Review Deck Flashcards

1
Q

Amazon Macie

A

AI/ML security service that helps prevent data loss by automatically discovering, classifying, and protecting sensitive data stored in Amazon S3.

Machine Learning to recognize sensitive data (e.g., PII, intellectual property, etc.), assigns a business value, and provides visibility into where this data is stored and how it is being used in your organization.

Macie continuously monitors data access activity for anomalies, and delivers alerts when it detects risk of unauthorized access or data leak.

Macie can detect global access permissions set on sensitive data, detect upload of API keys inside source code, and verify data is stored and accessed according to customer compliance standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lambda@Edge

A

Lets you run Lambda functions to customize the content that CloudFront delivers, executing the functions in AWS locations closer to the viewer. Lambda@Edge functions run in response to CloudFront events, without provisioning or managing servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You can use Lambda functions to change CloudFront requests and responses at the following points:

A

– After CloudFront receives a request from a viewer (viewer request)

– Before CloudFront forwards the request to the origin (origin request)

– After CloudFront receives the response from the origin (origin response)

– Before CloudFront forwards the response to the viewer (viewer response)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HTTP 504

A

Gateway timeout error, usually results when a server is down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Amazon MQ

A

Message broker that supports industry-standard APIs and protocols so you can switch from any standards-based message broker without rewriting messaging code in existing applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TRUE/FALSE: Step Scaling & Simple Scaling both require you to create CloudWatch alarms.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Step Scaling & Simple Scaling both require you to define whether to…

A

…add or remove instances, and how many, or set the group to an exact size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Step Scaling and Simple Scaling policies Both require you to…

A

…specify the high and low thresholds for the alarms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Simple vs Step Scaling Policies

A

The main difference is the step adjustments you get with step scaling policies. Step adjustments increase or decrease capacity of an Auto Scaling group based on the size of the alarm breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Target Tracking Scaling Policy

A

Increase or decrease capacity of an Auto Scaling group based on a target value for a specific metric, adding/removing capacity to keep the metric at/near the specified target value.

In addition, a target tracking scaling policy also adjusts to changes in the metric due to a changing load pattern.

Helps resolve over-provisioning of your resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Suspend and Resume scaling…

A

…is used to temporarily pause scaling activities triggered by scaling policies and scheduled actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cooldown periods…

A

…help to prevent the initiation of additional scaling activities before the effects of previous activities are visible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This policy must wait for a scaling activity or health check replacement to complete and a cooldown period to expire before responding to additional alarms.

A

Simple Scaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use cases for signed URLs:

A

– RTMP distribution–signed cookies aren’t supported for RTMP distributions

– Restrict access to individual files

– Use when cookies aren’t supported by users’ clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use cases for signed cookies:

A

– Provide access to multiple restricted files

– To avoid changing existing URLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Match Viewer

A

An Origin Protocol Policy which configures CloudFront to communicate with your origin using HTTP or HTTPS, depending on the protocol of the viewer request. CloudFront caches the object only once even if viewers make requests using both HTTP and HTTPS protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Field-Level Encryption…

A

…allows secure user-submitted uploads of sensitive information to a web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TRUE/FALSE: To use signed urls will require changes to existing urls?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TRUE/FALSE: Amazon RDS provides metrics in real time for the operating system (OS) that your DB instance runs on.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Two ways you can view metrics for an RDS DB instance:

A
  1. By using the console

2. View Enhanced Monitoring JSON output from CloudWatch Logs in a monitoring system of your choice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

By default, Enhanced Monitoring metrics are stored in the CloudWatch Logs for…

A

…30 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To modify the amount of time the metrics are stored in the CloudWatch Logs…

A

…change the retention for the RDSOSMetrics log group in the CloudWatch console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why are CloudWatch and Enhanced Monitoring Metrics different?

