AWS Course Content 1
AWS Course Content 1
AWS Course Content 1
Search:
Practice Tests
All Questions
Question 1Skipped
Question 2Skipped
Question 3Skipped
You are working for a software company that has moved a legacy application from
an on-premise data center to the cloud. The legacy application requires a static IP
address hard-coded into the backend, which blocks you from using an Application
Load Balancer. Which steps would you take to apply high availability and fault
tolerance to this application without ELB? (Choose 2)
Question 4Skipped
For the user session management of your web application, you are tasked to
implement a technical solution to consistently route the user's request to the
same EC2 instance using sticky sessions. What are the two requirements to
configure sticky sessions for your Classic Load Balancer?
Question 5Skipped
You have triggered the creation of a snapshot of your EBS volume and is currently
on-going. At this point, what are the things that the EBS volume can or cannot do?
Question 6Skipped
A startup company based in Australia is deploying a new two-tier web application
in AWS. The Australian company wants to store their most frequently used data to
AWS to improve the retrieval and response time of its web application. Which AWS
service provides a solution for the requirement?
Question 7Skipped
You are designing a multi-tier web application architecture that consists of a fleet
of EC2 instances and an Oracle relational database server. It is required that the
database is highly available and that you have full control over its underlying
operation system. Which AWS Service will you use for your database tier?
Question 8Skipped
You have a new e-commerce web application written in Angular framework which
is deployed to a fleet of EC2 instances behind an Application Load Balancer. You
configured the load balancer to perform health checks on these EC2 instances.
What will happen if one of these EC2 instances failed the health checks?
Question 9Skipped
Question 10Skipped
Your IT director assigned you the task of providing a single sign-on feature to all
of your existing users who are using on-premise web applications.How will you
implement this feature?
Question 11Skipped
Question 12Skipped
You had launched a travel photo sharing website using Amazon S3 to serve high-
quality photos to visitors of your website. After a few days, you found out that
there are other travel websites linking and using your photos. This resulted to a
loss for your business. What is an effective method to mitigate this issue?
Question 13Skipped
A media company has a workflow that sends video files from their on-premise
system to AWS for transcoding. They use a fleet of EC2 instances that pull
transcoding jobs from SQS. Why is SQS an appropriate service for this scenario?
Question 14Skipped
You are using a combination of API Gateway and Lambda for the web services of
your online web portal that is being accessed by hundreds of thousands of clients
each day. Your company will be announcing a new revolutionary product and it is
expected that your web portal will receive a massive amount of visitors all around
the globe. How can you protect your backend systems and applications from
traffic spikes?
Question 15Skipped
Which of the below AWS services allows you to run code without the need to host
it in an Elastic Compute Cloud instance?
Question 16Skipped
You are a Solutions Architect in your company working with 3 DevOps Engineers
under you. One of the engineers accidentally deleted a file hosted in Amazon S3
which has caused disruption of service. What can you do to prevent this from
happening again?
Question 17Skipped
There are a lot of outages in the Availability Zone of your RDS database instance
to the point that you have lost access to the database. What could you do to
prevent losing access to your database in case that this event happens again?
Question 18Skipped
You are working for a large financial company as an IT consultant. Your role is to
help their development team to build a highly available web application using
stateless web servers. In this scenario, which AWS services are suitable for
storing session state data? (Choose 2)
Question 19Skipped
Which of the following AWS Services can you use to build and run serverless
applications? (Choose 3)
Question 20Skipped
You have a new joiner in your orgranization. You had provisioned an IAM user for
the new employee in AWS however, the user is not able to perform any actions.
What could be the reason for this?
Question 21Skipped
Question 22Skipped
Question 23Skipped
Which of the following does not happen when you stop a running EBS-backed EC2
instance?
Question 24Skipped
Which service can help you manage the budgets for all your AWS resources?
Question 25Skipped
You are trying establish an SSH connection to a newly created Amazon EC2
instance using the PuTTY tool. However, you are getting the following error
message: Error: No supported authentication methods availableWhat steps should
you take to fix this issue? (Choose 2)
Question 26Skipped
In monitoring your EC2 instance, what is the time period of data that Amazon
CloudWatch receives and aggregates from EC2 by default?
Question 27Skipped
Question 28Skipped
Which of the following statements are correct regarding EBS volumes and
snapshots? (Choose 3)
Question 29Skipped
Which of the following launches a number of Amazon EC2 instances as part of its
service and then allows the customer to retain full admin privileges of those
underlying EC2 instances?
Question 30Skipped
You have one security group associated with 10 On-Demand EC2 instances. You
configured the security group to allow all inbound SSH traffic and then right after
that, you created two new EC2 instances in the same security group. When will be
the changes be applied to the EC2 instances?
Question 31Skipped
The company that you are working for has a highly available architecture,
consisting of an elastic load balancer and several EC2 instances configured with
auto-scaling in three Availability Zones. You want to monitor your EC2 instances
based on a particular metric, which is not readily available in CloudWatch. Which
of the following is a custom metric in CloudWatch which you have to manually
setup?
Question 32Skipped
Question 33Skipped
In your AWS VPC, you need to add a new subnet that will allow you to host a total
of 20 EC2 instances. Which of the following IPv4 CIDR block can you use for this
scenario?
Question 34Skipped
In Amazon Kinesis Data Firehose, which service can you load streaming data into?
Question 35Skipped
Question 36Skipped
What combination of the following options will protect the S3 objects in your
bucket from both accidental deletion and accidental overwriting? (Choose 2)
Question 37Skipped
You have a web application deployed in AWS which is currently running in the eu-
central-1 region. Your EC2 instances are using pre-built AMIs. Your manager
instructed you to implement a disaster recovery of your system so in the event
that the application goes down in the eu-central-1 region, a new instance can be
started in the us-west-2 region.As part of your disaster recovery plan, which of the
following should you take into consideration?
Question 38Skipped
Which AWS service is is a fully managed, highly available, in-memory cache that
can reduce Amazon DynamoDB response times from milliseconds to
microseconds?
Question 39Skipped
You have launched a new enterprise application with a web server and a
database. You are using an EC2 Instance with one 500 GB EBS volume to host a
relational database. Upon checking the performance, it shows that write
throughput to the database needs to be increased. Which of the following
approaches can help you achieve this? (Choose 2)
Question 40Skipped
In a government agency that you are working for, you have been assigned a task
to put confidential tax documents on AWS cloud. However, there is a concern
from a security perspective on what can be put on AWS. What are the features in
AWS that can ensure data security to your confidential documents? (Choose 3)
Question 41Skipped
You are working for a large pharmaceutical company that has resources hosted
on both their on-premise network and in AWS cloud. They want all of their
Software Architects to access resources on both environments using their on-
premise credentials, which is stored in Active Directory. In this scenario, which of
the following can be used to fulfill this requirement?
