Section 1 Flashcards

1
Q

What certification exam is being prepared for in the content?

A

Cloud Practitioner exam – CLF-C02

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many AWS services will be covered in the course according to the content?

A

Over 40 AWS services (out of the 200+ in AWS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the estimated cost for the course?

A

Most services used will be within the AWS Free Tier, costing $0. Any service incurring costs will be mentioned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the AWS Free Tier.

A

The AWS Free Tier allows users to access certain AWS services for free up to a specified limit, helping users explore and learn without incurring charges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the components involved in how websites work based on the provided content.

A

Websites involve servers, networks, clients with IP addresses, and servers with IP addresses. Client communicates with the network which then in turn communicates with the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define the role of a server in the context of websites based on the provided content.

A

Servers play a crucial role in hosting website data and serving it to clients over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are clients and servers differentiated in terms of IP addresses according to the content?

A

Clients and servers both have IP addresses, with clients using them to request data and servers using them to send requested data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the components that make up a server according to the provided content.

A

A server is composed of compute (CPU), memory (RAM), storage (data), database (for storing data in a structured way), and network components (routers, switches, DNS server).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe a network in IT terminology.

A

A network in IT terminology refers to cables, routers, and servers connected with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define a router in IT terminology.

A

A router is a networking device that forwards data packets between computer networks and knows where to send packets on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a switch function in IT terminology?

A

A switch takes a packet and sends it to the correct server/client on your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the role of a switch in a network.

A

In a network, a switch is responsible for directing packets to the appropriate destination server or client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of a router in IT networks?

A

Routers in IT networks are used to forward data packets between different computer networks and determine the path for packet delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the traditional ways of building infrastructure according to the provided content.

A

The traditional ways include setting up infrastructure in a data center, at home or in a garage, and in an office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the problems with the traditional IT approach outlined in the content.

A

The traditional IT approach involves paying for data center rent, power supply, cooling, maintenance, limited scaling, hiring a 24/7 monitoring team, and addressing disaster recovery concerns like earthquakes, power shutdowns, and fires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define the need for externalization in the context of IT infrastructure.

A

Externalization in IT infrastructure refers to outsourcing data center operations, maintenance, and monitoring to third-party service providers to alleviate the burden on internal resources and improve scalability and disaster recovery capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can externalizing IT infrastructure help address the challenges mentioned in the content?

A

Externalizing IT infrastructure can reduce costs, improve scalability, enhance disaster recovery capabilities, and streamline operations by leveraging the expertise and resources of specialized service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe Cloud Computing.

A

Cloud computing is the on-demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform with pay-as-you-go pricing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does cloud computing allow you to do in terms of computing resources?

A

Cloud computing allows you to provision exactly the right type and size of computing resources you need and access as many resources as you need almost instantly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define the role of Amazon Web Services in cloud computing.

A

Amazon Web Services owns and maintains the network-connected hardware required for application services, while users provision and use what they need via a web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe Gmail as a cloud service.

A

Gmail is an email cloud service where users pay only for the emails stored, without having to manage infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define Dropbox as a cloud service.

A

Dropbox is a cloud storage service that allows users to store and access their files online, originally built on AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How is Netflix utilizing cloud services?

A

Netflix is built on AWS and offers video-on-demand services to its users, leveraging cloud infrastructure for content delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe the Private Cloud deployment model in the context of cloud computing.

A

Private Cloud involves cloud services exclusive to a single organization, offering complete control, security for sensitive applications, and tailored solutions to meet specific business requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define the Public Cloud deployment model in the context of cloud computing.

A

Public Cloud refers to cloud resources managed by a third-party provider and accessible over the Internet, providing various advantages of cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How does the Hybrid Cloud deployment model combine on-premises servers with cloud capabilities?

A

Hybrid Cloud integrates on-premises servers with cloud services, allowing organizations to retain control over sensitive assets while leveraging the flexibility and cost-effectiveness of the public cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Do private clouds offer security advantages over public clouds? If so, how?

A

Yes, private clouds provide enhanced security for sensitive applications compared to public clouds due to their exclusive nature and the organization’s complete control over the infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Describe the key benefits of utilizing a Hybrid Cloud deployment model.

A

Hybrid Cloud offers organizations the ability to maintain control over sensitive assets in their private infrastructure while benefiting from the flexibility and cost-effectiveness of the public cloud, providing a balanced approach to cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the 5 characteristics of cloud computing

A

On-demand self service:

Broad network access:

Multi-tenancy and resource pooling:

Rapid elasticity and scalability:

Measured service:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Describe the on-demand self service characteristic of cloud computing.

