AWS Interview Questions
AWS Interview Questions
AWS Interview Questions
Ans. It is a structured data store that supports indexing and data queries
to both EC2 and S3.
Ans. Yes. Spinup a new larger instance than the one you are running,
then pause that instance to detach the root ebs volume from this server
and discard. After that, stop the live instance and detach its root volume.
Note the unique device ID and attach that root volume to the new
server, and start again. This way you will have scaled vertically.
1|Page
Ans. You can send request by using the REST API or the AWS SDK
wrapper libraries that wrap the underlying Amazon S3 REST API.
Ans. Fully Baked AMI, JeOS (just enough operating system) AMI, and
Hybrid AMI.
Ans. AWS Lambda is a compute service that lets you run code in the
AWS Cloud without provisioning or managing servers.
Q15. What is a Serverless application in AWS?
Ans. The AWS Serverless Application Model (AWS SAM) extends AWS
CloudFormation to provide a simplified way of defining the Amazon API
Gateway APIs, AWS Lambda functions, and Amazon DynamoDB tables
needed by your serverless application.
2|Page
Ans. The buffer is used to make the system more robust to manage
traffic or load by synchronizing different component.
Q20. Give one instance where you would prefer Provisioned IOPS
over Standard RDS storage?
Ans. When you have batch-oriented workloads.
These are some of the popular questions asked in AWS architect
interviews. Always be prepared to answer all types of questions —
technical skills, interpersonal, leadership or methodology. If you are
someone who has recently started your career in cloud computing, you
can always get certified in one of the technical courses like AWS
Architect to get the requisite knowledge and skills.
2. What is AWS?
3|Page
AWS (Amazon Web Services) is a platform to provide secure cloud
services, database storage, offerings to compute power, content delivery,
and other services to help business level and develop.
3. What is the importance of buffer in Amazon Web Services?
An Elastic Load Balancer ensures that the incoming traffic is distributed
optimally across various AWS instances. A buffer will synchronize
different components and makes the arrangement additional elastic to a
burst of load or traffic. The components are prone to work in an unstable
way of receiving and processing the requests. The buffer creates the
equilibrium linking various apparatus and crafts them effort at the
identical rate to supply more rapid services.
4. What is the way to secure data for carrying in the cloud?
One thing must be ensured that no one should seize the information in
the cloud while data is moving from point one to another and also there
should not be any leakage with the security key from several storerooms
in the cloud. Segregation of information from additional companies’
information and then encrypting it by means of approved methods is
one of the options.
Amazon Web Services offers you a secure way of carrying data in the
cloud. Looking to master AWS platform?
5. Name the several layers of Cloud Computing.
Here is the list of layers of the cloud computing
4|Page
Amazon SQS : this component acts as a mediator between different
controllers. Also worn for cushioning requirements those are obtained by
the manager of Amazon.
Amazon SimpleDB : helps in storing the transitional position log and
the errands executed by the consumers.
7. Distinguish between scalability and flexibility
The aptitude of any scheme to enhance the tasks on hand on its present
hardware resources to grip inconsistency in command is known as
scalability. The capability of a scheme to augment the tasks on hand on
its present and supplementary hardware property is recognized as
flexibility, hence enabling the industry to convene command devoid of
putting in the infrastructure at all. AWS has several configuration
management solutions for AWS scalability, flexibility, availability and
management.
9. Define auto-scaling.
Auto- scaling is one of the remarkable features of AWS where it permits
you to arrange and robotically stipulation and spin up fresh examples
without the requirement for your involvement. This can be achieved by
setting brinks and metrics to watch. If those entrances are overcome, a
fresh example of your selection will be configured, spun up and copied
into the weight planner collection.
12. How the processes start, stop and terminate works? How?
Starting and stopping of an instance: If an instance gets stopped or
ended, the instance functions a usual power cut and then change over to
a clogged position. You can establish the case afterward since all the EBS
volumes of Amazon remain attached. If an instance is in stopping state,
then you will not get charged for additional instance.
Finishing the instance: If an instance gets terminated it tends to
perform a typical blackout, so the EBS volumes which are attached will
get removed except the volume’s deleteOnTermination characteristic is
set to zero. In such cases, the instance will get removed and cannot set it
up afterward.
13. What is the relation between an instance and AMI?
AMI can be elaborated as Amazon Machine Image, basically, a template
consisting software configuration part. For example an OS, applications,
application server. If you start an instance, a duplicate of the AMI in a
row as an unspoken attendant in the cloud.
6|Page
Area AWS Azure
Security AWS Shield DDos Protection Service
DB Migration available as Azure also provides DB
DB migration
preview service Migration
NoSQL Dynamo Data Base Azure Cosmos Data Base
Content delivery
CloudFront Azure Content Delivery NW
network
Container instances EC2 Container Service (ECS) Azure Container Service
Azure Command Line Interface
Programmatic access Command Line Interface
(CLI)
Batch computing AWS Batch Azure Batch
7|Page
you can associate a security group from that VPC to the EC2 classic
instance that you would prefer. This will make sure that your EC2 classic
instance is linked to VPC. It will become a member of the chosen security
group in the VPC. It should be remembered that you cannot connect
your EC2 classic instance to more than one virtual private cloud at the
same time.
Q: Is it possible for an EC2 classic instance to become a member of a
virtual private cloud?
No, it is not possible for an EC2 classic instance to be a member of a VPC
though it can become a member of the security group of virtual private
cloud. The security group should be associated with the EC2 classic
instance.
Q: Is it possible for classic link settings on EC2 classic interface to
persist through start or stop cycles?
It is not possible for a classic link connection to persist through the start
or stop cycles of the EC2 classic interface. After the EC2 classic interface
is stopped it will need to be linked back to a virtual private cloud. But the
classic link will persist through the instance reboot cycles.
Q: Is it possible to have more than two network interfaces to be
attached to EC2 instance?
The number of network interfaces that are to be attached with an EC2
instance will depend on the type of the instance.
Q: Can a network interface in one availability zone be attached with
an instance in another availability zone?
The instances that are present in the same availability zone can be
attached with network interfaces.
Q: Can a network interface in one VPC be attached to an instance
that is present in another VPC?
It is possible for the network interfaces to be attached to instances that
are in the same virtual private cloud as that of the interface.
Q: Is it possible to use elastic network interfaces in a way so that it
can host multiple websites which are required to separate IP
addresses on a single instance?
8|Page
Yes it is a possible scenario but not the best suited use case in case of
multiple interfaces. Apart from doing this it is much more logical to
assign an additional private IP address to the instance and to associate
the EIPs to the private IPs as per requirement.
Q: Can a primary interface be detached on EC2 instance?
It is possible. You can only attach and detach secondary interfaces on an
instance of EC2 but you would not be able to detach eth0 interface.