Question 42Skipped
Question 43Skipped
You are working as a Solution Architect in a new startup that provides storage for
high-quality photos. You developed a cloud service that uses RRS storage type on
Amazon S3 for free users and S3 standard storage type for premium users. When
you manager found out about this, he asked you the trade-offs of using RRS
instead of the Standard storage type. What will you say to your manager?
Question 44Skipped
Question 45Skipped
You have a new VPC with private and public subnets. You will be creating a new
mySQL database server. In which subnet should you launch the new database
server into?
Question 46Skipped
Question 47Skipped
You have created an EBS-Backed EC2 instance with ephemeral0 and ephemeral1
instance store volumes attached. If that instance is stopped, what will happen to
the data of the ephemeral store volumes?
Question 48Skipped
You are building the development, testing, UAT, and production enviroment of
your company's new cloud infrastructure. All of the environments will only be
under one VPC. In this scenario, how can you categorize your EC2 resources in
different ways such as by purpose, owner, or environment?
Question 49Skipped
In Amazon SNS, what are the different delivery formats or transports available for
receiving notifications? (Choose 3)
Question 50Skipped
Which of the following AWS services allow you to access the underlying operating
system for the resource? (Choose 2)
Question 51Skipped
In the VPC that you are managing, it has one EC2 instance that have its data
stored in an instance store. The instance was shut down by a 2nd level support
staff over the weekend to save costs. When you arrived in the office the next
Monday, you noticed that all data is lost and is no longer available on the EC2
instance. What might be the cause of this?
Question 52Skipped
You have a requirement to make sure that an On-Demand EC2 instance can only
be accessed from this IP address (110.238.98.71) via an SSH connection. Which
configuration below will satisfy this requirement?
Question 53Skipped
Question 54Skipped
What happens when an EC2 instance behind an ELB fails a health check?
Question 55Skipped
What is the AWS Lambda resource limit for the amount of ephemeral disk capacity
allocated per invocation?
Question 56Skipped
A tech company that you are working for has undertaken a Total Cost Of
Ownership (TCO) analysis evaluating the use of Amazon S3 versus acquiring more
storage hardware. The result was that all 1200 employees would be granted
access to use Amazon S3 for storage of their personal documents. Which of the
following will you need to consider so you can set up a solution that incorporates
single sign-on feature from your corporate AD or LDAP directory and also restricts
access for each individual user to a designated user folder in an S3 bucket?
(Choose 3)
Question 57Skipped
You have a web application hosted in EC2 that consumes messages from an SQS
queue and is integrated with SNS to send out an email to you once the process is
complete. You received 5 orders but after a few hours, you saw more than 20
email notifcations in your inbox. Which of the following could be the possible
culprit for this issue?
Question 58Skipped
Question 59Skipped
Question 60Skipped
Question 61Skipped
How many types of block devices does Amazon Elastic Compute Cloud service
support?
Question 62Skipped
Question 63Skipped
Question 64Skipped
You have acquired a new EC2 Spot Instance at a bid of $0.03/hr. However, the
Spot price increases to $0.05/hr after 40 minutes. What was the total EC2
compute cost of running your Spot Instance for that hour?
Question 65Skipped
Which AWS service provides an easy and cost-effective way to distribute content
across all parts of the globe with low latency and high data transfer speeds?
AWS Certified Solutions Architect Associate Practice Test 1 - Results
Return to Review
Correct92.3%
Attempt 2
All Knowledge Areas
All Questions
Question 1: Correct
Which of the following is the best method to quickly and temporarily deny
access from the specified IP addresses?
Modify the Network Access Control List associated with all public
subnets in the VPC to deny access from the IP Address block.
(Correct)
Add a rule in the Security Group of the EC2 instances to deny access from
the IP Address block.
Explanation
To control the traffic coming in and out of your VPC network, you can use
the network access control list (ACL). It is an optional layer of security
for your VPC that acts as a firewall for controlling traffic in and out of one
or more subnets. This is the best solution among other options as you can
easily add and remove the restriction in a matter of minutes.
Option 1 is incorrect as an IAM policy does not control the inbound and
outbound traffic of your VPC.
References:
http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html
Question 2: Correct
Memory utilization
disk swap utilization
(Correct)
Explanation
CloudWatch has available Amazon EC2 Metrics for you to use for
monitoring CPU utilization, Network utilization, Disk performance and
Disk Reads/Writes. In case that you need to monitor the below items, you
need to prepare a custom metric using a Perl or other shell script, as
there are no ready to use metrics for these:
Memory utilization
disk swap utilization
disk space utilization
page file utilization
log collection
References:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/
monitoring_ec2.html
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/mon-
scripts.html#using_put_script
Question 3: Correct
You are working for a software company that has moved a legacy
application from an on-premise data center to the cloud. The legacy
application requires a static IP address hard-coded into the backend,
which blocks you from using an Application Load Balancer.
Which steps would you take to apply high availability and fault tolerance
to this application without ELB? (Choose 2)
Write a script that checks the health of the EC2 instance. If the instance
stops responding, the script will switch the elastic IP address to a
standby EC2 instance.
(Correct)
(Correct)
Postpone the deployment until you have fully converted the application to
work with the ELB and Auto Scaling.
Launch the instance using Auto Scaling which will deploy the instance
again if it becomes unhealthy.
Option 4 is incorrect as even though the Auto Scaling group provides high
availability and scalability, it still depends on ELB which is not available
in this scenario.
Resources:
https://aws.amazon.com/articles/leveraging-multiple-ip-addresses-for-
virtual-ip-address-fail-over-in-6-simple-steps/
Question 4: Correct
For the user session management of your web application, you are tasked
to implement a technical solution to consistently route the user's request
to the same EC2 instance using sticky sessions. What are the two
requirements to configure sticky sessions for your Classic Load
Balancer?
An HTTP/HTTPS load balancer and at least one healthy instance in each
Availability Zone.
(Correct)
The key to managing sticky sessions is to determine how long your load
balancer should consistently route the user's request to the same
instance. If your application has its own session cookie, then you can
configure Elastic Load Balancing so that the session cookie follows the
duration specified. If your application does not have its own session
cookie, then you can configure Elastic Load Balancing to create a session
cookie by specifying your own stickiness duration.
Take note that these 2 types of EC2 instances are NOT required when you
want to implement the sticky session. They are mainly used to improve
the performance of the your EC2 instances but not necessarily helpful for
the aformentioned feature.
References:
https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-
sticky-sessions.html
Question 5: Correct
You have triggered the creation of a snapshot of your EBS volume and is
currently on-going. At this point, what are the things that the EBS volume
can or cannot do?
