PE Reviews Flashcards

1
Q

minimum properties required in resources for lambda

A

name, alias, current version, and target version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To enable SSL between the end-user and CloudFront, what policy should be configured.

A

Viewer Protocol Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To enable SSL between the origin and the distribution the Developer can configure the

A

Origin Protocol Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The _________________ policy will add an additional batch of instances, updates those instances, then move onto the next batch.

no reduction in app performance/availability during update

A

Rolling with additional batch:

Like Rolling but launches new instances in a batch ensuring that there is full availability.

Application is running at capacity.

Can set the bucket size.

Application is running both versions simultaneously.

Small additional cost.

Additional batch is removed at the end of the deployment.

Longer deployment.

Good for production environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Only deployment policy with downtime

A

All-at-once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What 3 deployment types have no reduction in capacities?

A

Rolling w/ additional batch

Immutable

Blue/green

happen to be the 3 with the longest deployment time too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ is a container for CloudWatch metrics. Metrics in different ________ are isolated from each other, so that metrics from different applications are not mistakenly aggregated into the same statistics.

A

namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You can configure a CloudWatch alarm that notifies based on item lifecycle events. (T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Amazon DynamoDB is integrated with AWS Lambda so that you can create __________
—pieces of code that automatically respond to events in DynamoDB Streams. With _________, you can build applications that react to data modifications in DynamoDB tables.

A

triggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When you create a ___________ in Amazon Cognito and then configure a domain for it, Amazon Cognito automatically provisions a hosted web UI to let you add sign-up and sign-in pages to your app. You can add a custom logo or customize the CSS for the hosted web UI.

A

user pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

With _________________ mode, you specify the number of data reads and writes per second that you require for your application.

A

provisioned capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For items up to 4 KB in size, one RCU can perform

A

one RCU can perform two eventually consistent read requests per second.

one RCU can perform one strongly consistent read request per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

require two RCUs to perform one read per second for items up to 4 KB.

A

Transactional read requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

require two WCUs to perform one write per second for items up to 1 KB.

A

Transactional write requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To encrypt an object at the time of upload, you need to add a header called ________________ to the request to tell S3 to encrypt the object using SSE-C, SSE-S3, or SSE-KMS.

A

x-amz-server-side-encryption:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

tells S3 to use S3-managed keys

A

AES256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

tells S3 to use AWS KMS–managed key

A

aws:kms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

conveys information about a segment to X-Ray.

can be up to 64 kB and contain a whole segment with subsegments, a fragment of a segment that indicates that a request is in progress, or a single subsegment that is sent separately.

A

segment document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You can send segment documents directly to X-Ray by using the

A

PutTraceSegments API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

this API action retrieves a service graph for one or more specific trace IDs.

A

GetTraceGraph API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You should initialize SDK clients and database connections outside of the function handler, and cache static assets locally in the

A

/tmp directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is a custom session handler for PHP that allows developers to use Amazon DynamoDB as a session store.

A

The DynamoDB Session Handler

Using DynamoDB for session storage alleviates issues that occur with session handling in a distributed web application by moving sessions off of the local file system and into a shared location. DynamoDB is fast, scalable, easy to setup, and handles replication of your data automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

involves maintaining session state data on the EC2 instances and thus that data is lost if an instance fails.

A

Use sticky sessions with an Elastic Load Balancer target group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

There are no limits to the number of prefixes that you can have in your bucket.

A

True

To avoid throttling in Amazon S3 you must ensure you do not exceed certain limits on a per-prefix basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

T/F: You can send 5,500 PUT/COPY/POST/DELETE or 3,500 GET/HEAD requests per second per prefix in an Amazon S3 bucket.

A

False

You can send 3,500 PUT/COPY/POST/DELETE or 5,500 GET/HEAD requests per second per prefix in an Amazon S3 bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

is a fully managed build service in the cloud.

It compiles your source code, runs unit tests, and produces artifacts that are ready to deploy.

It eliminates the need to provision, manage, and scale your own build servers.

It provides pre-packaged build environments for popular programming languages and build tools such as Apache Maven, Gradle, and more.

A

AWS CodeBuild

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

is a deployment service that automates application deployments to Amazon EC2 instances, on-premises instances, serverless Lambda functions, or Amazon ECS services.

A

CodeDeploy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Flow logs can help you with a number of tasks, such as:

A
  • Diagnosing overly restrictive security group rules
  • Monitoring the traffic that is reaching your instance
  • Determining the direction of the traffic to and from the network interfaces
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

is a feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC.

A

VPC Flow Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Flow Log data can be published to:

A

Amazon CloudWatch Logs or Amazon S3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Adding certificates to the EC2 instances would place a burden on CPU when

A

encrypting and decrypting data, this burden will impact performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

which uses encrypted connections (also known as SSL offload). This feature enables traffic encryption between your load balancer and the clients that initiate SSL or TLS sessions.

A

HTTPS listener,

To use an HTTPS listener, you must deploy at least one SSL/TLS server certificate on your load balancer. The load balancer uses a server certificate to terminate the front-end connection and then decrypt requests from clients before sending them to the targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

configuring elb w/ ssl passthrough is used to forward encrypted packets directly to EC2 instance for termination

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

is an API Gateway feature that uses a Lambda function to control access to your API.

A

A Lambda authorizer (formerly known as a custom authorizer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

is useful if you want to implement a custom authorization scheme that uses a bearer token authentication strategy such as OAuth or SAML, or that uses request parameters to determine the caller’s identity.

A

A Lambda authorizer

When a client makes a request to one of your API’s methods, API Gateway calls your Lambda authorizer, which takes the caller’s identity as input and returns an IAM policy as output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What Lambda authorizer receives the caller’s identity in a bearer token, such as a JSON Web Token (JWT) or an OAuth token?

A

A token-based Lambda authorizer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

type of Lambda authorizer that receives the caller’s identity in a combination of headers, query string parameters, stageVariables, and $context variables.

A

A request parameter-based Lambda authorizer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

You can create an authorizer in API Gateway that uses Cognito identity pools, but not user pools.

A

False, you can create an authorizer in API Gateway that uses Cognito user pools, but not identity pools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

is a container for an IAM role that you can use to pass role information to an EC2 instance when the instance starts.

A

An instance profile,

and using an instance profile you can attach an IAM Role to an EC2 instance that the instance can then assume in order to gain access to AWS services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

is used to manage encryption keys.

A

AWS KMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

is used to manage encryption keys. It is similar to KMS but uses a dedicated hardware device that is not multi-tenant.

A

AWS CloudHSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

To include objects defined by the AWS Serverless Application Model (SAM) in an AWS CloudFormation template, in addition to Resources, what section MUST be included in the document root?

A

Transform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

AWS SAM templates differ from CloudFormation templates in which areas:

A

Transform declaration, Globals section, Resources section.

The declaration Transform: AWS::Serverless-2016-10-31 is required for AWS SAM templates. This declaration identifies an AWS CloudFormation template as an AWS SAM template.

The Globals section is unique to AWS SAM. It defines properties that are common to all your serverless functions and APIs. All the AWS::Serverless::Function, AWS::Serverless::Api, and AWS::Serverless::SimpleTable resources inherit the properties that are defined in the Globals section.

  • In AWS SAM templates the Resources section can contain a combination of AWS CloudFormation resources and AWS SAM resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

An application uses both Amazon EC2 instances and on-premises servers. The on-premises servers are a critical component of the application, and a developer wants to collect metrics and logs from these servers. The developer would like to use Amazon CloudWatch.

How can the developer accomplish this?

A

Install the CloudWatch agent on the on-premises servers and specify IAM credentials with permissions to CloudWatch

You can download the CloudWatch agent package using either Systems Manager Run Command or an Amazon S3 download link. You then install the agent and specify the IAM credentials to use. The IAM credentials are an access key and secret access key of an IAM user that has permissions to Amazon CloudWatch.

Once this has been completed the on-premises servers will automatically send metrics and log files to Amazon CloudWatch and can be centrally monitored along with AWS services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Your Amazon ECS tasks can have an IAM role associated with them. The permissions granted in the IAM role are assumed by the containers running in the task. What explains the benefits of using IAM roles with your tasks.

A

Credential Isolation, Authorization, Auditability

  • Credential Isolation: A container can only retrieve credentials for the IAM role that is defined in the task definition to which it belongs; a container never has access to credentials that are intended for another container that belongs to another task.
  • Authorization: Unauthorized containers cannot access IAM role credentials defined for other tasks.
  • Auditability: Access and event logging is available through CloudTrail to ensure retrospective auditing. Task credentials have a context of taskArn that is attached to the session, so CloudTrail logs show which task is using which role.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

True/False: Access keys are not a secure way of providing authentication. It is better to use roles that obtain temporary security permissions using the AWS STS service.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

SSM Parameter Store supports automatic key rotation.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which service encrypts secrets at rest using encryption keys that you own and store in AWS Key Management Service (KMS)?