The differences can be greater if your DB instances use smaller instance classes, because then there are likely more virtual machines (VMs) that are managed by the hypervisor layer on a single physical instance. Enhanced Monitoring metrics are useful when you want to see how different processes or threads on a DB instance use the CPU.

A

CloudWatch gathers metrics about CPU utilization from the hypervisor for a DB instance, and Enhanced Monitoring gathers metrics from an agent on the instance. Because the hypervisor does additional work CloudWatch accounts for that in its CPU usage calculation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TRUE/FALSE: You can use CloudWatch to monitor CPU Utilization of a database.

A

False–although you can use CloudWatch to monitor CPU Utilization of a database instance, it will not provide CPU bandwidth usage or total memory consumed by each database process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

TRUE/FALSE: CPU% and MEM% metrics are readily available in the Amazon RDS console.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CloudTrail Event

A

The record of an activity in an AWS account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CloudTrail activities can be…

A

…an action taken by a user, role, or service that is monitorable by CloudTrail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CloudTrail events provide a history of…

A

…API and non-API account activity in AWS Management Console, AWS SDKs, command-line tools, and other AWS services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Two types of events that can be logged in CloudTrail:

A

Management events and data events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What events will CloudTrail log by default?

A

By default, CloudTrail will log management events, but not data events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

TRUE/FLASE: A CloudTrail trail can be applied only to a single region.

A

FALSE–CloudTrail trails can be applied to all regions or a single region.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is considered best practice when creating a CloudTrail trail?

A

It is considered best practice to create a trails that apply to all regions in the AWS partition you are working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the default region setting when you create a trail in the CloudTrail console?

A

All regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Global services… , events are delivered to any trail that includes global services, and are logged as occurring in US East (N. Virginia) Region.

A

AWS Identity and Access Management (IAM), AWS STS, Amazon CloudFront, and Route 53 (and maybe others…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

CloudTrail can be used to log events most events with the multi-region setting enabled, however…

A

…it will only cover activity occurring in regional services (EC2, S3, RDS etc.), not global services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

In order for CloudTrail to log activity occurring in global services, you have to add what events parameter in your AWS CLI command?

A

–include-global-service–

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Amazon Elastic File System (EFS)…

A

…provides simple, scalable, elastic file storage for use with AWS Cloud services and on-premises resources, and when mounted on Amazon EC2 instances, EFS provides a standard file system interface and access semantics, which seamlessly integrate with existing applications and tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Can multiple EC2 instances access EFS simultaneously? And what is the benefit?

A

Yes, when used by multiple EC2 instances, EFS can serve as a common data source and shared file system for multiple workloads and applications on separate EC2 instances, making file sharing much faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Can multiple EC2 instances share the same EBS Volumes? Across AZs?

A

Yes, EC2 instances can share EBS volumes, but no, they cannot share EBS volumes across AZs. However, EC2 instances can share an EFS across AZs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Is S3 the best choice for file storage?

A

No, is mainly used for “object storage”, and S3 does not provide the notion of “folders” too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

If you create or update a Lambda function that uses environment variables, does AWS Lambda encrypt them automatically? If so, how?

A

Yes, The first time you create or update Lambda functions that use environment variables in a region, a default service key is created for you automatically within AWS KMS. This key is used to encrypt environment variables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Can you use the default KMS key to encrypt environment variables after a Lambda function is created?

A

No, you must create your own KMS key and choose it instead of the default key. The default key will give errors. Creating a new key also offers more flexibility, including the ability to create, rotate, disable, and define access controls, and to audit the encryption keys used to protect your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Network Access Control List (ACL)…

A

…is an optional layer of security that acts as a firewall, controlling traffic in and out of a VPC network, protecting one or more subnets. A network ACL is great for temporary or ad hoc protection, because you can easily add and remove restrictions in a matter of minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Can IAM policies control network traffic in/out of a VPC?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

TRUE/FALSE: Adding a rule to a security group can control inbound/outbound VPC network traffic?

