AWS End of Module Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which statement best describes Amazon Lex? a. A service that enables you to build conversational interfaces using voice and text b. A machine learning service that automatically extracts text and data from scanned documents c. A document database service that supports MongoDB workloads d. A service that enables you to identify potentially fraudulent online activities

a. A service that enables you to build conversational interfaces using voice and text

Which service or resource is used to find third-party software that runs on AWS? a. AWS Marketplace b. AWS Free Tier c. AWS Support d. Billing dashboard in the AWS Management Console

a. AWS Marketplace

Which service is used to query and analyze data across a data warehouse? a. Amazon Redshift b. Amazon Neptune c. Amazon DocumentDB d. Amazon ElastiCache

a. Amazon Redshift

Which statement or statements are TRUE about Amazon EBS volumes and Amazon EFS file systems? a. EBS volumes store data within a single Availability Zone. Amazon EFS file systems store data across multiple Availability Zones. b. EBS volumes store data across multiple Availability Zones. Amazon EFS file systems store data within a single Availability Zone. c. EBS volumes and Amazon EFS file systems both store data within a single Availability Zone. d. EBS volumes and Amazon EFS file systems both store data across multiple Availability Zones.

a. EBS volumes store data within a single Availability Zone. Amazon EFS file systems store data across multiple Availability Zones.

Which process is an example of Elastic Load Balancing? a. Ensuring that no single Amazon EC2 instance has to carry the full workload on its own. b. Removing unneeded Amazon EC2 instances when demand is low. c. Adding a second Amazon EC2 instance during an online store's popular sale. d. Automatically adjusting the number of Amazon EC2 instances to meet demand.

a. Ensuring that no single Amazon EC2 instance has to carry the full workload on its own.

What is another name for on-premises deployment? a. Private cloud deployment b. Cloud-based application c. Hybrid Development d. AWS Cloud

a. Private cloud deployment

Which statement best describes security groups? a. They are stateful and deny all inbound traffic by default. b. They are stateful and allow all inbound traffic by default. c. They are stateless and deny all inbound traffic by default. d. They are stateless and allow all inbound traffic by default.

a. They are stateful and deny all inbound traffic by default.

Which factors should be considered when selecting a Region? (Select TWO.) a. Compliance with data governance and legal requirements b. Proximity to your customers c. Access to 24/7 technical support d. Ability to assign custom permissions to different users e. Access to the AWS Command Line Interface (AWS CLI)

a/b. a. Compliance with data governance and legal requirements b. Proximity to your customers

What are the contract length options for Amazon EC2 Reserved Instances? (Select TWO) a. 1 year b. 2 years c. 3 years d. 4 years e. 5 years

a/c. 1 year, 3 years

Which actions can you perform using Amazon CloudWatch? (Select TWO.) a. Monitor your resources' utilization and performance b. Receive real-time guidance for improving your AWS environment c. Compare your infrastructure to AWS best practices in five categories d. Access metrics from a single dashboard e. Automatically detect unusual account activity

a/d. a. Monitor your resources utilization and performance. d. Access metrics from a single dashboard

What are the benefits of cloud computing? (Select TWO.) a. Increase speed and agility. b. Benefit from smaller economies of scale. c. Trade variable expense for upfront expense. d. Maintain infrastructure capacity. e. Stop spending money running and maintaining data centers.

a/e. a. Increase speed and agility e. Stop spending money running and maintaining data centers.

