Practice Flashcards
(112 cards)
Which EC2 Purchasing Option can provide the biggest discount, but is not suitable for critical jobs or databases?
a. Reserved Instances
b. Convertible Instances
c. Dedicated Hosts
d. Spot Instances
d. Spot Instances
Spot Instances are good for short workloads, but are less reliable.
Which network security tool can you use to control traffic in and out of EC2 Instances?
a.Network Access Control List (NACL)
b. Identity and Management Access (IAM)
c. GuardDuty
d. Security Groups
d. Security Groups
Security Groups operate at instance level and can control traffic.
Under the Shared Responsibility Model, who is responsible for operating-system patches and updates on EC2 Instances?
a. The customer
b. AWS
c. Both AWS and the customer
a. The customer
The customer is responsible for operating-system patches and updates on EC2 Instances, as well as data security on the instances, Security Groups rules, etc.
How long can you reserve an EC2 Reserved Instance?
a. 1 or 3 years
b. 2 or 4 years
c. 6 months or 1 year
d. Anytime between 1 and 3 years.
a. 1 or 3 years
1 year or 3 years terms are available for EC2 Reserved Instances.
A company would like to deploy a high-performance computing (HPC) application on EC2. Which EC2 instance type should it choose?
a. Compute Optimized
b. Storage Optimized
c. Memory Optimized
d. General Purpose
a. Compute Optimized
Compute Optimized EC2 instances are great for compute-intensive workloads requiring high performance processors, such as batch processing, media transcoding, high performance web servers, high performance computing, scientific modeling & machine learning, and dedicated gaming servers.
Which of the following is NOT an EC2 Instance Purchasing Option?
a. Spot Instances
b. Reserved Instances
c. On-demand Instances
d. Connect Instances
d. Connect Instances
This EC2 Instance purchasing option does not exist.
Which EC2 Purchasing Option should you use for an application you plan on running on a server continuously for 1 year?
a. Reserved Instances
b. Spot Instances
c. On-demand Instances
d. Convertible Instances
a. Reserved Instances
Reserved Instances are good for long workloads. You can reserve instances for 1 or 3 years.
You ONLY want to manage Applications and Data. Which type of Cloud Computing model should you use?
a. On-premises
b. Infrastructure as a Service (IaaS)
c. Software as a Service (SaaS)
d. Platform as a Service (PaaS)
d. Platform as a Service (PaaS)
In the Platform as a Service model, you only manage the data and the applications.
What is the pricing model of Cloud Computing?
a. Discounts over time
b. Pay-as-you-go pricing
c. Pay once a year
d. Flat-rate pricing
b. Pay-as-you-go pricing
In Cloud Computing, you are only charged for what you use.
Which Global Infrastructure identity is composed of one or more discrete data centers with redundant power, networking, and connectivity, and are used to deploy infrastructure?
a. Edge Locations
b. Availability Zones
c. Regions
b. Availability Zones
This is the definition of Availability Zones.
Which of the following is NOT one of the Five Characteristics of Cloud Computing?
a. Rapid elasticity and scalability
b. Multi-tenancy and resource pooling
c. Dedicated Support Agent to help you deploy applications
d. On-demand self service
c. Dedicated Support Agent to help you deploy applications
This is not one of the Five Characteristics of Cloud Computing. In the cloud, everything is self-service.
Which of the following options is NOT a point of consideration when choosing an AWS Region?
a. Compliance with data governance
b. Latency
c. Capacity availability
d. Pricing
c. Capacity availability
Capacity is unlimited in the cloud, you do not need to worry about it. The 4 points of considerations when choosing an AWS Region are: compliance with data governance and legal requirements, proximity to customers, available services and features within a Region, and pricing.