A

FALSE, security groups act as firewalls at the instance-level. Adding a rule to a security group cannot influence traffic in/out of a VPC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Storage Gateway (file gateway)…

A

…is both a service and a virtual software appliance deployed into an on-premises environment as a virtual machine (VM) using VMware ESXi, Microsoft Hyper-V, or Linux Kernel-based Virtual Machine (KVM) hypervisor. It serves as a file interface into S3, allowing customers to store and retrieve objects using industry-standard protocols, e.g., Network File System (NFS) and Server Message Block (SMB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

With a file gateway, you can:

A

– store and retrieve files directly using the NFS version 3 or 4.1 protocol.

– store and retrieve files directly using the SMB file system version, 2 and 3 protocol.

– access data directly in S3 from any AWS Cloud application or service

– manage S3 data using lifecycle policies, cross-region replication, and versioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Storage Gateway supports which storage standards?

A

S3 Standard, Amazon S3 Standard-Infrequent Access, Amazon S3 One Zone-Infrequent Access and Amazon Glacier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

TRUE/FALSE: Lifecycle policies work with storage gateway file shares?

A

TRUE–Objects stored in any storage class can be transitioned/archived to Glacier using a Lifecycle Policies. Although you can write directly to S3, lifecycle policies are recommended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A DynamoDB stream is…

A

…an ordered flow of information about changes to items in an Amazon DynamoDB table. When you enable a stream on a table, DynamoDB captures information about every modification to data items in the table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Whenever an application creates, updates, or deletes items in a table, DynamoDB Streams…

A

…writes a stream record with the primary key attribute(s) of the items that were modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A DynamoDB stream record…

A

…contains information about a data modification to a single item in a DynamoDB table. You can also configure streams so that stream records capture additional information, such as the “before” and “after” images of modified items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

DynamoDB and Lambda

A

Amazon DynamoDB is integrated with AWS Lambda so that you can create triggers—pieces of code that automatically respond to events in DynamoDB Streams. With triggers, you can build applications that react to data modifications in DynamoDB tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

If you enable DynamoDB Streams on a table…

A

…you can associate the stream ARN with a Lambda function that you write. New records appear in the stream immediately after a table item changes. AWS Lambda invokes the Lambda function synchronously when it detects new stream records. The Lambda function can perform any actions you specify, such as sending a notification or initiating a workflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

By default, DynamoDB Streams must be…

A

Enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

FSx for Windows File Server…

A

…is Windows, Linux, and macOS accessible, fully managed Windows file servers and native Windows file system with the features, performance, and compatibility to easily lift and shift enterprise applications to the AWS Cloud. Thousands of compute instances and devices can access a file system concurrently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

FSx for Windows File Server…

A

…provides fully managed Microsoft Windows file servers, backed by a fully native Windows file system. FSx offers features, performance, and compatibility ideal for lift and shift to the AWS Cloud. It is accessible from Windows, Linux, and macOS compute instances and devices. Thousands of compute instances and devices can access a file system concurrently.

58
Q

Server Message Block (SMB) protocol…

A

…is a network file sharing protocol that allows applications on a computer to read/write to files and request services from server programs in a computer network. The SMB protocol can be used on top of its TCP/IP protocol or other network protocols.

59
Q

AWS Resource Access Manager (RAM)…

A

…enables you to easily and securely share AWS resources with any AWS account or within your AWS Organization. You can share AWS Transit Gateways, Subnets, AWS License Manager configurations, and Amazon Route 53 Resolver rules resources with RAM.

60
Q

Single Sign-On (SSO) approach to temporary access…

A

Authenticating users in an organization’s network, and then providing them access to AWS without creating new AWS identities for them and requiring separate credentials.

61
Q

AWS STS supports…

A

…open standards like Security Assertion Markup Language (SAML) 2.0, which is compatible with Microsoft AD FS, allowing organizations to leverage existing Microsoft Active Directory. You can also use SAML 2.0 to manage your own solution for federating user identities.

