Round 1 Flashcards

- Introduction - Course Fundamentals and AWS Accounts - Cloud Computing Fundamentals

1
Q

What is the Account Root User?

A

The account root user has full control over an AWS Account and any resources created within it. This user can not be restricted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IAM and what is it’s purpose?

A

IAM is an IDP (Identity Provider).

Used to:
1 - Manage Identities - Users, Groups, and Roles which can have policies assigned to them in order to control their permissions.
2- Authenticate - Prove you are who you claim to be and become an “authenticated identity)
3 - Authorize - Allow or deny access to resources

IAM identities start with no permissions on an AWS Account, but can be granted permissions (almost) up to those held by the Account Root User.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List 4 MFA Factors

A

Multi-factor Authentication can use the following factors among others:

KIPoL

  • Knowledge - Something you know
  • Inherent - Something you are… fingerprints, face, voice, iris, etc.
  • Possession - Something you have (bank card, MFA device/app)
  • Location - A location (physical), which network (corp or wifi)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the general steps to creating a new AWS account?

A

1 - Use a unique email
2 - Add MFA to the account root user
3 - Billing
a - Set billing preferences so that you receive emails and alerts
b - Add a billing ALARM to the AWS Account.
c - Enable billing access for IAM users
4 - Set account contacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is PoLP?

A

The principle of least privilege (PoLP) refers to an information security concept in which a user (or identity) is given the minimum levels of access – or permissions – needed to perform his/her job functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is IAM shared across AWS accounts?

A

Every AWS account has its own IAM database. It is a “globally resilient service” so any data is always secure across all AWS regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an IAM policy?

A

You manage access in AWS by creating policies and attaching them to IAM identities (users, groups of users, or roles) or AWS resources. A policy is an object in AWS that, when associated with an identity or resource, defines their permissions.
https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give an example aws command to configure a new profile?

A

aws configure –profile training-general-iamadmin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give an example aws command to list files in s3 bucket using a profile.

A

aws s3 ls –profile training-general-iamadmin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is required for “Cloud Computing”

A

NIST (National Institute of Standards and Technology) defines it as follows:

1 - On-Demand Self-Service - Provision and Terminate using a UI/CLI without human interaction.
2 - Broad Network Access - Access services over any network, on any devices, using standard protocols and methods.
3 - Resource Pooling - Economies of scale, cheaper service.
4 - Rapid Elasticity - Scale UP (OUT) and DOWN (IN) automatically in response to system load.
5 - Measured Service - Usage is measured. Pay for what you consume.

https://learn.cantrill.io/courses/730712/lectures/14040936

OBRRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When speaking about Cloud Computing, what is “On-Demand Self-Service”?

A

“…you can provision capabilities as needed without requiring human interaction from the cloud provider”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When speaking about Cloud Computing, what is “Broad Network Access”?

A

“Capabilities are available over the network and accessed through standard mechanisms…”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When speaking about Cloud Computing, what is “Resource Pooling”?

A

a - There is a sense of location independence… no control or knowledge over exact location of the resources
b - …resources are pooled to serve multiple customers using a multi-tenant model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When speaking about Cloud Computing, what is “Rapid Elasticity”?

A

a - Capabilities can be elastically provisioned and released to scale rapidly outward and inward with demand.
b - To consumer, the capabilities available for provisioning often appear to be unlimited.

This is one of the most important aspects of Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When speaking about Cloud Computing, what is “Measured Service”?

A

“Resource usage can be monitored, controlled, reported, and billed”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is “Public Cloud”?

A

Using only ONE “Cloud” platform. This platform must be available to the general public. (AWS, Azure, Google Cloud)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is “Private Cloud”?

A

Using just one real “Cloud” platform which is dedicated to you. It must be on-premises. (AWS Outposts, Azure Stack, Google Anthos) It still needs to meet the 5 essential characteristics of Cloud Computing to be considered “Private Cloud”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Multi-Cloud?