(Correct)
The volume can be used in read-only mode while the snapshot is in
progress.
Explanation
Snapshots occur asynchronously which means that the point-in-time
snapshot is created immediately, but the status of the snapshot
is pending until the snapshot is complete (when all of the modified blocks
have been transferred to Amazon S3), which can take several hours for
large initial snapshots or subsequent snapshots where many blocks have
changed. While it is completing, an in-progress snapshot is not affected
by ongoing reads and writes to the volume hence, you can still use the
volume.
References:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-creating-
snapshot.html
Question 6: Correct
Amazon RDS for MySQL with Multi-AZ
Amazon ElastiCache
(Correct)
Amazon Kinesis
Amazon Redshift
Explanation
Amazon ElastiCache is a web service that makes it easy to deploy,
operate, and scale an in-memory data store or cache in the cloud. The
service improves the performance of web applications by allowing you to
retrieve information from fast, managed, in-memory data stores, instead
of relying entirely on slower disk-based databases
Option 2 is incorrect because the Multi-AZ option for RDS is mainly used
to set up applications with high availability and not for data storage of
frequently used data.
References:
https://aws.amazon.com/elasticache/
Question 7: Incorrect
Which AWS Service will you use for your database tier?
Amazon RDS
(Incorrect)
(Correct)
Explanation
To achieve this requirement, you can deploy your Oracle database to
Amazon EC2 instances with data replication between two different
Availability Zones. Hence, option 4 is the correct answer. The deployment
of this architecture can easily be achieved by using Cloudformation and
Quick Start. Please refer to the reference link for information.
The Quick Start deploys the Oracle primary database (using the
preconfigured, general-purpose starter database from Oracle) on an
Amazon EC2 instance in the first Availability Zone. It then sets up a
second EC2 instance in a second Availability Zone, copies the primary
database to the second instance by using the DUPLICATE command, and
configures Oracle Data Guard.
Options 1 and 2 are incorrect because the scenario requires you to have
access to the underlying operating system of the database server.
Remember that Amazon RDS is a managed database service, which
means that Amazon is the one that manages the underlying operating
system of the database instance and not you.
Option 3 is incorrect since deploying to just one Availability Zone (AZ) will
not make the database tier highly available. If that AZ went down, your
database will be unavailable.
References:
https://aws.amazon.com/quickstart/
https://docs.aws.amazon.com/quickstart/latest/oracle-database/
architecture.html
http://docs.aws.amazon.com/dms/latest/userguide/
CHAP_Introduction.ReplicationInstance.html
Question 8: Correct
What will happen if one of these EC2 instances failed the health checks?
The EC2 instance gets quarantined by the Application Load Balancer for
root cause analysis.
The Application Load Balancer stops sending traffic to the instance that
failed its health check.
(Correct)
Explanation
In case that one of the EC2 instances failed a health check, the
Application Load Balancer stops sending traffic to that instance.
References:
http://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-
healthchecks.html
Question 9: Correct
Elastic Beanstalk
(Correct)
EC2
(Correct)
DynamoDB
RDS
Explanation
You can connect and manage the EC2 instance so Option 2 is correct.
You can install new packages and perform changes on the underlying
infrastructure of the EC2 instance such as Enhanced Networking,
Encryption, and so forth.
Resources:
https://docs.aws.amazon.com/elasticbeanstalk/latest/dg/Welcome.html
Question 10: Incorrect
(Incorrect)
(Correct)
Explanation
You can authenticate users in your organization's network and then
provide those users access to AWS without creating new AWS identities
for them and requiring them to sign in with a separate user name and
password.
You can also use SAML 2.0 to manage your own solution for federating
user identities.
References:
https://docs.aws.amazon.com/IAM/latest/UserGuide/
id_credentials_temp.html
What step would you take to configure the instances in another region?
Create an AMI of the EC2 instance and copy the AMI to the desired region
(Correct)
Use IAM permissions to make the EC2 instance shareable among other
regions
Explanation
You can copy an Amazon Machine Image (AMI) within or across an AWS
region using the AWS Management Console, the AWS command line tools
or SDKs, or the Amazon EC2 API, all of which support
the CopyImage action. You can copy both Amazon EBS-backed AMIs and
instance store-backed AMIs. You can copy encrypted AMIs and AMIs with
encrypted snapshots.
Copying a source AMI results in an identical but distinct target AMI with
its own unique identifier. In the case of an Amazon EBS-backed AMI, each
of its backing snapshots is, by default, copied to an identical but distinct
target snapshot. (The one exception is when you choose to encrypt the
snapshot.) You can change or deregister the source AMI with no effect on
the target AMI. The reverse is also true.
There are no charges for copying an AMI. However, standard storage and
data transfer rates apply.
References:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/CopyingAMIs.html
Configure your S3 bucket to remove public read access and use pre-
signed URLs with expiry dates.
(Correct)
Explanation
In Amazon S3, all objects by default are private. Only the object owner
has permission to access these objects. However, the object owner can
optionally share objects with others by creating a pre-signed URL, using
their own security credentials, to grant time-limited permission to
download the objects.
When you create a pre-signed URL for your object, you must provide your
security credentials, specify a bucket name, an object key, specify the
HTTP method (GET to download the object) and expiration date and time.
The pre-signed URLs are valid only for the specified duration.
Anyone who receives the pre-signed URL can then access the object. For
example, if you have a video in your bucket and both the bucket and the
object are private, you can share the video with others by generating a
pre-signed URL.
References:
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/
private-content-signed-urls.html
A media company has a workflow that sends video files from their on-
premise system to AWS for transcoding. They use a fleet of EC2 instances
that pull transcoding jobs from SQS.
(Incorrect)
(Correct)
Explanation
Option 4 is correct. Horizontal scaling means increasing the number of
your message producers (making SendMessage requests) and consumers
(making ReceiveMessage and DeleteMessage requests) in order to
increase your overall queue throughput. You can scale horizontally by
increasing the number of threads on a client, adding clients, or both. You
should achieve essentially linear gains in queue throughput as you add
more clients. For example, if you double the number of clients, you can
get twice the throughput.
References:
https://docs.aws.amazon.com/AWSSimpleQueueService/latest/
SQSDeveloperGuide/sqs-throughput-horizontal-scaling-and-batching.html
(Correct)
API Gateway will automatically scale and handle massive traffic spikes
so you do not have to do anything.
Amazon API Gateway tracks the number of requests per second. Any
requests over the limit will receive a 429 HTTP response. The client SDKs
generated by Amazon API Gateway retry calls automatically when met
with this response.
Option 2 is incorrect because although it can scale using AWS Edge
locations, you still need to configure the throttling to further manage the
bursts of your APIs.
Option 3 is incorrect because API Gateway is a fully managed service and
hence, you do not have access to its underlying resources.