Which statement best describes an IAM policy? a. An authentication process that provides an extra layer of protection for your AWS account b. A document that grants or denies permissions to AWS services and resources c. An identity that you can assume to gain temporary access to permissions d. The identity that is established when you first create an AWS account

b. A document that grants or denies permissions to AWS services and resources

Which statement best describes Amazon DynamoDB? a. A service that enables you to run relational databases in the AWS Cloud b. A serverless key-value database service c. A service that you can use to migrate relational databases, nonrelational databases, and other types of data stores d. An enterprise-class relational database

b. A serverless key-value database service

Which pricing tool enables you to receive alerts when your service usage exceeds a threshold that you have defined? a. Billing dashboard in the AWS Management Console b. AWS Budgets c. AWS Free Tier d. AWS Cost Explorer

b. AWS Budgets

Your company wants to receive support from an AWS Technical Account Manager (TAM). Which support plan should you choose? a. Developer b. Enterprise c. Basic d. Business

b. Enterprise

Which pillar of the AWS Well-Architected Framework includes the ability to run workloads effectively and gain insights into their operations? a. Cost Optimization b. Operational Excellence c. Performance Efficiency d. Reliability

b. Operational Excellence

Your company has an application that uses Amazon EC2 instances to run the customer-facing website and Amazon RDS database instances to store customers' personal information. How should the developer configure the VPC according to best practices? a. Place the Amazon EC2 instances in a private subnet and the Amazon RDS database instances in a public subnet. b. Place the Amazon EC2 instances in a public subnet and the Amazon RDS database instances in a private subnet. c. Place the Amazon EC2 instances and the Amazon RDS database instances in a public subnet. d. Place the Amazon EC2 instances and the Amazon RDS database instances in a private subnet.

b. Place the Amazon EC2 instances in a public subnet and the Amazon RDS database instances in a private subnet.

Which Perspective of the AWS Cloud Adoption Framework helps you structure the selection and implementation of permissions? a. Governance Perspective b. Security Perspective c. Operations Perspective d. Business Perspective

b. Security Perspective

You have a workload that will run for a total of 6 months and can withstand interruptions. What would be the most cost-efficient Amazon EC2 purchasing option? a. Reserved Instance b. Spot Instance c. Dedicated Instance d. On-Demand Instance

b. Spot Instance

How does the scale of cloud computing help you to save costs? a. You do not have to invest in technology resources before using them. b. The aggregated cloud usage from a large number of customers results in lower pay-as-you-go prices. c. Accessing services on-demand helps to prevent excess or limited capacity. d. You can quickly deploy applications to customers and provide them with low latency.

b. The aggregated cloud usage from a large number of customers results in lower pay-as-you-go prices.

Which categories are included in the AWS Trusted Advisor dashboard? (Select TWO.) a. Reliability b. Performance c. Scalability d. Elasticity e. Fault tolerance

b/e. b. Performance e. Fault Tolerance

Which strategies are included in the six strategies for application migration? (Select TWO.) a. Revisiting b. Retaining c. Remembering d. Redeveloping e. Rehosting

b/e. b. Retaining e. Rehosting

Which Amazon S3 storage classes are optimized for archival data? (Select TWO.) a. S3 Standard b. S3 Glacier c. S3 Intelligent-Tiering d. S3 Standard - IA e. S3 Glacier Deep Archive

b/e. b. S3 Glacier/ e. S3 Glacier Deep Archive

Which statement is TRUE for the AWS global infrastructure? a. A region consists of a single Availability Zone b. An Availability Zone consists of two or more regions c. A region consists of two or more Availability Zones d. An Availability Zone consists of a single Region

c. A region consists of two or more Availability Zones

Which pricing tool is used to visualize, understand, and manage your AWS costs and usage over time? a. AWS Pricing Calculator b. AWS Budgets c. AWS Cost Explorer d. AWS Free Tier

c. AWS Cost Explorer

Which component can be used to establish a private dedicated connection between your company's data center and AWS? a. Private subnet b. DNS c. AWS Direct Connect d. Virtual private gateway

c. AWS Direct Connect

Which service enables you to review the security of your Amazon S3 buckets by checking for open access permissions? a. Amazon CloudWatch b. AWS CloudTrail c. AWS Trusted Advisor d. Amazon GuardDuty

c. AWS Trusted Advisor

Which action can you perform with consolidated billing? a. Review how much cost your predicted AWS usage will incur by the end of the month. b. Create an estimate for the cost of your use cases on AWS. c. Combine usage across accounts to receive volume pricing discounts. d. Visualize and manage your AWS costs and usage over time.

c. Combine usage across accounts to receive volume pricing discounts.

