MyCloudGuru Practice Tests Flashcards
(86 cards)
What is true about Amazon S3 URLs for accessing a bucket?
(Choose 3)
A) Path-Style URLs (such as https://s3.Region.amazonaws.com/bucket-name/key name) are supported to access an S3 bucket
B) Virtual-host-style URLs will be eventually deprecated in favor of Path-Style URLs for S3 bucket access
C) Virtual-host-style URLs (such as: https://bucket-name.s3.Region.amazonaws.com/key name) are supported to access an S3 bucket
D) Path-Style URLs will be eventually deprecated in favor of virtual hosted-style URLs for S3 bucket access
A) Path-Style URLs (such as https://s3.Region.amazonaws.com/bucket-name/key name) are supported to access an S3 bucket
C) Virtual-host-style URLs (such as: https://bucket-name.s3.Region.amazonaws.com/key name) are supported to access an S3 bucket
D) Path-Style URLs will be eventually deprecated in favor of virtual hosted-style URLs for S3 bucket access
You are working in the media industry, and you have created a web application where users will be able to upload photos they create to your website. This web application must be able to call the S3 API in order to be able to function. Where should you store your API credentials whilst maintaining the maximum level of security.
A) Don’t save your API credentials. Instead, create a role in IAM and assign this role to an EC2 instance when you first create it.
B) Save your API credentials in a public Github repository.
C) Get the API credentials using the EC2 instances User Data.
D) Save the API credentials locally to each EC2 instance.
A) Don’t save your API credentials. Instead, create a role in IAM and assign this role to an EC2 instance when you first create it.
Which of the following AWS services allow native encryption of data, while at rest?
(Choose 3)
A) Elasticache for Memcached
B) S3
C) Elastic Block Store (EBS)
D) Elastic File System (EFS)
B) S3
C) Elastic Block Store (EBS)
D) Elastic File System (EFS)
EBS, S3 and EFS all allow the user to configure encryption at rest using either the AWS Key Management Service (KMS) or, in some cases, using customer provided keys. The exception on the list is Elasticache for Memcached which does not offer a native encryption service, although Elasticache for Redis does.
You have been asked by your employer to create an identical copy of your production environment in another Region for disaster recovery purposes. In the list below, which AWS resources would you NOT need to recreate, because they are available universally across the console?
(Choose 2)
A) Elastic Load Balancers
B) Route 53
C) Identity Access Management Roles
D) Security Groups
E) EC2 Key Pairs
B) Route 53
C) Identity Access Management Roles
The Customer Experience manager comes to see you about some odd behaviors with the ticketing system: messages presented to the support team are not arriving in the order in which they were generated, and occasionally they are receiving a duplicate copy of the message. You know that this is due to the way that the underlying SQS standard queue service is being used to manage messages. Which of the following are correct explanations?
(Choose 2)
A) SQS has been set up to prioritize messages in the queue based on keywords.
B) If an agent abandons a message or takes a break before finishing with a message, it will be offered in the queue again. In order to ensure that no message is lost, a message will persist in the SQS queue until it is processed successfully or until the message retention quota is reached.
C) As the SQS service gets busy, some of the hosts will automatically swap from FIFO to LIFO to provide a better workload balance and clearance rate.
D) SQS uses multiple hosts, and each host holds only a portion of all the messages. When a staff member calls for their next message, the consumer process does not see all the hosts or all the messages. As such, messages are not necessarily delivered in the order in which they were generated.
E) The support staff are probably using the provided admin tools to amend the priority in the SQS queue based on their experience and insights about the issues.
B) If an agent abandons a message or takes a break before finishing with a message, it will be offered in the queue again. In order to ensure that no message is lost, a message will persist in the SQS queue until it is processed successfully or until the message retention quota is reached.
D) SQS uses multiple hosts, and each host holds only a portion of all the messages. When a staff member calls for their next message, the consumer process does not see all the hosts or all the messages. As such, messages are not necessarily delivered in the order in which they were generated.
When a consumer receives and processes a message from a queue, the message remains in the queue. Amazon SQS doesn’t automatically delete the message. To prevent other consumers from processing the message again, Amazon SQS sets a visibility timeout, a period of time during which Amazon SQS prevents other consumers from receiving and processing the message. The visibility timeout begins when Amazon SQS returns a message. During this time, the consumer processes and deletes the message. However, if the consumer fails before deleting the message and your system doesn’t call the DeleteMessage action for that message before the visibility timeout expires, the message becomes visible to other consumers and the message is received again. If a message must be received only once, your consumer should delete it within the duration of the visibility timeout.