Option 4 is incorrect because RDS has Multi-AZ and Read Replica
capabilities, and not API Gateway
Resources:
https://aws.amazon.com/api-gateway/faqs/#Throttling_and_Caching
Which of the below AWS services allows you to run code without the need
to host it in an Elastic Compute Cloud instance?
AWS Lambda
(Correct)
AWS IoT
AWS SQS
AWS SES
Explanation
AWS Lambda lets you run code without provisioning or managing servers.
You pay only for the compute time you consume - there is no charge when
your code is not running.
With Lambda, you can run code for virtually any type of application or
backend service - all with zero administration. Just upload your code and
Lambda takes care of everything required to run and scale your code with
high availability. You can set up your code to automatically trigger from
other AWS services or call it directly from any web or mobile app.
References:
https://aws.amazon.com/lambda/
(Correct)
Explanation
To avoid accidental deletion in Amazon S3 bucket, you can:
Enable Versioning
Enable MFA (Multi-Factor Authentication) Delete
References:
http://docs.aws.amazon.com/AmazonS3/latest/dev/Versioning.html
There are a lot of outages in the Availability Zone of your RDS database
instance to the point that you have lost access to the database. What
could you do to prevent losing access to your database in case that this
event happens again?
Enabled Multi-AZ failover
(Correct)
Explanation
Amazon RDS Multi-AZ deployments provide enhanced availability and
durability for Database (DB) Instances, making them a natural fit for
production database workloads. When you provision a Multi-AZ DB
Instance, Amazon RDS automatically creates a primary DB Instance and
synchronously replicates the data to a standby instance in a different
Availability Zone (AZ). Each AZ runs on its own physically distinct,
independent infrastructure, and is engineered to be highly reliable.
Resources:
https://aws.amazon.com/rds/details/multi-az/
EC2
DynamoDB
(Correct)
S3
ElastiCache
(Correct)
Glacier
Redshift
Explanation
You can store session state data on both DynamoDB and ElastiCache.
These AWS services provide high performance storage of key-value pairs
which can be used to build a highly available web application.
References:
https://aws.amazon.com/caching/database-caching/
https://aws.amazon.com/caching/session-management/
Which of the following AWS Services can you use to build and run
serverless applications? (Choose 3)
(Correct)
AWS Lambda
(Correct)
AWS DynamoDB
(Correct)
AWS EC2
Explanation
AWS provides a set of fully managed services such as Lambda, API
Gateway, DynamoDB and many others that you can use to build and run
serverless applications. Serverless applications don’t require
provisioning, maintaining, and administering servers for backend
components such as compute, databases, storage, stream processing,
message queueing, and more.
You also no longer need to worry about ensuring application fault
tolerance and availability. Instead, AWS handles all of these capabilities
for you. This allows you to focus on product innovation while enjoying
faster time-to-market.
References:
https://aws.amazon.com/serverless/
You have a new joiner in your orgranization. You had provisioned an IAM
user for the new employee in AWS however, the user is not able to
perform any actions. What could be the reason for this?
(Correct)
You need to wait for 24 hours for the new IAM user to have access.
Explanation
The reason for this issue is that IAM users are created with no
permissions by default. That means that when you created the new IAM
user, you might not provisioned any permissions to the user. Hence,
option 3 is correct and conversely, options 1 and 2 are wrong.
Option 4 is incorrect because provisions are applied immediately, and not
after 24 hours.
The IAM user might need to make API calls or use the AWS CLI or the
Tools for Windows PowerShell. In that case, create an access key (an
access key ID and a secret access key) for that user. This is called
Programmatic access.
If the user needs to access AWS resources from the AWS Management
Console, create a password and provide it to the user.
References:
https://aws.amazon.com/iam/details/manage-users/
(Correct)
(Correct)
It runs in a VPC on hardware that's dedicated to a single customer.
(Correct)
Explanation
RIs provide you with a significant discount (up to 75%) compared to On-
Demand instance pricing. You have the flexibility to change families, OS
types, and tenancies while benefitting from RI pricing when you use
Convertible RIs. One important thing to remember here is that Reserved
Instances are not physical instances, but rather a billing discount
applied to the use of On-Demand Instances in your account.
When your computing needs change, you can modify your Standard or
Convertible Reserved Instances and continue to take advantage of the
billing benefit. You can modify the Availability Zone, scope, network
platform, or instance size (within the same instance type) of your
Reserved Instance. You can also sell your unused instance on the
Reserved Instance Marketplace.
Option 1 is correct because you can sell your unused instances in the
Reserved Instance Marketplace.
Option 2 is wrong because you can indeed modify the Availability Zone,
scope, network platform, or instance size of your Reserved Instance as
long as it is within the same instance type.
References:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ri-modifying.html
https://aws.amazon.com/ec2/pricing/reserved-instances/
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-reserved-
instances.html
https://stackoverflow.com/questions/30873849/use-reserved-instance-and-
autoscaling-group
The SDK
The Console
Explanation
AWS CloudTrail is a service that enables governance, compliance,
operational auditing, and risk auditing of your AWS account. With
CloudTrail, you can log, continuously monitor, and retain account activity
related to actions across your AWS infrastructure.
Resources:
https://aws.amazon.com/cloudtrail/
Which of the following does not happen when you stop a running EBS-
backed EC2 instance?
Any Amazon EBS volumes remain attached to the instance, and their data
persists.
Any data stored in the RAM of the host computer or the instance store
volumes of the host computer are gone.
(Correct)
Explanation
All of the options are correct except for option 4. The instance retains its
associated Elastic IP addresses if it is in the EC2-VPC platform and not
on EC2-Classic.
-The instance performs a normal shutdown and stops running; its status
changes to stopping and then stopped .
-Any Amazon EBS volumes remain attached to the instance, and their
data persists.
-Any data stored in the RAM of the host computer or the instance store
volumes of the host computer are gone.
-In most cases, the instance is migrated to a new underlying host
computer when it's started.
-EC2-Classic: AWS releases the public and private IPv4 addresses for the
instance when you stop the instance, and assign new ones when you
restart it.
-EC2-VPC: The instance retains its private IPv4 addresses and any IPv6
addresses when stopped and restarted. AWS releases the public IPv4
address and assign a new one when you restart it.
-EC2-Classic: AWS disassociates any Elastic IP address that's associated
with the instance. You're charged for Elastic IP addresses that aren't
associated with an instance. When you restart the instance, you must
associate the Elastic IP address with the instance; AWS doesn't do this
automatically.
-EC2-VPC: The instance retains its associated Elastic IP addresses.
You're charged for any Elastic IP addresses associated with a stopped
instance
References:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Stop_Start.html
Question 24: Correct
Which service can help you manage the budgets for all your AWS
resources?