When you retrieve a secret, this service decrypts the secret and transmits it securely over TLS to your local environment.

With this service, you can rotate secrets on a schedule or on demand by using the Secrets Manager console, AWS SDK, or AWS CLI.

A

AWS Secrets Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The ________ strategy adds data or updates data in the cache whenever data is written to the database.

A

write-through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The advantages of write-through are as follows:

A
  • Data in the cache is never stale. Because the data in the cache is updated every time it’s written to the database, the data in the cache is always current.
  • Write penalty vs. read penalty.

Every write involves two trips:

  1. A write to the cache
  2. A write to the database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

This will allow the cache to be updated when an item is next read but will not ensure the best performance for all items in the database.

A

Invalidate the cache for each database write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

this is a caching strategy that loads data into the cache only when necessary. This will not ensure strong consistency between the database and the cache.

A

Lazy loading (caching)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

uses permissions in the function’s execution role to read and manage items in the event source. Permissions, event structure, settings, and polling behavior vary by event source.

A

An event source mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
  • Launches new instances in a new ASG and deploys the version update to these instances before swapping traffic to these instances once healthy.
  • Zero downtime.
A

Immutable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
  • Zero downtime and release facility.
  • Create a new “stage” environment and deploy updates there.
A

Blue / Green deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Deploys the new version to all instances simultaneously.

A

All at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Update a few instances at a time (bucket), and then move onto the next bucket once the first bucket is healthy (downtime for 1 bucket at a time).

A

Rolling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Like Rolling but launches new instances in a batch ensuring that there is full availability.

A

Rolling with additional batch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

enable you to create unique identities for your users and federate them with identity providers. With this, you can obtain temporary, limited-privilege AWS credentials to access other AWS services.

A

Amazon Cognito identity pools (federated identities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Amazon Cognito identity pools support what identity providers:

A
  • Public providers: Login with Amazon (Identity Pools), Facebook (Identity Pools), Google (Identity Pools) Sign in with Apple (Identity Pools).
  • Amazon Cognito User Pools
  • Open ID Connect Providers (Identity Pools)
  • SAML Identity Providers (Identity Pools)
  • Developer Authenticated Identities (Identity Pools)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

is an algorithm for selecting instances for task placement or tasks for termination.

can be specified when either running a task or creating a new service.

A

Task placement strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

ECS supports what 3 task placement strategies

A

binpack, random, spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

place tasks based on the least available amount of CPU or memory. This minimizes the number of instances in use.

A

binpack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

place tasks randomly

A

random

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

place tasks evenly based on the specified value. Accepted values are instanceId (or host, which has the same effect), or any platform or custom attribute that is applied to a container instance, such as attribute:ecs.availability-zone.

A

spread

Service tasks are spread based on the tasks from that service. Standalone tasks are spread based on the tasks from the same task group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

S3 and SNS invoke functions in what manner to process events?

A

asynchronously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

To invoke a function asynchronously, set the invocation type parameter to

A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

if your access pattern exceeds 3000 RCU or 1000 WCU for a single partition key value, your requests might be throttled with a

A

ProvisionedThroughputExceededException error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

To avoid request throttling, design your DynamoDB table with the right partition key to meet your access requirements and provide even distribution of data. Recommendations for doing this include the following:

A
  • Use high cardinality attributes (e.g. email_id, employee_no, customer_id etc.)
  • Use composite attributes
  • Cache popular items
  • Add random numbers or digits from a pre-determined range for write-heavy use cases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

GSI is used for querying data more efficiently, it will not solve the problem of write performance due to a

A

hot partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

You can force update the cache in CloudFront (T/F)

A

False, there’s no way to directly update the cache.

The Developer should invalidate the relevant cache entries and then the cache will be updated the next time a request is received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

If you need to remove a file from CloudFront edge caches before it expires, you can do one of the following:

A
  • Invalidate the file from edge caches. The next time a viewer requests the file, CloudFront returns to the origin to fetch the latest version of the file.
  • Use file versioning to serve a different version of the file that has a different name. For more information, see Updating Existing Files Using Versioned File Names.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

is used with the AWS KMS services and generates a unique symmetric data key.

This operation returns a plaintext copy of the data key and a copy that is encrypted under a customer master key (CMK) that you specify.

A

GenerateDayKey API.

You can use the plaintext key to encrypt your data outside of AWS KMS and store the encrypted data key with the encrypted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Name the feature:

The Lambda console lets you encrypt environment variable values client side, before sending them to Lambda.

This feature enhances security further by preventing secrets from being displayed unencrypted in the Lambda console, or in function configuration that’s returned by the Lambda API.

The console also provides sample code that you can adapt to decrypt the values in your function handler.

A

Encryption helpers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Name the feature:

On a per-function basis, you can configure Lambda to use an encryption key that you create and manage in AWS Key Management Service. These are referred to as customer managed customer master keys (CMKs) or customer managed keys. If you don’t configure a customer managed key, Lambda uses an AWS managed CMK named aws/lambda, which Lambda creates in your account.

A

Key configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

CodeDeploy:
Traffic is shifted in two increments. You can choose from predefined ______ options. The options specify the percentage of traffic that’s shifted to your updated Lambda function version in the first increment, and the interval, in minutes, before the remaining traffic is shifted in the second increment.

A

Canary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

CodeDeploy:
Traffic is shifted in equal increments with an equal number of minutes between each increment. You can choose from predefined _____ options that specify the percentage of traffic that’s shifted in each increment and the number of minutes between each increment.

A

linear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

CodeDeploy:
All traffic is shifted from the original Lambda function to the updated Lambda function version at once.

A

All-at-once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

You can use Half at a Time traffic shifting strategy with

A

EC2 and on-premises instances, but not Lambda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

is a highly available, durable, secure, fully managed pub/sub messaging service that enables you to decouple microservices, distributed systems, and serverless applications.

A

Amazon Simple Notification Service (SNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

is a fully managed message queuing service that enables you to decouple and scale microservices, distributed systems, and serverless applications.

A

Amazon Simple Queue Service (SQS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which AWS services can be used for asynchronous message passing?

A

SNS and SQS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

The ____________ API call returns a set of temporary credentials for an AWS account or IAM user. The credentials consist of an access key ID, a secret access key, and a security token.

A

GetSessionToken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Typically, you use what API call if you want to use MFA to protect programmatic calls to specific AWS API operations

A

GetSessionToken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

a web service that enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users or for users you authenticate (federated users).

A

AWS Security Token Service (AWS STS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Returns a set of temporary security credentials that you can use to access AWS resources. These temporary credentials consist of an access key ID, a secret access key, and a security token. Typically, you used within your account or for cross-account access.

A

AssumeRole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Returns a set of temporary security credentials for users who have been authenticated via a SAML authentication response.

This operation provides a mechanism for tying an enterprise identity store or directory to role-based AWS access without user-specific credentials or configuration.

A

AssumeRoleWithSAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Returns a set of temporary security credentials for users who have been authenticated in a mobile or web application with a web identity provider.

A

AssumeRoleWithWebIdentity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Decodes additional information about the authorization status of a request from an encoded message returned in response to an AWS request.

A

DecodeAuthorizationMessage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Returns the account identifier for the specified access key ID.

A

GetAccessKeyInfo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Returns details about the IAM user or role whose credentials are used to call the operation.

A

GetCallerIdentity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Returns a set of temporary security credentials (consisting of an access key ID, a secret access key, and a security token) for a federated user. A typical use is in a proxy application that gets temporary security credentials on behalf of distributed applications inside a corporate network.

A

GetFederationToken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

AWS Security Token Service API calls include:

A

AssumeRole
AssumeRoleWithSAML
AssumeRoleWithWebIdentity
DecodeAuthorizationMessage
GetAccessKeyInfo
GetCallerIdentity
GetFederationToken
GetSessionToken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Returns the account identifier for the specified access key ID.

A

GetAccessKeyInfo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

represents the partition key of the dynamodb table

A

LeadingKeys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

represents the items that can be changed in the dynamodb table

A

Attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

This condition key allows users to access only the items where the partition key value matches their user ID. This ID, ${www.amazon.com:user_id}, is a substitution variable.

A

dynamodb:LeadingKeys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

This dynamoDB condition key limits access to the specified attributes so that only the actions listed in the permissions policy can return values for these attributes.

In addition, the StringEqualsIfExists clause ensures that the app must always provide a list of specific attributes to act upon and that the app can’t request all attributes.