Standard queues support at-least-once message delivery. However, occasionally (because of the highly distributed architecture that allows nearly unlimited throughput), more than one copy of a message might be delivered out of order.
You are a consultant planning to deploy DynamoDB across three AZs. Your lead DBA is concerned about data consistency. Which of the following do you advise the lead DBA to do?
A) To ask the development team to code an maintenance task to run on a schedule to check consistency.
B) To ask the development team to code for strongly consistent reads. As the consultant, you will advise the CTO it may have higher latency than eventually consistent reads.
C) To ask the development team to code a Lambda function to check data consistency after each write.
D) To ask the development team to code to check for a successful completion code (200) at the completion of every write.
E) To ask the development team to implement a checksum algorithm to confirm that the data is consistent across all the AZs.
F) To ask the development team to code for Strongly Consistent Reads, as it will impact the read times slightly, but not the throughput capacity.
B) To ask the development team to code for strongly consistent reads. As the consultant, you will advise the CTO it may have higher latency than eventually consistent reads.
When you request a strongly consistent read, DynamoDB returns a response with the most up-to-date data, reflecting the updates from all prior write operations that were successful. However, this consistency comes with some disadvantages such as read might not be available if there is a network delay or outage, higher latency than eventually consistent reads, global secondary indexes not supported, and use of more throughput capacity than eventually consistent reads.
Which options are valid to protect your Amazon S3 data at rest using server-side encryption?
(Choose 3)
A) Server-Side Encryption with AWS Encryption SDK
B) Server-Side Encryption with SSL/TLS
C) Server-Side Encryption with Customer Master Keys (CMKs) Stored in AWS Key Management Service (SSE-KMS)
D) Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3)
E) Server-Side Encryption with Customer-Provided Keys (SSE-C)
C) Server-Side Encryption with Customer Master Keys (CMKs) Stored in AWS Key Management Service (SSE-KMS)
Server-Side Encryption with Customer Master Keys (CMKs) Stored in AWS Key Management Service (SSE-KMS) is similar to SSE-S3, but with some additional benefits and charges for using this service. There are separate permissions for the use of a CMK that provides added protection against unauthorized access of your objects in Amazon S3. SSE-KMS also provides you with an audit trail that shows when your CMK was used and by whom. Additionally, you can create and manage customer managed CMKs or use AWS managed CMKs that are unique to you, your service, and your Region.
D) Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3)
When you use Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3), each object is encrypted with a unique key. As an additional safeguard, it encrypts the key itself with a master key that it regularly rotates. Amazon S3 server-side encryption uses one of the strongest block ciphers available, 256-bit Advanced Encryption Standard (AES-256), to encrypt your data.
E) Server-Side Encryption with Customer-Provided Keys (SSE-C)
With Server-Side Encryption with Customer-Provided Keys (SSE-C), you manage the encryption keys and Amazon S3 manages the encryption, as it writes to disks, and decryption, when you access your objects.
Which of the following Amazon S3 Storage Classes offer 99.999999999% (11 x 9s) durability?
A)Standard, Glacier, Reduced Redundancy Storage
B) Standard, Standard-Infrequent Access, One Zone-Infrequent Access
C) Reduced Redundancy Storage, Standard, One Zone-Infrequent Access
D) Standard-Infrequent Access, One Zone-Infrequent Access, Reduced Redundancy Storage
B) Standard, Standard-Infrequent Access, One Zone-Infrequent Access
Currently the S3 Classes are; Standard, Standard-Infrequent Access, One Zone-Infrequent Access, Reduced Redundancy Storage and for archive, Glacier & Glacier Deep Archive. Reduced Redundancy Storage is the only S3 Class that does not offer 99.999999999% durability and therefore any of the answers that contain Reduced Redundancy Storage cannot be correct.
You are a solutions architect at a large digital media company. The company has decided that they want to operate within the Japanese region, and they need a bucket called “testbucket” set up immediately for testing purposes. You log in to the AWS console and try to create this bucket in the Japanese region. However, you are told that the bucket name is already taken. What should you do to resolve this?
