardware and software minimizing the attack surface. Finally, Nitro System’s security model is locked down and prohibits administrative access, eliminating the possibility of human error and tampering.

Better performance and price

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the types (6) of EC2 instances and their purposes ?

A

On-demand
Pay for compute capacity by the hour or the second depending on which instances you run. No longer-term commitments or upfront payments are needed. You can increase or decrease your compute capacity depending on the demands of your application and only pay the specified per hourly rates for the instance you use.

Savings Plans
Savings Plans are a flexible pricing model that offer low prices on EC2 and Fargate usage, in exchange for a commitment to a consistent amount of usage (measured in $/hour) for a 1 or 3 year term

Reserved
   Standard Reserved Instance
     One-year to three-year term
     Enables you to modify Availability Zone, scope, networking type, and instance size (within the same 
 instance type) of 
     your Reserved Instance.

Convertible Reserved Instance
One-year to three-year term
Enables you to exchange one or more Convertible Reserved Instances for another Convertible Reserved Instance with
a different configuration, including instance family, operating system, and tenancy

Spot Instances
Allow you to request spare Amazon EC2 computing capacity for up to 90% off the On-Demand price

Dedicated Hosts
A physical EC2 server dedicated for your use. Dedicated Hosts can help you reduce costs by allowing you to use your existing server-bound software licenses,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name 2 IAM Security Tools?

A

IAM Credential Report
Status of the users’ credentials, including passwords, access keys, MFA devices, and signing certificates

IAM Access Advisor
Helps you audit service access, remove unnecessary permissions, and set appropriate permissions providing the last timestamp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the port for Windows RDP ?

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name four MFA device options ?

A

Virtual
A software app that runs on a phone or other device and emulates a physical device.

U2F security key
A device that you plug into a USB port on your computer

Hardware MFA device
A hardware device that generates a six-digit numeric code based upon a time-synchronized one-time password algorithm

SMS text message-based MFA
A type of MFA in which the IAM user settings include the phone number of the user’s SMS-compatible mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Spot Fleets ?

What are four Spot Fleet strategies ?

A

Definition: Set of Spot Instances and optionally On-Demand Instances that is launched based on criteria that you specify

Strategies:

Lowest Price
The Spot Instances come from the Spot capacity pool with the lowest price. This is the default strategy.

Diversified
The Spot Instances are distributed across all Spot capacity pools.

Capacity Optimized
The Spot Instances come from the Spot capacity pool with optimal capacity for the number of instances that are launching.

InstancePoolsToUseCount
The Spot Instances are distributed across the number of Spot capacity pools that you specify. This parameter is valid only when used in combination with lowest-price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When does RDS Auto Scaling happen ? (3)

A

Free storage < 10 %
Low storage lasts at least 5 minutes
6 hours since last modificaiton

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the 2 types of ElasticCache in memory stores supported ?
What are the use-cases for each ?

A

Redis
Advanced Data Structures
Snapshots
Replication
Transactions
Pub/Sub
Lua scripting
Geospatial support
Ability to tier data between memory and SSD using the ? node type.
Ability to authenticate users with role-based access control.
You need Redis streams, a log data structure that allows producers to append new items in real time and also allows consumers to consume messages either in a blocking or non-blocking fashion.
You need both encryption and dynamically adding or removing shards from your Redis (cluster mode enabled) cluster.
Ability to dynamically add or remove shards from your Redis (cluster mode enabled) cluster.

Memcached
Multithreaded Architecture
You need the simplest model possible.
You need to run large nodes with multiple cores or threads.
You need the ability to scale out and in, adding and removing nodes as demand on your system increases and decreases.
You need to cache objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name 3 patterns for ElasticCache ?

A

Lazy Loading
Loads data into the cache only when necessary

Write through
Adds data or updates data in the cache whenever data is written to the database

Adding TTL
Avoid cluttering up the cache with extra data. Can be used with the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a reader endpoint and why use one?

A

Provide high availability for your read-only queries from your DB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the four types of Load Balancers and their features?