Cost Explorer
AWS Budgets
(Correct)
Payment History
Explanation
AWS Budgets gives you the ability to set custom budgets that alert you
when your costs or usage exceed (or are forecasted to exceed) your
budgeted amount.
Budgets can be tracked at the monthly, quarterly, or yearly level, and you
can customize the start and end dates. You can further refine your budget
to track costs associated with multiple dimensions, such as AWS service,
linked account, tag, and others. Budget alerts can be sent via email
and/or Amazon Simple Notification Service (SNS) topic.
You can also use AWS Budgets to set a custom reservation utilization
target and receive alerts when your utilization drops below the threshold
you define. RI utilization alerts support Amazon EC2, Amazon RDS,
Amazon Redshift, and Amazon ElastiCache reservations.
Budgets can be created and tracked from the AWS Budgets dashboard or
via the Budgets API.
References:
https://aws.amazon.com/aws-cost-management/aws-budgets/
Verify if your private key (.pem) file has been correctly converted to the
format recognized by PuTTY (.ppk).
(Correct)
Verify that your IAM user policy has permission to launch Amazon EC2
instances.
Verify that you are connecting with the appropriate user name for your
AMI such as ec2-user for Linux AMI, centos for Centos AMI or admin for
Debian AMI
(Correct)
Verify that the Amazon EC2 Instance was launched with the proper IAM
role.
Verify that you had waited at least 1 hour after the EC2 instance was
created before connecting via SSH.
Verify that the Enable SSH Connection feature is enabled in EC2 instance.
Explanation
If you use PuTTY to connect to your instance via SSH and get either of
the following errors, Error: Server refused our key or Error: No supported
authentication methods available , verify that you are connecting with the
appropriate user name for your AMI. Enter the user name in the User
name box in the PuTTY Configuration window.
You should also verify that your private key (.pem) file has been correctly
converted to the format recognized by PuTTY (.ppk).
Options 2 and 4 are incorrect because both an IAM user and IAM role
policy have nothing to do with this issue.
Option 5 is incorrect because you don't need to wait an hour in order to
connect to a new EC2 instance as you can immediately connect to it once
it is created.
Resources:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/
TroubleshootingInstancesConnecting.html#TroubleshootingInstancesCon
nectingPuTTY
In monitoring your EC2 instance, what is the time period of data that
Amazon CloudWatch receives and aggregates from EC2 by default?
One second
Five seconds
One minute
Three minutes
Five minutes
(Correct)
Explanation
By default, your instance is enabled for basic monitoring. You can
optionally enable detailed monitoring. After you enable detailed
monitoring, the Amazon EC2 console displays monitoring graphs with a 1-
minute period for the instance. The following table describes basic and
detailed monitoring for instances.
References:
https://aws.amazon.com/cloudwatch/faqs/
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-
cloudwatch-new.html
There is no additional charge for AWS CloudFormation. You only pay for
the AWS resources that are created.
(Correct)
The cost is based on the file size of the template.
Explanation
There is no additional charge for AWS CloudFormation. You only pay for
the AWS resources that are created (e.g. Amazon EC2 instances, Elastic
Load Balancing load balancers, etc.)
References:
https://aws.amazon.com/cloudformation/faqs/
Which of the following statements are correct regarding EBS volumes and
snapshots? (Choose 3)
(Correct)
You can change the size of the volume even when it is attached to an
instance.
(Correct)
You can only change the size of the volume if it is not attached to an
instance.
(Correct)
Explanation
If your current-generation Amazon EBS volume is attached to a current-
generation EC2 instance type, you can increase its size, change its
volume type, or (for an io1 volume) adjust its IOPS performance, all
without detaching it from the instance. You can apply these changes to
detached volumes as well.
References:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-modify-
volume.html
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/
EBSSnapshots.html
(Correct)
Amazon ElastiCache
Amazon DynamoDB
Explanation
Amazon EMR is a web service that enables businesses, researchers, data
analysts, and developers to easily and cost-effectively process vast
amounts of data. It utilizes a hosted Hadoop framework running on the
web-scale infrastructure of Amazon Elastic Compute Cloud (Amazon EC2)
and Amazon Simple Storage Service (Amazon S3).
This means that Amazon EMR launches a number of EC2 instances for its
Hadoop data processing engine. These created EC2 instances are
accessible and manageable by the customer, including full administrative
privileges.
References:
https://aws.amazon.com/emr/faqs/
(Correct)
(Incorrect)
Immediately to the new instances, but not for the old ones which must be
restarted before the changes take effect.
The changes will apply to all 12 instances after an hour when the
propagation is complete.
Explanation
Changes made in a Security Group is immediately implemented to all
associated EC2 instances.
References:
http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/
VPC_SecurityGroups.html
The company that you are working for has a highly available architecture,
consisting of an elastic load balancer and several EC2 instances
configured with auto-scaling in three Availability Zones. You want to
monitor your EC2 instances based on a particular metric, which is not
readily available in CloudWatch. Which of the following is a custom metric
in CloudWatch which you have to manually setup?
Explanation
CloudWatch has available Amazon EC2 Metrics for you to use for
monitoring CPU utilization, Network utilization, Disk performance and
Disk Reads/Writes. In case that you need to monitor the below items, you
need to prepare a custom metric using a Perl or other shell script, as
there are no ready to use metrics for these:
Memory utilization
disk swap utilization
disk space utilization
page file utilization
log collection
References:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/
monitoring_ec2.html
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/mon-
scripts.html#using_put_script
Service-based
(Correct)
Explanation
There are 2 types of policies in IAM:
1. Identity-Based Policies
2. Resource-Based Policies
References:
http://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
Which of the following IPv4 CIDR block can you use for this scenario?
172.0.0.0/27
(Correct)
172.0.0.0/28
172.0.0.0/29
172.0.0.0/30
Explanation
Options 3 and 4 are incorrect as the only allowed block size is between a
/28 netmask and /16 netmask.
To add a CIDR block to your VPC, the following rules apply:
The allowed block size is between a /28 netmask and /16 netmask.
The CIDR block must not overlap with any existing CIDR block that's
associated with the VPC.
You cannot increase or decrease the size of an existing CIDR block.
You have a limit on the number of CIDR blocks you can associate with a
VPC and the number of routes you can add to a route table. You cannot
associate a CIDR block if this results in you exceeding your limits.
The CIDR block must not be the same or larger than the CIDR range of a
route in any of the VPC route tables. For example, if you have a route with
a destination of 10.0.0.0/24 to a virtual private gateway, you cannot
associate a CIDR block of the same range or larger. However, you can
associate a CIDR block of 10.0.0.0/25 or smaller.
The first four IP addresses and the last IP address in each subnet CIDR
block are not available for you to use, and cannot be assigned to an
instance.
