|
AWS Cloud Technical Essentials | Coursera |
Week 1
1. What are the four main factors that a solutions architect should consider
when they must choose a Region?
- Latency, price, service availability, and compliance
- Latency, high availability, taxes, and compliance
- Latency, taxes, speed, and compliance
- Latency, security, high availability, and resiliency
2. True or False: Every action a user takes in AWS is an API call.
3. Which statement BEST describes the relationship between Regions,
Availability Zones and data centers?
-
Availability Zones are clusters of Regions. Regions are clusters of data
centers.
-
Data centers are cluster of Availability Zones. Regions are clusters of
Availability Zones.
-
Regions are clusters of Availability Zones. Availability Zones are
clusters of data centers.
-
Data centers are clusters of Regions. Regions are clusters of Availability
Zones.
4. Which of the following is a benefit of cloud computing?
- Run and maintain your own data centers.
- Increase time-to-market.
- Overprovision for scale.
- Go global in minutes.
5. A company wants to manage AWS services by using the command line and
automating them with scripts. What should the company use to accomplish this
goal?
- AWS Management Console
- AWS Command Line Interface (AWS CLI)
- AWS SDKs
- AWS Management Console and AWS SDKs
6. What is a best practice when securing the AWS account root user?
-
Activate AWS Identity and Access Management (IAM) access to the Billing and
Cost Management console
- Use the root user for routine administrative tasks
- Change account settings
- Enable multi-factor authentication
7. A solutions architect is consulting for a company. When users in the company
authenticate to a corporate network, they want to be able to use AWS without
needing to sign in again. Which AWS identity should the solutions architect
recommend for this use case?
- AWS account root user
- AWS Identity and Access Management (IAM) user
- IAM Role
- IAM Group
8. Which of the following can be found in an AWS Identity and Access Management
(IAM) policy?
- Effect
- Action
- Object
- A and B
- B and C
9. True or False: AWS Identity and Access Management (IAM) policies can restrict
the actions of the AWS account root user.
10. According to the AWS shared responsibility model, which of the following is
the responsibility of AWS?
-
Controlling the operating system and application platform, as well as
encrypting, protecting, and managing customer data.
-
Managing customer data, encrypting that data, and protecting the data
through network firewalls and backups.
-
Managing the hardware, software, and networking components that run AWS
services, such as the physical servers, host operating systems,
virtualization layers, and AWS networking components.
-
Managing customer data, encrypting that data, and protecting the data
through client-side encryption.
11. Which of the following is recommended if a company has a single AWS account,
and multiple people who work with AWS services in that account?
-
All people must use the root user to work with AWS services on a daily
basis.
-
The company should create an AWS Identity and Access Management (IAM)
group, grant the group permissions to perform specific job functions, and
assign users to a group, or use IAM roles.
-
The company must create AWS Identity and Access Management (IAM) users, and
grant users the permissions to perform specific job functions.
-
The company must create an AWS Identity and Access Management (IAM) user and
grant the user the permissions to access all AWS resources.
12. True or False: According to the AWS shared responsibility model, a customer
is responsible for security in the cloud.
13. Which of the following provides temporary credentials (that expire after a
defined period of time) to AWS services?
- Principle of least privilege
- IAM role
- Identity provider (IdP)
- AWS IAM Identity Center (successor to AWS Single Sign-On)
14. A user is hosting a solution on Amazon Elastic Compute Cloud (Amazon EC2).
Which networking component is needed to create a private network for their AWS
resources?
- Virtual private cloud (VPC)
- Instance
- Tags
- Amazon Machine Image (AMI)
Week 2
1. Which information is needed to create a virtual private cloud (VPC)?
- The Availability Zone that the VPC will reside in.
- The subnet that the VPC will reside in.
- The AWS Region that the VPC will reside in.
- The group of subnets that the VPC will reside in.
2. Which of the following can a route table be attached to?
- AWS Accounts
- Availability Zone
- Subnets
- Regions
3. A company wants to allow resources in a public subnet to communicate with the
internet. Which of the following must the company do to meet this
requirement?
- Create a route to a private subnet
- Attach an internet gateway to their VPC
- Create a route in a route table to the internet gateway
- A and B
- B and C
4. What is the compute as a service (CaaS) model?
-
The CaaS model requires that users purchase virtual machines and manually
provision servers to run a workload.
