Practice 5 Flashcards

(84 cards)

1
Q

AWS Systems Manager Session Manager

A

lets you manage your Amazon EC2 instances through an interactive one-click browser-based shell or through the AWS CLI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

if you need to have a distributed session data management, use:

A

Elasticache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is sticky session not a good choice for distributed session?

A
  1. in the event of a failure, you are likely to lose the sessions that were resident on the failed node
  2. In the event that the number of your web servers change when your Auto Scaling kicks in, it’s possible that the traffic may be unequally spread across the web servers as active sessions may exist on particular servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GetSessionToken

A

one of the available actions in STS which returns a set of temporary credentials for an AWS account or IAM user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fully Managed means

A

You no longer need to perform management tasks such as hardware provisioning, software patching, setup, configuration, monitoring, failure recovery, and backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Redis support ? for security

A

Redis Auth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Memcached support ? for authentication

A

SASL (Simple Authentication and Security Layer )authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

None of the caches support IAM authentication - True of False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IAM Policies on the Elasticache are only used for

A

AWS API - Level security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Patterns for Elasticache

A
  1. Lazy Loading - all the read data is cached, data can become stale in cache
  2. Write Through - adds or updates data in the cache when written to a DB (no stale data)
  3. Session Store - store temporary session data in cache (using TTL feature)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AWS Glue

A

is a fully managed extract, transform, and load (ETL) service that makes it easy for customers to prepare and load their data for analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AWS Glue Advantage

A
  1. Serverless
  2. Schema-inference
  3. Autogen ETL scripts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

you can directly upload archives to Glacier by using the management console - T or F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to upload data to Glacier?

A

AWS CLI or write code to make requests, by using either the REST API directly or by using the AWS SDKs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Error if the private key that you are using has a file permission of 0777

A

Unprotected Private Key File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You might be unable to log into an EC2 instance if:

A

• You’re using an SSH private key but the corresponding public key is not in the authorized_keys file.
• You don’t have permissions for your authorized_keys file.
• You don’t have permissions for the .ssh folder.
• Your authorized_keys file or .ssh folder isn’t named correctly.
• Your authorized_keys file or .ssh folder was deleted.
• Your instance was launched without a key, or it was launched with an incorrect key.
To connect to your EC2 instance after receiving the error “Server refused our key,” you can update the instance’s user data to append the specified SSH public key to the authorized_keys file, which sets the appropriate ownership and file permissions for the SSH directory and files contained in it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ClassicLink

A

allows you to link an EC2-Classic instance to a VPC in your account, within the same region (using private IPv4 addresses - no need to use public IPv4 addresses or Elastic IP addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AWS Trusted Advisore ensure

A

that all of the AWS resources in your VPC don’t go beyond their service limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AWS Trusted Advisor analyzes your AWS environment and provides best practice recommendations in these five categories:

A
  1. Cost Optimization,
  2. Performance,
  3. Fault Tolerance,
  4. Security, and
  5. Service Limits
    CPFSS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Target tracking scaling

A

Increase or decrease the current capacity of the group based on a

target value for a specific metric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Step scaling

A

Increase or decrease the current capacity of the group based on a

set of scaling adjustments,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Simple scaling

A

Increase or decrease the current capacity of the group based on a

single scaling adjustment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Use Server-Side Encryption

A

You request Amazon S3 to encrypt your object before saving it on disks in its data centers and decrypt it when you download the objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Use Client-Side Encryption