A

dynamodb:Attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Which action defined by Amazon DynamoDB:
Grants permission to return the attributes of one or more items from one or more tables

A

BatchGetItem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Which action defined by Amazon DynamoDB:
Grants permission to put or delete multiple items in one or more tables

A

Grants permission to put or delete multiple items in one or more tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Which action defined by Amazon DynamoDB:
Grants permission to the ConditionCheckItem operation checks the existence of a set of attributes for the item with the given primary key

A

ConditionCheckItem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Which action defined by Amazon DynamoDB:

Grants permission to return one or more items and item attributes by accessing every item in a table or a secondary index

A

Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Which action defined by Amazon DynamoDB:

Grants permission to create a new item, or replace an old item with a new item

A

PutItem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

With _________________, you can register and authenticate users via your own existing authentication process, while still using Amazon Cognito to synchronize user data and access AWS resources.

A

developer authenticated identities

Using developer authenticated identities involves interaction between the end user device, your backend for authentication, and Amazon Cognito.

Therefore, the Developer can implement developer-authenticated identities by using Amazon Cognito, and get credentials for these identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

It is suitable to store session state in an Amazon RDS database. T/F

A

False, RDS is not suitable for storing session state data. DynamoDB is a better fit for this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

With the _______ integration, also known as the ________ custom integration, you must configure both the integration request and integration response. You must set up necessary data mappings from the method request to the integration request, and from the integration response to the method response.

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

The ____________ integration allows a client to access the backend HTTP endpoints with a streamlined integration setup on single API method. You do not set the integration request or the integration response. API Gateway passes the incoming request from the client to the HTTP endpoint and passes the outgoing response from the HTTP endpoint to the client.

A

HTTP proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

this is a custom integration that would be used if you need to customize the data mappings.

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

this type of integration lets an API expose AWS service actions.

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

this type of integration lets an API method be integrated with the Lambda function invocation action with a flexible, versatile, and streamlined integration setup.

A

AWS_PROXY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

provides fully managed implementations of two popular in-memory data stores – Redis and Memcached.

A

ElastiCache,a web service that makes it easy to deploy and run Memcached or Redis protocol-compliant server nodes in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

this elasticache implementation does not offer read replicas or auto-failover and therefore cannot provide high availability

A

memcached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

is a data warehouse for use in online analytics processing (OLAP) use cases. It is not suitable to be used as a caching layer.

A

Amazon Redshift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

this elasticache implementation does offer read replicas or auto-failover and therefore can provide high availability

A

redis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Memcached Elasticache offers data partitioning but does Redis?

A

Yes, but only if cluster mode is enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

which elasitcache offers simple data types w/ no data persistence, encryption or replication?

A

memcached, unique features include nodes (scale up and out) and multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

which elasticache offers complex data types, data persistence, encryption and replication?

A

redis, unique features include automatic and manual snapshots, and sharding (which allows for scaling)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

As an alternative to using IAM roles and policies or Lambda authorizers (formerly known as custom authorizers), you can use an ___________ to control who can access your API in Amazon API Gateway.

A

Amazon Cognito user pool

To use an Amazon Cognito user pool with your API, you must first create an authorizer of the COGNITO_USER_POOLS type and then configure an API method to use that authorizer. After the API is deployed, the client must first sign the user in to the user pool, obtain an identity or access token for the user, and then call the API method with one of the tokens, which are typically set to the request’s Authorization header. The API call succeeds only if the required token is supplied and the supplied token is valid, otherwise, the client isn’t authorized to make the call because the client did not have credentials that could be authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

A developer is preparing the resources for creating a multicontainer Docker environment on AWS Elastic Beanstalk. How can the developer define the Docker containers?

A

Define the containers in the Dockerrun.aws.json file in JSON format and save at the root of the source directory.

You can launch a cluster of multicontainer instances in a single-instance or autoscaling Elastic Beanstalk environment using the Elastic Beanstalk console. The single container and multicontainer Docker platforms for Elastic Beanstalk support the use of Docker images stored in a public or private online image repository.

You specify images by name in the Dockerrun.aws.json file and save it in the root of your source directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

is a rule that is considered during task placement. can be specified when either running a task or creating a new service.

A

task placement constraint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Amazon ECS supports the following types of task placement constraints:

A

distinctInstance, memberOf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

The memberOf task placement constraint can be specified with the following actions:

A

Running a task

Creating a new service

Creating a new task definition

Creating a new revision of an existing task definition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Place tasks on container instances that satisfy an expression

A

memberOf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Place each task on a different container instance. This task placement constraint can be specified when either running a task or creating a new service.

A

distinctInstance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

is used to select instances for task placement using the binpack, random and spread algorithms.

A

task placement strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

A developer is building a multi-tier web application that accesses an Amazon RDS MySQL database. The application must use a credentials to connect and these need to be stored securely. The application will take care of secret rotation.

Which AWS service represents the LOWEST cost solution for storing credentials?

AWS IAM with the Security Token Service (STS)

AWS Systems Manager Parameter Store

AWS Secrets Manager

AWS Key Management Service (KMS)

A

AWS Systems Manager Parameter Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

provides secure, hierarchical storage for configuration data management and secrets management. You can store data such as passwords, database strings, and license codes as parameter values. It is highly scalable, available, and durable.

A

AWS Systems Manager Parameter Store

You can then reference values by using the unique name that you specified when you created the parameter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

By default, Amazon SQS uses ____ polling, querying only a subset of its servers (based on a weighted random distribution) to determine whether any messages are available for a response.

A

short polling

You can use long polling to reduce your costs while allowing your consumers to receive messages as soon as they arrive in the queue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

When the wait time for the ReceiveMessage API action is greater than 0, long polling is in effect. The maximum long polling wait time is

A

20 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

This attribute sets the length of time, in seconds, for which Amazon SQS retains a message.

A

MessageRetentionPeriod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

This SQS attribute sets the length of time, in seconds, for which the delivery of all messages in the queue is delayed.

A

DelaySeconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

A scenario requires encryption of in-flight data which can be done by implementing HTTPS. To do this the organization must configure the

A

Origin Protocol Policy and the Viewer Protocol Policy on the CloudFront Distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Origin Protocol Policy gives what 3 options:

A

HTTP only
HTTPS Only
Match Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Viewer Protocol Policy gives what 3 options:

A

HTTP and HTTPS
Redirect HTTP to HTTPS
HTTPS Only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

is used to configure whether you want CloudFront to require users to access your content using a signed URL or a signed cookie.

A

Enable the CloudFront option Restrict Viewer Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

is a feature in Amazon Kinesis Data Streams that automatically encrypts data before it’s at rest by using an AWS KMS customer master key (CMK) you specify.

A

Server-side encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

The AWS STS __________ API decodes additional information about the authorization status of a request from an encoded message returned in response to an AWS request. The output is then decoded into a more human-readable output that can be viewed in a JSON editor.

A

decode-authorization-message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q
  • Launches new instances in a new ASG and deploys the version update to these instances before swapping traffic to these instances once healthy.
  • Zero downtime.
  • New code is deployed to new instances using an ASG.
  • High cost as double the number of instances running during updates.
  • Longest deployment.
  • Quick rollback in case of failures.
  • Great for production environments.
A

Immutable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

The default credential provider chain looks for credentials in what order:

A
  1. Environment variables–AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY. The AWS SDK for Java uses the EnvironmentVariableCredentialsProvider class to load these credentials.
  2. Java system properties–aws.accessKeyId and aws.secretKey. The AWS SDK for Java uses the SystemPropertiesCredentialsProvider to load these credentials.
  3. The default credential profiles file– typically located at ~/.aws/credentials (location can vary per platform) and shared by many of the AWS SDKs and by the AWS CLI. The AWS SDK for Java uses the ProfileCredentialsProvider to load these credentials.
  4. Amazon ECS container credentials– loaded from the Amazon ECS if the environment variable AWS_CONTAINER_CREDENTIALS_RELATIVE_URI is set. The AWS SDK for Java uses the ContainerCredentialsProvider to load these credentials. You can specify the IP address for this value.
  5. Instance profile credentials– used on EC2 instances and delivered through the Amazon EC2 metadata service. The AWS SDK for Java uses the InstanceProfileCredentialsProvider to load these credentials. You can specify the IP address for this value.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

When you initialize a new service client without supplying any arguments, the AWS SDK for Java attempts to find AWS credentials by using the default credential provider chain implemented by the

A

DefaultAWSCredentialsProviderChain class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

You can invoke Lambda functions directly with the

A

Lambda console, the Lambda API, the AWS SDK, the AWS CLI, and AWS toolkits.

You can also configure other AWS services to invoke your function, or you can configure Lambda to read from a stream or queue and invoke your function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

You wait for the function to process the event and return a response.

o To invoke a function in this manner with the AWS CLI, use the invoke command.

o The Invocation-type can be used to specify a value of “RequestResponse”. This instructs AWS to execute your Lambda function and wait for the function to complete.