-
The CaaS model offers computing resources (such as virtual machines that
run on servers in data centers) on demand, by using virtual services.
-
The CaaS model offers large discounts for computing resources. However,
users must run the workload from the server that is stored on-premises.
-
The CaaS model delivers cloud-based applications to users across the globe,
over the internet.
5. Which statement about the default settings of a security group is TRUE?
-
Allows all inbound traffic and blocks all outbound traffic by default.
-
Blocks all inbound traffic and allows all outbound traffic by default.
- Allows all inbound and outbound traffic by default.
- Blocks all inbound and outbound traffic by default.
6. What does an Amazon Elastic Compute Cloud (Amazon EC2) instance type
indicate?
- Instance family and instance size
- Instance placement and instance size
- Instance tenancy and instance billing
- Instance Amazon Machine Image (AMI) and networking speed
7. What is the difference between using AWS Fargate or Amazon Elastic Compute
Cloud (Amazon EC2) as the compute platform for Amazon Elastic Container Service
(Amazon ECS)?
-
With AWS Fargate, AWS manages and provisions the underlying
infrastructure for hosting containers.
-
With Amazon ECS on Amazon EC2, AWS manages and provisions the underlying EC2
instance for containers.
- With AWS Fargate, users need to manage cluster capacity and scaling.
-
With Amazon ECS on Amazon EC2, users need to upload only the source code.
Amazon ECS takes care of the rest.
8. Which statement about serverless is TRUE?
- Users must provision and manage servers.
- Users must manually scale serverless resources.
- Users do not pay for idle resources.
- Users must manage availability and fault tolerance.
9. True or False: AWS Lambda is always the best solution when running
applications on AWS.
10. Which compute service does Amazon Elastic Compute Cloud (Amazon EC2)
provide?
- Container services
- Serverless
- Virtual machines (VMs)
- Analytics
11. Which stage of the instance lifecycle is an instance in when the account
starts to accumulate charges?
- When an instance is in a pending stage
- When an instance is in a running stage
- When an instance is stopped
- When an instance is terminated
12. Which component of the c5.4xlarge instance determines the instance family
and generation number?
13. Which container runtime can be used to host a container on an Amazon Elastic
Compute Cloud (Amazon EC2) instance?
- Docker
- Container
- Amazon Simple Storage Service (Amazon S3)
- Amazon EC2
14. What is an example of an event that invokes an AWS Lambda function?
-
An AWS API call that is made by an AWS Identity and Access Management (IAM)
role
-
An upload of a file to the Amazon Simple Storage Service (Amazon S3)
source bucket
-
An incoming HTTP request to a website that is hosted on Amazon Elastic
Compute Cloud (Amazon EC2)
- A simple WordPress website that has no API integration
15. True or False: With serverless, users do not need to provision and manage
servers.
16. True or False: All AWS services require users to configure a virtual private
cloud (VPC).
17. An engineer is working with networks in the AWS Cloud. What should the
engineer use to configure the size of their network?
- Classless Inter-Domain Routing (CIDR) notation
- IPv6 notation
- IPv4 notation
- IP addresses
18. What is the difference between network access control lists (ACLs) and
security groups?
-
By default, network ACLs allow incoming traffic and block outgoing traffic
from a subnet. Users can change these settings to provide an additional
layer of security. However, the default configurations of security groups
block all traffic.
-
By default, network ACLs block all traffic from a subnet. However, the
default configurations of security groups allow all inbound and outbound
traffic. Users can change these settings to provide an additional layer of
security.
-
By default, network ACLs block incoming traffic and allow outgoing traffic.
The default configurations of security groups block all traffic. Users can
change these settings when they configure networking for their instance.
-
By default, network ACLs allow incoming and outgoing traffic from a
subnet. Users can change these settings to provide an additional layer of
security. However, the default configurations of security groups block all
inbound traffic and allow all outbound traffic.
