Term
|
Definition
Perform penetration testing as performed by attackers to find any vulnerability. The organization must take an approval from AWS before performing penetration testing Perform hardening testing to find if there are any unnecessary ports open Perform SQL injection to find any DB security issues The code memory checks are generally useful when the organization wants to improve the application performance. |
|
|
Term
| In Dynamo DB, an item can have more than one attribute, true or false? |
|
Definition
|
|
Term
| A user is enabling logging on a particular bucket. Which of the below mentioned options may be best suitable to allow access to the log bucket? |
|
Definition
| grant the write permission to the Amazon S3 Log Delivery group to write access log objects to the user’s bucket |
|
|
Term
| Amazon SNS mobile push notifications, you first need an app for the mobile endpoints that uses one of the supported push notification services: |
|
Definition
|
|
Term
| What does Provisioned IOPS utilize? |
|
Definition
| optimized EBS volumes and an optimized configuration stack |
|
|
Term
| General Purpose SSD volumes |
|
Definition
| deliver within 10% of their baseline and burst performance 99% |
|
|
Term
|
Definition
| 10% of their provisioned performance 99.9% of the time in a given year |
|
|
Term
| A user has developed an application required to send the data to a NoSQL database. The user wants to decouple the process so that the application keeps processing and sending data, but does not wait for database acknowledgement. Which of the below mentioned applications helps in this scenario? |
|
Definition
| Amazon Simple Queue Service |
|
|
Term
| True or False: AWS CloudFormation allows you to create Microsoft Windows stacks. |
|
Definition
|
|
Term
| What is the best application to get instances running in the cloud from the start? |
|
Definition
| AWS Elastic Beanstalk is best suited for those groups who want to deploy and manage their applications within minutes in the AWS cloud. As a bonus, you don’t even need experience with cloud computing to get started |
|
|
Term
| Do you need to create a file system before mounting an EBS volume? True or False. |
|
Definition
|
|
Term
| What are the two ways a user can map an ELB to DNS? |
|
Definition
| 1) By creating CNAME with the existing domain name service provider or 2) By creating a record with Route 53. |
|
|
Term
|
Definition
| contains information about how to route traffic on the Internet for your domain |
|
|
Term
| alias resource record set |
|
Definition
| routes queries for your domain name to your load balancer |
|
|
Term
|
Definition
| enable you to inject information into a running workflow execution |
|
|
Term
|
Definition
| A workflow that is initiated when triggered from a parent task. |
|
|
Term
|
Definition
| allows you to record important history of the execution of SWF flows. |
|
|
Term
| What does SQS allow the user to do? |
|
Definition
| SQS allows the user to move data between distributed components of applications so they can perform different tasks without losing messages or requiring each component to be always available |
|
|
Term
| What kind of endpoints can SNS send messages to? |
|
Definition
| deliver notifications by SMS text message or email to the Amazon Simple Queue Service (SQS) queues or to any HTTP endpoint. |
|
|
Term
| Which of the following transports can a user select as part of a subscription request? |
|
Definition
| “HTTP”, “HTTPS”,”Email”, “Email-JSON”, “SQS”, “and SMS”. |
|
|
Term
| What does Cloud Formation allow the user to do? |
|
Definition
| AWS CloudFormation allows you to create Microsoft Windows stacks based on Amazon EC2 Windows Amazon Machine Images (AMIs) and provides you with the ability to install software, to use remote desktop to access your stack, and to update and configure your stack. |
|
|
Term
| Does Amazon Beanstalk support multiple run environments? True or False. |
|
Definition
|
|
Term
| What can the owner of a bucket do to make the objects another user publishes public? |
|
Definition
| An S3 object ACL is the only way to manage access to objects which are not owned by the bucket owner. An AWS account that owns the bucket can grant another AWS account permission to upload objects. |
|
|
Term
| Bob is an IAM user who has access to the EC2 services. Admin is an IAM user who has access to all the AWS services including IAM. Can Bob change his own password? |
|
Definition