A

Classic Load Balancer
Layer 4/7
Protocol listeners: TCP, SSL/TLS, HTTP, HTTPS

Application Load Balancer
Layer 7
Target: IP, Instance, Lambda
Protocol listeners: HTTP, HTTPS, gRPC

Network Load Balancer
Layer 4
Target: IP, Instance, Application Load Balancer
Protocol listeners: TCP, UDP, TLS

Gateway Load Balancer
Layer 3 Gateway + Layer 4 Load Balancing
Target: IP, Instance
Protocol listeners: IP
Deploy, scale, and manage your third-party virtual appliances.

https://aws.amazon.com/elasticloadbalancing/features/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Name and describe the EBS Volume Types?

A

General Purpose SSD
Provides a balance of price and performance. Recommended for most workloads.
Low-latency interactive apps
Development and test environments

Provisioned IOPS SSD
Provides high performance for mission-critical, low-latency, or high-throughput workloads.
Sub-millisecond latency
Sustained IOPS performance
More than 64,000 IOPS or 1,000 MiB/s of throughput
I/O-intensive database workloads

Hard disk drives (HDD)
Throughput Optimized HDD — A low-cost HDD designed for frequently accessed, throughput-intensive workloads.
Big data
Data warehouses
Log processing

Cold HDD — The lowest-cost HDD design for less frequently accessed workloads.
Throughput-oriented storage for data that is infrequently accessed
Scenarios where the lowest storage cost is important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Cloudfront signed URL?
What is a S3 pre-signed URL ?

What are the differences?

A

In CloudFront, a signed URL allow access to a path. Therefore, if the user has a valid signature, they can access it, no matter the origin.

In S3, a signed URL issue a request as the signer user. When you sign a request, you need to provide IAM credentials, so accessing a signed URL has the same effect as that user would have done it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the three Cloudfront Price Classes?

A

Class ALL: This default price class includes all regions
Class 200: Only USA, Europe, HK, Singapore and Japan
Class 100: Only USA and Europe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are three Glacier retrieval options ?

A

Expedited — Expedited retrievals allow you to quickly access your data when occasional urgent requests for a subset of archives are required. For all but the largest archives (250 MB+), data accessed using Expedited retrievals are typically made available within 1–5 minutes. Provisioned Capacity ensures that retrieval capacity for Expedited retrievals is available when you need it. For more information, see Provisioned Capacity.

Standard — Standard retrievals allow you to access any of your archives within several hours. Standard retrievals typically complete within 3–5 hours. This is the default option for retrieval requests that do not specify the retrieval option.

Bulk — Bulk retrievals are S3 Glacier’s lowest-cost retrieval option, which you can use to retrieve large amounts, even petabytes, of data inexpensively in a day. Bulk retrievals typically complete within 5–12 hours.

26
Q

Name the types of S3 Storage Classes ?

A
S3 Standard	
S3 Intelligent-Tiering*
S3 Standard-IA
S3 One Zone-IA†
S3 Glacier Instant Retrieval
S3 Glacier Flexible Retrieval	
S3 Glacier Deep Archive

https://aws.amazon.com/s3/storage-classes/

27
Q

Define the following :

A
AAAA
CNAME
NS
Alias
A

A - v4 IP Address
AAAA - v6 IP Address
CNAME - forwards one domain or subdomain to another, never use a CNAME record for your root domain name
NS - name server
Alias - points your domain name to a hostname instead of an IP address (Apex Zone)

28
Q
What services typically run behind the following ports?
21
22
80
443
5432
3306
1521
1433
3389
A
21 - ftp
22 - ssh
80 - http
443 - https
5432 - postgres
3306 - mysql
1521 - oracle 
1433 - SQL Server
3389 - RDP
29
Q

What are three API Gateway types ?

A

Edge-optimized API endpoints
An edge-optimized API endpoint is best for geographically distributed clients. API requests are routed to the nearest CloudFront Point of Presence (POP). This is the default endpoint type for API Gateway REST APIs.
Edge-optimized APIs capitalize the names of HTTP headers (for example, Cookie).

Regional API endpoints
A regional API endpoint is intended for clients in the same region. When a client running on an EC2 instance calls an API in the same region, or when an API is intended to serve a small number of clients with high demands, a regional API reduces connection overhead.