62
Q

Amazon WorkDocs…

A

…provides users the ability to create, edit, and share content, and stored centrally on AWS, the content is accessible from anywhere on any device.

63
Q

TRUE/FALSE: WorkDocs integrates directly with S3.

A

FALSE–There is no direct integration between WorkDocs and S3. WorkDocs is simply a managed content creation service.

64
Q

A security group…

A

…acts as a virtual firewall at the instance-level–NOT the subnet-level–to control inbound and outbound traffic.

65
Q

Per CIDR notation, /32 denotes… and the /0 refers to…

A

…one IP address…the entire network.

66
Q

SSH protocol uses…

A

…TCP and port 22.

67
Q

Amazon S3 is…

A

…object storage built to store/retrieve any amount of data from anywhere on the Internet that offers high durability, availability, performance, security, and virtually unlimited scalability at very low cost. S3 is also highly flexible, allowing users to store any volume or type of data; read data a million times or only for emergency disaster recovery; build a simple FTP app or a sophisticated web app; etc.

68
Q

S3 Transfer Accelerator…

A

…can speed up content transfers to/from S3 as much as 50-500% for long-distance transfer of larger objects.

69
Q

How long does it take for data to reach the destination bucket using s3 cross-region replication?

A

15 minutes

70
Q

How long does it take, end-to-end, to transfer up to 80 TB of data into AWS Snowball Edge?

A

About one week

71
Q

A Site-to-Site VPN is…

A

…used to establish a secure connection between an on-premises network and Amazon VPC.

72
Q

Aurora Global Database is…

A

…designed for globally distributed applications, allowing a single Amazon Aurora database to span multiple AWS regions. It replicates data with no impact on database performance, enables fast local reads with low latency in each region, and provides disaster recovery from region-wide outages.

73
Q

Aurora Global Database supports…

A

…sub-1-second storage-based replication latency.

74
Q

Cross-Region Disaster Recovery is…

A

…a feature of Aurora Global Database that allows an assigned database in a secondary to be promoted to take over read/write capabilities in less than, in the event of an unplanned outage.

75
Q

DynamoDB is…

A

…AWS’s NoSQL database.

76
Q

Global Accelerator is…

A

…a networking service that simplifies traffic management and improves application performance.

77
Q

Hot storage refers to…

A

…the storage that keeps frequently accessed data ( hot data ).

78
Q

Warm storage refers to…

A

…the storage that keeps less frequently accessed data ( warm data ).

79
Q

Cold storage refers to…

A

…the storage that keeps rarely accessed data ( cold data ).

80
Q

In terms of pricing, the colder the data…

A

…the cheaper it is to store, and the costlier it is to access when needed.

81
Q

Amazon FSx For Lustre is…

A

…a high-performance file system for fast processing of workloads. Lustre is a popular open-source parallel file system which stores data across multiple network file servers to maximize performance and reduce bottlenecks.

82
Q

Amazon FSx for Windows File Server…

A

…is a fully managed Microsoft Windows file system with full support for the SMB protocol, Windows NTFS, Microsoft Active Directory ( AD ) Integration.

83
Q

Elastic File System (EFS) is…

A

…a fully-managed file storage service that makes it easy to set up and scale file storage in the Amazon Cloud.

84
Q

CloudTrail is…

A

…a service that enables governance, compliance, operational auditing, and risk auditing of an AWS account. CloudTrail enables logging, continuous monitorinmg, and retention of account-wide AWS infrastructure activity. CloudTrail is enabled by default on account creation. AWS account activity is recorded as a CloudTrail event. Recent events are easily viewed in the CloudTrail console “Event History”.

85
Q

CloudTrail provides event history of…

A

…AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, API calls, and other AWS services. This event history simplifies security analysis, resource change tracking, and troubleshooting.

