MyCloudGuru Flashcards
(160 cards)
Which of the following are a part of AWS’ Networking & Content Delivery services?
(Choose 2)
A) Lambda
B) EC2
C) CloudFront
D) VPC
C) CloudFront
D) VPC
The VPC service is a member of which group of AWS services in the ‘All services’ view of the AWS Portal?
A) Networking & Content Delivery
B) Database Services
C) Global Infrastructure
D) Compute Services
A) Networking & Content Delivery
A Virtual Private Cloud (VPC) is a virtual network dedicated to a single AWS account. It is logically isolated from other virtual networks in the AWS cloud. VPC is found in the “Networking & Content Delivery” section of the AWS Portal.
The AWS Global Infrastructure comprises Regions, Availability Zones, and edge locations, and there is a different number of each infrastructure element. Select the option that shows the correct order from greatest to least.
A) Number of Availability Zones > Number of Regions > Number of Edge Locations
B) Number of Edge Locations > Number of Availability Zones > Number of Regions
C) Number of Availability Zones > Number of Edge Locations > Number of Regions
D) Number of Regions > Number of Availability Zones > Number of Edge Locations
B) Number of Edge Locations > Number of Availability Zones > Number of Regions
Currently, there are more Edge Locations in the Global Cloud Infrastructure than Availability Zones; in turn, there are more Availability Zones than Regions. Reference: Global Infrastructure.
What is an AWS region?
A) A region is a geographical area divided into Availability Zones. Each region contains at least two Availability Zones.
B) A region is a collection of Edge Locations available in specific countries.
C) A region is a subset of AWS technologies. For example, the Compute region consists of EC2, ECS, Lambda, etc.
D) A region is an independent data center, located in different countries around the globe.
A) A region is a geographical area divided into Availability Zones. Each region contains at least two Availability Zones.
In which of the following is CloudFront content cached?
A) Region
B) Edge Location
C) Availability Zone
D) Data Center
B) Edge Location
What does an AWS Region consist of?
A) A collection of databases that can only be accessed from a specific geographic region.
B) Each AWS Region consists of multiple, isolated, and physically separate Availability Zones within a geographic area.
C) A collection of data centers that is spread evenly around a specific continent.
D) A console that gives you a quick, global picture of your cloud computing environment.
B) Each AWS Region consists of multiple, isolated, and physically separate Availability Zones within a geographic area.
AWS has the concept of a Region, which is a physical location around the world where data centers are clustered. Each group of logical data centers is called an Availability Zone. Each AWS Region consists of multiple, isolated, and physically separate AZ’s within a geographic area.
What is an Amazon VPC?
A) Virtual Public Compute
B) Virtual Private Cloud
C) Virtual Private Compute
D) Virtual Public Cloud
B) Virtual Private Cloud
Which of the below are storage services in AWS?
(Choose 2)
A) EC2
B) S3
C) EFS
D) VPC
B) S3
C) EFS
S3 and EFS both provide the ability to store files in the cloud. EC2 provides compute, and is often augmented with other storage services. VPC is a networking service.
Which of the below are AWS compute services?
(Choose 2)
A) S3
B) Lambda
C) VPC
D) EC2
B) Lambda
AWS Lambda lets you run code without provisioning or managing servers. You pay only for the compute time you consume.
D) EC2
Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. It is designed to make web-scale computing easier for developers.
Which of the below are factors that have helped make public cloud so powerful?
(Choose 2)
A) No special skills required
B) The ease of trying new solutions.
C) Traditional methods that are used for on-premise infrastructure always work just as well in cloud
D) Pay-as-you-go approach for pricing
B) The ease of trying new solutions.
D) Pay-as-you-go approach for pricing
10,000 Foot Overview
Which of the below are database services from AWS?
(Choose 2)
A) S3
B) DynamoDB
C) EC2
D) Amazon RDS
B) DynamoDB
DynamoDB is a fast and flexible non-relational database service for any scale. DynamoDB enables customers to offload the administrative burdens of operating and scaling distributed databases to AWS so that they don’t have to worry about hardware provisioning, setup and configuration, throughput capacity planning, replication, software patching, or cluster scaling.
D) Amazon RDS
Amazon Relational Database Service (Amazon RDS) is a managed service that makes it easy to set up, operate, and scale a relational database in the cloud. Amazon RDS gives you access to the capabilities of a familiar MySQL, MariaDB, Oracle, SQL Server, or PostgreSQL database.
Which statement best describes Availability Zones?
A) A Content Distribution Network used to distribute content to users.
B) Distinct locations from within an AWS region that are engineered to be isolated from failures.
C) Restricted areas designed specifically for the creation of Virtual Private Clouds.
D) Two zones containing compute resources that are designed to automatically maintain synchronized copies of each other’s data.
B) Distinct locations from within an AWS region that are engineered to be isolated from failures.
An Availability Zone (AZ) is a distinct location within an AWS Region. Each Region comprises at least two AZs.
You are a security administrator working for a hotel chain. You have a new member of staff who has started as a systems administrator, and she will need full access to the AWS console. You have created the user account and generated the access key id and the secret access key. You have moved this user into the group where the other administrators are, and you have provided the new user with their secret access key and their access key id. However, when she tries to log in to the AWS console, she cannot. Why might that be?
A) You have not applied the “log in from console” policy document to the user. You must apply this first so that they can log in.
B) Your user is trying to log in from the AWS console from outside the corporate network. This is not possible.