Week 3
1. What is a typical use case for Amazon Simple Storage Service (Amazon S3)?
- Object storage for media hosting
- Object storage for a boot drive
-
Block storage for an Amazon Elastic Compute Cloud (Amazon EC2) instance
-
File storage for multiple Amazon Elastic Compute Cloud (Amazon EC2)
instances
2. A company needs a storage layer for a high-transaction relational database on
an Amazon Elastic Compute Cloud (Amazon EC2) instance. Which service should the
company use?
- Amazon EC2 Instance Store
- Amazon Elastic Block Store (Amazon EBS)
- Amazon Simple Storage Service (Amazon S3)
- Amazon Elastic File System (Amazon EFS)
3. True or False: Amazon Elastic Block Store (Amazon EBS) volumes are considered
ephemeral storage.
4. A solutions architect is working for a healthcare facility, and they are
tasked with storing 7 years of patient information that is rarely accessed. The
facility’s IT manager asks the solutions architect to consider one of the Amazon
Simple Storage Service (Amazon S3) storage tiers to store the patient
information. Which storage tier should the solutions architect suggest?
- Amazon S3 Standard
- Amazon S3 Glacier Deep Archive
- Amazon S3 Standard-Infrequent Access
- Amazon S3 Intelligent-Tiering
5. True or False: Object storage is the best storage solution for applications
that need to frequently update specific small sections of a file.
6. True or False: A Multi-AZ deployment is beneficial when users want to
increase the availability of their database.
7. Which task of running and operating the database are users responsible for
when they use Amazon Relational Database Service (Amazon RDS)?
- Optimizing the database
- Provisioning and managing the underlying infrastructure
-
Installing the relational database management system on the database
instance
- Installing patches to the operating system for the database instance
8. Which of the following are common use cases for file storage? (Choose TWO.)
- User home directories
-
Backup files that are stored in Amazon Simple Storage Service (Amazon S3)
- Relational or non-relational databases
- Large content repositories
- Big data analytics
9. True or False: The IT department in a company can attach Amazon Elastic Block
Store (Amazon EBS) volumes to Amazon Simple Storage Service (Amazon S3) to store
data in a bucket.
10. Which of the following instance families does Amazon Relational Database
Service (Amazon RDS) support? (Choose TWO.)
- Storage optimized
- General purpose.
- Compute optimized
- Memory optimized
- Accelerated computing
11. A solutions architect is working for a small business. The business is
looking for a storage service that temporarily stores frequently changing and
non-persistent data. This type of data can be deleted during instance stops or
terminations. Which service should the solutions architect recommend for this
use case?
- Amazon Elastic Block Store (Amazon EBS)
- Amazon Simple Storage Service (Amazon S3)
- Amazon Elastic Compute Cloud (Amazon EC2) Instance Store
- Amazon Elastic File System (Amazon EFS)
12. Which database is a non-relational database that stores data in key-value
pairs, and is a good fit for hosting simple lookup tables?
- Amazon DynamoDB
- Amazon DocumentDB
- Amazon Neptune
- Amazon Relational Database Service (Amazon RDS)
13. Which core component of Amazon DynamoDB corresponds to a column in a
relational database table?
- Table
- Item
- Attribute
- Database
14. Which AWS database service is best suited for use cases such as social
networking or recommendation engines?
- Amazon DynamoDB
- Amazon Aurora
- Amazon Redshift
- Amazon Neptune
Week 4
1. What are the three components of Amazon EC2 Auto Scaling?
- Scaling policies, security group, EC2 Auto Scaling group
-
Launch template, scaling policies, EC2 Auto Scaling group
- Security group, instance type, key pair
- Amazon Machine Image (AMI) ID, instance type, storage
2. Which of the following features are included in Elastic Load Balancing (ELB)?
- Automatic scaling
- Integration with Amazon Relational Database Service RDS
- Integration with Amazon EC2 Auto Scaling
- A and B
- A and C
3. True or False: When a user uses Elastic Load Balancing (ELB) with an Auto
Scaling group, it is not necessary to manually register individual Amazon
Elastic Compute Cloud (Amazon EC2) instances with the load balancer.
4. An application must choose target groups by using a rule that is based on the
path of a URL. Which Elastic Load Balancing (ELB) type should be used for this
use case?