A) Run a WHOIS request on the bucket name and get the registered owners email address. Contact the owner and ask if you can purchase the rights to the bucket.
B) Raise a ticket with AWS and ask them to release the name “testbucket” to you.
C) Change your region to Korea and then create the bucket “testbucket”.
D) Bucket names are global, not regional. This is a popular bucket name and is already taken. You must choose another bucket name.
D) Bucket names are global, not regional. This is a popular bucket name and is already taken. You must choose another bucket name.
What is the maximum VisibilityTimeout of an SQS message in a FIFO queue?
A) 12 hours
B) 1 hour
C) 14 days
D) 1 day
A) 12 hours
The visibility timeout controls how long a message is invisible in the queue while it is being worked on by a processing instance. This interval should not be confused with how long the message can remain in the queue.
Which of the following strategies does AWS use to deliver the promised levels of DynamoDB performance?
(Choose 2)
A) The Database is partitioned across a number of nodes.
B) AWS deploy caching instances in front of the DynamoDB cluster.
C) Data is stored on Solid State Drives (SSDs).
D) AWS deploys Read Replicas of the database to balance the load.
E) DynamoDB instances can be configured with EBS-Optimised connections.
A) The Database is partitioned across a number of nodes.
DynamoDB makes use of parallel processing to achieve predictable performance. You visualise each partition as an independent DB server of fixed size. Each responsible for a defined block of data. In SQL terminology it is called sharding.
C) Data is stored on Solid State Drives (SSDs).
AWS DynamoDB delivers predictable performance brought on by the use of Solid State Drives, better known as SSDs.
At the monthly product meeting, one of the Product Owners proposes an idea to address an immediate shortcoming of the product system: storing a copy of the customer price schedule in the customer record in the database. You know that you can store large text or binary objects in DynamoDB. You give a tentative OK to do a Minimal Viable Product test, but stipulate that it must comply with the size limitation on the Attribute Name & Value. Which is the correct limitation?
A) The combined Value and Name must not exceed 500 KB.
B) The Name must not exceed 64 KB and the Value must not exceed 255 KB.
C) The Name must not exceed 64 KB and the Value must not exceed 500 KB.
D) The combined Value and Name must not exceed 400 KB.
E) The Name must not exceed 64 KB and the Value must not exceed 400 KB.
F) The combined Value and Name must not exceed 255 KB.
D) The combined Value and Name must not exceed 400 KB.
When it comes to Security Groups within a custom VPC, which of the following statements are correct?
(Choose 2)
A) Updates to security groups are applied immediately.
B) Updates to security groups are not applied immediately, however they are applied within the hour in which they are made.
C) Security Groups are stateful.
D) Security Groups are stateless.
A) Updates to security groups are applied immediately.
C) Security Groups are stateful.
You are a solutions architect working for a construction company. Your company is migrating their production estate to AWS, and you are in the process of setting up access to the AWS console using Identity Access Management (IAM). You have created 15 users for your system administrators. What further steps do you need to take to enable your system administrators to get access to the AWS console in a secure fashion?
(Choose 2)
A) Get the systems administrators to download the CLI and configure this on their laptop, using their user names and passwords.
B) Generate a password for each administrator user and give these passwords to your system administrators.
C) Give the system administrators the secret access key and access key id, and tell them to use these credentials to log in to the AWS console.
D) Have each user set up multi-factor authentication once they have logged in to the console.
B) Generate a password for each administrator user and give these passwords to your system administrators.
You should generate a password for each administrator user and give these passwords to your system administrators. You should then have each user set up multi-factor authentication once they have been able to log in to the console. You cannot use the secret access key and access key id to log in to the AWS console; rather, these credentials are used to call Amazon API’s.
D) Have each user set up multi-factor authentication once they have logged in to the console.
You should generate a password for each administrator user and give these passwords to your system administrators. It is best practice to require the user to change their password after the initial logon. You should then have each user set up multi-factor authentication once they have been able to log in to the console. You cannot use the secret access key and access key id to log in to the AWS console; rather, these credentials are used to call Amazon APIs.