Q: In order to access VPCs that you are peered with, can you make
use of AWS direct connect or hardware VPN connections?
This is not a possible concept. Amazon VPC does not support edge to
edge routing.
Q: Is it possible to peer two VPCs with matching IP address ranges?
No, it is not possible to peer two VPCs with matching IP address ranges
since peered VPCs should posses IP ranges that are non-overlapping.
Q: In order to use peering connections, is it necessary to have an
Internet gateway?
No, you do not need an Internet gateway in order to virtual private cloud
peering connections.
Q: The VPC peering traffic that is present with the region, is it
encrypted?
No, the VPC peering traffic within the region is not encrypted. The traffic
between instances that is present in peered VPCs does remain isolated
and private. This is similar to the fact the traffic between two instances in
the same VPC are also isolated and private.
Q: In case of peering connections, is there any limitation on
bandwidth?
There is no difference in bandwidth between instances in peered VPCs
and also between instances in the VPC. Peered VPCs can be spanned by
a placement group. But you will not be provided with full bisects on
bandwidth that is present between instances in peered VPCs.
Q: Is it possible to modify the route tables of virtual private cloud? If
possible then how?
9|Page
Yes, it is possible go modify the route table of VPC. In order to specify
which subnets are to be routed to VPC, Internet gateway or any other
instances you are allowed to create route rules.
Q: Is it possible to specify the subnet that will be used by a gateway
as its default?
Yes, it possible to specify which subnet will be used by which gateway as
its default. You are entitled to make a default route for each and every
subnet. Via the VPC, Internet gateway or the NAT gateway, the default
route will be able to direct traffic to egress the virtual private cloud.
Q: In order to control and mane Amazon VPC, is it possible to make
use of AWS management console?
It is possible to use AWS management console to manage and control
Amazon VPC objects that include subnets, virtual private cloud, IPsec
VPN connections, and Internet gateways. Also you can make use of a
simple wizard in order to create a virtual private cloud.
Q: What are the VPCs, elastic IP addresses, subnets, Internet
gateways, virtual private gateways, customer gateways and VPN
connections can be created?
There are:-
1. There are five Amazon VPCs per AWS account per region.
2. For per Amazon VPC there are two hundred subnets
3. For per AWS account per region there are five Amazon VPC
elastic IP addresses.
4. For per AWS per region there are five virtual private gateways.
5. For each VPC there is one Internet gateway.
6. There are fifty customer gateways for every AWS account per
region.
7. For every virtual private gateway, there are ten IPsec VPN
connections.
Q: Is there a service level Agreement (SLA) for the Amazon VPC VPN
connection?
No there is no service level agreement for Amazon VPC VPN connection.
Q: Mention the work of an Amazon VPC router.
10 | P a g e
Enabling of Amazon EC2 instances that is within the subnet so that it can
communicate with Amazon EC2 instances on other subnets that are in
the same VPC is done by an Amazon VPC router. It also helps in enabling
Internet gateways, subnets, and virtual private gateways so that it can
communicate with each other. You will not get between usage data from
the router. But you are entitled to obtain network usage statistics from
the instances which are using Amazon cloud watch.
Q: Is the property of multicast or broadcast supported by Amazon
VPC?
No, Amazon VPC do not support multicast or broadcast.
Q: Mention the process in which a VPC access the Internet.
In order to give instances in the VPC the power to both direct
communicate outbound to the Internet and also to get the unsolicited
inbound traffic from the Internet, you can make use of public IP
addresses which include elastic IP addresses.
Q: Mention the process in which instances without public IP
addresses access the Internet.
There are two ways in which instances without public addresses can
make use of the Internet.
Those instances that are without public IP addresses can route their
traffic through a NAT instance or a NAT gateway so that it can access the
Internet. In order to traverse the Internet, these instances make use of
public IP address of the NAT gateway or the NAT instance. Outbound
communication is allowed by the NAT instance or NAT gateway but it do
not permit machines on the Internet to start a connection with the
addressed instances privately.
For those VPCs that are provided by a hardware VPN connection or
direct connect connection, the instances can route the Internet traffic
through the virtual private gateway to the existing data centre. It can
then access the Internet through the existing egress points and also new
tweak security or monitoring devices.
Q: Mention the process in which a hardware VPN connection turns
work with Amazon VPC.
11 | P a g e
The virtual private cloud is connected to the data centre with the help of
a hardware VPN connection. Internet protocol security VPN connections
are supported by Amazon. In order to intern the integrity and
confidentiality of a data which is in transit, this data is transferred
between the VPN and the data centres are routed over an encrypted
VPN connection. To establish a hardware VPN connection you do not
need an Internet gateway.
Q: How can one connect a VPC to corporate data centre?
In order to establish a hardware VPN connection among an existing
network and Amazon, VPC will permit you to interact with Amazon EC2
instances that are present within a VPC as if they were already present
within the existing network. Network address translation is not
performed by AWS on Amazon EC2 instances that are present within a
VPN connection that is VPC accessed through hardware.
Q: Name the customer gateway devices that are used to connect to
Amazon VPC
Statically routed VPN connections and dynamically routed VPN
connections are the two types of VPN connections. The customer
gateway devices that supports statically routed VPN connections must
be able to do:-
1. Using pre-shared keys, establish IKE security association.
2. In tunnel mode, establish IPsec security associations.
3. Utilization of AES 128 bit or 256 bit encryption function
4. Prior to encryption, perform packet fragmentation.
5. Utilization of SHA 1 or SHA 2 having function
The custom gateway devices that supports dynamically routed VPN
connections must be able to:-
1.Establishing border gateway protocol peering
2.Utilization of IPsec dead peer detection
3.Binding of tunnels to logical interfaces which have VPN route
based
Q: Mention the VPCs for which the classic link cannot be enabled.
A VPC which has a classless inter domain routing is one type of VPCs for
which you cannot enable classic link. Another one is the VPC which has a
route table entry that points to 10.0.0.0/8 CIDR space.
12 | P a g e
Q: Is it possible for traffic from an EC2 classic instance to travel
through the Amazon VPC and then egress through the internet
gateway, virtual private gateway or to peer VPCs?
It is only possible to route the traffic from an EC2 classic instance to the
private IP addresses that is within the VPC. They cannot be routed to any
other destination which is outside the VPC.
Q: Is the access control between the EC2 classic instance and other
instances which are present in the EC2 classic platform be affected
by classic link?
The access control that is defined for an EC2 classic instance through its
existing security groups from the EC2 classic platform cannot be
changed with classic link.
Q: Name the tools that are available to help troubleshoot the
hardware VPN configuration.
The status of the VPN connection is displayed by the Describe VPN
connection API. It also includes the Up or down state of each and every
VPN tunnel and it shows corresponding error messages if either one of
the tunnel is down.
