AWS Compute
AWS Storage
AWS Networking
AWS Databases
AWS Billing & Pricing
AWS Security
100

Which service can assist a developer with quickly deploying and managing a web application on AWS? 

1. AWS CloudFormation 2. AWS Elastic Beanstalk

AWS Elastic Beanstalk- AWS Elastic Beanstalk can be used to quickly deploy and manage applications in the AWS Cloud

100

Which storage service is used by Amazon EC2 instances for the root volume? 1. Amazon Simple Storage Service (S3) 2. Amazon Elastic File System (EFS) 3. Amazon Elastic Block Store (EBS) 4. Amazon Storage Gateway

Amazon Elastic Block Store (EBS)- Elastic Block Store (EBS) is used for the root volume on EBS backed instances

100

What is the scope of an Amazon VPC? 1. A data center 2. A region 3. An availability zone 4. A subnet

A region- An Amazon VPC is created within a region. You can create multiple VPCs within a region and there is a default VPC created in every AWS region by default

100

Amazon Relational Database Service (RDS) is an example of what type of database? 1. Online transaction processing (OLTP) 2. Online analytics processing (OLAP) 3. No-SQL 4. Data warehouse

Online transaction processing (OLTP)- Amazon RDS is an example of a relational database used for online transaction processing (OLTP) workloads. This means its typically used for production databases that process transactions

100

Which AWS services are free? 1. Amazon EC2 Auto Scaling, CloudFormation, IAM 2. Amazon EC2, CloudFormation, IAM 3. Consolidated billing, EC2 Auto Scaling, NAT Gateway 4. IAM, Amazon S3, outbound data transfer

Amazon EC2 Auto Scaling, CloudFormation, IAM- All these services are free of charge. However, you do pay for resources created by Auto Scaling and CloudFormation

100

Which tool can be used to find compliance information that relates to the AWS Cloud platform? 1. Amazon Inspector 2. AWS Trusted Advisor 3. AWS Artifact 4. AWS Personal Health Dashboard

AWS Artifact-AWS Artifact is your go-to, central resource for compliance-related information that matters to you. It provides on-demand access to AWS’ security and compliance reports and select online agreements

200

AWS Elastic Beanstalk is an example of which cloud computing service model? 1. On-premises 2. Infrastructure as a Service (IaaS) 3. Platform as a Service (PaaS) 4. Software as a Service (SaaS)

Platform as a Service (PaaS)- Elastic Beanstalk is considered to be a PaaS service. This means the underlying infrastructure and the runtime engine are managed for you and you only need to upload the code

200

Which Amazon S3 storage class is used for archiving data for long term retention? 1. S3 Standard 2. S3 Intelligent-Tiering 3. S3 One Zone-IA 4. S3 Glacier Deep Archive

S3 Glacier Deep Archive- S3 Glacier Deep Archive is the lowest cost storage class for long term retention

200

Which type of firewall operates at the instance level? 1. A security group 2. A network access control list (NACL) 3. A route table 4. A NAT Gateway

A security group- Security groups are considered to be instance-level firewalls

200

Which AWS database service offers seamless horizontal scaling? 1. Amazon RDS 2. Amazon RedShift 3. Amazon DynamoDB 4. Database on Amazon EC2

Amazon DynamoDB- Amazon DynamoDB offers seamless "push-button" horizontal scaling

200

Which pricing model is best suited for a batch computing workload that requires significant compute power and can be stopped at any time? 1. On-demand instances 2. Dedicated instances 3. Spot instances 4. Reserved instances

Spot instances- Spot instances are great for this type of workload. You can achieve significant discounts which will mean a big cost saving for such a compute intensive workload. You can be stopped at any time if AWS need the capacity back but that's OK for some batch workloads

200

What is AWS' policy regarding penetration testing? 1. You can only perform penetration testing with permission from AWS 2. You can perform penetration testing against any service and account 3. You can perform penetration testing against selected services without approval 4. Penetration testing is not allowed under any circumstance

You can perform penetration testing against selected services without approval - This is the new policy. You can now perform penetration testing against several services without approval

300

What is a benefit of Amazon EC2 compared to traditional servers? 1. You can use specialized hardware 2. You have more control over the operating system 3. You can scale elastically within minutes 4. You get more compute power in the cloud

You can scale elastically within minutes- This is a key benefit of the AWS Cloud. You can elastically increase or decrease capacity by changing instance types whenever you need to.