A

Synchronous invocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Asynchronous invocation:

A

o When you invoke a function asynchronously, you don’t wait for a response from the function code.

o For asynchronous invocation, Lambda handles retries and can send invocation records to a destination.

o To invoke a function asynchronously, set the invocation type parameter to Event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

The fastest way to process all the files is to use asynchronous invocation and process the files in parallel. To do this you should specify the invocation type of

A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

querying only a subset of its servers (based on a weighted random distribution) to determine whether any messages are available for a response.

A

short polling, Amazon SQS defaults to this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Used to reduce your costs while allowing your consumers to receive messages as soon as they arrive in the queue.

A

long polling

When the wait time for the ReceiveMessage API action is greater than 0, long polling is in effect. The maximum long polling wait time is 20 seconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

helps reduce the cost of using Amazon SQS by eliminating the number of empty responses (when there are no messages available for a ReceiveMessage request) and false empty responses (when messages are available but aren’t included in a response). It also returns messages as soon as they become available.

A

Long polling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Service: AWSKMS; Status Code: 400, Error Code: ThrottlingException

Resolve

A

Perform error retries with exponential backoff in the application code

Contact AWS support to request an AWS KMS rate limit increase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

A function execution result includes

A

version, timestamp, request context, request payload, response context, and response payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

For each execution status (i.e. Success and Failure), you can choose one destination from four options: another Lambda function and what others?

A

an SNS topic, an SQS standard queue, or EventBridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

provides secure, hierarchical storage for configuration data management and secrets management. You can store data such as passwords, database strings, and license codes as parameter values.

A

AWS Systems Manager Parameter Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

is any sensitive data that needs to be stored and referenced in a secure manner.

A

secure string parameter,

If you have data that you don’t want users to alter or reference in plaintext, such as passwords or license keys, create those parameters using the SecureString datatype.

153
Q

Each shard is processed by how many KCL workers?

A

exactly one

The maximum number of instances should be the same as the number of shards.

154
Q

To collect logs from Amazon EC2 and on-premises instances it is necessary to install an agent. There are two options:

A

the unified CloudWatch Agent which collects logs and advanced metrics (such as memory usage)

the older CloudWatch Logs agent which only collects logs from Linux servers.

155
Q

enables you to centralize the logs from all of your systems, applications, and AWS services that you use, in a single, highly scalable service. You can then easily view them, search them for specific error codes or patterns, filter them based on specific fields, or archive them securely for future analysis.

A

CloudWatch Logs

156
Q

creates a unique customer managed customer master key (CMK) in your AWS account and Region.

A

kms:CreateKey

157
Q

Which api generates a unique symmetric data key?

This operation returns a plaintext copy of the data key and a copy that is encrypted under a customer master key (CMK) that you specify. You can use the plaintext key to encrypt your data outside of AWS KMS and store the encrypted data key with the encrypted data.

A

kms:GenerateDataKey

158
Q

this sets the key state of a customer master key (CMK) to enabled. It allows you to use the CMK for cryptographic operations

A

kms:EnableKey

159
Q

is a fully managed service that makes it easy for developers to create, publish, maintain, monitor, and secure APIs at any scale.

A

Amazon API Gateway

160
Q

act as the “front door” for applications to access data, business logic, or functionality from your backend services.

A

APIs

161
Q

you can use this to create RESTful APIs and WebSocket APIs that enable real-time two-way communication applications.

it supports containerized and serverless workloads, as well as web applications.

A

API Gateway

162
Q

is used to provide central management of multiple AWS accounts and business applications and to provide single sign-on to accounts.

A

AWS Single Sign On (SSO)

163
Q

is used for adding sign-up, sign-in and access control to web and mobile apps.

A

AWS Cognito

164
Q

is a web service that enables you to coordinate the components of distributed applications and microservices using visual workflows. You build applications from individual components that each perform a discrete function, or task, allowing you to scale and change applications quickly.

A

AWS Step Functions

165
Q

offers a graphical console to visualize the components of your application as a series of steps. It automatically triggers and tracks each step, and retries when there are errors, so your application executes in order and as expected, every time.

A

AWS Step Functions

166
Q

Can be thought of as a fully-managed state tracker and task coordinator in the Cloud. It does not coordinate serverless workflows.

A

Amazon SWF

167
Q

is used to run batch computing jobs on Amazon EC2 and is therefore not serverless.

A

AWS Batch

168
Q

it is serverless, it does not provide a native capability to coordinate multiple AWS services.

A

AWS Lambda

169
Q

True/False: You can access the SAR through the console and deploy SAM templates

A

True

170
Q

True/False: You can access AWS SAM through the AWS Management Console

A

False

171
Q

True/False: You cannot deploy SAM templates through the CloudFormation console.

A

True, you must use the SAM CLI or deploy using the SAR

172
Q

command initializes a serverless application with an AWS SAM template. The template provides a folder structure for your Lambda functions and is connected to an event source such as APIs, S3 buckets, or DynamoDB tables

A

sam init

173
Q

Each _____ can be a thread (in programming languages that support multithreading) or an operating system process. (DynamoDB related question)

A

worker

174
Q

The total number of segments for the parallel scan. This value must be the same as the number of workers that your application will use.

A

TotalSegments

175
Q

T/F: Even though DynamoDB distributes a large table’s data across multiple physical partitions, a Scan operation can only read one partition at a time. For this reason, the throughput of a Scan is constrained by the maximum throughput of a single partition.

A

True

To address these issues, the Scan operation can logically divide a table or secondary index into multiple segments, with multiple application workers scanning the segments in parallel. Each worker can be a thread (in programming languages that support multithreading) or an operating system process. To perform a parallel scan, each worker issues its own Scan request with the following parameters:

  • Segment
  • TotalSegments
176
Q

To control the amount of data returned per request, using this can help prevent situations where one worker consumes all of the provisioned throughput, at the expense of all other workers.

A

Limit parameter.

177
Q

BeforeInstall > AfterInstall > AfterAllowTestTraffic > BeforeAllowTraffic > AfterAllowTraffic

What is shown?

A

a valid structure for the order of hooks that should be specified in the appspec.yml file

178
Q

extends the functionality of stacks by enabling you to create, update, or delete stacks across multiple accounts and regions with a single operation.

A

AWS CloudFormation StackSets

179
Q

A team of developers need to be able to collaborate and synchronize multiple distributed code repositories and leverage a pre-configured continuous delivery toolchain for deploying their projects on AWS. The team also require a centralized project dashboard to monitor application activity.

Which AWS service should they use?

A

AWS CodeStar

180
Q

is a fully managed source control service that hosts Git-based repositories. However, it does not offer the collaboration and project management dashboard features of CodeStar or the pre-configured continuous delivery toolchain.

A

CodeCommit

181
Q

Steps to determine number of RCUs needed

A
  1. Determine the average item size by rounding up the next multiple of 4KB (9KB rounds up to 12KB).
  2. Determine the RCU per item by dividing the item size by 4KB (12KB/4KB = 3).
  3. Multiply the value from step 2 with the number of reads required per second (3x4 = 12).
182
Q

What does an Amazon SQS delay queue accomplish?

A

Messages are hidden for a configurable amount of time when they are first added to the queue

183
Q

options for preventing DynamoDB throttling from occurring include:

A

Add exponential backoff to the application logic

Distribute read and write operations as evenly as possible across your table

Implement a caching solution

184
Q

An application is running on a fleet of EC2 instances running behind an Elastic Load Balancer (ELB). The EC2 instances session data in a shared Amazon S3 bucket. Security policy mandates that data must be encrypted in transit.

How can the Developer ensure that all data that is sent to the S3 bucket is encrypted in transit?

A

Create an S3 bucket policy that denies traffic where SecureTransport is false

185
Q

A Developer is creating an AWS Lambda function that generates a new file each time it runs. Each new file must be checked into an AWS CodeCommit repository hosted in the same AWS account.

How should the Developer accomplish this?

A

Use an AWS SDK to instantiate a CodeCommit client. Invoke the put_file method to add the file to the repository

186
Q

delivers a near real-time stream of system events that describe changes in Amazon Web Services (AWS) resources. Using simple rules that you can quickly set up, you can match events and route them to one or more target functions or streams.

A

Amazon CloudWatch Events

You can use Amazon CloudWatch Events to invoke the Lambda function on a recurring schedule of 15 minutes. This solution is entirely automated and serverless.

187
Q

actions are allowed by default, and you specify what services and actions are prohibited

A

SCP deny list

188
Q

actions are prohibited by default, and you specify what services and actions are allowed

A

SCP allow list

189
Q

compiles your source code, runs unit tests, and produces artifacts that are ready to deploy.