Q. What is Amazon Machine Image (AMI)?
A Machine Image on Amazon (AMI) contains a software configuration
information like OS information, app server, and app information. We
can even launch multiple instances of an AMI.
Q. What is Amazon Machine Image and what is the relation between
Instance and AMI?
Amazon Web Services provides several ways to access Amazon EC2, like
web-based interface, AWS Command Line Interface (CLI) and Amazon
Tools for Windows Powershell. First, you need to sign up for an AWS
account and you can access Amazon EC2.
Amazon EC2 provides a Query API. These requests are HTTP or HTTPS
requests that use the HTTP verbs GET or POST and a Query parameter
named Action.
13 | P a g e
1) Explain what is AWS?
AWS stands for Amazon Web Service; it is a collection of remote
computing services also known as cloud computing platform. This new
realm of cloud computing is also known as IaaS or Infrastructure as a
Service.
2) Mention what are the key components of AWS?
The key components of AWS are
• Route 53: A DNS web service
• Simple E-mail Service: It allows sending e-mail using RESTFUL API
call or via regular SMTP
• Identity and Access Management: It provides enhanced security
and identity management for your AWS account
• Simple Storage Device or (S3): It is a storage device and the most
widely used AWS service
• Elastic Compute Cloud (EC2): It provides on-demand computing
resources for hosting applications. It is very useful in case of
unpredictable workloads
• Elastic Block Store (EBS): It provides persistent storage volumes
that attach to EC2 to allow you to persist data past the lifespan of a
single EC2
• CloudWatch: To monitor AWS resources, It allows administrators
to view and collect key Also, one can set a notification alarm in case of
trouble.
3) Explain what is S3?
S3 stands for Simple Storage Service. You can use S3 interface to store
and retrieve any amount of data, at any time and from anywhere on the
web. For S3, the payment model is “pay as you go”.
4) Explain what is AMI?
AMI stands for Amazon Machine Image. It’s a template that provides the
information (an operating system, an application server and applications)
required to launch an instance, which is a copy of the AMI running as a
14 | P a g e
virtual server in the cloud. You can launch instances from as many
different AMIs as you need.
5) Mention what is the relation between an instance and AMI?
From a single AMI, you can launch multiple types of instances. An
instance type defines the hardware of the host computer used for your
instance. Each instance type provides different compute and memory
capabilities. Once you launch an instance, it looks like a traditional host,
and we can interact with it as we would with any computer.
6) What does an AMI include?
An AMI includes the following things
• A template for the root volume for the instance
• Launch permissions decide which AWS accounts can avail the AMI
to launch instances
• A block device mapping that determines the volumes to attach to
the instance when it is launched
15 | P a g e
Service. Cloud.
It is just a data storage service which It is a cloud web service which is used to
is used to store large binary files. host the application created.
It is not required to run a server. It is enough to run a server.
It has a REST interface and uses It is just like a huge computer machine
secure HMAC-SHA1 authentication which can handle application like
keys. Python, PHP, Apache and any other
database.
13) Mention what are the security best practices for Amazon EC2?
For secure Amazon EC2 best practices, follow the following steps
• Use AWS identity and access management to control access to your
AWS resources
16 | P a g e
• Restrict access by allowing only trusted hosts or networks to access
ports on your instance
• Review the rules in your security groups regularly
• Only open up permissions that your require
• Disable password-based login, for instance, launched from your AMI
17 | P a g e
Easy E-mail Service: It permits addressing e-mail utilizing RESTFUL
API request or through normal SMTP
Identity and Access Management: It gives heightened protection
and identity control for your AWS account
Simple Storage Device or (S3): It is warehouse equipment and the
well-known widely utilized AWS service
Elastic Compute Cloud (EC2): It affords on-demand computing
sources for hosting purposes. It is extremely valuable in trouble of
variable workloads
Elastic Block Store (EBS): It presents persistent storage masses that
connect to EC2 to enable you to endure data beyond the lifespan of a
particular EC2
Cloud Watch: To observe AWS sources, It permits managers to
inspect and obtain key Additionally, one can produce a notification
alert in the state of crisis.
3. Question 3. What Is The Importance Of Buffer In Amazon
Web Services?
Answer :
An Elastic Load Balancer ensures that the incoming traffic is
distributed optimally across various AWS instances. A buffer will
synchronize different components and makes the arrangement
additional elastic to a burst of load or traffic. The components are
prone to work in an unstable way of receiving and processing the
requests. The buffer creates the equilibrium linking various apparatus
and crafts them effort at the identical rate to supply more rapid
services.
18 | P a g e
6. Question 6. Explain Can You Vertically Scale An Amazon
Instance ? How?
Answer :
Surely, you can vertically estimate on Amazon instance. During that
• Twist up a fresh massive instance than the one you are currently
governing
• Delay that instance and separate the source webs mass of server
and dispatch
• Next, quit your existing instance and separate its source quantity
• Note the different machine ID and connect that source mass to your
fresh server
• Also, begin it repeatedly Study AWS Training Online From Real Time
Experts
7. Question 7. What Are The Components Involved In Amazon
Web Services?
Answer :
There are 4 components involved and are as below. Amazon S3: with
this, one can retrieve the key information which are occupied in
creating cloud structural design and amount of produced information
also can be stored in this component that is the consequence of the
key specified. Amazon EC2 instance: helpful to run a large distributed
system on the Hadoop cluster. Automatic parallelization and job
scheduling can be achieved by this component.
Amazon SQS: this component acts as a mediator between different
controllers. Also worn for cushioning requirements those are obtained
by the manager of Amazon.
Amazon SimpleDB: helps in storing the transitional position log and
the errands executed by the consumers.
8. Question 8. What Is Lambda@edge In Aws?
Answer :
• In AWS, we can use Lambda@Edge utility to solve the problem of
low network latency for end users.
• In Lambda@Edge there is no need to provision or manage
servers. We can just upload our Node.js code to AWS Lambda and
create functions that will be triggered on CloudFront requests.
• When a request for content is received by CloudFront edge
location, the Lambda code is ready to execute.
• This is a very good option for scaling up the operations in
CloudFront without managing servers.
9. Question 9. Distinguish Between Scalability And Flexibility?
Answer :
19 | P a g e
The aptitude of any scheme to enhance the tasks on hand on its
present hardware resources to grip inconsistency in command is
known as scalability. The capability of a scheme to augment the tasks
on hand on its present and supplementary hardware property is
recognized as flexibility, hence enabling the industry to convene
command devoid of putting in the infrastructure at all. AWS has
several configuration management solutions for AWS scalability,
flexibility, availability and management.
10. Question 10. Name The Various Layers Of The Cloud
Architecture?