You run a meme creation website that stores the original images in S3 and each meme’s metadata in DynamoDB. You need to decide upon a low-cost storage option for the memes, which won’t be accessed on a regular basis, but require rapid access when needed. If a meme object is unavailable or lost, a Lambda function will automatically recreate it but at a $10 licensing cost per creation. There is a very large number of files. Which storage solution should you use to store the memes in the most cost-effective way?
A) Glacier
B) S3 - OneZone-IA
C) S3 - IA
D) S3 - RRS
E) S3
C) S3 - IA
The storage savings between IA and OneZone-IA are about $0.0025 this is small compared to the $10 for licensing if many files are lost. The durability of S3 - IA and S3 - OneZone-IA is the same: 99.999999999%., but there is far more of a risk of high costs if it is in one zone. S3 - IA guards against that possibility.
You have been engaged as a consultant by a company that generates utility bills and publishes them online. PDF images are generated, then stored on a high-performance RDS instance. Customers view invoices once per month. Recently, the number of customers has increased threefold, and the wait-time necessary to view invoices has increased unacceptably. The CTO is unwilling to alter the codebase more than necessary this quarter, but needs to return performance to an acceptable level before the end-of-the-month print run. Which of the following solutions would you feel comfortable proposing to the CTO and GM?
(Choose 2)
A) Install an ElastiCache cluster in front of the RDS installation.
B) Move the metadata to a DynamoDB solution, permitting real-time scaling of Read IOPS to match demand.
C) Create RDS Read-Replicas and additional Web/App instances across all the available AZs.
D) Evaluate the risks and benefits associated with an RDS instance type upgrade.
E) Use CloudFront to accelerate presentation of the PDF images.
C) Create RDS Read-Replicas and additional Web/App instances across all the available AZs.
Read Replicas are often a great way to help read queries on your database.
D) Evaluate the risks and benefits associated with an RDS instance type upgrade.
One way of scaling is vertical scaling. The decision must make sure the new instance size is the best solution.
You are a solutions architect working for a large anti-virus company and your job is to secure your company’s production AWS environment. A new policy dictates that a particular public-facing subnet needs to allow RDP on port 3389 at custom network ACL layer. You create an inbound rule allowing traffic to port 3389 on the ACL level. However, users complain that they still cannot connect. Which of the following answers may represent the root cause of the connectivity issues?
(Choose 2)
A) Network Access Control lists are stateful.
B) You need to create an outbound rule allowing RDP response traffic to go back out again.
C) Updates to network access control lists can take time to propagate.
D) Network Access Control lists are stateless.
B) You need to create an outbound rule allowing RDP response traffic to go back out again.
D) Network Access Control lists are stateless.
Network Access Control Lists are stateless, so rules must be created for both inbound and outbound traffic.
You’re building out a single-region application in us-west-2. However, disaster recovery is a strong consideration, and you need to build the application so that if us-west-2 becomes unavailable, you can fail-over to us-west-1. Your application relies exclusively on pre-built AMI’s, and has specific launch permissions, custom tags, and security group rules. In order to run your application leveraging those AMI’s in your backup region, which process would you follow?
A) Create a new instance in us-west-1, making certain the instance in the failover region shares a security group with the instance in the default region.
B) Copy the AMI from us-west-2 to us-west-1 and launch as-is.
C) Copy the AMI from us-west-2 to us-west-1. After the copy operation is complete, apply launch permissions, user-defined tags, and security group configurations.
D) Nothing: AMIs are specific to an account, and they can be used anywhere.
C) Copy the AMI from us-west-2 to us-west-1. After the copy operation is complete, apply launch permissions, user-defined tags, and security group configurations.
AWS does not copy launch permissions, user-defined tags, or security group rules from the source AMI to the new AMI. After the copy operation is complete, you can apply launch permissions, user-defined tags, and security group configurations to the new AMI.
A single m4.large NAT instance inside a VPC supports a company of 100 people. This NAT instance allows individual EC2 instances in private subnets to communicate out to the internet without being directly accessible via the internet. As the company has grown over the last year, they are finding that the additional traffic through the NAT instance is causing serious performance degradation. What might you do to solve this problem?
A) Increase the class size of the NAT instance from an m4.large to an m4.xlarge.
B) Use an Elastic Load Balancer and forward traffic out through this ELB. The ELB will automatically scale on-demand as traffic increases.
C) Attach an additional IGW to your VPC.
D) Instead of using a NAT, use Direct Connect to route all traffic through your VPC and back out to the Internet.