C) You cannot log in to the AWS console using the Access Key ID / Secret Access Key pair. Instead, you must generate a password for the user, and supply the user with this password and your organization’s unique AWS console login URL.
D) You have not yet activated multi-factor authentication for the user, so by default they will not be able to log in.
C) You cannot log in to the AWS console using the Access Key ID / Secret Access Key pair. Instead, you must generate a password for the user, and supply the user with this password and your organization’s unique AWS console login URL.
You have created a new AWS account for your company, and you have also configured multi-factor authentication on the root account. You are about to create your new users. What strategy should you consider in order to ensure that there is good security on this account.
A) Require users only to be able to log in using biometric authentication.
B) Enact a strong password policy: user passwords must be changed every 45 days, with each password containing a combination of capital letters, lower case letters, numbers, and special symbols.
C) Give all users the same password so that if they forget their password they can just ask their co-workers.
D) Restrict login to the corporate network only.
B) Enact a strong password policy: user passwords must be changed every 45 days, with each password containing a combination of capital letters, lower case letters, numbers, and special symbols.
A password policy to set a minimum standard is good practice and is generally a top requirement for any industry compliance endorsement.
Which statement best describes IAM?
A) IAM allows you to manage users, groups, roles, and their corresponding level of access to the AWS Platform.
B) IAM allows you to manage permissions for AWS resources only.
C) IAM stands for Improvised Application Management, and it allows you to deploy and manage applications in the AWS Cloud.
D) IAM allows you to manage users’ passwords only. AWS staff must create new users for your organization. This is done by raising a ticket.
A) IAM allows you to manage users, groups, roles, and their corresponding level of access to the AWS Platform.
When you create a new user, that user ____.
A) Will be able to interact with AWS using their access key ID and secret access key using the API, CLI, or the AWS SDKs assuming programmatic access was enabled.
B) Will only be able to log in to the console in the region in which that user was created.
C) Will be able to log in to the console anywhere in the world, using their access key ID and secret access key.
D) Will be able to log in to the console only after multi-factor authentication is enabled on their account.
A) Will be able to interact with AWS using their access key ID and secret access key using the API, CLI, or the AWS SDKs assuming programmatic access was enabled.
To access the console you use an account and password combination. To access AWS programmatically you use a Key and Secret Key combination
Power User Access allows ____.
A) Read Only access to all AWS services and resources.
B) Users to inspect the source code of the AWS platform
C) Full Access to all AWS services and resources.
D) Access to all AWS services except the management of groups and users within IAM.
D) Access to all AWS services except the management of groups and users within IAM.
Which of the following is not a feature of IAM?
A) IAM integrates with existing active directory account allowing single sign-on.
B) IAM allows you to set up biometric authentication, so that no passwords are required.
C) IAM offers centralized control of your AWS account.
D) IAM offers fine-grained access control to AWS resources.
B) IAM allows you to set up biometric authentication, so that no passwords are required.
AWS makes use of Accounts & Passwords, or Keys and Secret keys, and MFA, to prove identity. You may have a 3rd party device that uses BioMetrics to initiate and exchange of the password or secret key with AWS, but that is not an AWS / IAM service.
In what language/format are policy documents written?
A) Python
B) Node.js
C) Java
D) JSON
D) JSON
JavaScript Object Notation is a human-readable and easily parsed structured data format used to pass blocks of data into and between systems.
What level of access does the “root” account have?
A) Administrator Access
B) Read-only Access
C) Power User Access
D) No Access
A) Administrator Access
The root account in an AWS account represents the Owner of the account and can do anything including changing billing details and even close the account. The details for this account should be locked away and only used when absolutely necessary.
Every user you create in the IAM systems starts with ____.
A) No Permissions
B) Partial Permissions
C) Inherited Permissions
D) Full Permissions
A) No Permissions
AWS systems are designed to be secure first. The system administrator needs to add permissions to allow accounts to take actions.
What is the default level of access a newly created IAM User is granted?
A) Read-only access to all AWS services.
B) Power user access to all AWS services.
C) No access to any AWS services.
D) Administrator access to all AWS services.
C) No access to any AWS services.
By default new IAM Users have no permissions to AWS services. They must be explicitly granted.
You are a solutions architect working for a large engineering company that are moving from a legacy infrastructure to AWS. You have configured the company’s first AWS account and you have set up IAM. Your company is based in Andorra, but there will be a small subsidiary operating out of South Korea, so that office will need its own AWS environment. Which of the following statements is true?
A) You will need to configure your policy documents regionally, however your users are global.
B) You will then need to configure Users and Policy Documents for each region, respectively.
C) You will need to configure Users and Policy Documents only once, as these are applied globally.
D) You will need to configure your users regionally, however your policy documents are global.
C) You will need to configure Users and Policy Documents only once, as these are applied globally.
IAM is a Global service.
You can have regional conditions in policies, however by default users & policies are Global.
What is an additional way to secure the AWS accounts of both the root account and new users alike?
A) Implement Multi-Factor Authentication for all accounts.
B) Configure the AWS Console so that you can only log in to it from your internal network IP address range.
C) Store the access key id and secret access key of all users in a publicly accessible plain text document on S3 of which only you and members of your organization know the address.
D) Configure the AWS Console so that you can only log in to it from a specific IP Address range
A) Implement Multi-Factor Authentication for all accounts.
MFA provides an additional requirement for the person signing on to prove that they are who they claim to be. Username & password are things you ‘know’ the MFA is something that you ‘have’. e.g. you have the only device that can generate the token.