Answer :
There are 5 layers and are listed below
o CC- Cluster Controller
o SC- Storage Controller
o CLC- Cloud Controller
o Walrus
o NC- Node Controller
11. Question 11. What Are The Different Types Of Events
Triggered By Amazon Cloud Front?
Answer :
Different types of events triggered by Amazon CloudFront are as
follows:
Viewer Request: When an end user or a client program makes an
HTTP/HTTPS request to CloudFront, this event is triggered at the Edge
Location closer to the end user.
Viewer Response: When a CloudFront server is ready to respond to a
request, this event is triggered.
Origin Request: When CloudFront server does not have the
requested object in its cache, the request is forwarded to Origin
server. At this time this event is triggered.
Origin Response: When CloudFront server at an Edge location
receives the response from Origin server, this event is triggered.
12. Question 12. Which Automation Gears Can Help With Spinup
Services?
Answer :
The API tools can be used for spinup services and also for the written
scripts. Those scripts could be coded in Perl, bash or other languages
of your preference. There is one more option that is patterned
administration and stipulating tools such as a dummy or improved
descendant. A tool called Scalr can also be used and finally we can go
with a controlled explanation like a Rightscale.
13. Question 13. What Is An Ami ? How Do I Build One?
Answer :
20 | P a g e
AMI holds for Amazon Machine Image. It is efficiently a snap of the
source filesystem. Products appliance servers have a bio that shows
the master drive report of the initial slice on a disk. A disk form though
can lie anyplace physically on a disc, so Linux can boot from an
absolute position on the EBS warehouse interface.
Create a unique AMI at beginning rotating up and instance from a
granted AMI. Later uniting combinations and components as needed.
Comprise wary of setting delicate data over an AMI (learn salesforce
online). For instance, your way credentials should be joined to an
instance later spinup. Among a database, mount an external volume
that carries your MySQL data next spinup actually enough.
14. Question 14. What Are The Main Features Of Amazon Cloud
Front?
Answer :
Some of the main features of Amazon CloudFront are as follows:
Device Detection Protocol Detection Geo Targeting Cache Behavior
Cross Origin Resource Sharing Multiple Origin Servers HTTP Cookies
Query String Parameters Custom SSL.
15. Question 15. What Is The Relation Between An Instance And
Ami?
Answer :
AMI can be elaborated as Amazon Machine Image, basically, a
template consisting software configuration part. For example an OS,
applications, application server. If you start an instance, a duplicate of
the AMI in a row as an unspoken attendant in the cloud.
16. Question 16. What Is Amazon Ec2 Service?
Answer :
Amazon Elastic Compute Cloud (Amazon EC2) is a web service that
provides resizable (scalable) computing capacity in the cloud. You can
use Amazon EC2 to launch as many virtual servers you need. In
Amazon EC2 you can configure security and networking as well as
manage storage.Amazon EC2 service also helps in obtaining and
configuring capacity using minimal friction.
17. Question 17. What Are The Features Of The Amazon Ec2
Service?
Answer :
As the Amazon EC2 service is a cloud service so it has all the cloud
features. Amazon EC2 provides the following features:
• Virtual computing environment (known as instances)
• Pre-configured templates for your instances (known as Amazon
Machine Images – AMIs)
21 | P a g e
• Amazon Machine Images (AMIs) is a complete package that you
need for your server (including the operating system and additional
software)
• Amazon EC2 provides various configurations of CPU, memory,
storage and networking capacity for your instances (known as
instance type)
• Secure login information for your instances using key pairs (AWS
stores the public key and you can store the private key in a secure
place)
• Storage volumes of temporary data is deleted when you stop or
terminate your instance (known as instance store volumes)
• Amazon EC2 provides persistent storage volumes (using Amazon
Elastic Block Store – EBS)
• A firewall that enables you to specify the protocols, ports, and
source IP ranges that can reach your instances using security groups
• Static IP addresses for dynamic cloud computing (known as Elastic
IP address)
• Amazon EC2 provides metadata (known as tags)
• Amazon EC2 provides virtual networks that are logically isolated
from the rest of the AWS cloud, and that you can optionally connect
to your own network (known as virtual private clouds – VPCs)
18. Question 18. What Is Amazon Machine Image And What Is
The Relation Between Instance And Ami?
Answer :
Amazon Web Services provides several ways to access Amazon EC2,
like web-based interface, AWS Command Line Interface (CLI) and
Amazon Tools for Windows Powershell. First, you need to sign up for
an AWS account and you can access Amazon EC2.
Amazon EC2 provides a Query API. These requests are HTTP or HTTPS
requests that use the HTTP verbs GET or POST and a Query parameter
named Action.
19. Question 19. What Is Amazon Machine Image (ami)?
Answer :
An Amazon Machine Image (AMI) is a template that contains a
software configuration (for example, an operating system, an
application server, and applications). From an AMI, we launch an
instance, which is a copy of the AMI running as a virtual server in the
cloud. We can even launch multiple instances of an AMI.
23 | P a g e
• Use AWS Identity and Access Management (AM) to control access
to your AWS resources.
• Restrict access by only allowing trusted hosts or networks to access
ports on your instance.
• Review the rules in your security groups regularly, and ensure that
you apply the principle of least
• Privilege — only open up permissions that you require.
• Disable password-based logins for instances launched from your
AMI. Passwords can be found or cracked, and are a security risk.
23. Question 23. Explain Stopping, Starting, And Terminating An
Amazon Ec2 Instance?
Answer :
Stopping and Starting an instance: When an instance is stopped, the
instance performs a normal shutdown and then transitions to a
stopped state. All of its Amazon EBS volumes remain attached, and
you can start the instance again at a later time. You are not charged
for additional instance hours while the instance is in a stopped state.
Terminating an instance: When an instance is terminated, the
instance performs a normal shutdown, then the attached Amazon EBS
volumes are deleted unless the volume’s deleteOnTermination
attribute is set to false. The instance itself is also deleted, and you can’t
start the instance again at a later time.
24. Question 24. Explain Elastic Block Storage? What Type Of
Performance Can You Expect? How Do You Back It Up? How Do
You Improve Performance?
Answer :
EBS is a virtualized SAN or storage area network. That means it is
RAID storage to start with, so it’s redundant and fault tolerant. If disks
die in that RAID you don’t lose data. Great! It is also virtualized, so
you can provision and allocate storage, and attach it to your server
with various API calls. No calling the storage expert and asking him or
her to run specialized commands from the hardware vendor.
Performance on EBS can exhibit variability. That is, it can go above the
SLA performance level, then drop below it. The SLA provides you with
an average disk I/O rate you can expect. This can frustrate some folks,
especially performance experts who expect reliable and consistent disk
throughout on a server. Traditional physically hosted servers behave
that way. Virtual AWS instances do not.