A

CodeBuild

190
Q

is a fully managed continuous delivery service that helps you automate your release pipelines for fast and reliable application and infrastructure updates.

A

AWS CodePipeline

191
Q

is an ordered flow of information about changes to items in a DynamoDB table. When you enable a stream on a table, DynamoDB captures information about every modification to data items in the table.

A

DynamoDB stream

192
Q

To restrict access to content that you serve from Amazon S3 buckets, you create CloudFront signed URLs or signed cookies to limit access to files in your Amazon S3 bucket, and then you create a

A

special CloudFront user called an origin access identity (OAI) and associate it with your distribution.

193
Q

After creating a special CloudFront user called an origin access identity (OAI) and associate it with your distribution, you then?

A

configure permissions so that CloudFront can use the OAI to access and serve files to your users, but users can’t use a direct URL to the S3 bucket to access a file there.

Taking these steps help you maintain secure access to the files that you serve through CloudFront.

194
Q

True/False: You can restrict access to buckets by IP address when using ACL

A

False

195
Q

Name 3 benefits of envelope encryption:

A

Protecting data keys

Encrypting the same data under multiple master keys

Combining the strengths of multiple algorithms

196
Q

This picture depicts what?

A

envelope encryption

197
Q

is the practice of encrypting plaintext data with a data key, and then encrypting the data key under another key.

A

envelope encryption

198
Q

The top-level plaintext key encryption key is known as the

A

master key

199
Q

CMK can only encrypt up to ______ in a single operation.

A

4kb

200
Q

To encrypt large amounts of data via KMS, you must use a __________ instead of a CMK

A

data encryption key

201
Q

To generate a data key, call the ____________________ operation

A

GenerateDataKey

202
Q

With the SAM CLI you can package and deploy your source code using two simple commands:

A
  • sam package
  • sam deploy

Alternatively, you can use:

  • aws cloudformation package
  • aws cloudformation deploy
203
Q

are designed to enhance messaging between applications when the order of operations and events is critical, or where duplicates can’t be tolerated.

A

FIFO (First-In-First-Out) queues

204
Q

An AppSpec file can be written using

A

JSON or YAML

205
Q

For a deployment to an Amazon ECS compute platform:

True/False: A revision is the same as an AppSpec file.

A

True

206
Q

For a deployment to an Amazon ECS compute platform:

What specifies the Amazon ECS task definition used for the deployment, a container name and port mapping used to route traffic, and optional Lambda functions run after deployment lifecycle events.

A

appspec file

207
Q

describes how to deploy a remote Docker image as an Elastic Beanstalk application.

A

Dockerrun.aws.json file

208
Q

is a collection of build commands and related settings, in YAML format, that CodeBuild uses to run a build using AWS CodeBuild.

A

A build spec, buildspec.yaml

209
Q

The _______________________ in the source code for an Elastic Beanstalk application is used for .config files that configure the environment and customize resources.

A

.ebextensions folder

210
Q
  • Writes to one or more Kinesis data streams with an automatic and configurable retry mechanism
  • Collects records and uses PutRecords to write multiple records to multiple shards per request
A

Kinesis Producer Library (KPL)

211
Q
  • Aggregates user records to increase payload size and improve throughput
  • Integrates seamlessly with the Kinesis Client Library (KCL) to de-aggregate batched records on the consumer
  • Submits Amazon CloudWatch metrics on your behalf to provide visibility into producer performance
A

Kinesis Producer Library (KPL)

212
Q

What object storage uses standards-based REST and SOAP interfaces designed to work with any internet-development toolkit.

A

Amazon S3, an object storage built to store and retrieve any amount of data from anywhere on the Internet.

213
Q

Amazon S3 is a simple key-based object store. T/F

A

True

214
Q

allow containers to access ports on the host container instance to send or receive traffic. And they are specified as part of the container definition.

A

port mappings

215
Q

the port number on the container that is bound to the user-specified or automatically assigned host port.

A

containerPort

216
Q

the port number on the container instance to reserve for your container.

A

hostPort

217
Q

True/False: You can create a VPC endpoint for AWS Lambda

A

False

218
Q

a feature that lets you specify placeholders in a policy.

When the policy is evaluated, they are replaced with values that come from the context of the request itself.

A

policy variables

219
Q

True/False: You can run docker login with an IAM key pair

A

False

220
Q

Amazon Cognito ______ pools support both authenticated and unauthenticated identities.

A

identity

221
Q

A Developer is publishing custom metrics for Amazon EC2 using the Amazon CloudWatch CLI. The Developer needs to add further context to the metrics being published by organizing them by EC2 instance and Auto Scaling Group.

What should the Developer add to the CLI command when publishing the metrics using put-metric-data

A

the –dimensions parameter

222
Q

A dimension further clarifies

A

what the metric is and what data it stores. You can have up to 10 dimensions in one metric, and each dimension is defined by a name and value pair.

223
Q

enables fast, easy, and secure transfers of files over long distances between your client and an S3 bucket.

A

Amazon S3 Transfer Acceleration

224
Q

What can capture, transform, and load streaming data into Amazon S3, Amazon Redshift, Amazon Elasticsearch Service, and Splunk, enabling near real-time analytics with existing business intelligence tools and dashboards you’re already using today?

A

Amazon Kinesis Data Firehose, the easiest way to load streaming data into data stores and analytical tools.

225
Q

is a fully managed service that automatically scales to match the throughput of your data and requires no ongoing administration. It can also batch, compress, and encrypt the data before loading it, minimizing the amount of storage used at the destination and increasing security.

A

Firehose

226
Q

What kinesis service needs consumers running on EC2 instances or AWS Lambda for processing data from stream and won’t load data directly to a datastore?

A

Amazon Kinesis Data Streams

227
Q

displays a graphical view of your state machine’s structure. This provides a way to visually check your state machine’s logic and monitor executions.

A

The Step Functions console

228
Q

is based on the concepts of tasks and state machines

defined using the JSON-based Amazon States Language.

A

AWS Step Functions

229
Q

True or false: Read Replicas are used for fault tolerance

A

False

230
Q

is the only Elastic Load Balancer provided by AWS that can perform host-based routing.

A

The Application Load Balancer,

This means you can route traffic coming in to forum.example.com and myaccount.example.com to different target groups.

231
Q

this type of ELB routes traffic based on information at the connection layer (L4).

A

Network Load Balancer

232
Q

A Developer is creating an AWS Lambda function that will process medical images. The function is dependent on several libraries that are not available in the Lambda runtime environment. Which strategy should be used to create the Lambda deployment package?

A

Create a ZIP file with the source code and all dependent libraries

233
Q

True/False: You cannot map an external path to a Lambda function using an environment variable.

A

True

234
Q

a map of services used by your application with trace data. You can use the trace data to drill into specific services or issues. This data provides a view of connections between services in your application and aggregated data for each service, including average latency and failure rates.

A

X-ray service map

235
Q

is used to record API calls for governance, compliance operation, and risk auditing purposes.

A

CloudTrail event history

236
Q

delivers a near-real-time stream of system events that describe changes in Amazon Web Services resources.

A

EventBridge (CloudWatch Events)

237
Q

provides real-time guidance to help provision AWS resources to follow AWS best practices. It can report overall system utilization, but it is not used for identifying application performance issues.

A

Trusted Advisor

238
Q

(Step Functions)

The HeartbeatSeconds attribute defines the

A

maximum interval that the task will wait for a heartbeat signal.

If an activity worker fails to send heartbeats within this interval, the state is failed. A retry policy on the state allows another activity worker to attempt to complete the state.

239
Q

(Step Functions)

The TimeoutSeconds attribute defines the

A

maximum task duration before the task is considered failed.

240
Q

A function needs permission to call CloudWatch Logs. Update the execution role to grant the permission. You can use the managed policy of

A

AWSLambdaBasicExecutionRole

241
Q

You use the Lambda _________ to grant Lambda permission to AWS resources. The ____________ allows other services to invoke the Lambda function.

A

execution role, resource-based policy

242
Q

(DynamoDB Feature) provides end-to-end protection for your data in transit and at rest. You can encrypt selected items or attribute values in a table.

A

The DynamoDB Encryption Client

243
Q

When you configure the DynamoDB Encryption Client to use AWS KMS, the DynamoDB Encryption Client uses a KMS key that is always encrypted when the key is used outside of AWS KMS. This cryptographic materials provider returns a unique encryption key and a signing key for every table item. This method of encryption uses a

A

symmetric KMS key.

244
Q

allows for easy externalization of parameters, such as an API key. The secure string option provides for data security by keeping the value encrypted at rest.

A

Parameter Store

245
Q

is used to manage the state of an instance itself, such as specific instance configurations or software installations.

A

Systems Manager State Manager

246
Q

An ElastiCache cluster with a _________ strategy will allow for the read requests to be redirected to ElastiCache efficiently. The strategy will allow for the most up-to-date data to be retrieved.