A

Users can provision resources and use them without human interaction from the service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define multi-tenancy and resource pooling in cloud computing.

A

It allows multiple customers to share the same infrastructure and applications with security and privacy, being serviced from the same physical resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How does rapid elasticity and scalability work in cloud computing?

A

It involves automatically acquiring and disposing of resources as needed, as well as quickly and easily scaling based on demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does the measured service characteristic of cloud computing entail?

A

It means usage is measured, and users pay for what they have used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Do you need human interaction from the service provider for on-demand self service in cloud computing?

A

No, users can provision resources and use them without human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Six Advantages of Cloud Computing

A
  1. Trade capital expense (CAPEX) for operational expense (OPEX)
  2. Benifit for massice economies of scale.
  3. Stop quessing capacity
  4. Increase speed and agility
  5. Stop spending money and running and maintaining data centers.
  6. Go global in minutes, leverage the AWD global infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Describe the advantage of cloud computing related to capital expense (CAPEX) and operational expense (OPEX).

A

Cloud computing allows for shifting from capital expenses (CAPEX) to operational expenses (OPEX), reducing upfront costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is one benefit of cloud computing in terms of capacity planning?

A

Cloud computing allows users to scale based on actual measured usage, eliminating the need to guess capacity requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How does cloud computing contribute to increased speed and agility for businesses?

A

Cloud computing enables businesses to stop spending money on running and maintaining data centers, allowing them to focus on agility and speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define the advantage of cloud computing related to leveraging global infrastructure.

A

Cloud computing allows users to go global in minutes by leveraging the global infrastructure provided by cloud service providers like AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is one advantage of cloud computing in terms of cost efficiency?

A

Cloud computing allows users to benefit from massive economies of scale, leading to reduced prices and increased efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Describe the flexibility provided by the Cloud.

A

The Cloud allows users to change resource types as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Problems solved by the Cloud

A
  1. Flexibility
  2. Cost-Effectiveness
  3. Scalability
  4. Elasticity
  5. Hight availability and fault tolerance
  6. Agility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Define cost-effectiveness in the context of the Cloud.

A

In the Cloud, users pay as they go for the resources they use, making it cost-effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Descript how Flexibility solves problems with the cloud

A

You can change resource types when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How does the Cloud ensure high-availability and fault-tolerance?

A

By building across multiple data centers, the Cloud ensures high-availability and fault-tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Do you explain scalability in the Cloud environment?

A

Scalability in the Cloud allows for accommodating larger loads by strengthening hardware or adding more nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Define agility as it relates to the Cloud.

A

Agility in the Cloud refers to the ability to rapidly develop, test, and launch software applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Describe Infrastructure as a Service (IaaS)

A

IaaS provides building blocks for cloud IT, including networking, computers, and data storage space, offering the highest level of flexibility and easy comparison with traditional on-premises IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Define Platform as a Service (PaaS)

A

PaaS eliminates the need for organizations to manage underlying infrastructure, focusing instead on deploying and managing applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How does Software as a Service (SaaS) work?

A

SaaS delivers a complete product that is operated and maintained by the service provider, allowing users to access software over the internet without the need for installation or maintenance. It inclused Applications, Data, runtime, middelware, 0/s, virtualization, services, storage, networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Types of Cloud Computing.

A

Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Define the term ‘On-premises’ as used in the content.

A

Refers to software or services that are deployed and operated from a company’s in-house server and computing infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

How is Infrastructure as a Service (IaaS) different from Platform as a Service (PaaS) and Software as a Service (SaaS)?

A
  • Infrastructure as a Service (IaaS)
    Provide building blocks for cloud IT
    Provides networking, computers, data storage space
    Highest level of flexibility
    Easy parallel with traditional on-premises IT
  • Platform as a Service (PaaS)
    Removes the need for your organization to manage the underlying infrastructure
    Focus on the deployment and management of your applications
  • Software as a Service (SaaS)
    Completed product that is run and managed by the service provider
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Describe the components typically included in the Infrastructure as a Service (IaaS) model.

A

Components include virtualization, servers, storage, networking, operating systems, middleware, runtime, data, and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Do you have control over managing the infrastructure in Software as a Service (SaaS) according to the content?