A

Using MORE THAN ONE “Public Cloud” vendor (AWS, Azure, Google)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Hybrid Cloud?

A

Using both Public Cloud and Private Cloud offerings from ONE specific vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is XaaS

A

X as a Sevice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What makes up an Infrastructure Stack (or Application Stack)?

A
Application
Data
Runtime
Container
OS
Virtualization
Servers
Infrastructure
Facilities

9 parts
ADRCOVSIF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the difference between On-Premise, DC Hosted, IaaS, PaaS, SaaS, etc?

A

On-Premise
DC (Data Center) Hosted
IaaS (Infrastructure as a Service)
PaaS (Platform as a Service) - Heroku - This model is used mostly by Developers
SaaS - Software as a Service - Netflix, Dropbox, Gmail, etc.

AWS has IaaS, Paas, SaaS, etc.

https://learn.cantrill.io/courses/730712/lectures/14040947

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does YAML stand for?

A

“YAML Ain’t Markup Language”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does JSON stand for?

A

JavaScript Object Notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the layers of the OSI 7 Layer Networking Model?

A
Layer 1 - Physical
Layer 2 - Data Link
Layer 3 - Network
Layer 4 - Transport
Layer 5 - Session
Layer 6 - Presentation
Layer 7 - Application

A layer ‘x’ device contains functionality for that layer and below. For example, a layer 3 device contains functionality from layers 1, 2, and 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the physical mediums used in networking?

A

Copper (electrical), Fibre (light), and WiFi (Radio Frequency)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Describe Layer 1 of a Network as defined by the OSI 7 Layer Networking Model.

A

Physical Layer

Defines the transmission and reception of RAW BIT STREAMS between a device and a SHARED physical medium. It defines things like voltage levels, timing, rates, distances, modulation, and connectors.

https://learn.cantrill.io/courses/730712/lectures/25094904

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the issues with a solely Layer 1 network? A hub?

A
  • Anything received on any port, is transmitted on every other port. This includes error and collisions.
  • No device addressing, all data is processed by all devices.
  • If multiple devices transmit at once - a collision occurs
  • L1 has no media (physical medium) access control and no collision detection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Describe Layer 2 of a Network as defined by the OSI 7 Layer Networking Model.

A

Data Link Layer

  • Uses layer 1 (Physical layer)
  • Adds unique hardware (MAC) address resulting in identifiable devices
  • Controls access to shared medium
  • Detects and mitigates collisions
  • Adds frames for communication.

“The data link layer is one of the most important layers, and creates the foundational networking layer which supports Layer 3 IP .. which is how the internet functions.”

30
Q

What does MAC stand for and describe its format.

A

Media Access Control

48 bits, in hex, 24 bits for manufacturer. Assigned to a piece of hardware.

31
Q

What is CSMA?

A

Carrier-sense multiple access is a MAC (media access control) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium, such as an electrical bus or a band of the electromagnetic spectrum.

32
Q

What make a switch unique?

A

It stores and forwards frames to a matching port. At first it doesn’t know the what MAC address is assigned to its port, but once a call is received from a device, it remembers its “from” component of the frame. If a message is sent to a port that is not recognized, the frame is broadcast to all ports on the switch.

33
Q

How many bits per byte

A

8

34
Q

What is an octet?

A

It’s a name used to describe 8 bits. This often is used in reference to describe one of the numbers in an IPv4 address.

35
Q

How many bits are there in an IP address?

A

32 bits (which is 4 octets…)

36
Q

Pick a random number less than 256 and convert it to binary

A

https://www.rapidtables.com/convert/number/decimal-to-binary.html

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
| 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 |

37
Q

Pick a random 8 bit binary number and convert it to its decimal equivalent

A

https://www.rapidtables.com/convert/number/binary-to-decimal.html

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
| 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 |

38
Q

What protocol is generally used at L2 for local networks?

