New Flashcards

(85 cards)

1
Q

S3 - What are the file restrictions in S3?

A

0bytes to 5TB
Files need to be uploaded in multipart when >5GB

IA: min 128KB and min. duration of 30days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

S3 - What are the two types of meta data?

A

System metadata: last modified, MD5 digest, Content-Type

User Metadata: key-value for user defined tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

S3 - How is an URL for a file in S3 structured?

A

http://[BUCKET].s3.amazonaws.com/[FILENAME]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

S3 - What API actions can be done in S3?

A

GET, PUT, DELETE, LIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

S3 - How many facilities can fail in S3 at one time?

A

Two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

S3 - What is RRS in S3?

A

Durability 99.99%

Lower costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

S3 - What are atomic reads for eventual consistent reads?

A

An old version or the new version will be delivered, but not a mix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

S3 - How can access be controlled in S3?

A

coarse grained: Access Control Lists

fine grained: Bucket Policy, IAM, query-string authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

S3 - What can be done with Bucket Policies?

A

Restrict access based on IP-Range, time-of-day, which bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

S3 - Can you assign a IAM Policy to another account?

A

No, use roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

S3 - How are static websites structured?

A

[BUCKET].s3-website-[REGION].amazonaws.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

S3 - What mechanisms can be used to encrypt?

A

Before sending: Client Side Encryption
In-Flight: SSL
At Rest: SSE-S3, SSE-KMS, SSE-C (All using AES 256bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

S3 - What is a Range GET?

A

Get the n-first bytes of S3/Glacier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

S3 - What gets logged in S3 Access Logs?

A
Account/IP
Bucket name
Time
Action (PUT, GET...)
Response Code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

S3 - How are files stored in Glacier?

A

Archives (up to 40TB)
Identified with an archive ID (not user defined)
Automatically encrypted
Immutable, cannot be modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EC2 - What is an EBS optimized instance?

A

Optimized configuration to take full advantage of EBS storage. Comes with an additional hourly cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

VPC - Can you have more than one Route Table?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

VPC - What is an ENI?

A

Elastic Network Interface
Can be attached to the Instance
Handles the Security Group
Can have one public and multiple private IPs (>1 -> Dual Homed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ELB - What Protocols does ELB support?

A

HTTP
HTTPS
TCP
SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ELB - How to use SSL on ELB?

A

Install the SSL Certificate, which terminates the connection, decryptes the request, then sends it to the backend
If there are multiple websites, you need to use Subject Alternative Name (SAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ELB - What is a Listener on the ELB?

A

Process that checks for a connection request
CNAME, A-Recored e.g.
COnfigured with a protocol and port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ELB - What OSI Levels does ELB use?

A

Layer 7 for applications (HTTP/HTTPS)

Layer 4 for TCP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ELB - What are the configurable features in ELB? (6)

A
Idle Connection Timeout
Cross Zone Load Balancing
Connection Draining
Proxy Protocol
Sticky Sessions
Health Checks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ELB - How can ELB help to keep instances updated?