A

No, in SaaS, the software applications are managed by others, not by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What services are included in platform as a service Paas.

A

runtime, middleware, os, virtualization, servers, storage, networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Describe Infrastructure as a Service in cloud computing.

A

Infrastructure as a Service (IaaS) provides virtualized computing resources over the internet, allowing users to rent servers, storage, and networking on a pay-as-you-go basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are some examples of Platform as a Service providers in cloud computing?

A

Examples of Platform as a Service (PaaS) providers include Elastic Beanstalk on AWS, Heroku, Google App Engine on GCP, and Windows Azure by Microsoft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Define Software as a Service in the context of cloud computing.

A

Software as a Service (SaaS) delivers software applications over the internet on a subscription basis, eliminating the need for users to install and maintain the software locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

How does Infrastructure as a Service differ from Platform as a Service in cloud computing?

A

Infrastructure as a Service (IaaS) provides virtualized computing resources like servers and storage, while Platform as a Service (PaaS) offers a platform for developers to build, deploy, and manage applications without worrying about the underlying infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Do you need to manage the underlying infrastructure in Software as a Service (SaaS) in cloud computing?

A

No, in Software as a Service (SaaS), the service provider manages the infrastructure, including servers, storage, and networking, allowing users to focus solely on using the software applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Describe the pricing fundamentals of AWS in Cloud.

A

AWS 3 pricing fundamentals: compute time, data stored, and data transfer OUT of the Cloud.

64
Q

Define the pay-as-you-go pricing model in the context of AWS.

A

The pay-as-you-go pricing model means customers only pay for the services they use, without any upfront costs or long-term commitments.

65
Q

How does AWS address the issue of expensive data transfer in traditional IT environments?

A

AWS offers free data transfer IN to the Cloud and charges only for data transfer OUT, solving the expensive issue of traditional IT data transfer costs.

66
Q

Describe the history of AWS cloud from 200 to 2007.

A

Internally launched in 2002, publicly launched in 2004 with SQS, re-launched in 2006 with SQS, S3 & EC2, and finally launched in Europe in 2007.

67
Q

What were some key milestones in the early history of AWS cloud from 2002 to 2007?

A

Internally launched in 2002, publicly launched in 2004 with SQS, re-launched in 2006 with SQS, S3 & EC2, and launched in Europe in 2007.

68
Q

Describe AWS’s market share in 2019 compared to Microsoft.

A

AWS accounted for 47% of the market in 2019, while Microsoft held 22%.

69
Q

Define Gartner Magic Quadrant in the context of.

A

Gartner Magic Quadrant is a research methodology that provides a graphical representation of a market’s direction, maturity, and participants, with AWS being recognized in it.

70
Q

How many active users did AWS have according to the content?

A

AWS had over 1,000,000 active users according to the provided information.

71
Q

Describe some AWS Cloud use cases according to the provided content.

A

AWS enables building sophisticated, scalable applications applicable to various industries such as Enterprise IT, Backup & Storage, Big Data analytics, Website hosting, Mobile & Social Apps, and Gaming.

72
Q

What industries can benefit from AWS Cloud according to the content?

A

Various industries such as Enterprise IT, Backup & Storage, Big Data analytics, Website hosting, Mobile & Social Apps, and Gaming can benefit from AWS Cloud.

73
Q

Describe the components of AWS global infrastructure mentioned in the content.

A

AWS global infrastructure includes Regions, Availability Zones, Data Centers, and Edge Locations/Points of Presence.

74
Q

Define AWS Availability Zones and how they relate to AWS Regions.

A

AWS Availability Zones are distinct locations within an AWS Region that are engineered to be isolated from failures in other Availability Zones. AWS Regions consist of multiple Availability Zones.

75
Q

How can one access more information about AWS infrastructure according to the content?

A

One can access more information about AWS infrastructure by visiting https://infrastructure.aws/ as mentioned in the content.

76
Q

Describe AWS Regions.

A

AWS Regions are clusters of data located all around the world, with names like us-east-1, eu-west-3, etc. Most AWS services are region-scoped.

77
Q

Define AWS Regions.

A

AWS Regions refer to clusters of data centers spread across the globe, each identified by a unique name such as us-east-1 or eu-west-3.

78
Q

How are AWS Regions structured?

A

AWS Regions are structured as clusters of data centers distributed globally, with each region having a unique name like us-east-1 or eu-west-3. Most AWS services are specific to a particular region.