A

write-through

247
Q

can help users quickly identify services by their relative response times and can identify a poorly performing service from within a web of interacting services.

A

X-Ray, once identified, CloudWatch provides the context, including the logs and metrics necessary to study specific issues.

248
Q

The contents of the appspec.yml file can be directly added into the CodeDeploy console only when an ___________ deployment is created.

A

AWS Lambda application

249
Q

Set the _________ parameter to 1 to set the maximum number of items that need to be retrieved with a DynamoDB scan operation.

A

scan limit

250
Q

AWS software development kits (SDKs) require what 2 things to make programmatic calls to AWS.

A

an access key ID and a secret access key

251
Q

An EC2 instance, or any AWS principal, service, or resource can assume how many roles at a time?

A

1

252
Q

is a .zip file archive that contains libraries, a custom runtime, or other dependencies.

With them, you can use libraries in a Lambda function without needing to include the libraries in a deployment package.

can be used on multiple lambda functions

A

Lambda layer

253
Q

is the practice of encrypting plaintext data with a data key and then encrypting the data key under another key.

A

Envelope Encryption

254
Q

True/False: It is bad practice to store the encrypted form of the data key so that you can use the data key with the encrypted data

A

False, You must store the encrypted form of the data key so that you can use the data key to decrypt the encrypted data in the database.

255
Q

can grant API access in one AWS account to users in a different AWS account by using Signature Version 4 (SigV4) protocols.

A

resource policy

256
Q

simplifies application development by giving you the ability to create a flexible API to securely access, manipulate, and combine data from one or more data sources. It is a managed service that uses GraphQL to help applications get the exact data that they need.

A

AWS AppSync, You can use AWS AppSync to build scalable applications that require real-time updates on a range of data sources, including Amazon DynamoDB.

257
Q

helps protect the credentials that are needed to access databases, applications, services, and other IT resources.

name service and use

A

With Secrets Manager, you can rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.

Users and applications retrieve secrets by making a Secrets Manager API call, eliminating the need to hardcode sensitive information in plaintext.

Secrets Manager offers secret rotation with built-in integration for Amazon RDS, Amazon Redshift, and Amazon DocumentDB (with MongoDB compatibility).

258
Q

Supports SSL endpoints using https protocol, client side, and server side encryption

A

S3
SSE-S3, SSE-C, SSE-KMS

259
Q

Encrypts data at rest and in transit via EBS encryption that uses AWS KMS CMKs

A

EBS

260
Q

Encrypt data at rest and in transit. Data at rest via AWS KMS, in-transit via TLS

A

EFS

261
Q

If your AWS Elastic Beanstalk application performs operations or workflows that take a long time to complete, you can offload those tasks to a dedicated

A

worker environment

262
Q

With _______, you can also configure the worker daemon to queue messages based on a cron schedule. Each of which can POST to a different path

A

periodic tasks

263
Q

are primarily used in updating data and for scenarios where you want the updates to not be idempotent.

A

atomic counters

264
Q

True/False: There is a default SSL/TLS certificate in ELBs

A

False

265
Q

is a fully managed, highly available, in-memory cache for DynamoDB that delivers up to a 10x performance improvement – from milliseconds to microseconds – even at millions of requests per second.

A

Amazon DynamoDB Accelerator (DAX)

DAX does all the heavy lifting required to add in-memory acceleration to your DynamoDB tables without requiring developers to manage cache invalidation, data population, or cluster management.

266
Q

the default value of the –storage-resolution parameter is

A

60, which stores data in one-minute granularity

267
Q

provides a time-ordered sequence of item level changes in any DynamoDB table. The changes are de-duplicated and stored for 24 hours. Applications can access this log and view the data items as they appeared before and after they were modified, in near real time.

A

DynamoDB Streams

268
Q

Amazon DynamoDB is also integrated with AWS Lambda so that you can create _____ which are pieces of code that automatically respond to events in DynamoDB Streams. With them, you can build applications that react to data modifications in DynamoDB tables.

A

triggers

269
Q

Choose Memcached or Redis if you have the following requirements:

– You need the simplest model possible.

– You need to run large nodes with multiple cores or threads.

– You need the ability to scale out and in, adding and removing nodes as demand on your system increases and decreases.

– You need to cache objects, such as a database.

A

Memcached

270
Q

Choose Memcached or Redis if you have the following requirements:

-Snapshots &/or Replications
-Pub/Sub
-Advanced Data Structures
-Transactions

A

Redis

271
Q

this service is primarily used to enable connected devices to run AWS Lambda functions, execute predictions based on machine learning models, keep device data in sync, and communicate with other devices securely even without an Internet connection

A

AWS IoT Greengrass

272
Q

You can integrate an API method in your API Gateway with a custom HTTP endpoint of your application in two ways:

A

– HTTP proxy integration

– HTTP custom integration

273
Q

Programmatically, you choose an integration type by setting the type property on the Integration resource. For the Lambda proxy integration, the value is

A

AWS_PROXY

For the Lambda custom integration and all other AWS integrations, it is AWS

274
Q

allows container instances to connect to your cluster.

A

Container Agent

The Amazon ECS container agent is included in the Amazon ECS-optimized AMIs, but you can also install it on any Amazon EC2 instance that supports the Amazon ECS specification.

275
Q

an Amazon EC2 instance that is running the Amazon ECS container agent and has been registered into a cluster.

A

Container instance

276
Q

Amazon ECS provides a _________ for long-running tasks and applications. It also provides the ability to run tasks manually for batch jobs or single run tasks.

A

service scheduler

277
Q

Port mappings allow containers to access ports on the host container instance to send or receive traffic. Port mappings are specified as part of the container definition which can be configured in the

A

task definition.

278
Q

Ticking the _______ _______ checkbox ensures that not every client can invalidate the API cache. If most or all of the clients invalidate the API cache, this could significantly increase the latency of your API.

A

Require authorization

279
Q

If the AWS Lambda service encountered an internal error, the return will be

A

ServiceException

280
Q

GenerateDataKeyWithoutPlaintext is identical to GenerateDataKey except that it returns only the

A

encrypted copy of the data key.

281
Q

is an AWS service that makes it easier for you to manage secrets. Secrets can be database credentials, passwords, third-party API keys, and even arbitrary text.

A

AWS Secrets Manager

You can store and control access to these secrets centrally by using the Secrets Manager console, the Secrets Manager command line interface (CLI), or the Secrets Manager API and SDKs.

282
Q

enables you to replace hardcoded credentials in your code (including passwords), with an API call to it to retrieve the secret programmatically.

A

Secrets Manager

283
Q

AWS resources created for a worker environment tier include

A

an Auto Scaling group, one or more Amazon EC2 instances, and an IAM role.

284
Q

Allows you to define periodic tasks in a file named ______ in your source bundle to add jobs to your worker environment’s queue automatically at a regular intervals.

A

cron.yaml

285
Q

file that is primarily used to configure the environment name, solution stack, and environment links to use when creating your environment in Elastic Beanstalk.

A

env.yaml

286
Q

file used to manage each application deployment as a series of lifecycle event hooks in CodeDeploy

A

appspec.yml

287
Q

helps you manage a large number of connections from Lambda to an RDS database by establishing a warm connection pool to the database. Your Lambda functions interact with this instead of your database instance

A

RDS Proxy,

It handles the connection pooling necessary for scaling many simultaneous connections created by concurrent Lambda functions. This allows your Lambda applications to reuse existing connections, rather than creating new connections for every function invocation.

288
Q

increasing the maximum number of connections alone, without considering the database size, may lead to other issues, such as

A

slow response times, timeouts, and even crashes.

289
Q

provides an end-to-end view of requests as they travel through your application, and shows a map of your application’s underlying components.

A

AWS X-Ray

You can use X-Ray to analyze both applications in development and in production, from simple three-tier applications to complex microservices applications consisting of thousands of services.

AWS X-Ray works with Amazon EC2, Amazon EC2 Container Service (Amazon ECS), AWS Lambda, and AWS Elastic Beanstalk. You can use X-Ray with applications written in Java, Node.js, and .NET that are deployed on these services.

290
Q

provides secure, hierarchical storage for configuration data management and secrets management. You can store data such as passwords, database strings, and license codes as parameter values. You can store values as plain text or encrypted data. You can then reference values by using the unique name that you specified when you created the parameter.

A

AWS Systems Manager Parameter Store

offers the following benefits and features:

– Use a secure, scalable, hosted secrets management service (No servers to manage).

– Improve your security posture by separating your data from your code.

– Store configuration data and secure strings in hierarchies and track versions.

– Control and audit access at granular levels.

– Configure change notifications and trigger automated actions.