| Yes, provided Admin has given access to Bob to change his password. |
|
|
Term
| What is the best way to configure an RDS instance to an ELB? |
|
Definition
| Configure the private IP to have access to the ELB. |
|
|
Term
| What are the core components of Dynamo DB? |
|
Definition
"Table", a collection of Items; "Items", with Keys and one or more Attribute; "Attribute", with Name and Value. |
|
|
Term
| Queue names characteristics? |
|
Definition
| Queue names are limited to 80 characters. Alphanumeric characters plus hyphens (-) and underscores (_) are allowed. Queue names must be unique within an AWS account. After you delete a queue, you can reuse the queue name. |
|
|
Term
| If you want to give access to 20 users for an AWS account which is the best option? |
|
Definition
| AWS Identity and Access Management is a web service that enables the AWS customers to manage users and user permissions in AWS. The IAM is targeted at organizations with multiple users or systems that use AWS products such as Amazon EC2, Amazon RDS, and the AWS Management Console. With IAM, the organization can centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users can access. |
|
|
Term
| What is the initial status when a user makes changes to the RDS group? |
|
Definition
| When the user makes any changes to the RDS security group the rule status will be authorizing for some time until the changes are applied to all instances that the group is connected with. Once the changes are propagated the rule status will change to authorized. |
|
|
Term
| A user is planning to create a structured database in the cloud. Which of the below mentioned AWS offerings help the user achieve the goal? |
|
Definition
|
|
Term
| What are the states of an S3 bucket? |
|
Definition
| unversioned (the default), versioning-enabled or versioning-suspended. |
|
|
Term
| What happens if a user does not specify a backup window? |
|
Definition
| If the user does not specify a preferred backup window while enabling an automated backup, Amazon RDS assigns a default 30-minute backup window which is selected at random from an 8-hour block of time per region. |
|
|
Term
| An account owner has created an IAM user with the name cloudacademy. The account owner wants to give EC2 access of only the US West region to that IAM user. How can the owner configure this? |
|
Definition
| Create an IAM policy and define region in condition. |
|
|
Term
| Does a secondary index support queries as well as scans? True or False? |
|
Definition
| True. In DynamoDB, a secondary index is a data structure that contains a subset of attributes from a table, along with an alternate key to support Query operations. |
|
|
Term
|
Definition
| helps the user identify the port used by the client while sending a request to ELB |
|
|
Term
| What are the different approaches to manage cookies with ELB? |
|
Definition
| The key to manage the sticky session is determining how long the load balancer should route the user's request to the same application instance. If the application has its own session cookie, then the user can set the Elastic Load Balancing to create the session cookie to follow the duration specified by the application's session cookie. If the user’s application does not have its own session cookie, then he can set the Elastic Load Balancing to create a session cookie by specifying his own stickiness duration. |
|
|
Term
| What is the best approach for restricting access to less than 5000 IAM users? |
|
Definition
| Identity federation enables users from an existing directory to access resources within your AWS account, making it easier to manage your users by maintaining their identities in a single place. In this case, the federated user is the only solution since AWS does not allow creating more than 5000 IAM users. |
|
|
Term
| How can you configure an elastic load balancer? |
|
Definition
| You can configure your load balancer in ELB (Elastic Load Balancing) to use a SSL certificate in order to improve your system security.The load balancer uses the certificate to terminate and then decrypt requests before sending them to the back-end instances. Elastic Load Balancing uses AWS Identity and Access Management (IAM) to upload your certificate to your load balancer. |
|
|
Term
| Can you move a different volume to the same EC2 instance in a different AZ? |
|
Definition
| If an EBS volume is not in the same AZ of an EC2 instance, it cannot be attached to the instance. The only option is to take a snapshot of the volume and create a new volume in the instance’s AZ. |