79
Q

Describe the factors to consider when choosing an AWS Region.

A

Factors include compliance with data governance, proximity to customers, available services within a Region, and pricing.

80
Q

What is the importance of compliance with data governance and legal requirements when choosing an AWS Region?

A

Data should never leave a region without explicit permission to ensure compliance.

81
Q

How does proximity to customers impact the choice of AWS Region?

A

Proximity to customers helps in reducing latency for better user experience.

82
Q

Define the significance of available services within a Region when selecting an AWS Region.

A

New services and features may not be available in every Region, influencing the choice based on required functionalities.

83
Q

How does pricing play a role in determining the AWS Region for launching a new application?

A

Pricing varies region to region, and transparency in pricing is available on the service pricing page, affecting cost considerations for the application.

84
Q

Describe AWS Availability Zones.

A

AWS Availability Zones are separate data centers within a region that offer redundancy in power, networking, and connectivity to ensure isolation from disasters.

85
Q

What is the purpose of AWS Availability Zones?

A

To provide high availability and fault tolerance by isolating data centers within a region.

86
Q

Define AWS Region in the context of AWS infrastructure.

A

An AWS Region is a geographical area where AWS has multiple Availability Zones to provide low-latency, high-bandwidth connectivity.

87
Q

How are AWS Availability Zones connected to each other?

A

They are connected with high bandwidth and ultra-low latency networking to facilitate data transfer and redundancy.

88
Q

Do AWS Regions always have the same number of Availability Zones?

A

No, the number of Availability Zones in an AWS Region can vary, typically ranging from 3 to 6.

89
Q

Describe some of the Global Services offered by AWS.

A

Some of the Global Services offered by AWS include Identity and Access Management (IAM), Route 53 (DNS service), CloudFront (Content Delivery Network), and WAF (Web Application Firewall).

90
Q

What are examples of Region-scoped AWS services?

A

Examples of Region-scoped AWS services include Amazon EC2 (Infrastructure as a Service), Elastic Beanstalk (Platform as a Service), Lambda (Function as a Service), and Rekognition (Software as a Service).

91
Q

How are most AWS services scoped in terms of regions?

A

Most AWS services are Region-scoped, meaning they are specific to particular geographic regions.

92
Q

Define AWS Lambda.

A

AWS Lambda is a serverless computing service provided by AWS, allowing users to run code without provisioning or managing servers.

93
Q

Do you need to distribute this content according to the disclaimer provided?

A

No, the content explicitly states that it is not for distribution.

94
Q

Describe the Shared Responsibility Model in AWS.

A

AWS is responsible for the security of the cloud, while the customer is responsible for the security in the cloud.

95
Q

What is the division of responsibilities in the Shared Responsibility Model for AWS?

A

AWS is responsible for the security of the cloud, while the customer is responsible for the security in the cloud.

96
Q

What is IAM?

A

IAM stands for Identity and Access Management, a global service.

97
Q

Describe the Root account in IAM.

A

The Root account is created by default in IAM but shouldn’t be used or shared.

98
Q

How are users and groups structured in IAM?

A

Users are individuals within the organization and can be grouped, while groups only contain users and not other groups.

99
Q

Define the relationship between users and groups in IAM.

A

Users don’t have to belong to a group, and a user can belong to multiple groups.

100
Q

Do groups in IAM have any restrictions on their composition?

A

Groups in IAM can only contain users and not other groups.

101
Q

What is the purpose of IAM Policies inheritance in AWS?

A

IAM Policies inheritance allows for the cascading of permissions from one entity to another in a hierarchical manner.

102
Q

Describe the concept of inline IAM Policies in AWS.

A

Inline IAM Policies are policies that are embedded directly within a single user, group, or role, providing a more granular level of control over permissions.

103
Q

How does IAM Policies inheritance work in AWS?

A

IAM Policies inheritance in AWS allows permissions assigned to a higher-level entity (such as a group) to be inherited by lower-level entities (such as individual users within that group).

104
Q

Describe the structure of IAM Policies according to the provided content.

A

IAM Policies consist of Version, Id, and Statement. Each Statement includes Sid, Effect, Principal, Action, Resource, and Condition.

105
Q

What is the purpose of the ‘Version’ in IAM Policies as per the content?

A

The ‘Version’ in IAM Policies specifies the policy language version and should always include ‘2012-10-17’.

106
Q

Define ‘Effect’ in IAM Policies based on the information given.