You want to use an Amazon EC2 instance for a batch processing workload. What would be the best Amazon EC2 instance type to use? a. General Purpose b. Memory Optimized c. Compute Optimized d. Storage Optimized

c. Compute Optimized

Which task can AWS Key Management Service (AWS KMS) perform? a. Configure multi-factor authentication (MFA). b. Update the AWS account root user password. c. Create cryptographic keys. d. Assign permissions to users and groups.

c. Create cryptographic keys.

Which site does Amazon CloudFront use to cache copies of content for faster delivery to users at any location? a. Region b. Availability Zone c. Edge location d. Origin

c. Edge Location

Which statement best describes the principle of least privilege? a. Adding an IAM user into at least one IAM group b. Checking a packet's permissions against an access control list c. Granting only the permissions that are needed to perform specific tasks d. Performing a denial of service attack that originates from at least one device

c. Granting only the permissions that are needed to perform specific tasks

An employee requires temporary access to create several Amazon S3 buckets. Which option would be the best choice for this task? a. AWS account root user b. IAM group c. IAM role d. Service control policy (SCP)

c. IAM role

What is the storage capacity of AWS Snowmobile? a. 40 PB b. 60 PB c. 80 PB d. 100 PB

d. 100 PB

Which statement best describes Amazon CloudFront? a. A service that enables you to run infrastructure in a hybrid cloud approach b. A serverless compute engine for containers c. A service that enables you to send and receive messages between software components through a queue d. A global content delivery service

d. A global content delivery service

Which service helps protect your applications against distributed denial-of-service (DDoS) attacks? a. Amazon GuardDuty b. Amazon Inspector c. AWS Artifact d. AWS Shield

d. AWS Shield

You want to deploy and manage containerized applications. Which service should you use? a. AWS Lambda b. Amazon Simple Notification Service (Amazon SNS) c. Amazon Simple Queue Service (Amazon SQS) d. Amazon Elastic Kubernetes Service (Amazon EKS)

d. Amazon Elastic Kubernetes Service (Amazon EKS)

Which service is used to manage the DNS records for domain names? a. Amazon Virtual Private Cloud b. AWS Direct Connect c. Amazon CloudFront d. Amazon Route 53

d. Amazon Route 53

You want to store data in an object storage service. Which AWS service is best for this type of storage? a. Amazon Managed Blockchain b. Amazon Elastic File System (Amazon EFS) c. Amazon Elastic Block Store (Amazon EBS) d. Amazon Simple Storage Service (Amazon S3)

d. Amazon Simple Storage Service (Amazon S3)

Which action can you perform with AWS Outposts? a. Automate actions for AWS services and applications through scripts. b. Access wizards and automated workflows to perform tasks in AWS services. c. Develop AWS applications in supported programming languages. d. Extend AWS infrastructure and services to your on-premises data center.

d. Extend AWS infrastructure and services to your on-premises data center.

Which component is used to connect a VPC to the internet? a. Public Subnet b. Edge Location c. Security Group d. Internet Gateway

d. Internet Gateway

What is cloud computing? a. Backing up files that are stored on desktop and mobile devices to prevent data loss. b. Deploying applications connected to on-premises infrastructure c. Running code without needing to manage or provision servers. d. On-demand delivery of IT resources and applications through the internet with pay-as-you-go pricing.

d. On-demand delivery of IT resources and applications through the internet with pay-as-you-go pricing.


Set pelajaran terkait

Foundations and Practice of Mental Health Nursing HESI EXIT 5

View Set

Intro. to Public Health Riegelman & Kirkwood Ch. 13: Food & Drugs

View Set

HIST 2610 Learning Curve Chapter 1

View Set