Which are the 3 pricing fundamentals of the AWS Cloud?
a. Compute, Storage, and Data transfer in the AWS Cloud
b. Compute, Networking, and Data transfer out of the AWS Cloud
c. Compute, Storage, and Data transfer out of the AWS Cloud
d. Storage, Functions, and Data transfer in the AWS Cloud
c. Compute, Storage, and Data transfer out of the AWS Cloud
Compute, Storage, and data transfer out of the AWS Cloud are the 3 pricing fundamentals of the AWS Cloud.
Which of the following is NOT an advantage of Cloud Computing?
a. Trade capital expense (CAPEX) for operational expense (OPEX)
b. Train your employees less
c. Go global in minutes
d. Stop spending money running and maintaining data centers
b. Train your employees less
You must train your employees more so they can use the cloud effectively.
AWS Regions are composed of?
a. Two or more Edge Locations
b. One or more discrete data centers
c. Three or more Availability Zones
c. Three or more Availability Zones
AWS Regions consist of multiple, isolated, and physically separate Availability Zones within a geographic area.
Which of the following services has a global scope?
a. EC2
b. IAM
c. Lambda
d. Rekognition
b. IAM
IAM is a global service (encompasses all regions).
Which of the following is the definition of Cloud Computing?
a. Rapidly develop, test and launch software applications
b. Automatic and quick ability to acquire resources as you need them and release resources when you no longer need them
c. On-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active management by the user
d. Change resource types when needed
c. On-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active management by the user
This is the definition of Cloud Computing
What defines the distribution of responsibilities for security in the AWS Cloud?
a. AWS Pricing Fundamentals
b. The Shared Responsibility Model
c. AWS Acceptable Use Policy
d. The AWS Management Console
b. The Shared Responsibility Model
The Shared Responsibility Model defines who is responsible for what in the AWS Cloud.
A company would like to benefit from the advantages of the Public Cloud but would like to keep sensitive assets in its own infrastructure. Which deployment model should the company use?
a. Private Cloud
b. Public Cloud
c. Hybrid Cloud
c. Hybrid Cloud
Using a Hybrid Cloud deployment model allows you to benefit from the flexibility, scalability and on-demand storage access while keeping security and performance of your own infrastructure.
What is NOT authorized to do on AWS according to the AWS Acceptable Use Policy?
a. Building a gaming application
b. Deploying a website
c. Run analytics on stolen content
d. Backup your data
c. Run analytics on stolen content
You can run analytics on AWS, but you cannot run analytics on fraudulent content. Refer to the AWS Acceptable Use Policy to see what is not authorized to do on AWS.
What is a proper definition of IAM Roles?
a. An IAM entity that defines a set of permissions for making AWS service requests, that will be used by AWS services
b. IAM Users in multiple Groups
c. A password policy
d. Permissions assigned to Users to perform actions
a. An IAM entity that defines a set of permissions for making AWS service requests, that will be used by AWS services
Some AWS service will need to perform actions on your behalf. To do so, you assign permissions to AWS services with IAM Roles.
Which of the following is an IAM Security Tool?
a. IAM Credentials Report
b. IAM Root Account Manager
c. IAM Services Report
d. IAM Security Advisor
a. IAM Credentials Report
IAM Credentials report lists all your account’s users and the status of their various credentials. The other IAM Security Tool is IAM Access Advisor. It shows the service permissions granted to a user and when those services were last accessed.
Which answer is INCORRECT regarding IAM Users?
a. IAM Users can belong to multiple groups
b. IAM Users don’t have to belong to a group
c. IAM Users can have policies assigned to them
d. IAM Users access AWS with the root account credentials
d. IAM Users access AWS with the root account credentials
IAM Users access AWS using a username and a password.
Which of the following is an IAM best practice?
a. Don’t use the root user account
b. Create several users for a physical person
c. Share credentials so a colleague can perform a task for you
d. Do not enable MFA for easier access
a. Don’t use the root user account
You only want to use the root account to create your first IAM user, and for a few account and service management tasks. For every day and administration tasks, use an IAM user with permissions.