A

In IAM Policies, ‘Effect’ determines whether the statement allows or denies access, with options being ‘Allow’ or ‘Deny’.

107
Q

How is ‘Principal’ defined in IAM Policies according to the content?

A

In IAM Policies, ‘Principal’ refers to the account/user/role to which the policy is applied.

108
Q

Do IAM Policies require the ‘Id’ field according to the provided content?

A

The ‘Id’ field in IAM Policies is optional, meaning it is not mandatory to include an identifier for the policy.

109
Q

Describe the purpose of an IAM password in AWS.

A

An IAM password in AWS aims to enhance account security by enforcing guidelines such as strong passwords, specific character types, password length requirements, password expiration, and preventing password re-use.

110
Q

What are some components of an IAM password policy in AWS?

A

Components include setting a minimum password length, requiring specific character types (uppercase letters, lowercase letters, numbers, non-alphanumeric characters), allowing users to change their passwords, enforcing password expiration, and preventing password re-use.

111
Q

How does enforcing a password policy contribute to account security in AWS?

A

Enforcing a password policy ensures that users create strong passwords, regularly update them, and follow specific guidelines, ultimately reducing the risk of unauthorized access and enhancing overall security.

112
Q

Define the concept of password expiration in an IAM password policy.

A

Password expiration requires users to change their passwords after a specified period, promoting regular updates and reducing the likelihood of compromised credentials being used over an extended period.

113
Q

Do IAM users have the ability to change their passwords in AWS under the password policy?

A

Yes, the IAM password policy in AWS allows all IAM users to change their own passwords, giving them control over their account security and password management.

114
Q

Describe the concept of Multi Factor Authentication (MFA) as explained in the content.

A

MFA involves combining a password with a security device to enhance account security and prevent unauthorized access.

115
Q

Define the main benefit of using Multi Factor Authentication (MFA) according to the content.

A

The primary advantage of MFA is that even if a password is stolen or hacked, the account remains secure and is not compromised.

116
Q

How does Multi Factor Authentication (MFA) help protect Root Accounts and IAM users in AWS, as mentioned in the content?

A

MFA ensures that users need both a password and a security device to access the account, reducing the risk of unauthorized access and potential changes to configurations or resources.

117
Q

What are some MFA device options in AWS?

A

Virtual MFA device, Google Authenticator, Authy, Universal 2nd Factor (U2F) Security Key, YubiKey by Yubico.

118
Q

Describe the support provided by AWS for multiple tokens on a single device.

A

AWS supports multiple tokens on a single device for enhanced security.

119
Q

How does AWS enable support for multiple root and IAM users using a single security key?

A

AWS allows multiple root and IAM users to use a single security key for authentication purposes.

120
Q

What are some options forFA devices in AWS?

A

Hardware Key Fob MFA Device provided by Gemalto and SurePassID.

121
Q

Describe the MFA device provided by SurePassID for AWS GovCloud (US).

A

It is a Hardware Key Fob MFA Device.

122
Q

Describe three options for users to access AWS.

A

Users can access AWS through the AWS Management Console (protected by password + MFA), AWS Command Line Interface (CLI) using access keys, and AWS Software Developer Kit (SDK) for code also protected by access keys.

123
Q

How are Access Keys generated for AWS access?

A

Access Keys are generated through the AWS Console, and users manage their own access keys.

124
Q

Define the purpose of Access Keys in AWS access.

A

Access Keys in AWS are secret credentials used for authentication, similar to a password, where the Access Key ID is akin to a username and the Secret Access Key is like a password.

125
Q

What should users avoid doing with their Access Keys in AWS?

A

Users should not share their Access Keys, as they are meant to be kept secret for security purposes.

126
Q

What should you avoid doing with your access keys?

A

Sharing them.

127
Q

Describe the format of an AWS access key ID.

A

It starts with ‘AKIA’ followed by a string of alphanumeric characters.

128
Q

How should you treat your AWS secret access key?

A

Keep it confidential and never share it.

129
Q

Describe the AWS CLI.

A

The AWS CLI is a tool allows users to interact with AWS services through commands in the command-line shell.

130
Q

What does the AWS CLI provide access to?

A

The public APIs of AWS services.

131
Q

How can you use the AWS CLI for resource management?

A

By developing scripts to manage your resources.

132
Q

What is the nature of the AWS CLI in terms of accessibility?