300

Which storage device is physically attached to the Amazon EC2 host servers? 1. Amazon Elastic Block Store (EBS) volume 2. Amazon Machine Image (AMI) 3. Instance Store volume 4. Elastic Network Adapter

Instance Store volume- Instance store volumes are physically attached to EC2 host servers. They are ephemeral storage which means the data is lost when powered off

300

How can an organization create a private hybrid cloud connection between their on-premises data center and the AWS Cloud? 1. AWS managed VPN 2. VPN CloudHub 3. Software VPN 4. AWS Direct Connect

AWS Direct Connect- AWS Direct Connect is a private network connection to the AWS Cloud. It provides high bandwidth and low latency with reliable performance

300

Which AWS database service is a relational, data warehouse? 1. Amazon RedShift 2. Amazon RDS Aurora 3. Amazon DynamoDB 4. Amazon ElastiCache

Amazon RedShift- RedShift is a relational, SQL database that is well suited for data warehouse use

300

With Amazon S3, which of the following are NOT chargeable items? 1. Quantity of data in S3 buckets 2. Lifecycle transitions 3. Transfer Acceleration 4. Inbound data transfer

Inbound data transfer- You do not pay for inbound data transfer, only outbound data transfer

300

Which service is involved with encryption? 1. AWS Key Management Service (KMS) 2. AWS WAF 3. AWS Shield

AWS Key Management Service (KMS) -AWS KMS is used for managing encryption keys

400

How can you run commands on an Amazon EC2 instance at launch time? 1. With metadata 2. With user data 3. With a container 4. With a snapshot

With user data- User data can be run at instance launch time. You can use it to run commands

400

With default settings, what will happen to a root EBS volume when the Amazon EC2 instance is terminated? 1. It will be deleted 2. It will be retained 3. A snapshot will be retained 4. An AMI will be created 

It will be deleted-With default settings an Amazon EBS root volume will be deleted when the instance is terminated

400

Which type of public IP address is retained when the instance is stopped? 1. Public IP address 2. Private IP address 3. Elastic IP address 5. Local IP address

Elastic IP address- With Elastic IP addresses, the address is retained when the instance is stopped. Remember that you do pay for unused Elastic IP addresses

400

How do you increase the capacity of an Amazon RDS database? 1. Scaling horizontally, by adding instances 2. Scaling horizontally, by adding RCUs/WCUs 3. Scaling vertically, by changing instance type 4. Scaling vertically by adding CPUs

Scaling vertically, by changing instance type- You can scale Amazon RDS by changing to a larger instance type. This is an example of vertical scaling  

400

What are the three fundamentals of pricing in AWS? 1. Compute, storage and inbound data transfer 2. Compute, database and Internet connectivity 3. Compute, storage and outbound data transfer 4. Elasticity, agility, and data transfer

Compute, storage and outbound data transfer- Compute, storage and outbound data transfer are the three fundamentals of AWS pricing

400

In case of account compromise, which of the following actions should you perform? 1. Delete all IAM users 2. Delete all resources in your account 3. Open a support case with AWS 4. Immediately close your account

Open a support case with AWS- You should always respond to any notifications you received from AWS through the AWS Support Center and/or contact AWS Support to open a support case

500

Which service allows you to run Docker containers on AWS? 1. Amazon EC2 2. AWS Lambda 3. Amazon ECS 4. Amazon EBS

Amazon ECS- Amazon Elastic Container Service (ECS) is used to run Docker containers on AWS

500

Which Amazon Machine Image can be used to mount an Amazon Elastic File System (EFS) file system? 1. Microsoft Windows Server 2019 with Containers 2. Microsoft Windows Server 2016 Core 3. Amazon Linux 2 AMI 4. All of the above

Amazon Linux 2 AMI- Only Linux AMIs can be used with Amazon EFS

500

With Amazon Virtual Private Cloud (VPC) what must you pay for? 1. Internet Gateway 2. Route Table 3. Security Group 4. VPN Connection

VPN Connection- You do need to pay for VPN connections.

500

Amazon DynamoDB is good for which use case? 1. Structured data, rigid schema 2. Unstructured data, flexible schema

Unstructured data, flexible schema- DynamoDB is a No-SQL database which has a flexible schema and is good for unstructured data

500

What can you use to assign metadata to AWS resources for cost reporting? 1. Labels 2. Tags 3. ARNs 4. Templates

Tags - Tags and resource groups are great tools for assigning metadata to AWS resources and then being able to group resources that share one or more tags

500

Which service can assist with protecting against common web-based exploits? 1. AWS Shield 2. AWS Web Application Firewall (WAF) 3. Amazon Route 53 4. AWS CloudHSM

AWS Web Application Firewall (WAF) - AWS WAF is a web application firewall that protects against common exploits that could compromise application availability, compromise security or consume excessive resources