Backup EBS volumes by using the snapshot facility via API call or via a
GUI interface like elasticfox.
Improve performance by using Linux software raid and striping across
four volumes.
24 | P a g e
25. Question 25. What Is S3? What Is It Used For? Should
Encryption Be Used?
Answer :
S3 stands for Simple Storage Service. You can think of it like FTP
storage, where you can move files to and from there, but not mount it
like a filesystem. AWS automatically puts your snapshots there, as well
as AMIs there. Encryption should be considered for sensitive data, as
S3 is a proprietary technology developed by Amazon themselves, and
as yet unproven vis-a-vis a security standpoint.
26. Question 26. What Is An Ami? How Do I Build One?
Answer :
AMI stands for Amazon Machine Image. It is effectively a snapshot of
the root filesystem. Commodity hardware, servers have a bios that
points the master boot record of the first block on a disk. A disk
image, though can sit anywhere physically on a disk, so Linux can boot
from an arbitrary location on the EBS storage network.
Build a new AMI by first spinning up and instance from a trusted
AMI.Then adding packages and components as required. Be wary of
putting sensitive data onto an AMI. For instance, your access
credentials should be added to an instance after spinup with a
database, mount an outside volume that holds your MySQL data after
spinup as well.
25 | P a g e
29. Question 29. What Automation Tools Can I Use To Spin Up
Servers?
Answer :
The most obvious way is to roll-your-own scripts, and use the AWS
API tools. Such scripts could be written in bash, Perl or another
language or your choice.
The next option is to use a configuration management and
provisioning tools like puppet or better it’s successor Opscode
Chef.You might also look towards a tool like Scalr. Lastly, you can go
with a managed solution such as Rightscale.
30. Question 30. What Is Configuration Management? Why
Would I Want To Use It With Cloud Provisioning Of Resources?
Answer :
Configuration management has been around for a long time in web
operations and systems administration. Yet the cultural popularity of
it has been limited. Most systems administrators configure machines
as software was developed before version control – that is manually
making changes on servers. Each server can then and usually is
slightly different. Troubleshooting though, is straightforward as you
login to the box and operate on it directly. Configuration
management brings a large automation tool in the picture, managing
servers like strings of a puppet. This forces standardization, best
practices, and reproducibility as all configs are versioned and
managed. It also introduces a new way of working which is the
biggest hurdle to its adoption.
Enter the cloud, then configuration management becomes even more
critical.That’s because virtual servers such as amazons EC2 instances
are much less reliable than physical ones.You absolutely need a
mechanism to rebuild them as-is at any moment.This pushes best
practices like automation, reproducibility and disaster recovery into
center stage.
31. Question 31. Explain How You Would Simulate Perimeter
Security Using The Amazon Web Services Model?
Answer :
Traditional perimeter security that we’re already familiar with using
firewalls and so forth is not supported in the Amazon EC2 world. AWS
supports security groups.One can create a security group for a jump
box with ssh access – only port 22 open.From there a webserver group
and database group are created.The webserver group allows 80 and
443 from the world, but port 22 *only* from the jump box
group.Further the database group allows port 3306 from the
webserver group and port 22 from the jump box group.Add any
machines to the webserver group and they can all hit the database.
26 | P a g e
No one from the world can, and no one can directly ssh to any of
your boxe.
32. Question 32. How To Use Amazon Sqs?
Answer :
Amazon SQS (Simple Queue Service) is a message passing mechanism
that is used for communication between different connectors that are
connected with each other. It also acts as a communicator between
various components of Amazon. It keeps all the different functional
components together. This functionality helps different components
to be loosely coupled, and provide an architecture that is more failure
resilient system.
27 | P a g e
Section 1: What is Cloud Computing
Answer D.
Explanation: This type of architecture would be a hybrid cloud. Why?
Because we are using both, the public cloud, and your on premises
servers i.e the private cloud. To make this hybrid architecture easy to use,
wouldn’t it be better if your private and public cloud were all on the
same network(virtually). This is established by including your public
cloud servers in a virtual private cloud, and connecting this virtual cloud
with your on premise servers using a VPN(Virtual Private Network).
Section 2: Amazon EC2 Interview Questions
For a detailed discussion on this topic, please refer our EC2 AWS blog.
ec2-create-group CreateSecurityGroup
A. Groups the user created security groups into a new group for easy
access.
B. Creates a new security group for use with your account.
C. Creates a new group inside the security group.
D. Creates a new rule inside the security group.
Answer B.
Explanation: A Security group is just like a firewall, it controls the traffic
in and out of your instance. In AWS terms, the inbound and outbound
traffic. The command mentioned is pretty straight forward, it says create
security group, and does the same. Moving along, once your security
group is created, you can add different rules in it. For example, you have
28 | P a g e
an RDS instance, to access it, you have to add the public IP address of
the machine from which you want access the instance in its security
group.
You should be using an On Demand instance for the same. Why? First of
all, the workload has to be processed now, meaning it is urgent, secondly
you don’t need them once your backlog is cleared, therefore Reserved
Instance is out of the picture, and since the work is urgent, you cannot
stop the work on your instance just because the spot price spiked,
therefore Spot Instances shall also not be used. Hence On-Demand
instances shall be the right choice in this case.
4. You have a distributed application that periodically processes large
volumes of data across multiple Amazon EC2 Instances. The application
is designed to recover gracefully from Amazon EC2 instance failures. You
are required to accomplish this task in the most cost effective way.
A. Spot Instances
B. Reserved instances
C. Dedicated instances
D. On-Demand instances
Answer: A
Explanation: Since the work we are addressing here is not continuous, a
reserved instance shall be idle at times, same goes with On Demand
instances. Also it does not make sense to launch an On Demand instance
whenever work comes up, since it is expensive. Hence Spot Instances will
be the right fit because of their low rates and no long term
commitments.
29 | P a g e
5. How is stopping and terminating an instance different from each
other?
A. Dedicated
B. Isolated
C. One
D. Reserved
Answer A.
Explanation: The Instance tenancy attribute should be set to Dedicated
Instance. The rest of the values are invalid.
Answer C.
30 | P a g e
Explanation: You are not charged, if only one Elastic IP address is
attached with your running instance. But you do get charged in the
following conditions:
• When you use more than one Elastic IPs with your instance.
• When your Elastic IP is attached to a stopped instance.
• When your Elastic IP is not attached to any instance.