References:
http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/
VPC_Subnets.html
In Amazon Kinesis Data Firehose, which service can you load streaming
data into?
Amazon S3
Amazon Redshift
Amazon Elasticsearch Service
Splunk
(Correct)
Explanation
Amazon Kinesis Data Firehose is the easiest way to load streaming data
into data stores and analytics tools. It can capture, transform, and load
streaming data into Amazon S3, Amazon Redshift, Amazon Elasticsearch
Service, and Splunk, enabling near real-time analytics with existing
business intelligence tools and dashboards you’re already using today.
References:
https://aws.amazon.com/kinesis/data-firehose/
(Correct)
Explanation
Amazon EBS-backed instances can be stopped and restarted unlike
Amazon Instance Store-Backed instances which cannot be stopped. An
Instance Store-Backed instance is either running or terminated. Hence,
option 1 is correct and conversely, option 2 is incorrect.
References:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/
ComponentsAMIs.html
Enable Versioning
(Correct)
Enable S3 RRS
(Correct)
Explanation
By using Versioning and enabling MFA (Multi-Factor Authentication)
Delete, you can secure and recover your S3 objects from accidental
deletion or overwrite.
References:
https://docs.aws.amazon.com/AmazonS3/latest/dev/Versioning.html
As part of your disaster recovery plan, which of the following should you
take into consideration?
In the AMI dashboard, add the us-west-2 region to the Network Access
Control List which contains the regions that are allowed to use the AMI.
Copy the AMI from the eu-central-1 region to the us-west-2 region.
Afterwards, change the Auto Scaling groups in the us-west-2 region to
use this new AMI ID.
(Correct)
None. AMIs can be used in any region hence, there is no problem using it
in the us-west-2 region.
Explanation
In this scenario, the EC2 instances you are currently using depends on a
pre-built AMI. This AMI is not accessible to another region hence, you
have to copy it to the us-west-2 region to properly establish your disaster
recovery instance.
You can copy an Amazon Machine Image (AMI) within or across an AWS
region using the AWS Management Console, the AWS command line tools
or SDKs, or the Amazon EC2 API, all of which support
the CopyImage action. You can copy both Amazon EBS-backed AMIs and
instance store-backed AMIs. You can copy encrypted AMIs and AMIs with
encrypted snapshots.
Options 1 and 3 are incorrect because the AMI does not have a Network
Access Control nor a Share functionality.
References:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/CopyingAMIs.html
(Correct)
Explanation
Amazon DynamoDB Accelerator (DAX) is a fully managed, highly available,
in-memory cache that can reduce Amazon DynamoDB response times
from milliseconds to microseconds, even at millions of requests per
second.
References:
https://aws.amazon.com/dynamodb/
Which of the following approaches can help you achieve this? (Choose 2)
(Correct)
Place the instance that hosts the database in an Auto Scaling Group
(Correct)
Explanation
The goal here is to increase the write performance of the database
hosted in an EC2 instance. You can achieve this by either setting up a
standard RAID configuration or simply by increasing the size of the EC2
instance.
Some EC2 instance types can drive more I/O throughput than what you
can provision for a single EBS volume. You can join
multiple gp2 , io1 , st1 , or sc1 volumes together in a RAID 0
configuration to use the available bandwidth for these instances.
With Amazon EBS, you can use any of the standard RAID configurations
that you can use with a traditional bare metal server, as long as that
particular RAID configuration is supported by the operating system for
your instance. This is because all RAID is accomplished at the software
level. For greater I/O performance than you can achieve with a single
volume, RAID 0 can stripe multiple volumes together; for on-instance
redundancy, RAID 1 can mirror two volumes together.
References:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/raid-config.html
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/
EBSPerformance.html
In a government agency that you are working for, you have been assigned
a task to put confidential tax documents on AWS cloud. However, there is
a concern from a security perspective on what can be put on AWS.
What are the features in AWS that can ensure data security to your
confidential documents? (Choose 3)
EBS Encyption
(Correct)
S3 Server-Side Encryption
(Correct)
S3 Client-Side Encryption
(Correct)
Explanation
You can secure the privacy of your data in AWS, both at rest and in-
transit, through encryption. If your data is stored in EBS Volumes, you can
enable EBS Encryption and if it is stored on Amazon S3, you can enable
client-side and server-side encryption.
Resources:
https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingEncryption.html
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/
EBSEncryption.html
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-public-data-
sets.html
You are working for a large pharmaceutical company that has resources
hosted on both their on-premise network and in AWS cloud. They want all
of their Software Architects to access resources on both environments
using their on-premise credentials, which is stored in Active Directory.
(Correct)
Use S3
Explanation
Since the company is using Microsoft Active Directory which
implements Security Assertion Markup Language (SAML), you can set
up a SAML-Based Federation for API Access to your AWS cloud. In this
way, you can easily connect to AWS using the login credentials of your
on-premise network.
AWS supports identity federation with SAML 2.0, an open standard that
many identity providers (IdPs) use. This feature enables federated single
sign-on (SSO), so users can log into the AWS Management Console or call
the AWS APIs without you having to create an IAM user for everyone in
your organization. By using SAML, you can simplify the process of
configuring federation with AWS, because you can use the IdP's service
instead of writing custom identity proxy code.
References:
http://docs.aws.amazon.com/IAM/latest/UserGuide/
id_roles_providers_saml.html
You are only using an On-Demand EC2 instance which is exactly the same
price as Spot instance.
Transferring data from an EC2 instance to an S3 bucket in the same
region has no cost at all.
(Correct)
You are only using an On-Demand EC2 instance so the cost will be lower
than a Spot instance.
Explanation
Transferring data from an EC2 instance to Amazon S3, Amazon Glacier,
Amazon DynamoDB, Amazon SES, Amazon SQS, or Amazon SimpleDB in
the same AWS Region has no cost at all. Refer to the Amazon EC2 Pricing
on the link below for reference.
References:
https://aws.amazon.com/ec2/pricing/on-demand/#Data_Transfer
(Correct)
Explanation
Reduced Redundancy Storage (RRS) is an Amazon S3 storage option that
enables customers to store noncritical, reproducible data at lower levels
of redundancy than Amazon S3’s standard storage. It provides a highly
available solution for distributing or sharing content that is durably stored
elsewhere, or for storing thumbnails, transcoded media, or other
processed data that can be easily reproduced. The RRS option stores
objects on multiple devices across multiple facilities, providing 400 times
the durability of a typical disk drive, but does not replicate objects as
many times as standard Amazon S3 storage.
