Networking Flashcards

1
Q

Amazon VPC

A

Logically isolated AWS Cloud section

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VPC Purpose

A

Launch AWS resources in defined virtual network. Establish boundaries for AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Resource Accessibility

A

Public-facing or private resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Subnets Explanation

A

Public and private resource groupings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Subnets in VPC

A

Ranges of IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Coffee Shop Analogy VPC

A

Cashiers in public, baristas in private subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPC Definition

A

AWS private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Resource Placement

A

EC2, ELBs inside VPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Subnets and Grouping

A

Grouping: Resources grouped in subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Networking Rules

A

Rules: Control resource accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Traffic Control

A

Control: Public or private availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Gateway (IGW)

A

IGW: Allows internet traffic flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet Gateway Analogy

A

Analogy: IGW like a front door for customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual Private Gateway

A

Private Gateway: Allows VPN connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VPN Connection Analogy

A

Analogy: Private bus route for approved network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AWS Direct Connect

A

Direct Connect: Private, dedicated fiber connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Direct Connect Benefits

A

Benefits: Low latency, high security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AWS Direct Connect Analogy

A

Analogy: Magic doorway for direct connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Multiple Gateway Types

A

Types: One VPC, multiple gateways for different resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Direct Connect Partner Involvement

A

Involvement: Partner assists in establishing connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Regulatory Compliance

A

Compliance: Direct Connect meets high regulatory needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

VPC Organization

A

Organization: Resources in subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Subnet Definition

A

Subnet: VPC section with EC2 instances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Internet Gateway Purpose

A

Purpose: Allow public internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Internet Gateway Connection

A

Connection: Between VPC and internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

No Internet Gateway Implication

A

Implication: No access without internet gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Virtual Private Gateway Purpose

A

Purpose: Access private VPC resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Virtual Private Gateway Analogy

A

Analogy: Internet as a road with a bodyguard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Bodyguard Role in Analogy

A

Role: VPN connection, extra protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

VPN Connection Encryption

A

Encryption: Protects internet traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Protected Internet Traffic

A

Protection: Enabled by virtual private gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Traffic Jams Possibility

A

Possibility: Shared road, potential jams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Corporate Data Center Connection

A

Connection: VPN to virtual private gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

VPN Connection Approval

A

Approval: Traffic allowed from approved networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

AWS Direct Connect Purpose

A

Purpose: Dedicated connection to data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Apartment Building Analogy

A

Analogy: Dedicated hallway for residents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Residents’ Exclusive Access

A

Access: Exclusive, no public road usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

AWS Direct Connect Benefits

A

Benefits: Reduce costs, increase bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Network Traffic Flow

A

Flow: Dedicated private connection usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

AWS Security Tools

A

Tools: Network hardening, app security, identity, DDoS prevention, encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Subnet Purpose

A

Purpose: Control access to gateways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Subnet Traffic Permissions

A

Permissions: Controlled by network ACLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Network ACLs Function

A

Function: Packet control, like passport control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Network ACLs Role

A

Role: Approve or block traffic based on rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Security Groups Introduction

A

Introduction: Instance-level access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Default Security Group

A

Default: Blocks all inbound and outbound traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Security Group Modification

A

Modification: Customize to allow specific traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Security Group Analogy

A

Analogy: Doorman at a building entrance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Security Group Stateful Nature

A

Stateful: Remembers allowed traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Network ACLs Stateless Nature

A

Stateless: Checks every packet, no memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Traffic Round Trip Explanation

A

Explanation: Security group and ACL checks illustrated.

52
Q

Return Traffic Pattern

A

Pattern: Stateful security group advantage.

53
Q

Network Overhead Clarification

A

Clarification: Instant exchanges, minimal overhead.

54
Q

Security in Depth Importance

A

Importance: Combine ACLs and security groups for robust security.

55
Q

Networking Service Comparison

A

Comparison: AWS networking isolates and directs traffic.

56
Q

Coffee Shop Owners’ Action - Networking Service

A

Action: Divide counter into public (cashier) and private (barista) areas.

57
Q

Public Subnet Purpose

A

Purpose: Resources accessible to the public (e.g., online store).

58
Q

Private Subnet Purpose

A

Purpose: Resources accessible only through private network (e.g., customer database).

59
Q

Subnet Communication Ability

A

Communication: Subnets can communicate within the VPC.

60
Q

Example Scenario

A

Scenario: EC2 instances in public subnet communicate with databases in private subnet.

61
Q

Default Network ACL

A

Default: AWS account includes default network ACL.

62
Q

Configuration Options

A

Options: Use default or create custom network ACLs.

63
Q

Default ACL Functionality

A

Functionality: Default allows all traffic, modifiable with rules.

64
Q

Custom ACL Behavior

A

Custom: Denies all traffic until rules specify allowed traffic.

65
Q

Explicit Deny Rule

A

Rule: All network ACLs have an explicit deny rule.

66
Q

Deny Rule Purpose

A

Purpose: Deny unmatched packets for enhanced security.

67
Q

Network Traffic in VPC:

Customer Request in AWS Cloud
Packet Entry into VPC
Packet Permission Check
Permission Check Component

A

Action: Customer requests data sent as a packet.
Entry: Packet enters VPC via internet gateway.
Check: Permissions checked before entering/exiting subnet.
Component: Network Access Control List (ACL).

68
Q

Network ACL Definition

A

Definition: Virtual firewall controlling traffic at subnet level.