86
Q

AWS X-Ray…

A

…helps debug and analyze microservices applications with request tracing to find the root cause of issues and poor performance.

87
Q

Redshift Spectrum is…

A

…a feature of Redshift that enables queries and analysis of all data in Amazon S3 using the open data formats already in use, with no data loading or transformations needed.

88
Q

Amazon Aurora Serverless is…

A

…an on-demand, auto-scaling configuration for Amazon Aurora. An Aurora Serverless DB cluster is a DB cluster that automatically starts up, shuts down, and scales up or down its compute capacity based on an application’s needs. Aurora Serverless provides a relatively simple, cost-effective option for infrequent, intermittent, sporadic or unpredictable workloads.

89
Q

Aurora Serverless is good for unpredictable, sporadic workloads, because…

A

…it automatically starts up, scales compute capacity to match your application’s usage and shuts down when it’s not in use.

90
Q

A non-Serverless DB cluster for Aurora is called a…

A

…provisioned DB cluster.

91
Q

In the provisioned DB cluster Aurora model… works well when…

A

…users define DB instance class size and create Aurora Replicas to increase read throughput. When workload changes, the user can modify the DB instance class size and change the number of Aurora Replicas…the database workload is predictable, because you can adjust capacity manually based on the expected workload.

92
Q

Aurora serverless is best when…

A

…workloads are intermittent and unpredictable, when heavy traffic may last a few minutes or it may last hours, or there may be long periods of light or no activity (e.g., retail websites with intermittent sales events, databases used for reports as-needed, dev/test environments, applications with uncertain requirements).

93
Q

With Aurora Serverless…

A

…users can create a database endpoint without specifying the instance class size. Setting the minimum and maximum capacity, the database endpoint connects to a proxy fleet that routes the workload to a fleet of auto scaling resources. Connections are continuous as Aurora Serverless scales based on specified capacity limits.

94
Q

TRUE/FALSE: With Aurora Serverless, database client applications need to change to use the proxy fleet.

A

FLASE

95
Q

Aurora Serverless scales rapidly, because…

A

…it uses a pool of “warm” resources that are always ready for service requests.

96
Q

Why is Aurora Serverless storage and processing decoupled?

A

To allow processing to scale down to zero, so accounts only pay for storage when compute isn’t needed.

97
Q

DynamoDB Global table is primarily used for…

A

…for massively scaled, global applications requiring a fully managed, multi-region, multi-master database with fast, local, read/write performance.

98
Q

Amazon Redshift is…

A

…best used for online analytical processing (OLAP) and not for online transactional processing (OLTP).

99
Q

Concurrency Scaling is…

A

…a Redshift feature that automatically and elastically scales a Redshift cluster’s query processing power to ensure consistently fast performance for hundreds of concurrent queries.

100
Q

AWS WAF is tightly integrated with…

A

…CloudFront, the Application Load Balancer (ALB), API Gateway, and AppSync – services commonly used for content delivery to websites and applications.

101
Q

When using WAF with CloudFront…

A

…rules run in all AWS Edge Locations, located around the world closer to end-users so the added security doesn’t compromise security. Requests are blocked before they reach web servers.

102
Q

When using WAF on regional services, (e.g., Application Load Balancer, API Gateway, and AppSync)…

A

…rules run in the same region and can be used to protect both internet-facing and internal resources.

103
Q

WAF rate-based rules…

A

…track the rate of requests from each originating IP address and trigger action on IPs with request rates exceeding a specified limit, which is set as the number of requests per 5-minute time span. This type of rule can be used to block temporarily requests from an IP address sending excessive requests.

104
Q

What are the two types of web ACL rules a user can create?

A

Regular and Rate-Based

105
Q

How will an Auto Scaling Group scale resources in, using the default termination policy?

A

If using multiple AZs instances will be terminated in the AZ with the most running instances. If more than one AZ have the same number of instances, scale in will favor the AZ with instances running the oldest launch configuration.

