Concepts
Networking
Management & Governance
Security, Identity & Compliance
Potpourri
100

What is the shared responsibility Model and what are each party responsible for? 1.22

AWS is responsible for the cloud (infrastructure, Data Centers etc)

Customers are responsible for what goes into the cloud (Data encryption, Custom software, access policies etc)

100

What is VPC Peering? 9.12

A networking link  that allows you to connect one VPC with another. Doesnt have to be in the same account. Allows EC2 instances to communicate as if they were on the same network

100

What is AWS User Notifications? 6.30

A centralizzed and unified way to configure and access notifications from various services. You can view notifications from across accounts regions and service and customize delivery channels to receive notifications via Email, chat bot or AWS console mobile app

100

What is AWS Artifact? 5.11

A service that provides a variety of documents that details how AWS complies with various regulatory standards. 
100

What are AWS Decision Guides? 26.3

Decision Guides offer a clear overview of AWS services along with structured guidance to help you select the best options for your specific use cases. They also help you identify and evaluate the key criteria that should influence your decisions.

200

What is the Backup and Restore DR strategy? 1.17

Backups are made in the same AWS region as the source and duplicated into a different region. Has the lowest cost, but the slowest RTO

200

What are the differences between a public and private connectivity types for a NAT Gateway? 9.8

Public: Instances in a public NAT Gateway can connect to the internet through it but cannot receive unsolicited inbound connections from the internet

Private: Instances in private subnets can connect to other VPCs on your on-prem network through a private NAT Gateway. You can route traffic from the NAT gateway through a transit gateway or a virtual private gateway

200

What is the Compute Optimizer and what resources does it work with? 6.10

Evaluates AWS resource configuration and usage and makes recommendations to decrease cost and improve performance. 

EC2 instances

EC2 Autoscaling groups

EBS Volumes

Lambda functions

200

What are the two main ways to set up Cross Account Access? 5.10

Resource-based policies - The trusting account specifies which principals from other accounts can access a resource. Principals retain their original permissions while gaining access to shared resource. Principals can be IAM users, federated users, roles or AWS services


IAM Roles - Allow an account to delegate access to resources by creating a role that can be assumed by a principal from an outside account.

200

What are AWS Decision Guides? 26.3

Decision Guides offer a clear overview of AWS services along with structured guidance to help you select the best options for your specific use cases. They also help you identify and evaluate the key criteria that should influence your decisions.

300

What is an AWS Service Endpoint? 1.21

An AWS service endpoint is a specific URL that denotes a service within the AWS ecosystem. They let you securely communicate with and request APIs from AWS services without using the open internet

300

Compare and contrast Global Accelerator and Cloud Front 9.45

They both use the AWS global network and its edge locations world wide to offer their services to customers

CF boosts performance for both cacheable and interactive content output

GA increases performance by proxying packets for a wide variety of Apps over TCP & UDP by routhing them across regions 


300

What does AWS Grafana do? 6.13

Makes it easy to deploy, operate, and scale the Grafana data visualization tool. Lets you build dashboards and visualizations to metrics logs, and traces from multiple data sources

Integrates with Operational data sources (CloudWatch, OpenSearch, X-Ray etc) as well as open-source and 3rd party data sources.

300

When the Policy Evaluation logic is determining if an action is denied, in what order does it check policies? 5.9

SCP/RCP -> Resource-based policies -> Identity based policies -> IAM permission boundaries -> session policies.

300

What are the protocols supported by the AWS transfer Family? 8.68

Secure File Transfer Protocol (SFTP)

File Transfer Protocol Secure(FTPS)

File Transfer Protocol (FTP)

Applicating Statement 2 (AS2)

400

What are the Goals of Cost Optimization and can you list the 5 design Principles?  1.13

Keep expenses as low as possible

1. Implement Cloud financial management

2. Adopt a Consumption model

3. Measure overall efficiency 

4. Stop spending money on undifferentiated heavy lifting

5. Analyze and attribute expediture

400

What is AWS CloudMap, what does it do? 9.30

A service for finding cloud resources. You can give your app resources custom names and the service and the service will automatically update the locations of resources that move around.

400

What are the differences between GuardDuty, Detective, and Security Hub? 6.33

GuardDuty is a threat detection service that continuously montiors malicious and unwanted activity

Detective eliminates the time and resources needed to investigate security findings and determine the underlying cause. Monitors CloudTrail logs and GuardDuty results and presents you with a single interactive view of your resources, users and interactions between them

Security Hub aggregates, organizes and prioritizes the security warnings from AWS services

400

What can AWS Private Certificate Authority do? 5.25

Simplifies the management of private digital certificates and lets you establish cert authority hierarchies without the need of CA infrastructure. Can issue X.509 certs for various purposes such as:

Setting up secure TLS channels with encryption

authenticating users/endpoints/devices

Applying cryptographic signatures to code

Implementing the OCSP to check the revocation status of certs

400

What is the Cost Optimization Hub and what are some of its recommendation types? 23.8

Provides a single dashboard to conolidate and identify over 15 different types of AWS cost optimzation recommendations across AWS accounts and regions. Recommendation types include:

right-sizing EC2 instances, migrating to Graviton, detecting idle resources and utilizing savings plans, reserving capacity and nodes/instances.

500

What are the 6 pillars of a well-architected framework and what do they cover? 1.8

1. Operational Excellence

2. Security

3. Reliability

4. Performance Efficiency

5. Cost Optimization

6. Sustainability

500

What are Signed URLs and Signed Cookies for and when would you use each one? 9.28

These are both for sharing private S3 contents to designated users.

Signed URLs are for individual files or for when a client doesn't support cookies.

Signed Cookies are for multiple files that you don't want to update every URL for.

500

What is AWS Control tower and what are its core features? 6.12

A service that makes it easy to setup and manage a secure compliant multi-account AWS environment using best practices.

Landing Zone - All OUs that you want to be subject to compliance are kept in the LZ

Controls - High level rules (guardrails) that help you run your environment.

Account factory - A customizable account template that makes it easier to setup new accounts with approved configurations.

Dashboard - Lets you keep an eye on the LZ

500

What is AWS Payment Cryptography for and what are some of the features? 5.27

Simplifies the process of implementing cryptographic operations for securing data in payment processing app. It adheres to various industry standards and rules such as PCI, network and ANSI standards

Enables key gneration, electronic import/export, automates key management tasks. and manages physical HSM infrastructure and meets key management requirements to ensure compliance.

500

What is Amazon MQ and when would you use it over other amazon services? 16.5

It is a message broker service for Apache Active MQ and Rabbit-MQ that simplifies the deployment and operation of cloud-based message brokers. You have direct access to the ActiveMQ andRabbitMQ consoles as well as APIs and protocols for message.

You would only use this instead on SNS and SQS if your already relying on a MQ service and are not ready to change protocol.

M
e
n
u