– Tag parameters individually, and then secure access from different levels, including operational, parameter, Amazon EC2 tag, or path levels.

– Reference AWS Secrets Manager secrets by using Parameter Store parameters.

291
Q

This environment variable exposes the X-Ray daemon’s address in the following format: IP_ADDRESS:PORT. You can use the X-Ray daemon’s address to send trace data to the X-Ray daemon directly without using the X-Ray SDK.

A

AWS_XRAY_DAEMON_ADDRESS

292
Q

Contains the tracing header, which includes the sampling decision, trace ID, and parent segment ID. If Lambda receives a tracing header when your function is invoked, that header will be used to populate the ___________ environment variable. If a tracing header was not received, Lambda will generate one for you.

A

_X_AMZN_TRACE_ID

293
Q

The X-Ray SDK uses this variable to determine its behavior in the event that your function tries to record X-Ray data, but a tracing header is not available. Lambda sets this value to LOG_ERROR by default.

A

AWS_XRAY_CONTEXT_MISSING

294
Q

A recently deployed Lambda function has an intermittent issue in processing customer data. You enabled the active tracing option in order to detect, analyze, and optimize performance issues of your function using the X-Ray service.

Which of the following environment variables are used by AWS Lambda to facilitate communication with X-Ray? (Select TWO.)

AUTO_INSTRUMENT

AWS_XRAY_DEBUG_MODE

AWS_XRAY_TRACING_NAME

AWS_XRAY_CONTEXT_MISSING

_X_AMZN_TRACE_ID

A

AWS_XRAY_CONTEXT_MISSING

_X_AMZN_TRACE_ID

295
Q

When you create an alarm, you specify three settings to enable CloudWatch to evaluate when to change the alarm state:

A

– Period
– Evaluation Period
– Datapoints to Alarm

296
Q

is the length of time to evaluate the metric or expression to create each individual data point for an alarm. It is expressed in seconds. If you choose one minute as the period, there is one datapoint every minute

A

Period

297
Q

is the number of the most recent periods, or data points, to evaluate when determining alarm state.

A

Evaluation Period

298
Q

the number of data points within the evaluation period that must be breaching to cause the alarm to go to the ALARM state. The breaching data points do not have to be consecutive, they just must all be within the last number of data points equal to Evaluation Period.

A

– Datapoints to Alarm

299
Q

is a string that identifies the attributes you want. To retrieve a single attribute, specify its name. For multiple attributes, the names must be comma-separated.

A

A DynamoDB projection expression

300
Q

determines which items (and not the attributes) within the Query results should be returned to you. All of the other results are discarded

A

Using filter expressions

301
Q

-can include one or more nested applications. You can deploy a nested application as a stand-alone artifact or as a component of a larger application.

A

A serverless application

302
Q

By using _________ as the method authorization type, it ensures that the API can only be accessed by IAM identities such as IAM users or IAM roles.

A

AWS_IAM

303
Q

True/False: API Keys are just a way of identifying the calling parties that you trust, but they are not intended to be used to grant permissions to an IAM role.

A

True

304
Q

The following are the Gateway response types which are associated with the HTTP 504 error in API Gateway:

A

INTEGRATION_FAILURE
INTEGRATION_TIMEOUT

305
Q

The gateway response for an integration timed out error. If the response type is unspecified, this response defaults to the DEFAULT_5XX type.

A

INTEGRATION_TIMEOUT

For the integration timeout, the range is from 50 milliseconds to 29 seconds for all integration types, including Lambda, Lambda proxy, HTTP, HTTP proxy, and AWS integrations.

306
Q

The gateway response for an integration failed error. If the response type is unspecified, this response defaults to the DEFAULT_5XX type.

A

INTEGRATION_FAILURE

307
Q

a bucket-level feature that enables faster data transfers to and from Amazon S3. Although this will improve the retrieval times of your objects, this feature will still not paginate the result, which may still cause time-out errors.

A

Enabling Amazon S3 Transfer Acceleration

308
Q

provides you with the capability to use simple structured query language (SQL) statements to filter the contents of Amazon S3 objects and retrieve just the subset of data that you need.

A

Using S3 Select

309
Q

What are the reserved and unreserved concurrency limits of an AWS Lambda function? (For a newly created AWS account or one without any concurrency limit increases)

A

By default, an AWS account’s concurrent execution limit is 1000 which will be shared by all Lambda functions.

reserve concurrency is 900 due to the fact that unreserved account concurrency can’t go below 100.

310
Q

Database with autoscaling capabilities: RDS or DynamoDB

A

DynamoDB

311
Q

Beyond Auto Scaling for Amazon EC2, you can use Application Auto Scaling to automatically scale resources for other AWS services, including:

A
  • Amazon ECS
  • Amazon EC2 Spot Fleets
  • Amazon EMR clusters
  • Amazon AppStream 2.0 stacks and fleets
  • Amazon DynamoDB
312
Q

In addition, you can migrate an existing Git repository to a CodeCommit repository as well. To migrate a project hosted on another Git repository to CodeCommit, you have to follow what sequence:

A
  1. Complete the initial setup required for CodeCommit.
  2. Create a CodeCommit repository.
  3. Clone the repository and push it to CodeCommit.
  4. View files in the CodeCommit repository.
  5. Share the CodeCommit repository with your team
313
Q

True or False: It’s possible to enable scheduling on the AWS Console of your Lambda function

A

False

314
Q

evaluates the policies that you choose and determines the effective permissions for each of the actions that you specify.

A

IAM Policy Simulator

315
Q

an automated security assessment service that helps improve the security and compliance of applications deployed on AWS.

A

Amazon Inspector

316
Q

a service that enables you to assess, audit, and evaluate the configurations of your AWS resources.

A

AWS Config

317
Q

T/F: the update-application command will allow you to upload packages to Elastic Beanstalk.

A

false

318
Q

When using server-side encryption with customer-provided encryption keys (SSE-C), you must provide encryption key information using the following request headers:

A

x-amz-server-side-encryption-customer-algorithm
x-amz-server-side-encryption-customer-key
x-amz-server-side-encryption-customer-key-MD5

319
Q

– This header specifies the encryption algorithm.

A

x-amz-server-side-encryption-customer-algorithm

320
Q

This header provides the 256-bit, base64-encoded encryption key for Amazon S3 to use to encrypt or decrypt your data.

A

x-amz-server-side-encryption-customer-key

321
Q

– This header provides the base64-encoded 128-bit MD5 digest of the encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure the encryption key was transmitted without error.

A

x-amz-server-side-encryption-customer-key-MD5

322
Q

What API gets the list of trace IDs of an app

A

GetTraceSummaries

323
Q

What app gets a list of traces

A

BatchGetTraces

324
Q

Container Instance IAM Role only applies if you are using the ___ launch type

A

EC2

325
Q

You attach policies to ECS tasks via a) IAM roles or b) IAM Groups?

A

A, IAM Roles

326
Q

is a software application that listens for traffic on UDP port 2000, gathers raw segment data, and relays it to the AWS X-Ray API.

A

The AWS X-Ray daemon

The daemon works in conjunction with the AWS X-Ray SDKs and must be running so that data sent by the SDKs can reach the X-Ray service.

327
Q

In a _______ deployment configuration, the traffic will be shifted in equal increments with an equal number of minutes between each increment

A

Linear

328
Q

Describe the envelope encryption process.

A

Encrypt plaintext data with a data key and then encrypt the data key with a top level plain text master key

329
Q

True/False: A subnet can be associated with multiple route tables at once.

A

False, a subnet can only be associated with one route table at a time.

330
Q

(Amazon RDS _________
provide enhanced performance and durability for the database (DB) instances. This feature makes it easy to elastically scale out beyond the capacity constraints of a single DB instance for read-heavy database workloads.

A

Amazon RDS Read Replicas

331
Q

A developer needs to configure the environment name, solution stack, and environment links of his application environment which will be hosted in Elastic Beanstalk. Which configuration file should the developer add in the source bundle to meet the above requirement?

env.yaml

env.config

cron.yaml

Dockerrun.aws.json

A

env.yaml

332
Q

represent your application’s view of a downstream call as a client. If the downstream service is also instrumented, the segment that it sends replaces the inferred segment generated from the upstream client’s subsegment.

A

Subsegments

333
Q

is a strategy to ensure that the client-side item that you are updating (or deleting) is the same as the item in DynamoDB. If you use this strategy, then your database writes are protected from being overwritten by the writes of others — and vice-versa. (type of locking)

A

Optimistic locking

334
Q

type of locking can interrupt user operations. This is an approach where an entity is locked in the database for the entire time that it is in application memory (often in the form of an object). This can prevent certain users from reading, updating, or deleting an entry depending on the lock type.