106
Q

The Amazon S3 notification feature…

A

…allows users to setup notifications in response to certain events in an S3 bucket.

107
Q

To enable SNS notifications on an S3 bucket…

A

…add a notification configuration to identify the events S3 should publish and destinations S3 should send those notifications, and store the configuration in the notification sub-resource associated with a bucket.

108
Q

S3 supports the following event publication destinations:

A

– Simple Notification Service (SNS) topic

– Simple Queue Service (SQS) queue

– Lambda

109
Q

The SNS fanout scenario is…

A

…when a message published to an SNS topic is replicated and pushed to multiple endpoints, such as SQS, HTTP(S) endpoints, or Lambda functions, which allows parallel asynchronous processing.

110
Q

S3 Bucket SNS Use Case

A

An application publishes a message to an SNS topic when an order is placed, then all subscribed SQS queues receive identical notifications of the order. EC2 instances attached to the SQS queues process the order.

111
Q

In a scenario where multiple teams need to be notified of S3 bucket activity…

A

…a combination of SNS and SQS can be used. The SNS message fanout feature allows multiple SQS queues to subscribe to an SNS topic, so when SNS receives an event notification, it will publish the message to both subscribers.

112
Q

TRUE/FALSE: S3 event notifications can go to multiple destinations (e.g., SNS topics, SQS queues).

A

FALSE–S3 event notifications are designed to be delivered to one destination only; event notifications will not go to more than one destination. SNS receives event notifications and republishes them to resources subscribed to the relevant SNS topic.

113
Q

SNS FIFO topics and SQS FIFO queues are used to…

A

…provide strict message ordering and message deduplication. SNS and SQS FIFO capabilities work together, acting as a fully managed service that integrates distributed applications that require near-real-time data consistency.

114
Q

TRUE/FALSE: SQS polls SNS.

A

FALSE–SQS can’t poll SNS, SQS queues are configured to subscribe to SNS topics.

115
Q

DynamoDB Accelerator (DAX) is…

A

…a fully managed, highly available, in-memory cache that can reduce DynamoDB response times from milliseconds to microseconds, even at millions of requests per second.

116
Q

AWS Device Farm is…

A

…an app testing service that lets you test and interact with your Android, iOS, and web apps on many devices at once, or reproduce issues on a device in real time.

117
Q

DynamoDB Auto Scaling is primarily used to…

A

…automate capacity management for your tables and global secondary indexes.

118
Q

Relational Databases are best for what types of workloads?

A

E.g., ad hoc queries; online analytical processing

119
Q

DynamoDB is best for what types of workloads?

A

E.g., web-scale applications like social networks, gaming platforms, media sharing, and IoT

120
Q

The relational data model requires…

A

…well defined schemas that normalize data in tables, organizing variables in rows and columns.

121
Q

The DynamoDB data model…

A

…is schema-less. Each table has a primary key to uniquely identify each data element, but non-key attributes should not share any similar constraints. DynamoDB can manage structured or non-structured data, including JSON documents.

122
Q

SQL stands for…

A

…Structured Query Language

123
Q

RDBs are optimized for…

A

…storage, so performance depends on the disk subsystem. Performance is optimized by managing queries, indexes, and table structures.

124
Q

DynamoDB is optimized for…

A

…compute, so performance is a function of the hardware and network latency, but it’s a managed service, so customer applications are insulated from these implementation details.

125
Q

Scaling RDbs is most easily achieved by…

A

…migrating to faster hardware, or it is also possible to leverage a distributed system and configuring tables to span across multiple hosts, but RDbs have constraints on the number and size of files, limiting scalability.

126
Q

DynamoDB is designed to scale out using…

A

…distributed hardware clusters, which allows for increased throughput w/o impacting latency. Customers simply specify throughput requirements and DynamoDB allocates resources to meet those requirements. There are no limits on the number of table items or the total size of a table.