69
Q

Network ACL Functionality

A

Function: Stateless packet filtering, remembers nothing.

70
Q

Packet Check Direction

A

Check: Inbound and outbound at subnet border.

71
Q

Traveler Analogy Recap

A

Recap: Similar to a traveler entering a different country.

72
Q

Packet Response Handling

A

Handling: Network ACL checks response, no memory of previous requests.

73
Q

Permissions Evaluation

A

Evaluation: After entering subnet, permissions evaluated for resources.

74
Q

Packet Permission Checker

A

Checker: Security group for Amazon EC2 instance.

75
Q

Security Groups Definition

A

Definition: Virtual firewall controlling inbound/outbound EC2 traffic.

76
Q

Security Group Default Setting

A

Default: Denies inbound, allows outbound traffic.

77
Q

Custom Rule Addition

A

Customization: Rules added to allow specific inbound traffic.

78
Q

Guests in Apartment Analogy

A

Analogy: Apartment building with guests as packets, door attendant as security group.

79
Q

Door Attendant’s Role

A

Role: Security group checks list for guest entry.

80
Q

Checking List Analogy

A

Check: Door attendant checks list for entering guests.

81
Q

List Checking Recap

A

Recap: List checked for entry, not rechecked for exit.

82
Q

Security Group Default Setup

A

Setup: Denies all inbound, allows all outbound traffic by default.

83
Q

Custom Rule Configuration

A

Configuration: Add rules for allowed traffic, deny others.

84
Q

Amazon EC2 Instances Scenario

A

Scenario: Multiple instances in the same VPC, common or different security groups.

85
Q

Security Groups Feature

A

Feature: Stateful packet filtering, remembers prior decisions.

86
Q

Packet Response Handling

A

Handling: Security group recalls previous decisions for inbound packets.

87
Q

Example Recap

A

Recap: Sending request from EC2 to the internet.

88
Q

Response Packet Handling

A

Handling: Security group remembers the request, allows response irrespective of inbound rules.

89
Q

Guest Analogy Recap

A

Recap: Door attendant recalls guest from prior approval, allows exit without additional checks.

90
Q

Custom Rule Configuration

A

Configuration: Configure custom rules for both network ACLs and security groups.

91
Q

Packet’s Internet Journey

A

Journey: Travels from client to internet gateway, through network ACL, reaches public subnet with EC2 instances.

92
Q

AWS account’s default network access control list?

A

It is stateless and allows all inbound and outbound traffic.

93
Q

Route 53 (DNS): Function

A

AWS’s DNS service.

94
Q

Route 53 (DNS): Translation Analogy

A

Translates names to IP addresses.

95
Q

Route 53 (DNS): Routing Policies

A

Geolocation, latency-based, weighted round robin.

96
Q

Route 53 (DNS): Domain Registration

A

Buy and manage domains.

97
Q

Route 53 (DNS): Example Use Case

A

Direct traffic based on customer location.

98
Q

Amazon CloudFront: Purpose

A

Content Delivery Network (CDN).

99
Q

Amazon CloudFront: Edge Locations

A

Serve content near users

100
Q

Amazon CloudFront: Deployment Example

A

Host in Oregon for North America, Dublin for Ireland.

101
Q

Amazon CloudFront: Latency Improvement

A

Content delivered closer to users.

102
Q

Amazon CloudFront: Asset Types

A

Static web assets like images and GIFs.

103
Q

DNS Resolution: Role

A

Phone book of the internet.

104
Q

DNS Resolution: Process

A

Translates domain to IP address.

105
Q

DNS Resolution: Resolver Interaction

A

Customer DNS resolver communicates with company DNS server.

106
Q

DNS Resolution: Example Scenario

A

AnyCompany’s website IP retrieval.

107
Q

Amazon Route 53: Function

A

DNS web service in AWS.

108
Q

Amazon Route 53: Routing

A

Connects users to AWS-hosted applications.

109
Q

Amazon Route 53: DNS Records Management:

A

Register new domains, transfer records.

110
Q

Amazon Route 53: Integration with CloudFront

A

Works together for content delivery.

111
Q

Example: Route 53 and CloudFront Content Delivery: Setup

A

AnyCompany’s app on EC2 instances, Auto Scaling, and Load Balancer.

112
Q

Example: Route 53 and CloudFront Content Delivery: Request Initiation

A

Customer visits AnyCompany’s website.

113
Q

Example: Route 53 and CloudFront Content Delivery:DNS Resolution

A

Route 53 identifies IP address (192.0.2.0)

114
Q

Example: Route 53 and CloudFront Content Delivery:Content Delivery

A

CloudFront routes request to nearest edge location.

115
Q

Example: Route 53 and CloudFront Content Delivery: Connection

A

CloudFront connects to Load Balancer, then to EC2 instance.

116
Q

Connection Options

A

VPN, Direct Connect.

117
Q

Security Measures

A

Block subversive attacks, allow healthy traffic.

118
Q

Components Covered

A

VPC, gateways, network ACLs, security groups.

119
Q

Secure Pipelines

A

Encrypted over the internet or exclusive fiber.

120
Q

Global Network

A

Edge locations for global reach.

121
Q

DNS Management

A

Route 53.

122
Q

Content Delivery

A

CloudFront for caching.

123
Q

Which component can be used to establish a private dedicated connection between your company’s data center and AWS?

A

AWS Direct Connect.

124
Q

security groups

A

They are stateful and deny all inbound traffic by default.

125
Q

Which component is used to connect a VPC to the internet?

A

Internet gateway