A

Ethernet

39
Q

What protocols are used for long distance point to point links?

A

PPP/MPLS/ATM

40
Q

What does IP stand for? Describe it.

A

Internet Protocol
There is v4 and v6 that are currently used. This is a L3 (layer 3) protocol. It defines the packet structure used to move data through the network.

https://learn.cantrill.io/courses/730712/lectures/25141550

41
Q

What is dotted decimal notation? What do the parts represent?

A

4x0-255 used to represent an IPv4 address
The first part is used to identify the network.
The last parts are used to identify the host.

42
Q

What does DHCP stand for?

A

Dynamic Host Configuration Protocol

43
Q

What is a Subnet Mask?

A

It’s used to determine what part of an IP address represents the network and what part represents the host. This helps the host know if it needs to use a gateway to communicate locally or remotely.

44
Q

What is the prefix for the subnet mask 255.255.0.0?

A

It’ is a /16 prefix. 16 bits (2 octets) of the IP are the network, and the remaining bits are for hosts.

https://learn.cantrill.io/courses/730712/lectures/25141552

45
Q

What is ARP

A

Address Resolution Protocol

46
Q

Describe Layer 3 of a Network as defined by the OSI 7 Layer Networking Model.

A

The network layer adds the ability for cross-network addressing (IP Addresses). It allows packets to be routed across different layer 2 networks, via L2 Frame encapsulation and forwarding decisions using routes and route tables. Its Layer 3 which allows the internet to function.

  • Contains IP Addresses which is used for “cross network addressing”
  • ARP - Find the MAC address for an given IP
  • Routes - Where to forward packets to
  • Route Tables - Multiple routes
  • Router - Moves packets from SRC to DEST - Encapsulating in L2 on the way
  • Device <=> Device communications over the internet
  • No method for channels of communications .. SRC IP <=> DSP IP Only
  • Packets can be delivered out of order… which is resolved by L4.
47
Q

Describe Layer 4 of a Network as defined by the OSI 7 Layer Networking Model.

A

Transport Layer - This layer adds Ports, error correction, retransmission, flow control and a connection orientated architecture. TCP and UDP live at this layer.

48
Q

What name is used for temporary ports?

A

Ephemeral port.

49
Q

What is an ephemeral port?

A

Also called a “higher port”, it is a temporary post used during TCP communication. It’s usually has a higher port number.

50
Q

What is a Network ACL?

A

Network Access Control List

It’s a stateless firewall which needs two rules for each TCP connection, one in both directions.

51
Q

What is NAT?

A

Network Address Translation (NAT) is the process of adjusting packets source and destination addresses to allow transit across different networks.

The main types you will encounter are Static NAT, Dynamic NAT and Port Address Translation (PAT).

NAT is most commonly experienced in home or office networks where private IPv4 addresses are translated to a single public address, allowing outgoing internet access.

This only makes sense with IPv4. It doesn’t make sense with IPv6 since it has so many more addresses available.

IPv6 does not require NAT.

https://learn.cantrill.io/courses/730712/lectures/25279341

52
Q

What is Static NAT?

A

1 private to 1 (fixed) public address (IGW)

The router (NAT DEVICE) maintains a NAT table. It maps PrivateID : PublicIP (1:1)

In AWS this is how the Internet Gateway (IGW) functions.

53
Q

What is Dynamic NAT

A

1 private to 1st available Public

Public IP is temporarily allocated from Pubic IP Pool.

Only one Private IP will be mapped to a Public IP at a given time. It’s still 1:1 for the duration of the allocation.

If the Public IP Pool is exhausted, external access can/will fail.

https://learn.cantrill.io/courses/730712/lectures/25279345

54
Q

What is PAT?

A

Port Address Translation - Many private to 1 public (NATGW). This is often what home networks are like.

Allows a large number of private devices to share one public address.