References:
https://aws.amazon.com/s3/reduced-redundancy/
(Correct)
IAM Groups
IAM Roles
(Correct)
IAM Users
Explanation
Considering the company is using a corporate Active Directory, it is best
to use AWS Directory Service AD Connector for easier integration. In
addition, since the roles are already assigned using groups in the
corporate Active Directory, it would be better to also use IAM Roles.
References:
https://aws.amazon.com/blogs/security/how-to-connect-your-on-premises-
active-directory-to-aws-using-ad-connector/
You have a new VPC with private and public subnets. You will be creating
a new mySQL database server. In which subnet should you launch the
new database server into?
(Correct)
Explanation
In an ideal and secure VPC architecture, you launch the web servers or
elastic load balancers in the public subnet and the database servers in
the private subnet. If you launch your database server in the public
subnet, it will be publicly accessible all over the Internet which has a
higher security risk. Hence, it is better to launch your database in the
private subnet.
References:
https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/
VPC_Scenario2.html
(Correct)
Explanation
When you create or modify your DB instance to run as a Multi-AZ
deployment, Amazon RDS automatically provisions and maintains a
synchronous standby replica in a different Availability Zone. Updates to
your DB Instance are synchronously replicated across Availability Zones
to the standby in order to keep both in sync and protect your latest
database updates against DB instance failure.
References:
https://aws.amazon.com/rds/details/multi-az/
Data will be deleted.
(Correct)
Explanation
The virtual devices for instance store volumes are named as ephemeral[0-
23] . Instance types that support one instance store volume
have ephemeral0 . Instance types that support two instance store volumes
have ephemeral0 and ephemeral1 , and so on until ephemeral23
The data in an instance store persists only during the lifetime of its
associated instance. If an instance reboots (intentionally or
unintentionally), data in the instance store persists. However, data in the
instance store is lost under the following circumstances:
References:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/
InstanceStorage.html?shortFooter=true#instance-store-lifetime
wildcards
pointers
Tags
(Correct)
custom filters
Availability Zone
Explanation
Tags enable you to categorize your AWS resources in different ways, for
example, by purpose, owner, or environment. This is useful when you
have many resources of the same type — you can quickly identify a
specific resource based on the tags you've assigned to it. Each tag
consists of a key and an optional value, both of which you define. For
example, you could define a set of tags for your account's Amazon EC2
instances that helps you track each instance's owner and stack level. We
recommend that you devise a set of tag keys that meets your needs for
each resource type. Using a consistent set of tag keys makes it easier for
you to manage your resources. You can search and filter the resources
based on the tags you add.
References:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Tags.html
(Correct)
CloudFront distribution
(Correct)
(Correct)
Explanation
Amazon SNS supports notifications over multiple transport protocols in
order for customers to have broad flexibility of delivery mechanisms.
Customers can select one the following transports as part of the
subscription requests:
References:
https://aws.amazon.com/sns/faqs/
Which of the following AWS services allow you to access the underlying
operating system for the resource? (Choose 2)
Amazon RDS
(Incorrect)
Amazon EMR
(Correct)
Amazon EC2
(Correct)
DynamoDB
Explanation
Amazon EC2 provides you access to the operating system of the instance
that you created.
References:
http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/
VPC_SecurityGroups.html
In the VPC that you are managing, it has one EC2 instance that have its
data stored in an instance store. The instance was shut down by a 2nd
level support staff over the weekend to save costs. When you arrived in
the office the next Monday, you noticed that all data is lost and is no
longer available on the EC2 instance.
The EC2 instance was using an instance store hence, the data is erased
when the instance is terminated.
(Correct)
The EC2 instance was using EBS backed root volumes hence, the data is
erased when the instance is terminated.
AWS automatically erased the data due to a virus found on the EC2
instance.
Explanation
Since your are using an EC2 instance with an Instance store, the data is
ephemeral and it is expected to be erased once the instance is
terminated. You may argue that the instance was only shut down but
remember that the Operating system shutdown commands always
terminate an instance store-backed instance. That is why the right
answer is Option 1.
If you used Amazon Elastic Block Store as the storage option of your
instance, the data will exist independently of the life of your instance.
This means that you configure the EBS volume to still exist even if you
terminate your instance. If you are using an Instance Store as a storage
option, the data is ephemeral and as the name implies, your data lasts
for a very short time and would not exist once your EC2 instance is
terminated.
Resources:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-
lifecycle.html
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Storage.html
Security Group Inbound Rule: Protocol – TCP. Port Range – 22, Source
110.238.98.71/32
(Correct)
Security Group Inbound Rule: Protocol – UDP, Port Range – 22, Source
110.238.98.71/32
Security Group Inbound Rule: Protocol – TCP. Port Range – 22, Source
110.238.98.71/0
Security Group Inbound Rule: Protocol – UDP, Port Range – 22, Source
110.238.98.71/0
Explanation
The SSH protocol uses TCP and port 22. Hence, Options 2 and 4 are
incorrect as they are using UDP. Options 1 and 3 has one major difference
and that is their CIDR block
The requirement is to only allow the individual IP of the client and not the
entire network. Therefore, the proper CIDR notation should be used.
The /32 denotes one IP address and the /0 refers to the entire network.
That is why Option 4 is incorrect as it allowed the entire network instead
of a single IP.
References:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-
security.html#security-group-rules
An Elastic Load Balancer
(Correct)
(Correct)
An S3 Bucket
An EC2 instance
Create a default network access control list (ACL) and associate it with
your default VPC.
(Correct)
Explanation
In the default VPC, AWS automatically sets up the following for you:
-Create a VPC with a size /16 IPv4 CIDR block ( 172.31.0.0/16 ). This
provides up to 65,536 private IPv4 addresses.
-Create a size /20 default subnet in each Availability Zone. This provides
up to 4,096 addresses per subnet, a few of which are reserved for our use.
-Create an Internet Gateway and connect it to your default VPC.
-Create a main route table for your default VPC with a rule that sends all
IPv4 traffic destined for the Internet to the Internet gateway.
-Create a default security group and associate it with your default VPC.
-Create a default network access control list (ACL) and associate it with
your default VPC.
-Associate the default DHCP options set for your AWS account with your
default VPC.
References:
http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/default-
vpc.html
What happens when an EC2 instance behind an ELB fails a health check?
The EC2 instance gets quarantined by the ELB for root cause analysis.
(Correct)
Explanation
The load balancer routes requests only to the healthy instances. When
the load balancer determines that an instance is unhealthy, it stops
routing requests to that instance. The load balancer resumes routing
requests to the instance when it has been restored to a healthy state.
References:
https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-
healthchecks.html
What is the AWS Lambda resource limit for the amount of ephemeral disk
capacity allocated per invocation?