A

It is open-source and available on GitHub at https://github.com/aws/aws-cli.

133
Q

What is the AWS CLI considered as an alternative to?

A

Using the AWS Management Console.

134
Q

Describe the AWS SDK.

A

The AWS SDK is a set of language-specific APIs that enable users to access and manage AWS services programmatically, embedded within their applications.

135
Q

What programming languages are supported by the AWS SDK?

A

The AWS SDK supports various programming languages such as JavaScript, Python, PHP, .NET, Ruby, Java, Go, Node.js, and C++.

136
Q

How does the AWS SDK facilitate access to AWS services?

A

The AWS SDK provides libraries that allow developers to interact with AWS services programmatically, integrating them into their applications.

137
Q

Define the purpose of the AWS SDK.

A

The AWS SDK serves as a tool for developers to interact with AWS services through language-specific APIs, enabling seamless integration within applications.

138
Q

What are some examples of SDKs related to AWS?

A

The AWS SDK includes SDKs for various platforms such as mobile (Android, iOS), IoT devices (Embedded C, Arduino), and programming languages like Python used in tools like AWS CLI.

139
Q

What is the purpose of IAM Roles Services in AWS?

A

To permissions to AWS services perform actions on your behalf.

140
Q

Describe some common roles that utilize IAM Roles in AWS.

A

Common roles include EC2 Instance Roles, Lambda Function Roles, and Roles for CloudFormation.

141
Q

Describe IAM Credentials Report.

A

A report that lists all users in an account along with the status of their various credentials.

142
Q

What is IAM Access Advisor used for?

A

IAM Access Advisor shows the service permissions granted to a user and when those services were last accessed.

143
Q

How can IAM Access Advisor information be utilized?

A

The information from IAM Access Advisor can be used to revise policies.

144
Q

Define IAM Security Tools.

A

Tools related to Identity and Access Management (IAM) that help manage user permissions and access within an account.

145
Q

Do IAM Security Tools help in monitoring user access and permissions?

A

Yes, IAM Security Tools like IAM Credentials Report and IAM Access Advisor assist in monitoring and managing user access and permissions.

146
Q

Describe the IAM best practice of assigning users to groups and permissions to groups.

A

Assigning users to groups and permissions to groups helps manage permissions more efficiently by applying permissions to a group rather than individual users.

147
Q

Define Multi-Factor Authentication (MFA) in the context of IAM best practices.

A

MFA adds an extra layer of security by requiring users to provide two or more verification factors to access an account, enhancing security beyond just a password.

148
Q

How can you audit permissions in your AWS account according to IAM best practices?

A

You can audit permissions by using IAM Credentials Report and IAM Access Advisor to review and analyze the permissions assigned to users and roles in your AWS account.

149
Q

Describe the Shared Responsibility Model for IAM in the content.

A

The Shared Model for IAM involves security, configuration analysis, compliance validation on the provider’s side, and user management, MFA enforcement, key rotation, permission management, and access pattern analysis on the user’s side.

150
Q

What are some responsibilities of the user in the Shared Responsibility Model for IAM?

A

User responsibilities include managing users, groups, roles, policies, enabling MFA, rotating keys regularly, using IAM tools for permissions, and analyzing access patterns.

151
Q

How can users enhance security in IAM according to the content?

A

Users can enhance security by enabling MFA, rotating keys frequently, using IAM tools for permissions, and analyzing access patterns to review permissions.

152
Q

Define IAM in the context of the content provided.

A

IAM stands for Identity and Access Management, which involves managing user identities, their authentication, authorization, and access control to resources within a system or organization.

153
Q

Do users have a role in ensuring compliance in IAM according to the content?

A

Yes, users have a role in compliance validation in IAM by managing permissions, access patterns, and ensuring appropriate configurations to meet compliance requirements.

154
Q

Describe IAM in AWS.

A

IAM (Identity and Access Management) in AWS is a service that helps manage user access to resources securely by controlling who can use which resources and how.

155
Q

Define AWS CLI and AWS SDK.

A

AWS CLI (Command Line Interface) is a tool that allows users to interact with AWS services through commands in the terminal, while AWS SDK (Software Development Kit) enables developers to integrate AWS services into their applications using programming languages.

156
Q

How are roles used in AWS IAM?

A

Roles in AWS IAM are used to delegate permissions to entities like EC2 instances or AWS services, allowing them to access AWS resources securely without the need for long-term credentials.

157
Q

How many AZ?

A

80