In AWS, this is how the NATGateway (NATGW) functions.

55
Q

What is a disadvantage of using PAT?

A

External traffic can not initiate a connection to an internal device since the destination IP is unknown.

56
Q

When was IPv4 standardized?

A

1981 in RFC791

57
Q

How many IP addresses are available in IPv4?

A

4.294 billion

58
Q

What is the “Class A” address space?

A

IPv4 address space ranging from 0.0.0.0 to 127.255.255.255

128 NETWORKS
16,777,216 IPs each

The first octet is used to identify the network.

In the early days, each network was assigned to very large companies like Apple, Ford, USPS, military, etc. Many have since given up these ranges which are now allocated to regional managers of the IP address space for allocation to users in that region.

59
Q

What is the “Class B” address space?

A

IPv4 address space ranging from 128.0.0.0 to 191.255.255.255

12,384 NETWORKS
65,536 IPs each

The first two octets are used to identify the network.

In the early days these were allocated to large companies that didn’t need to have a “Class A” allocation. They are now generally allocated to the regional authorities and they manage them and allocate them to any organization that requests and can justify addresses in this range.

60
Q

What is the “Class C” address space?

A

IPv4 address space ranging from 192.0.0.0 to 223.255.255.255

2,097,152 NETWORKS
256 IPs each

The first three octets are used to identify the network.

In the early days these were allocated to smaller companies. They are now generally allocated to the regional authorities and they manage them and allocate them.

61
Q

What is the “Class D” and “Class E” address space?

A

“Class D” is used for multicast and “Class E” is reserved.

62
Q

Describe the IPv4 Private Addressing range

A

It is defined by standard RFC1918

  1. 0.0.0 - 10.255.255.255 (1 x “Class A” Network) - 1 x 16,777,216 IPv4 addresses
  2. 16.0.0 - 172.31.255.255 (16 x “Class B” Networks) - 16 x 65,536 IPv4 addresses
  3. 168.0.0 - 192.168.255.255 (256 x “Class C” Networks) - 256 x 256 IPv4 addresses

In AWS address 172.31.xxx.xxx is used for the default VPC

63
Q

How many IP addresses are available in IPv6?

A

340 sextillion

64
Q

How does the prefix number correlate to a network size?

A

The larger the prefix value, the smaller a network.

65
Q

How do you create a subnet?

A

You split the range into two. The prefix is then increased.

https://learn.cantrill.io/courses/730712/lectures/26984984

66
Q

What is DDoS

A

Distributed Denial of Service are effective at disrupting web applications no matter their size.

They are generally initiated from networks of compromised machines known as Botnets.

They come in 3 common types:

  • Application Layer - HTTP FLOODS - Making lots of calls to HTTP endpoints.
  • Protocol Attacks - SYN FLOODS - Related to the handshake process. Happens during SYN using a fake SOURCE)
  • Volumetric/Amplification Attacks - Size of botnet can be smaller. A Botnet exploits a protocol where a response is significantly larger than the request. In this case making a spoofed request to DNS using the source IP of the servers being attacked. That way the DNS servers all make a call to the server and overwhelm it.

https://learn.cantrill.io/courses/730712/lectures/26952882

67
Q

What does SSL stand for?

A

Secure Sockets Layer

68
Q

What does TLS stand for?

A

Transport Layer Security? It is a newer and more secure version of SSL.

69
Q

What are SSL and TLS used for?

A
Privacy and Data Integrity between client & server
Provide:
- Privacy - communications are encrypted
- Identity verified 
- Reliable connection
70
Q

What are the stages of setting up a TLS connection?

A

1 - Establish Cipher Suites - TLS begins with an established TCP connection. Agree on the method of communications, “the Cipher Suite”.
2 - Authentication - Ensure the server certificate is authentic, verifying the server as legitimate.
3 - Key Exchange - Move from Asymmetric to Symmetric keys in a secure way and begin encryption process.