A) Increase the class size of the NAT instance from an m4.large to an m4.xlarge.
The network bandwidth of the NAT instance depends on the bandwidth of the instance type. m4.xlarge instances deliver high network performance, whereas m4.large have moderate network performance. Hence, increasing the class size of the NAT instance would solve the performance degradation issue.
You have provisioned a custom VPC with a subnet that has a CIDR block of 10.0.3.0/28 address range. Inside this subnet, you have 2 web servers, 2 application servers, 2 database servers, and a NAT. You have configured an Autoscaling group on the two web servers to automatically scale when the CPU utilization goes above 90%. Several days later you notice that autoscaling is no longer deploying new instances into the subnet, despite the CPU utilization of all web servers being at 100%. Which of the following answers may offer an explanation?
(Choose 2)
A) AWS reserves both the first two and the last two IP addresses in each subnet’s CIDR block.
B) AWS reserves both the first four and the last IP address in each subnet’s CIDR block.
C) AWS reserves both the first three and the last two IP addresses in each subnet’s CIDR block.
D) Your internet gateway (IGW) on your VPC has provisioned too many EC2 instances.
E) Your Autoscaling Group (ASG) has provisioned too many EC2 instances and has exhausted the number of internal IP addresses available in the subnet.
B) AWS reserves both the first four and the last IP address in each subnet’s CIDR block.
E) Your Autoscaling Group (ASG) has provisioned too many EC2 instances and has exhausted the number of internal IP addresses available in the subnet.
A /28 subnet will only have 16 addresses available. AWS reserve both the first four and last IP addresses in each subnet’s CIDR block. It is likely that your autoscaling group has provisioned too many EC2 instances and you have run out of internal private IP addresses.
Your company is looking for an inexpensive solution for offsite backups that you can easily recover to your local data center. You need low-latency access to your entire dataset. Which AWS Storage Gateway configuration would you use to achieve both of these ends?
A) File Gateway
B) Volume Gateway - Stored volumes
C) Volume Gateway - Cached volumes
D) Gateway-Snapshot
E) Tape Gateway
B) Volume Gateway - Stored volumes
A volume gateway provides cloud-backed storage volumes that you can mount as Internet Small Computer System Interface (iSCSI) devices from your on-premises application servers. The gateway supports stored volumes if you need low-latency access to your entire dataset. You can configure your on-premises gateway to store all your data locally, then asynchronously back up point-in-time snapshots of this data to Amazon S3. This configuration provides durable and inexpensive offsite backups that you can recover to your local data center or Amazon Elastic Compute Cloud (Amazon EC2). For example, if you need replacement capacity for disaster recovery, you can recover the backups to Amazon EC2.
When editing Amazon S3 bucket permissions (policies and ACLs), to whom does the concept of the “resource owner” refer?
A) The “resource owner” is the IAM user who created the object via the GUI, CLI, or API.
B) There is no special concept of “resource owner” in Amazon S3 buckets.
C) The “resource owner” is IAM Role used to create the object via the GUI, CLI, or API.
D) The “resource owner” refers to the AWS account that creates Amazon S3 buckets and objects.
D) The “resource owner” refers to the AWS account that creates Amazon S3 buckets and objects.
The “resource owner” concept comes into play especially when setting or locking down access to various objects.
How does AWS deliver high availability for DynamoDB?
A) AWS maintain a schedule of incremental backups and log shipping.
B) DynamoDB data is automatically replicated across multiple AZs.
C) DynamoDB supports user Snapshots to S3.
B) DynamoDB data is automatically replicated across multiple AZs.
Being automatically replicated across multiple AZs makes DynamoDB highly available.
Route 53, the AWS implementation of DNS, supports a number of Routing policies. Which of the following are valid Policy types?
(Choose 5)
A) Latency Routing Policy
B) Simple Routing Policy
C) Failover Routing Policy
D) Geolocation Routing Policy
E) Geoproximity Routing Policy
F) Load Balanced Routing Policy
G) Default Routing Policy
A) Latency Routing Policy
B) Simple Routing Policy
C) Failover Routing Policy
D) Geolocation Routing Policy
E) Geoproximity Routing Policy
Route 53 provides an advanced level of service and sophistication going beyond the basic service of the normal DNS implementation.