- Classic Load Balancer
- Application Load Balancer
- Network Load Balancer
- Target Load Balancer
5. What are the two ways that an application can be scaled?
- Vertically and horizontally
- Diagonally and vertically
- Horizontally and diagonally
- Independently and vertically
6. Which elements in Amazon CloudWatch dashboards can be used to view and
analyze metrics?
- Widgets
- Metrics
- Icons
- Components
7. What are the possible states of a metric alarm in Amazon CloudWatch?
- OK, ALARM, NOT_AVAILABLE
- OK, ALERT, INSUFFICIENT_DATA
- OK, ALARM, INSUFFICIENT_DATA
- OK, ALERT, NOT_AVAILABLE
8. What kind of data can a company collect with VPC Flow Logs?
-
Data about network traffic that comes into and out of a virtual private
cloud (VPC)
- Malicious activity and unauthorized behavior
- Configurations of AWS resources
- Compliance-related information
9. What is a benefit of monitoring on AWS?
- Monitoring creates operation overhead.
- Monitoring recognizes security threats and events.
- Monitoring decreases the performance and reliability of resources.
- Monitoring increases speed and agility
10. True or False: When a company redesigns an application by using a serverless
service on AWS, they might not need to configure networking components, such as
a virtual private cloud (VPC), subnets, and security groups.
Week 5 End of Course Assessment
1. What are the four main factors that a solutions architect should consider
when choosing a Region
-
Latency, price, service availability, and compliance
- Latency, high availability, taxes, and compliance
- Latency, taxes, speed, and compliance
- Latency, security, high availability, and resiliency
2. Which statement BEST describes the relationship between Regions, Availability
Zones, and data centers?
-
Availability Zones are clusters of Regions. Regions are clusters of data
centers.
-
Data centers are clusters of Availability Zones. Regions are clusters of
data centers.
-
Regions are clusters of Availability Zones. Availability Zones are
clusters of data centers.
-
Data centers are clusters of Regions. Regions are clusters of Availability
Zones.
3. Which elements can be found in an AWS Identity and Access Management (IAM)
policy?Effect
- Action
- Object
- A and B
- B and C
4. A solutions architect is consulting for a company. When users in the company
authenticate to a corporate network, they want to be able to use AWS without
needing to sign in again. Which AWS identity should the solutions architect
recommend for this use case?
- AWS account root user
- AWS Identity and Access Management (IAM) user
- IAM Role
- IAM Group
5. A company wants to allow resources in a public subnet to communicate with the
internet. What should the company do to meet this requirement?
- Create a route to a private subnet
- Attach an internet gateway to their VPC
- Create a route in a route table to the internet gateway
- A and B
- B and C
6. What does an Amazon Elastic Compute Cloud (Amazon EC2) instance type
indicate?
-
Instance family and instance size
- Instance placement and instance size
- Instance tenancy and instance billing
- Instance Amazon Machine Image (AMI) and networking speed
7. What is a typical use case for Amazon Simple Storage Service (Amazon S3)?
-
Object storage for media hosting
- Object storage for a boot drive
- Block storage for an EC2 instance
- File storage for multiple EC2 instances
8. A solutions architect is working for a healthcare facility and is tasked with
storing 7 years of patient information that is rarely accessed. Which Amazon S3
storage tier should the solutions architect suggest?
- Amazon S3 Standard
-
Amazon S3 Glacier Deep Archive
- Amazon S3 Standard-Infrequent Access
- Amazon S3 Intelligent-Tiering
9. Which task of running and operating the database are users responsible for
when using Amazon Relational Database Service (Amazon RDS)?
- Optimizing the database
- Provisioning and managing the underlying infrastructure
-
Installing the relational database management system on the database
instance
- Installing patches to the operating system for the database instance
10. True or false: A Multi-AZ deployment is beneficial when users want to
increase the availability of their database.
11. What are the three components of Amazon EC2 Auto Scaling?
- Scaling policies, security group, EC2 Auto Scaling group
-
Launch template, scaling policies, EC2 Auto Scaling group
- Security group, instance type, key pair
- Amazon Machine Image (AMI) ID, instance type, storage
12. An application must choose target groups by using a rule that is based on
the path of a URL. Which Elastic Load Balancing (ELB) type should be used for
this use case?
- Classic Load Balancer
- Application Load Balancer
- Network Load Balancer
- Gateway Load Balancer
Related Articles