A

By terminating long running instances and replace them with fresh AMIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CloudWatch - Name two types of actions that CW can send an altert/message to?
SNS | AutoScalingGroup
26
CloudWatch - Can CW aggregate data across regions?
No
27
CloudWatch - What two metrics are not visible to AWS and need to be send as custom metrics?
Instance memory consumption | Disk metrics
28
CloudWatch - How can you store logs indefinately?
Store the logs in S3 (else the data is retained by two weeks)
29
ASG - What are the four scaling plans?
Maintain Current Instance Level Manual Scaling Scheduled Scaling Dynmaic Scaling
30
ASG - Can the AutoScalingGroup reference a spot and a on-demand instance at the same time?
No
31
ASG - What service integrates Active Directory?
AWS Directory Service
32
IAM - What is a principal in IAM?
Is the permanent or temporary right to interact with an AWS resource
33
IAM - For which three purposes are roles used?
As EC2-Role: Allows to use applications on an instance As Cross-Account-Access For Federation: Access granted by external system
34
IAM - What is a securtiy token and who provides it?
The AWS Security Token Service provides it. | Allows temp. acces for 15min to 36 hrs
35
IAM - What are ways to assign a policy?
Direcly on the IAM User As a policy, which is then attached to the user Directly on a Group As a policy, which is then attached to a group
36
IAM - How are permissions handeled?
Per default everything is denied Only allow -> allow Only deny -> deny allow and deny -> deny
37
Security - What is Storage Device Decommission?
Storage devices that reached the end of life will be decommissioned/destroyed so that no data can be exposed
38
Security - Does AWS have access to the instance or the OS?
No
39
Security - Best practise to auto update an instance
Launch the latest AMI
40
Security - Should you use additional firewalls
In best case: yes, like windows firewall or IPtables
41
Security - How is EBS being replicated?
At no additional costs, in the SAME Availability Zone
42
Security - Can you share EBS snapshots and can those be altered by other accounts?
Yes, they can be shared. | But, they cannot be modified by other accounts
43
Security - Can EBS volumes be encrypted?
Yes, but it requires processing power and therefore to ensure no latency this feature is only possible for more powerful EC2 instances
44
Security - What is Perfect Forward Secrecy?
Keys used for SSL on the ELB are ephemeral and never stored
45
Security - How many route tables are in a VPC?
One (or more) per subnet
46
Security - How many NACLs are in a VPC?
One per routing table
47
Security - What is a VPG?
Virtual Private Gateway, used for private connectivity between VPC and another network
48
Security - Can CloudFront access be geo restricted?
Yes
49
Security - Can you grant access to CF, but not the origin S3?
Yes, using the S3 ACL
50
Security - Describe the four access restriction for S3
IAM Policies: attached to a User ACL:Read/Write on a bucket level to users or groups Bucket Policies: permissions to single files or the bucket for users, groups or buckets Query String Authentication: Temporary access to a pre-sign URL for up to 7 days. Can be combined with additional rules. (Geo, IP..)
51
Security - Are the meta data in S3 encrypted?
No
52
Security - How can access to S3 be logged?
Using S3 Access Logs
53
Security - What is the process to retrieve data from Glacier?
Initiate retrieval job Wait 3-5 hrs Data can be accessed with HTTP GET for the full or partial data Data is available for 24 hrs
54
Security - What is Storage Gateway and how are files transferred?
Connects on premise data with the cloud. Used for backups and disaster recovery Data is asynchronously transferred
55
Security - How to backup DynamoDB
Using a special template in AWS DataPipeline for copying the tables
56
Security - Describe the process of RDS snapshots and backups in detail
``` - Backup - Automatic (Per default enabled) Point in time recovery Allows to restore DB to a specific second up to 5 min of the failure 35 days retention rate ``` ``` - Snapshots - Manually done Full copy Can be used to create another DB Is using I/O therefore writes are suspended. Should be done in the Multi A/Z standby ```
57
Security - How to first-access Linux/Windows instances
Linux: Using the full key pair (presenting the private key) Windows: Using the private key to decrypt the admin password
58
Security - Which seven services can use encryption at rest
SEGS RRW ``` S3 EBS Glacier StorageGateway RDS Redshift Workspaces ```
59
CDN - How to create a subdomain?
Create a CNAME record (cdn.example.com) in Route53
60
CDN - What is a use case for cache behaviour?
Target the caching by file name (.php / .jpg)
61
CDN - What are the features of cache behavoiur?
``` Path Pattern Origin Should query strings to forwarded to the origin Must have signed URLs If it needs HTTPS Caching time ```
62
CDN - Use cases for CloudFront
``` Static Websites Dynamic Websites / Applications Widely geographically distributed Large Files Streaming media ```
63
CDN - What cases is CloudFront NOT suited for?
Users from a single location | Users from a corporate VPN (if the all have the same IP)
64
Storage Gateway - Use cases for the three different Storage Gateway types
Cached volumes: expand local hardware Stored volumes: asynchronous backup Tape: cost effective use of already used tape licenses
65
Directory - Use cases for the three Directory Services
AWS Direcotry Service for MS AD (Enterprise): more than 5000 users Simple AD: Cost effective (<5000 users) AD Connector: on premise AD service
66
Security - What are the two services for encrypting with own keys and what are their use cases
KMS & Cloud HSM | Scalable solution for symmetric key distribution and Compliance with processes validated by a third party
67
CloudTrail - Can you use CT across regions
Yes, the same trails will be used on all regions and then stored in one S3 Bucket
68
CloudTrail - Use cases for Cloud Trail
External Compliance Audits | Information which service are target for unauthorized access
69
Kinesis - Difference between Firehose / Streams
Firehose: Storing data in the appropriate system Kinesis: real time analysis
70
EMR - Use cases for Elastic Map Reduce
Log processing Clickstream analysis Genomics and Life Science
71
Data Pipeline - What is the Data Pipeline?
Used for scheduled tasks that involve moving data to the appropriate services. Services can be started/stopped on its behalf, and if a task fails i can be retried. It is also possible to check for preconditions before the task is started
72
Import/Export - What are the two methods
Using snowball as a device presented by AWS | Use your own disk
73
OpsWorks - What is it based on and what does it do?
It is based on Chef. Creates an application stack that can be deployed Used to host multi-tier Web Applications and supports continious integration
74
AWS Config - Use cases
Discovery for all used ressources Lists all the services used in the past Used for incidents and troubleshooting
75
CloudFront - What is the use case for CF Origin Access Ientifier?
Makes sure that the content of a S3 bucket is only accessible with CloudFront
76
DB - How can Oracle and MS SQL be encrypted?
Using KMS | TDE for Enterprise tier
77
DB - What are the storage options for RDS?
Magnetic, SSD, SSD IOPS 4GB to 6TB up to 30.000 IOPS
78
DB - What is RPO / RTO ?
Recovery Point Objective: Max. data loss in an event of failure (should be minutes) Recovery Time Objective: How long does it take for the recovery to be fully effective
79
DB - How to scale vertically for writes?
Using partitions or shards | Problem: Client/Application must know in which shard the data is
80
DB - Which engines support Read Replicas
MySQL MariaDB PostgreSQL Aurora
81
DB - How to encrypt Redshift
in transit: SSL | At Rest: KMS or CLoudHSM
82
DB - How to improve read throughput for DynamoDB
Distribute Requests accross range of keys
83
DB - What is a secondary key in DynamoDB?
Used to further index the database to avoid scan operations Global Sec. Key: can be created at any time Local: on partition with the primary key, can only be created when the table is created
84
DB - How are IOPS generated for DynamoDB?
One Partition can generate 3000 IOPS, scaling would improve this. But if all reads go to one partition it wold be stuck at 3000
85
DB - What are DynamoDB Streams?
List of all changes of the last 24h