First of all, let’s understand that Spot Instance, On-Demand instance and
Reserved Instances are all models for pricing. Moving along, spot
instances provide the ability for customers to purchase compute capacity
with no upfront commitment, at hourly rates usually lower than the On-
Demand rate in each region. Spot instances are just like bidding, the
bidding price is called Spot Price. The Spot Price fluctuates based on
supply and demand for instances, but customers will never pay more
than the maximum price they have specified. If the Spot Price moves
higher than a customer’s maximum price, the customer’s EC2 instance
will be shut down automatically. But the reverse is not true, if the Spot
prices come down again, your EC2 instance will not be launched
automatically, one has to do that manually. In Spot and On demand
instance, there is no commitment for the duration from the user side,
however in reserved instances one has to stick to the time period that he
has chosen.
Answer B.
Explanation: Reserved Instances is a pricing model, which is available for
all instance types in EC2.
31 | P a g e
10. How to use the processor state control feature available on the
c4.8xlarge instance?
Now, why the C state and P state. Processors have cores, these cores
need thermal headroom to boost their performance. Now since all the
cores are on the processor the temperature should be kept at an optimal
state so that all the cores can perform at the highest performance.
Now how will these states help in that? If a core is put into sleep state it
will reduce the overall temperature of the processor and hence other
cores can perform better. Now the same can be synchronized with other
cores, so that the processor can boost as many cores it can by timely
putting other cores to sleep, and thus get an overall performance boost.
Concluding, the C and P state can be customized in some EC2 instances
like the c4.8xlarge instance and thus you can customize the processor
according to your workload.
How to do it? You can refer this tutorial for the same.
• 10 Gbps in a single-flow,
• 20 Gbps in multiflow i.e full duplex
• Network traffic outside the placement group will be limited to 5
Gbps(full duplex).
32 | P a g e
12. To deploy a 4 node cluster of Hadoop in AWS which instance
type can be used?
13. Where do you think an AMI fits, when you are designing an
architecture for a solution?
33 | P a g e
So, with reference to the above figure the regions to choose between
are, Mumbai and North Virginia. Now let us first compare the pricing,
you have hourly prices, which can be converted to your per month
figure. Here North Virginia emerges as a winner. But, pricing cannot be
the only parameter to consider. Performance should also be kept in mind
hence, let’s look at latency as well. Latency basically is the time that a
server takes to respond to your requests i.e the response time. North
Virginia wins again!
So concluding, North Virginia should be chosen for this use case.
15. Is one Elastic IP address enough for every instance that I have
running?
Depends! Every instance comes with its own private and public address.
The private address is associated exclusively with the instance and is
returned to Amazon EC2 only when it is stopped or terminated.
Similarly, the public address is associated exclusively with the instance
until it is stopped or terminated. However, this can be replaced by the
Elastic IP address, which stays with the instance as long as the user
doesn’t manually detach it. But what if you are hosting multiple websites
on your EC2 server, in that case you may require more than one Elastic IP
address.
16. What are the best practices for Security in Amazon EC2?
There are several best practices to secure Amazon EC2. A few of them
are given below:
34 | P a g e
• Use AWS Identity and Access Management (IAM) to control access
to your AWS resources.
• Restrict access by only allowing trusted hosts or networks to access
ports on your instance.
• Review the rules in your security groups regularly, and ensure that
you apply the principle of least
• Privilege – only open up permissions that you require.
• Disable password-based logins for instances launched from your
AMI. Passwords can be found or cracked, and are a security risk.
Answer B.
Explanation: Rather than making changes to every object, its better to
set the policy for the whole bucket. IAM is used to give more granular
permissions, since this is a website, all objects would be public by
default.
Answer D.
Explanation: Taking queue from the previous questions, this use case
involves more granular permissions, hence IAM would be used here.
Yes, it can be used for instances with root devices backed by local
instance storage. By using Amazon S3, developers have access to the
same highly scalable, reliable, fast, inexpensive data storage
infrastructure that Amazon uses to run its own global network of web
sites. In order to execute systems in the Amazon EC2 environment,
developers use the tools provided to load their Amazon Machine Images
(AMIs) into Amazon S3 and to move them between Amazon S3 and
Amazon EC2.
Another use case could be for websites hosted on EC2 to load their static
content from S3.
For a detailed discussion on S3, please refer our S3 AWS blog.
Answer C.
Explanation: The fastest way to do it would be launching a new storage
gateway instance. Why? Since time is the key factor which drives every
36 | P a g e
business, troubleshooting this problem will take more time. Rather than
we can just restore the previous working state of the storage gateway on
a new instance.
21. When you need to move data over long distances using the
internet, for instance across countries or continents to your Amazon
S3 bucket, which method or service will you use?
A. Amazon Glacier
B. Amazon CloudFront
C. Amazon Transfer Acceleration
D. Amazon Snowball
Answer C.
Explanation: You would not use Snowball, because for now, the
snowball service does not support cross region data transfer, and since,
we are transferring across countries, Snowball cannot be used. Transfer
Acceleration shall be the right choice here as it throttles your data
transfer with the use of optimized network paths and Amazon’s content
delivery network upto 300% compared to normal data transfer speed.
37 | P a g e
23. If you want to launch Amazon Elastic Compute Cloud (EC2)
instances and assign each instance a predetermined private IP
address you should:
Answer C.
Explanation: The best way of connecting to your cloud resources (for
ex- ec2 instances) from your own data center (for eg- private cloud) is a
VPC. Once you connect your datacenter to the VPC in which your
instances are present, each instance is assigned a private IP address
which can be accessed from your datacenter. Hence, you can access your
public cloud resources, as if they were on your own network.
Answer B.
38 | P a g e
Explanation: If there is a network which has a large no. of hosts,
managing all these hosts can be a tedious job. Therefore we divide this
network into subnets (sub-networks) so that managing these hosts
becomes simpler.
Answer B.
Explanation: Route Tables are used to route network packets, therefore
in a subnet having multiple route tables will lead to confusion as to
where the packet has to go. Therefore, there is only one route table in a
subnet, and since a route table can have any no. of records or
information, hence attaching multiple subnets to a route table is
possible.
Answer B.
Explanation: CloudFront is a content delivery system, which caches data
to the nearest edge location from the user, to reduce latency. If data is
not present at an edge location, the first time the data may get
transferred from the original server, but from the next time, it will be
served from the cached edge.
39 | P a g e
29. If I’m using Amazon CloudFront, can I use Direct Connect to
transfer objects from my own data center?
Answer D.
Explanation: No, since the purpose of having a standby instance is to
avoid an infrastructure failure (if it happens), therefore the standby
instance is stored in a different availability zone, which is a physically
different independent infrastructure.
32. When would I prefer Provisioned IOPS over Standard RDS storage?
Answer A.
Explanation: Provisioned IOPS deliver high IO rates but on the other
hand it is expensive as well. Batch processing workloads do not require
manual intervention they enable full utilization of systems, therefore
a provisioned IOPS will be preferred for batch oriented workload.
A. Yes
B. Only with MySQL based RDS
C. Only for Oracle RDS instances
D. No
Answer D.