Private API endpoints
A private API endpoint is an API endpoint that can only be accessed from your Amazon Virtual Private Cloud (VPC) using an interface VPC endpoint, which is an endpoint network interface (ENI) that you create in your VPC.

30
Q

What are six AWS Lambda limits for the following?

Memory
Execution Time
Environment Variables
Disk Capacity
Concurrency
Deployment Size
A
Memory - 128MB to 10 GB
Execution Time - 15 mins
Environment Variables - 4KB
Disk Capacity - 512 MB
Concurrency - 1000 
Deployment SIze - 50MB
31
Q

What is a Storage Gateway?

What are four types of Storage Gateways ?

A

AWS Storage Gateway is a set of hybrid cloud storage services that provide on-premises access to virtually unlimited cloud storage.

Amazon S3 File Gateway
Enables you to store and retrieve objects in Amazon S3 using file protocols such as Network File System (NFS) and Server Message Block (SMB). Objects written through S3 File Gateway can be directly accessed in S3.

Amazon FSx File Gateway
Enables you to store and retrieve files in Amazon FSx for Windows File Server using the SMB protocol. Files written through Amazon FSx File Gateway are directly accessible in Amazon FSx for Windows File Server.

Volume Gateway
Provides block storage to your on-premises applications using iSCSI connectivity. Data on the volumes is stored in Amazon S3 and you can take point in time copies of volumes which are stored in AWS as Amazon EBS snapshots. You can also take copies of volumes and manage their retention using AWS Backup. You can restore EBS snapshots to a Volume Gateway volume or an EBS volume.

Tape Gateway
Provides your backup application with an iSCSI virtual tape library (VTL) interface, consisting of a virtual media changer, virtual tape drives, and virtual tapes. Virtual tapes are stored in Amazon S3 and can be archived to Amazon S3 Glacier or Amazon S3 Glacier Deep Archive.

32
Q

What are Service Account Policies (SCP) ?

A

Service control policies (SCPs) are a type of organization policy that you can use to manage permissions in your organization. SCPs offer central control over the maximum available permissions for all accounts in your organization

33
Q

What is CloudWatch, CloudTrail and Config?

A

Config
reports on what has changed,
focused on the configuration of AWS resources and reports with detailed snapshots on how resources have changed.

CloudTrail
reports on who made the change, when, and from which location.
Focuses on the events, or API calls, that drive changes in resources
focuses on the user, application, and activity performed on the system.
It is a web service that records API activity in AWS account.
It logs information on
who made a request
the services used
the actions performed
parameters for the actions
the response elements returned by the AWS service.
Stores Logs in specific log group.
Logs provide specific information on what occurred in AWS account.
focuses more on AWS API calls made in AWS account.
helps in meeting compliance and regulatory standards.
Usually delivers an event within 15 minutes of the API call.

CloudWatch
It is a monitoring service for AWS resources and applications.
collects and track metrics and
collect and monitor log files
set alarms
Logs stored in an S3 bucket
Logs reports on application logs
Events are near real time stream of system events
Events describe changes to AWS resources.
Usually delivers metric data in 5 minutes periods for basic monitoring and 1 minute periods for detailed monitoring.
Logs Agent will send log data every five seconds by default.

34
Q

What is RPO?

What is RTO?

A

The recovery time objective (RTO) is the targeted duration of time between the event of failure and the point where operations resume.

A recovery point objective (RPO) is the maximum length of time permitted that data can be restored from, which may or may not mean data loss. It is the age of the files or data in backup storage required to resume normal operations if a computer system or network failure occurs.

To more concisely define the difference: RPO is the time from the last data backup until an incident occurred [that may have caused data loss] and RTO is the time that you set to recover the lost data. Try to imagine them on a timeline as illustrated below.

35
Q

What is AWS Cogito?

What are three Cogito types?

A

Amazon Cognito is a simple user identity and data synchronization service that helps you securely manage and synchronize app data for your users across their mobile devices.

User Pools
User pools are for authentication (identify verification). With a user pool, your app users can sign in through the user pool or federate through a third-party identity provider (IdP).

Identity Pools
Identity pools are for authorization (access control). You can use identity pools to create unique identities for users and give them access to other AWS services.