127
Q

Relational database systems do not scale well because:

A

– Normalize data and stores multiple tables and require multiple queries to write to disk

– Generally incur performance costs of ACID-compliant transaction systems

– Use expensive joins to reassemble required views of query results

128
Q

DynamoDB scales well because:

A

– Its schema flexibility lets DynamoDB store complex hierarchical data within a single item

– Composite key design lets it store related items close together on the same table

129
Q

Is DynamoDB totally schemaless?

A

No, the very definition of a schema is just the model or structure of data. Data in DynamoDB has a structure.

130
Q

API Gateway is…

A

…a fully managed service that makes publishing, maintaining, monitoring, and securing APIs easier at any scale, using AWS Management Console to create APIs that act as the “front door” for applications to access data, business logic, or functionality from back-end services. API Gateway handles all tasks involved in accepting and processing up to hundreds of thousands of concurrent API calls, including traffic management, authorization and access control, monitoring, and API version management.

131
Q

API Gateway throttling limits…

A

API Gateway provides throttling at multiple levels, including global and by service call, that can be set for standard rates and bursts. For example, API owners can set a rate limit of 1,000 requests per second for a specific method in their REST APIs, and also configure Amazon API Gateway to handle a burst of 2,000 requests per second for a few seconds.

132
Q

Customers can subscribe to Shield Advanced for…

A

…increased protection against attacks targeting applications running on EC2, ELB, CloudFront, and Route 53 resources, beyond the network and transport layer protections that come with Standard. Shield Advanced provides additional detection and mitigation against large and sophisticated DDoS attacks, near real-time visibility into attacks, integration with AWS WAF, 24×7 access to the AWS DDoS Response Team (DRT), and protection against charges caused by DDoS related spikes in EC2, ELB, CloudFront, and Route 53 resource activity.

133
Q

Firewall Manager is mainly used to…

A

…simplify your AWS WAF administration and maintenance tasks across multiple accounts and resources.

134
Q

AWS WAF can help block common attack patterns against a VPC such as…but it is not enough to mitigate…

A

…SQL injection or cross-site scripting…sophisticated DDoS attacks, for which customers should use Shield Advanced.

135
Q

The custom key store feature in KMS…

A

…combines the control provided by CloudHSM with KMS’s ease of integration, allowing customers to configure and maintain a CloudHSM cluster authorized for use by KMS as a dedicated key store into which KMS will generate key material, so the key material will never be exposed as plaintext.

136
Q

AWS CloudHSM is…

A

…a fully managed cryptographic service for creating and maintaining hardware security modules (HSMs) in the AWS environment.

137
Q

HSMs are…

A

…computing devices that process cryptographic operations and provide secure storage for cryptographic keys.

138
Q

Use CloudHSM to…

A

…offload SSL/TLS processing for web servers, protect private keys linked to an issuing certificate authority (CA), or enable Transparent Data Encryption (TDE) for Oracle databases.

139
Q

HSMs in CloudHSM can perform a variety of cryptographic tasks, including:

A
  • Generate, store, import, export, and manage cryptographic keys, including symmetric keys and asymmetric key pairs
  • Use symmetric and asymmetric algorithms to encrypt and decrypt data
  • Use cryptographic hash functions to compute message digests and hash-based message authentication codes (HMACs)
  • Sign data (including code signing) and verify signatures
  • Generate secure random data
140
Q

Keys generated in AWS KMS are protected by…

A

…FIPS 140-2 validated cryptographic modules

141
Q

TRUE/FALSE: KMS custom key store feature is suitable to enable a customer to audit the use of their keys independent of AWS KMS or AWS CloudTrail.

A

TRUE

142
Q

RDS events only provide…but data-modifying events (INSERT, DELETE, UPDATE) can be…

A

…operational events such as DB instance events, DB parameter group events, DB security group events, and DB snapshot events…using native functions or stored procedures.