Explanation: No, Standby DB instance cannot be used with primary DB
instance in parallel, as the former is solely used for standby purposes, it
cannot be used unless the primary instance goes down.
35. Your company’s branch offices are all over the world, they use a
software with a multi-regional deployment on AWS, they use
MySQL 5.6 for data persistence.
The task is to run an hourly batch process and read data from every
region to compute cross-regional reports which will be distributed
41 | P a g e
to all the branches. This should be done in the shortest time
possible. How will you build the DB architecture in order to meet
the requirements?
Answer A.
Explanation: For this we will take an RDS instance as a master, because
it will manage our database for us and since we have to read from every
region, we’ll put a read replica of this instance in every region where the
data has to be read from. Option C is not correct since putting a read
replica would be more efficient than putting a snapshot, a read replica
can be promoted if needed to an independent DB instance, but with a
Db snapshot it becomes mandatory to launch a separate DB Instance.
36. Can I run more than one DB instance for Amazon RDS for free?
Yes. You can run more than one Single-AZ Micro database instance, that
too for free! However, any use exceeding 750 instance hours, across all
Amazon RDS Single-AZ Micro DB instances, across all eligible database
engines and regions, will be billed at standard Amazon RDS prices. For
example: if you run two Single-AZ Micro DB instances for 400 hours each
in a single month, you will accumulate 800 instance hours of usage, of
which 750 hours will be free. You will be billed for the remaining 50
hours at the standard Amazon RDS price.
For a detailed discussion on this topic, please refer our RDS AWS blog.
37. Which AWS services will you use to collect and process e-
commerce data for near real-time analysis?
A. Amazon ElastiCache
B. Amazon DynamoDB
42 | P a g e
C. Amazon Redshift
D. Amazon Elastic MapReduce
Answer B,C.
Explanation: DynamoDB is a fully managed NoSQL database service.
DynamoDB, therefore can be fed any type of unstructured data, which
can be data from e-commerce websites as well, and later, an analysis can
be done on them using Amazon Redshift. We are not using Elastic
MapReduce, since a near real time analyses is needed.
Yes. When using the GetItem, BatchGetItem, Query or Scan APIs, you can
define a Projection Expression to determine which attributes should be
retrieved from the table. Those attributes can include scalars, sets, or
elements of a JSON document.
Answer D.
Explanation: DynamoDB has the ability to scale more than RDS or any
other relational database service, therefore DynamoDB would be the apt
choice.
41. Which of the following use cases are suitable for Amazon
DynamoDB? Choose 2 answers
Answer C,D.
Explanation: If all your JSON data have the same fields eg [id,name,age]
then it would be better to store it in a relational database, the metadata
on the other hand is unstructured, also running relational joins or
complex updates would work on DynamoDB as well.
42. How can I load my data to Amazon Redshift from different data
sources like Amazon RDS, Amazon DynamoDB and Amazon EC2?
• You can use the COPY command to load data in parallel directly to
Amazon Redshift from Amazon EMR, Amazon DynamoDB, or any
SSH-enabled host.
• AWS Data Pipeline provides a high performance, reliable, fault
tolerant solution to load data from a variety of AWS data sources.
You can use AWS Data Pipeline to specify the data source, desired
data transformations, and then execute a pre-written import script
to load your data into Amazon Redshift.
44 | P a g e
43. Your application has to retrieve data from your user’s mobile
every 5 minutes and the data is stored in DynamoDB, later every day
at a particular time the data is extracted into S3 on a per user basis
and then your application is later used to visualize the data to the
user. You are asked to optimize the architecture of the backend
system to lower cost, what would you recommend?
A. Create a new Amazon DynamoDB (able each day and drop the one
for the previous day after its data is on Amazon S3.
B. Introduce an Amazon SQS queue to buffer writes to the Amazon
DynamoDB table and reduce provisioned write throughput.
C. Introduce Amazon Elasticache to cache reads from the Amazon
DynamoDB table and reduce provisioned read throughput.
D. Write data directly into an Amazon Redshift cluster replacing both
Amazon DynamoDB and Amazon S3.
Answer C.
Explanation: Since our work requires the data to be extracted and
analyzed, to optimize this process a person would use provisioned IO,
but since it is expensive, using a ElastiCache memoryinsread to cache the
results in the memory can reduce the provisioned read throughput and
hence reduce cost without affecting the performance.
Answer A,C.
45 | P a g e
Explanation: Since it does a lot of read writes, provisioned IO may
become expensive. But we need high performance as well, therefore the
data can be cached using ElastiCache which can be used for frequently
reading the data. As for RDS since read contention is happening, the
instance size should be increased and provisioned IO should be
introduced to increase the performance.
Answer C.
Explanation: A Redshift cluster would be preferred because it easy to
scale, also the work would be done in parallel through the nodes,
therefore is perfect for a bigger workload like our use case. Since each
month 4 GB of data is generated, therefore in 2 year, it should be around
96 GB. And since the servers will be increased to 100K in number, 96 GB
will approximately become 96TB. Hence option C is the right answer.
Section 6: AWS Auto Scaling, AWS Load Balancer
46. Suppose you have an application where you have to render images
and also do some general computing. From the following services which
service will best fit your need?
Answer B.
Explanation: You will choose an application load balancer, since it
supports path based routing, which means it can take decisions based on
the URL, therefore if your task needs image rendering it will route it to a
different instance, and for general computing it will route it to a different
instance.
48. How will you change the instance type for instances which are
running in your application tier and are using Auto Scaling. Where
will you change it from the following areas?
Answer D.
Explanation: Auto scaling tags configuration, is used to attach metadata
to your instances, to change the instance type you have to use auto
scaling launch configuration.
47 | P a g e
49. You have a content management system running on an Amazon
EC2 instance that is approaching 100% CPU utilization. Which
option will reduce load on the Amazon EC2 instance?
Answer A.
Explanation:Creating alone an autoscaling group will not solve the
issue, until you attach a load balancer to it. Once you attach a load
balancer to an autoscaling group, it will efficiently distribute the load
among all the instances. Option B – CloudFront is a CDN, it is a data
transfer tool therefore will not help reduce load on the EC2 instance.
Similarly the other option – Launch configuration is a template for
configuration which has no connection with reducing loads.
50. When should I use a Classic Load Balancer and when should I use
an Application load balancer?
A Classic Load Balancer is ideal for simple load balancing of traffic across
multiple EC2 instances, while an Application Load Balancer is ideal for
microservices or container-based architectures where there is a need to
route traffic to multiple services or load balance across multiple ports on
the same EC2 instance.
48 | P a g e
Answer B.