Cognito Sync
Amazon Cognito Sync is an AWS service and client library that enables cross-device syncing of application-related user data. You can use it to synchronize user profile data across mobile devices and the web without requiring your own backend.

36
Q

What is the AWS Service where you store your code ? (Similar to GitHub)

A

CodeCommit

37
Q

What is the AWS Service for building and testing in your CICD pipelines ?

A

CodeBuild

38
Q

What is the service used to deeply packaged code onto EC2 and AWS Lambda ?

A

CodeDeploy

39
Q

What is the AWS service that orchestrates actions of your CICD Pipelines ? (build stages, manual approvals, many deploys, etc)

A

CodePipeline

40
Q

What is the service for Infrastructure as Code ? The declarative way to manage, create and update resources.

A

CloudFormation

41
Q

What is the Docker Container Management system on AWS. (Helps with micro services)

A

ECS (Elastic Container Service)

42
Q

What is the Docker image repository on AWS? Docker images can be pusged and pulled from this service.

A

ECR (Elastic Container Repository)

43
Q

What is the service to orchestrate / Coordinate Lambda functions and ECS containers into a workflow ?

A

Step Functions

44
Q

What is the old way of orchestrating a workflow ?

A

SWF (Simple workflow Service)

45
Q

What is the managed cluster platform that simplifies running big data frameworks ?

A

Amazon EMR (previously called Amazon Elastic MapReduce)

46
Q

What is the service for managed Puppet and Chef?

A

OpsWorks

47
Q

What is the ETL Service called on AWS ?

A

Glue

48
Q

What is the managed media (video, music) converter service that converts into various optimized formats ?

A

ElasticTranscoder

49
Q

What are Organizations ?

A

Hierarchy and centralized management of multiple AWS Accounts

50
Q

What is the GraphQL as a service on AWS ?

A

AppSync

51
Q

What are AWS Workspaces ?

A

Virtual Desktop on Demand in the Cloud. Replaces traditional on-premise VDI Infrastructure

52
Q

What is AWS Fargate ?

A

AWS Fargate is a serverless, pay-as-you-go compute engine that lets you focus on building applications without managing servers. AWS Fargate is compatible with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS).

53
Q

What is a AWS Transit Gateway ?

A

AWS Transit Gateway connects VPCs and on-premises networks through a central hub.

54
Q

What is an AWS Global Accelerator Endpoint ?

A

Global Accelerator continually monitors the health of all endpoints that are included in a standard endpoint group. It routes traffic only to the active endpoints that are healthy

55
Q

What is a Gateway Endpoint ?

A

A gateway endpoint is a gateway that is a target for a route in your route table used for traffic destined to either Amazon S3 or DynamoDB.

56
Q

What is AWS Datasync ?

A

A secure, online service that automates and accelerates moving data between on premises and AWS storage services.

57
Q

What is Amazon Kinesis Data Firehose ?

A

Amazon Kinesis Data Firehose is an extract, transform, and load (ETL) service that reliably captures, transforms, and delivers streaming data to data lakes, data stores, and analytics services.

58
Q

What are the Amazon S3 Glacier and S3 Glacier Deep Archive retrieval options ?

A

Storage class Expedited Standard Bulk
Amazon S3 Glacier 1–5 minutes 3–5 hours 5–12 hours
S3 Glacier Deep Archive Not available Within 12 hours Within 48 hours

Note: Deep Archive has a minimal storage timeframe of 180 days

59
Q

What is AWS EMR ?

A

A cloud big data platform for running large-scale distributed data processing jobs, interactive SQL queries, and machine learning (ML) applications using open-source analytics frameworks such as Apache Spark, Apache Hive, and Presto.

60
Q

What are the differences?

Simple Scaling
Scheduled Scaling
Step Scaling

A

Simple Scaling
The main issue with simple scaling is that after a scaling activity is started, the policy must wait for the scaling activity or health check replacement to complete and the cooldown period to expire before responding to additional alarms.

Step Scaling
When step adjustments are applied, and they increase or decrease the current capacity of your Auto Scaling group, the adjustments vary based on the size of the alarm breach.

Scheduled Scaling
Scheduled scaling helps you to set up your own scaling schedule according to predictable load changes.