|
|
Term
| What is an Activity Worker? |
|
Definition
| activity worker is a program that receives activity tasks, performs them, and provides results back. Which translates to a piece of software that implements tasks. |
|
|
Term
| How does billing work within AWS? |
|
Definition
| Billing commences when Amazon EC2 initiates the boot sequence of an AMI instance. Billing ends when the instance shuts down, which could occur through a web services command, by running “shutdown -h”, or through instance failure. Pricing is per instance-hour consumed for each instance type. Partial instance-hours consumed are billed as full hours |
|
|
Term
| Amazon Simple Email Service |
|
Definition
| is a highly scalable and cost-effective email-sending service for businesses and developers. It integrates with other AWS services, making it easy to send emails from applications that are hosted on AWS. |
|
|
Term
| What is the one piece of information you do not provide with SWF? |
|
Definition
| Before designing a workflow or any activity, you must register at least one domain |
|
|
Term
| Do workflows have to be in the same domain in order to interact? True or False. |
|
Definition
|
|
Term
|
Definition
| program that receives activity tasks, performs them, and provides results back |
|
|
Term
| What is an activity worker? |
|
Definition
| program that receives activity tasks, performs them, and provides results back |
|
|
Term
|
Definition
| The decider schedules activity tasks, provides input data to the activity workers, processes events that arrive while the workflow is in progress, and ultimately ends (or closes) the workflow when the objective has been completed. |
|
|
Term
| Does AWS reserve the right if none of the following requests have been issued for more than 30 days? |
|
Definition
SendMessage ReceiveMessage DeleteMessage GetQueueAttributes SetQueueAttributes |
|
|
Term
| Does Dynamo DB have unlimited storage? |
|
Definition
|
|
Term
| What is the maximum key length? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Allowed characters are letters, spaces, and numbers representable in UTF-8, plus the following special characters: + - =. _ : / @. |
|
|
Term
| Where can a user find the details for an instance termination? |
|
Definition
| description tab under the label State transition reason |
|
|
Term
| What is the only recommendation for a bucket ACL? |
|
Definition
| Amazon S3 Log Delivery group to write access log objects to your bucket. |
|
|
Term
| What are you charged for with Dynamo DB? |
|
Definition
|
|
Term
|
Definition
| configures additional network interfaces that you attach while the instance is running, refreshes secondary IPv4 addresses during DHCP lease renewal, and updates the related routing rules. |
|
|
Term
| Will a user be charged for the volume even if the EBS backed instance has stopped running? |
|
Definition
|
|
Term
| What is a must have for an IAM policy? |
|
Definition
|
|
Term
|
Definition
| element is required and specifies whether the statement results in an allow or an explicit deny |
|
|
Term
|
Definition
| element to specify the user (IAM user, federated user, or assumed-role user), AWS account, AWS service, or other principal entity that is allowed or denied access to a resource. |
|
|
Term
|
Definition
| element specifies the object or objects that the statement covers |
|
|
Term
|
Definition
| lets you specify conditions for when a policy is in effect |
|
|
Term
| Subnets in a VPC have to be associated with exactly one route table? |
|
Definition
|
|
Term
| Reccomended device name for Windows? |
|
Definition
|
|
Term
| If a user wants a site to have a specific domain name instead of his account id they can create an alias. |
|
Definition
| create an alias for his AWS account ID |
|
|
Term
| ec2-modify-image-attribute |
|
Definition
| allows a user to share the AMI with his peers. |
|
|
Term
| SLA for provisioned IOPS 90% |
|
Definition
|
|
Term
| When should elastic IPs be used? |
|
Definition
| Because, when the user has attached more than one network interface with an instance, AWS cannot assign public IPs to the |
|
|
Term
| Device names for root volumes |
|
Definition
| For Paravirtual virtualization type /dev/sda1 is the reserved name and for HVM virtualization /dev/sda1 or /dev/xvda |
|
|
Term
| Both the back and front end protocols for an ELB should be the same |
|
Definition
|
|