1 GB
256 MB
2 GiB
512 KB
512 MB
(Correct)
Explanation
The AWS Lambda resource limit for ephemeral disk capacity (/tmp space)
per invocation is 512 MB. The word ephemeral means short-lived or
temporary in the English dictionary. Hence, when you see this word in
AWS, always consider this as just a temporary memory or storage.
References:
http://docs.aws.amazon.com/lambda/latest/dg/limits.html
A tech company that you are working for has undertaken a Total Cost Of
Ownership (TCO) analysis evaluating the use of Amazon S3 versus
acquiring more storage hardware. The result was that all 1200 employees
would be granted access to use Amazon S3 for storage of their personal
documents.
Which of the following will you need to consider so you can set up a
solution that incorporates single sign-on feature from your corporate AD
or LDAP directory and also restricts access for each individual user to a
designated user folder in an S3 bucket? (Choose 3)
(Correct)
(Correct)
Use a resource tag on each folder in the S3 bucket.
(Correct)
Setup up a matching IAM user for each 1200 users in your corporate
directory that needs access to a folder in the S3 bucket.
Explanation
The question refers to one of the common scenarios for temporary
credentials in AWS. Temporary credentials are useful in scenarios that
involve identity federation, delegation, cross-account access, and IAM
roles. In this example, it is called enterprise identity
federation considering that you also need to setup a single sign-on (SSO)
capability.
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-
security.html
You have a web application hosted in EC2 that consumes messages from
an SQS queue and is integrated with SNS to send out an email to you
once the process is complete. You received 5 orders but after a few
hours, you saw more than 20 email notifcations in your inbox.
Which of the following could be the possible culprit for this issue?
The web application is set for long polling so the messages are being sent
twice.
The web application is not deleting the messages in the SQS queue after
it has processed them.
(Correct)
The web application is set to short polling so some messages are not
being picked up
Explanation
Always remember that the messages in the SQS queue will continue to
exist even after the EC2 instance has processed it, until you delete that
message.
References:
https://docs.aws.amazon.com/AWSSimpleQueueService/latest/
SQSDeveloperGuide/sqs-message-lifecycle.html
Amazon SES
Amazon Cloudtrail
Amazon CloudFront
(Correct)
Amazon S3
Explanation
Amazon CloudFront is a global content delivery network (CDN) service
that securely delivers data, videos, applications, and APIs to your viewers
with low latency and high transfer speeds. CloudFront is integrated with
AWS – both physical locations that are directly connected to the AWS
global infrastructure, as well as software that works seamlessly with
services including AWS Shield for DDoS mitigation, Amazon S3, Elastic
Load Balancing or Amazon EC2 as origins for your applications, and AWS
Lambda to run custom code close to your viewers.
Resources:
https://aws.amazon.com/cloudfront/
Create a new snapshot the current Amazon EBS volume. Restore the
snapshot to a new, encrypted Amazon EBS volume. Mount the Amazon
EBS volume.
Create and mount a new, encrypted Amazon EBS volume. Move the data
to the new volume and finally, delete the old Amazon EBS volume.
(Correct)
Unmount the EBS volume and then set the encryption attribute to true.
Afterwards, re-mount the Amazon EBS volume to the instance.
Associate the Amazon EBS volume with your AWS CloudHSM and then
remount the Amazon EBS volume.
Explanation
Amazon EBS encryption offers a simple encryption solution for your EBS
volumes without the need to build, maintain, and secure your own key
management infrastructure. When you create an encrypted EBS volume
and attach it to a supported instance type, the following types of data are
encrypted:
Option 3 is incorrect because you cannot encrypt the volume even if you
unmount the volume. Remember that encryption has to be done during
volume creation.
References:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/
EBSEncryption.html
AWS CloudFormation
(Correct)
AWS OpsWorks
Explanation
AWS CloudFormation provides a common language for you to describe
and provision all the infrastructure resources in your cloud environment.
CloudFormation allows you to use a simple text file to model and
provision, in an automated and secure manner, all the resources needed
for your applications across all regions and accounts. This file serves as
the single source of truth for your cloud environment. AWS
CloudFormation is available at no additional charge, and you pay only for
the AWS resources needed to run your applications.
References:
https://aws.amazon.com/cloudformation/
How many types of block devices does Amazon Elastic Compute Cloud
service support?
(Correct)
Explanation
A block device is a storage device that moves data in sequences of
bytes or bits (blocks). These devices support random access and
generally use buffered I/O. Examples include hard disks, CD-ROM drives,
and flash drives. A block device can be physically attached to a computer
or accessed remotely as if it were physically attached to the computer.
Amazon EC2 supports two types of block devices:
Resources:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-
security.html
(Correct)
Amazon S3
Kinesis
Lambda
CloudWatch
Explanation
AWS CloudTrail is a service that enables governance, compliance,
operational auditing, and risk auditing of your AWS account. With
CloudTrail, you can log, continuously monitor, and retain account activity
related to actions across your AWS infrastructure. CloudTrail provides
event history of your AWS account activity, including actions taken
through the AWS Management Console, AWS SDKs, command line tools,
and other AWS services. This event history simplifies security analysis,
resource change tracking, and troubleshooting.
Resources:
https://aws.amazon.com/cloudtrail/
Node.js
(Correct)
AngularJS
Java
(Correct)
Python
(Correct)
COBOL
Explanation
AWS Lambda supports Java, Node.js, C#, and Python with support for
other languages coming in the future.
References:
https://aws.amazon.com/lambda/features/
You have acquired a new EC2 Spot Instance at a bid of $0.03/hr. However,
the Spot price increases to $0.05/hr after 40 minutes.
What was the total EC2 compute cost of running your Spot Instance for
that hour?
$0.03
$0.05
$0.08
$0.00
(Correct)
Explanation
If your Spot instance is terminated or stopped by Amazon EC2 in the first
instance hour, you will not be charged for that usage. However, if you
terminate the instance yourself, you will be charged to the nearest
second. If the Spot instance is terminated or stopped by Amazon EC2 in
any subsequent hour, you will be charged for your usage to the nearest
second. If you are running on Windows and you terminate the instance
yourself, you will be charged for an entire hour.
References:
https://aws.amazon.com/ec2/faqs/
Amazon SES
Amazon Cloudtrail
Amazon CloudFront
(Correct)
Amazon S3
Explanation
Amazon CloudFront is a global content delivery network (CDN) service
that securely delivers data, videos, applications, and APIs to your viewers
with low latency and high transfer speeds. CloudFront is integrated with
AWS – both physical locations that are directly connected to the AWS
global infrastructure, as well as software that works seamlessly with
services including AWS Shield for DDoS mitigation, Amazon S3, Elastic
Load Balancing or Amazon EC2 as origins for your applications, and AWS
Lambda to run custom code close to your viewers.
Resources:
https://aws.amazon.com/cloudfront/
Retake Test
Continue
Go to Dashboard