A

You can encrypt data client-side and upload the encrypted data to Amazon S3. In this case, you manage the encryption process, the encryption keys, and related tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Amazon Neptune
fast, reliable, fully managed graph database service that makes it easy to build and run applications that work with highly connected datasets. The core of Amazon
26
When you create an encrypted EBS volume and attach it to a supported instance type, the following types of data are encrypted:
 - Data at rest inside the volume    - All data moving between the volume and the instance    - All snapshots created from the volume    - All volumes created from those snapshots
27
ALB supported protocols
HTTP and HTTPS
28
NLB supported protocols
TCP and TLS
29
CLB supported protocols
TCP, SSL/TLS, HTTP, HTTPS
30
you can modify the Availability Zones for your load balancer at any time. T or F
true
31
AWS Schema Conversion Tool
to convert the source schema and code to match that of the target database
32
AWS Database Migration Service
to migrate data from the source database to the target database.
33
AWS Systems Manager Run Command lets you
remotely and securely manage the configuration of your managed instance without having to establish a RDP or SSH connection
34
EC2Config
Windows AMIs for Windows Server 2012 R2 and earlier include an optional service
35
AWS CodePipeline is a fully managed continuous delivery service that helps you
automate your release pipelines for fast and reliable application and infrastructure updates.
36
If you have an Amazon Aurora Replica in the same or a different Availability Zone, when failing over,
Amazon Aurora flips the canonical name record (CNAME) for your DB Instance to point at the healthy replica, which in turn is promoted to become the new primary
37
If you do not have an Amazon Aurora Replica (i.e. single instance), Aurora will
first attempt to create a new DB Instance in the same Availability Zone as the original instance. If unable to do so, Aurora will attempt to create a new DB Instance in a different Availability Zone.
38
Amazon SimpleDB
highly available and scalable NoSQL database, it has a limit on the request capacity or storage size for a given table, unlike DynamoDB
39
In order for you to access your EC2 instance from the Internet, you need to have: 
1. An Internet Gateway (IGW) attached to the VPC. 2. A route entry to the Internet gateway in the Route table of the VPC. 3. A Public IP address attached to the EC2 instance.
40
How can you obtain a copy of the keys that you have stored on CloudHardware Security Module?
you can't. If your HSM is zeroized,all keys, certificates, and other data on the HSM is destroyed
41
You should consider using AWS CloudHSM if you require:
* Keys stored in dedicated, third-party validated hardware security modules under your exclusive control. * FIPS 140-2 compliance. * Integration with applications using PKCS#11, Java JCE, or Microsoft CNG interfaces. * High-performance in-VPC cryptographic acceleration (bulk crypto).
42
CloudHSM can be provisioned outside an Amazon VPC - T or F
False; To protect and isolate your AWS CloudHSM from other Amazon customers, CloudHSM must be provisioned inside an Amazon VPC.
43
AWS strongly recommends that you use at least two HSMs in two different Availability Zones for any production workload. T or F
true
44
Which section of the template should you configure to get the Domain Name Server hostname of the ELB upon the creation of the AWS stack?
Outputs - describes the values that are returned whenever you view your stack's properties
45
By default, CloudTrail event log files are encrypted using
Amazon S3 server-side encryption (SSE)
46
Default option when you create a trail in the CloudTrail console
trail that applies to all regions - cloudtrail records events in each region and delivers the cloudtrail event log files to an S3 bucket that you specify
47
Default option when you create a trail using the AWS CLI or CloudTrail API
trail that applies to one region - cloudtrail records the events in the region that you specify only
48
organizational trail
log all events for all AWS accounts in an org created by AWS organizations - trails must be created in the master account
49
HDD volumes can be used as a bootable volume - T or F
False; | HDD volumes cannot be used as a bootable volume
50
Amazon WorkSpaces is a
managed, secure cloud desktop service
51
The instance that you want to attach to an EC2 Auto Scaling must meet the following criteria:
 - The instance is in the running state.  - The AMI used to launch the instance must still exist.  - The instance is not a member of another Auto Scaling group.  - The instance is launched into one of the Availability Zones defined in your Auto Scaling group.  - If the Auto Scaling group has an attached load balancer, the instance and the load balancer must both be in EC2-Classic or the same VPC. If the Auto Scaling group has an attached target group, the instance and the load balancer must both be in the same VPC.
52
DB parameter groups act as a 
container for engine configuration values that are applied to one or more DB instances.
53
You should be using an Alias record pointing to the DNS name of the load balancer since the IP address of the load balancer can change at any time. T or F
true
54
alias record can only redirect queries to selected AWS resources:
1. Amazon S3 buckets 2. CloudFront distributions 3. Another record in the Route 53 hosted zone that you're creating the alias record in
55
Route 53 doesn't charge for CNAME queries. T or F
false; Route 53 charges for CNAME queries.
56
Route 53 doesn't charge for alias queries to AWS resources. T or F
true
57
The alias property is visible only in the
Route 53 console or in the response to a programmatic request, such as an AWS CLI list-resource-record-sets command.
58
DNS record A:
URL to IPV4
59
DNS record AAAA:
URL to IPV6
60
DNS record CNAME :
URL to URL
61
DNS record ALIAS:
URL to AWS resource
62
Advanced features of Route53:
1. Load Balancing 2. Health Checks 3. Routing policy
63
Route 53 is ? service (global or regional)
global
64
Route53 charges ? per month per hosted zone
$0.50
65
Alias has a native health check - t or F
true
66
Route53 charges for Alias usage - T or F
false; it is free
67
SSD is best for workloads with:
small, random IO operations
68
HDD is best for workloads with:
large, sequential I/O operations
69
An interface endpoint is
an elastic network interface with a private IP address that serves as an entry point for traffic destined to a supported service.
70
A gateway endpoint is a
gateway that is a target for a specified route in your route table, used for traffic destined to a supported AWS service (S3 and DynamoDB)
71
SQS default message retention period is
4 days (max 14 SetQueueAttributes)
72
In EBS encryption, what service does AWS use to secure the volume's data at rest?
> By using your own keys in AWS Key Management Service (KMS). >By using Amazon-managed keys in AWS Key Management Service (KMS).
73
The ?  command shows the status of the EC2 instances including the recently terminated instances.
 describe-instances
74
Your HSMs are in your Virtual Private Cloud (VPC) and isolated from other AWS networks -T or F
true
75
Cloud HSM provides a secure key storage in tamper-resistant hardware available in a single Availability Zone - T or F
false ; It provides a secure key storage in tamper-resistant hardware available in multiple AZ
76
ELB Access Logging
disabled by default; Each log contains information such as the time the request was received, the client's IP address, latencies, request paths, and server responses
77
All of the APIs created with Amazon API Gateway expose HTTPS endpoints only - T or F
true (no HTTP)
78
CloudTrail vs Xray
AWS X-Ray is usually used to debug and analyze your microservices applications with request tracing so you can find the root cause of issues and performance and does not record record the API calls which is what AWS CloudTrail does
79
The ? is the queue attribute that determines whether you are using Short or Long polling.
ReceiveMessageWaitTimeSeconds
80
ReceiveMessageWaitTimeSeconds = 0
short polling
81
ReceiveMessageWaitTimeSeconds > 0
Long polling
82
Snapshots are incremental backups, which means that only the blocks on the device that have changed after your most recent snapshot are saved.- T or F
TRUE; First snapshot will be full, second snapshot will only reference the full and add new changes; third snapshot will reference first and second and add new changes
83
The Reserved Instance Marketplace is a platform
that supports the sale of third-party and AWS customers' unused Standard Reserved Instances, which vary in terms of lengths and pricing option
84
To stop incurring charges for the Reserved instances, what cost-effective steps will you take?
1. Go to the AWS Reserved Instance Marketplace and sell the Reserved instances. 2. Terminate the Reserved instances as soon as possible to avoid getting billed at the on-demand price when it expires