A

pessimistic locking with read locking

335
Q

or certificates in a Region supported by AWS Certificate Manager (ACM), it is recommended that you use ACM to provision, manage, and deploy your server certificates. In unsupported Regions, you must use ___ as a certificate manager.

A

IAM

336
Q

If you got your certificate from a third-party CA, import the certificate into _____ or upload it to the ______ certificate store

A

ACM, IAM

337
Q

Lambda integration that requires you to specify how the incoming request data is mapped to the integration request and how the resulting integration response data is mapped to the method response.

A

Lambda custom integration

338
Q

The __________ integration type (AWS_PROXY) lets an API method be integrated with the Lambda function invocation action with a flexible, versatile, and streamlined integration setup.

A

Lambda proxy

339
Q

The following are the Gateway response types which are associated with the HTTP 504 error in API Gateway:
-INTEGRATION_FAILURE
-INTEGRATION_TIMEOUT

For the integration timeout, the range is from ___ milliseconds to ___ seconds for all integration types, including Lambda, Lambda proxy, HTTP, HTTP proxy, and AWS integrations.

A

For the integration timeout, the range is from 50 milliseconds to 29 seconds for all integration types, including Lambda, Lambda proxy, HTTP, HTTP proxy, and AWS integrations.

340
Q

It is recommended that you use the following pattern to encrypt data locally in your application:

  1. Use the ________ operation to get a data encryption key.
  2. Use the plaintext data key (returned in the ________ field of the response) to encrypt data locally, then erase the plaintext data key from memory.
  3. Store the encrypted data key (returned in the ________ field of the response) alongside the locally encrypted data.
A

1)GenerateDataKey
2)Plaintext
3)CiphertextBlob

341
Q

True/False: To increase or decrease the capacity of a Kinesis stream, you can upgrade the EC2 instance type.

A

False, this will improve processing time of data in the stream but to effect capacity the stream must be resharded, i.e. splitting or merging shards.

342
Q

When you upload an object, Amazon S3 uses the encryption key you provide to apply AES-256 encryption to your data and removes the encryption key from memory. It is important to note that Amazon S3 does not store the encryption key you provide. Instead, it is stored in a randomly salted HMAC value of the encryption key in order to validate future requests.

The salted HMAC value cannot be used to derive the value of the encryption key or to decrypt the contents of the encrypted object. That means,

A

if you lose the encryption key, you lose the object

343
Q

–ECS feature which provides you with expressions that you can use to group container instances by a specific attribute is

A

Cluster Query Language

For example, you can group container instances by attributes such as Availability Zone, instance type, or custom metadata. You can add custom metadata to your container instances, known as attributes. Each attribute has a name and an optional string value. You can use the built-in attributes provided by Amazon ECS or define custom attributes.

344
Q

True/False: To implement a DLQ in Lambda, you must specify teh ARN of the SQS Queue in the Lambda function’s DeadLetterConfig parameter.

A

True

345
Q

True/False: CloudWatch Events service has the capability to track any new inserts or updates on the DynamoDB table

A

False, Although Amazon CloudWatch Events delivers a near real-time stream of system events that describe changes in Amazon Web Services (AWS) resources, it cannot provide tracking of the DynamoDB’s table activities.

346
Q

CodeDeploy provides two deployment type options:

A

In-place deployment

Blue/green deployment

347
Q

True/False: Blue green deployments work with on-premises computing platforms

A

False.

348
Q

True/False: All AWS Lambda compute platform deployments are blue/green deployments.

A

True

349
Q

It is also important to note that the CodeDeploy agent is required only if you deploy to an EC2/On-Premises compute platform. The agent is not required for deployments that use what 2 compute platforms?

A

Amazon ECS or AWS Lambda

350
Q

Including the x-amz-server-side-encryption header with a value of AES256 in your upload request is only applicable for

A

SSE-S3 and SSE-C.

351
Q

To upload an object to the S3 bucket which uses SSE-KMS, you have to send a request with an x-amz-server-side-encryption header with the value of

A

aws:kms

352
Q

To perform a multipart upload with encryption using an AWS Key Management Service (AWS KMS) customer master key (CMK), the requester must have permission to the _______ and _______ actions on the key.

A

kms:Decrypt and kms:GenerateDataKey

353
Q

s helpful for troubleshooting your application, it does not have the capability to track the memory and swap usage of the instance.

A

AWS X-Ray daemon

354
Q

S3 Galcier retrieval option that allows you to access any of your archives within several hours. Standard retrievals typically complete within 3–5 hours. This is the default option.

A

Standard retrievals

355
Q

allow you to quickly access your data when occasional urgent requests for a subset of archives are required. Expedited retrievals are typically made available within 1–5 minutes.

A

Expedited retrievals

356
Q

are Glacier’s lowest-cost retrieval option, which you can use to retrieve large amounts, even petabytes, of data inexpensively in a day. Bulk retrievals typically complete within 5–12 hours.

A

– Bulk retrievals

357
Q

let you postpone the delivery of new messages to a queue for a number of seconds.

A

Delay Queues

If you create a delay queue, any messages that you send to the queue remain invisible to consumers for the duration of the delay period. The default (minimum) delay for a queue is 0 seconds. The maximum is 15 minutes

358
Q

Delay Queues vs Visibility Timeouts

A

Delay queues are similar to visibility timeouts because both features make messages unavailable to consumers for a specific period of time. The difference between the two is that, for delay queues, a message is hidden when it is first added to queue, whereas for visibility timeouts a message is hidden only after it is consumed from the queue.

359
Q

Monitor the CacheHitCount and CacheMissCount metrics to optimize cache capacities to achieve a desired performance.

________________ tracks the number of requests served from the backend in a given period, when API caching is enabled. On the other hand, ________________ track the number of requests served from the API cache in a given period

A

CacheMissCount, CacheHitCount

360
Q

automates the process of keeping your Amazon EC2 and hybrid infrastructure in a state that you define.

A

Systems Manager State Manager service

361
Q

helps consume and process data from a Kinesis data stream by handling shard-to-worker relationships.

A

The KCL

362
Q

safe threshold for a visibility timeout

A

max time that it takes app to process and delete a message from the queue

363
Q

Symmeyttic or Assymetric keys: SSE-C

A

Symmetric

364
Q

Symmeyttic or Assymetric keys: SSE-KMS

A

symmetric

365
Q

Symmeyttic or Assymetric keys: S3 managed encryption keys

A

symmetric

366
Q

Client-side encryption with customer-managed encryption keys allows you to select what type (symmetric/asymmetric) keys

A

both

367
Q

The CodeBuild buildspec.yml file and the CodeDeploy appspec.yml file should be in the .

A

root of the source directory

368
Q

What can you use to circumvent the 50mb dployment package size limit for Lambda?

A

Upload deployment package to S3 and reference using the –code CLI parameter

369
Q

can store and distribute credentials programmatically from a central and secure datastore.

can also automatically rotate the secrets according to a specified schedule.

A

Secrets Manager

370
Q

-provides secure, hierarchical storage for configuration data management and secrets management.

-can store data, including passwords, database strings, Amazon Machine Image (AMI) IDs, and license codes as parameter values.

-does not support automatic rotation of credentials

A

Parameter Store

371
Q

True/False: A Lambda alias does not give you the ability to modify the function configuration. And you cannot create environment variables for the function alias.

A

True, An alias is a reference to a Lambda function version or a weighted route between multiple versions.

372
Q

is a fully managed artifact repository service compatible with package managers. It is mainly used by companies to address security concerns by storing approved artifacts within an AWS account.
-would have a negligible effect on performance when compared to caching.

A

CodeArtifact

373
Q

A DynamoDB table that is keyed by S3 object key, label, and user would allow you to store every unique label combination for every object for every user. The global secondary index that is keyed by user and label provides an alternate organization for fast lookup performance. The key values in a global secondary index do not need to be unique.

What API can quickly look up all items for a user, including all labels and all S3 objects for each label?

A

QueryItem

374
Q

Access or Trust Policy related error:
AccessDenied – Not authorized to perform sts:AssumeRoleWithWebIdentity

A

Trust

375
Q

You must use the ____ associate-kms-key or the create-log-group API call to encrypt Cloud Watch log groups.

A

AWS CLI (not the console)

376
Q

To create a Lambda function, you first create a Lambda function deployment package. This package is a

A

.zip or .jar file consisting of your code and any dependencies.

377
Q

True/False: VPC Flow Logs help identify the cause of latency or find performance bottlenecks.

A

False

X-Ray gives you the ability to trace latency issues with your API Gateway APIs. X-Ray provides an end-to-end view of requests as they travel through your application. X-Ray can be used to trace and analyze user requests. These collected traces give you the ability to evaluate the end-to-end latency and identify performance bottlenecks.

378
Q

API caching in API Gateway improves performance by

A

reducing the number of requests that are sent to your endpoint service.