Explanation: Connection draining is a service under ELB which
constantly monitors the health of the instances. If any instance fails a
health check or if any instance has to be patched with a software update,
it pulls all the traffic from that instance and re routes them to other
instances.
A. Sticky Sessions
B. Fault Tolerance
C. Connection Draining
D. Monitoring
Answer B.
Explanation: When ELB detects that an instance is unhealthy, it starts
routing incoming traffic to other healthy instances in the region. If all the
instances in a region becomes unhealthy, and if you have instances in
some other availability zone/region, your traffic is directed to them. Once
your instances become healthy again, they are re routed back to the
original instances.
Answer B.
Explanation: Lifecycle hooks are used for putting wait time before any
lifecycle action i.e launching or terminating an instance happens. The
purpose of this wait time, can be anything from extracting log files
before terminating an instance or installing the necessary softwares in an
instance before launching it.
49 | P a g e
54. A user has setup an Auto Scaling group. Due to some issue the
group has failed to launch a single instance for more than 24 hours.
What will happen to Auto Scaling in this condition?
A. Auto Scaling will keep trying to launch the instance for 72 hours
B. Auto Scaling will suspend the scaling process
C. Auto Scaling will start an instance in a separate region
D. The Auto Scaling group will be terminated automatically
Answer B.
Explanation: Auto Scaling allows you to suspend and then resume one
or more of the Auto Scaling processes in your Auto Scaling group. This
can be very useful when you want to investigate a configuration problem
or other issue with your web application, and then make changes to your
application, without triggering the Auto Scaling process.
Section 7: CloudTrail, Route 53
55. You have an EC2 Security Group with several running EC2 instances.
You changed the Security Group rules to allow inbound traffic on a new
port and protocol, and then launched several new instances in the same
Security Group. The new rules apply:
Answer A.
Explanation: Any rule specified in an EC2 Security Group applies
immediately to all the instances, irrespective of when they are launched
before or after adding a rule.
Answer A.
Explanation: Route 53 record sets are common assets therefore there is
no need to replicate them, since Route 53 is valid across regions
Answer A.
Explanation: AWS CloudTrail provides inexpensive logging information
for load balancer and other AWS resources This logging information can
be used for analyses and other administrative work, therefore is perfect
for this use case.
Answer A.
Explanation: AWS CloudTrail has been designed for logging and
tracking API calls. Also this service is available for storage, therefore
should be used in this use case.
51 | P a g e
59. Which of the following are true regarding AWS CloudTrail?
(Choose 2 answers)
Answer B,C.
Explanation: Cloudtrail is not enabled for all the services and is also not
available for all the regions. Therefore option B is correct, also the logs
can be delivered to your S3 bucket, hence C is also correct.
You will need to get a list of the DNS record data for your domain name
first, it is generally available in the form of a “zone file” that you can get
from your existing DNS provider. Once you receive the DNS record data,
you can use Route 53’s Management Console or simple web-services
interface to create a hosted zone that will store your DNS records for
your domain name and follow its transfer process. It also includes steps
such as updating the nameservers for your domain name to the ones
associated with your hosted zone. For completing the process you have
to contact the registrar with whom you registered your domain name
and follow the transfer process. As soon as your registrar propagates the
new name server delegations, your DNS queries will start to get
answered.
Section 8: AWS SQS, AWS SNS, AWS SES, AWS ElasticBeanstalk
52 | P a g e
62. Which of the following services you would not use to deploy an app?
A. Elastic Beanstalk
B. Lambda
C. Opsworks
D. CloudFormation
Answer B.
Explanation: Lambda is used for running server-less applications. It can
be used to deploy functions triggered by events. When we say serverless,
we mean without you worrying about the computing resources running
in the background. It is not designed for creating applications which are
publicly accessed.
Answer A.
Explanation: Elastic Beanstalk prepares a duplicate copy of the instance,
before updating the original instance, and routes your traffic to the
duplicate instance, so that, incase your updated application fails, it will
switch back to the original instance, and there will be no downtime
experienced by the users who are using your application.
53 | P a g e
In contrast, AWS Opsworks is an integrated configuration management
platform for IT administrators or DevOps engineers who want a high
degree of customization and control over operations.
54 | P a g e
application-oriented AWS resource types including Amazon EC2
instances, Amazon EBS volumes, Elastic IPs, and Amazon CloudWatch
metrics.
Answer C.
Explanation: The key created and the data to be encrypted should be in
the same region. Hence the approach taken here to secure the data is
incorrect.
68. A company needs to monitor the read and write IOPS for their
AWS MySQL RDS instance and send real-time alerts to their
operations team. Which AWS services can accomplish this?
Answer B.
Explanation: Amazon CloudWatch is a cloud monitoring tool and hence
this is the right service for the mentioned use case. The other options
listed here are used for other purposes for example route 53 is used for
DNS services, therefore CloudWatch will be the apt choice.
When an event like this occurs, the “automatic rollback on error” feature
is enabled, which causes all the AWS resources which were created
55 | P a g e
successfully till the point where the error occurred to be deleted. This is
helpful since it does not leave behind any erroneous data, it ensures the
fact that stacks are either created fully or not created at all. It is useful in
events where you may accidentally exceed your limit of the no. of Elastic
IP addresses or maybe you may not have access to an EC2 AMI that you
are trying to run etc.
• Roll-your-own scripts, and use the AWS API tools. Such scripts
could be written in bash, perl or other language of your choice.
• Use a configuration management and provisioning tool like puppet
or its successor Opscode Chef. You can also use a tool like Scalr.
• Use a managed solution such as Rightscale.
Answer C.
Explanation: The key created and the data to be encrypted should be in
the same region. Hence the approach taken here to secure the data is
incorrect.
68. A company needs to monitor the read and write IOPS for their
AWS MySQL RDS instance and send real-time alerts to their
operations team. Which AWS services can accomplish this?
Answer B.
Explanation: Amazon CloudWatch is a cloud monitoring tool and hence
this is the right service for the mentioned use case. The other options
56 | P a g e
listed here are used for other purposes for example route 53 is used for
DNS services, therefore CloudWatch will be the apt choice.
When an event like this occurs, the “automatic rollback on error” feature
is enabled, which causes all the AWS resources which were created
successfully till the point where the error occurred to be deleted. This is
helpful since it does not leave behind any erroneous data, it ensures the
fact that stacks are either created fully or not created at all. It is useful in
events where you may accidentally exceed your limit of the no. of Elastic
IP addresses or maybe you may not have access to an EC2 AMI that you
are trying to run etc.
• Roll-your-own scripts, and use the AWS API tools. Such scripts
could be written in bash, perl or other language of your choice.
• Use a configuration management and provisioning tool like puppet
or its successor Opscode Chef. You can also use a tool like Scalr.
• Use a managed solution such as Rightscale.
57 | P a g e
58 | P a g e