Cloud Computing and AWS CloudTrail Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the default retention period for events in CloudTrail's Event History?

  • 60 days
  • 120 days
  • 90 days (correct)
  • 30 days
  • Which type of events does CloudTrail log by default?

  • Management Events (correct)
  • Service Events
  • API Events
  • Data Events
  • Which of the following services logs events globally and directs them to us-east-1?

  • Lambda
  • EC2
  • S3
  • IAM (correct)
  • What must be enabled for a trail to log Data Events such as S3 object uploads?

    <p>Data Events (C)</p> Signup and view all the answers

    How is a trail configured to log events for all regions?

    <p>All region trail (A)</p> Signup and view all the answers

    What is the approximate delay in event logging for CloudTrail?

    <p>15 minutes (D)</p> Signup and view all the answers

    What format does CloudTrail use to store events in an S3 bucket?

    <p>Compressed JSON files (B)</p> Signup and view all the answers

    Which statement accurately describes how CloudTrail operates with regards to AWS services?

    <p>Regional services log events in the region created. (A)</p> Signup and view all the answers

    What is a characteristic of on-demand self-service in cloud computing?

    <p>Allows immediate access through a user interface or command line interface (D)</p> Signup and view all the answers

    Which cloud model combines the features of both public and private clouds?

    <p>Hybrid Cloud (B)</p> Signup and view all the answers

    Which cloud service model allows clients to manage everything from data to facilities?

    <p>On-Premises (C)</p> Signup and view all the answers

    What distinguishes a public cloud from a private cloud?

    <p>Public cloud services can be accessed by anyone over the internet (C)</p> Signup and view all the answers

    In the Infrastructure as a Service (IaaS) model, what aspects does the vendor manage?

    <p>Facilities, servers, and operating system up to the OS level (C)</p> Signup and view all the answers

    What is the key benefit of resource pooling in cloud computing?

    <p>Economies of scale leading to cost reductions (A)</p> Signup and view all the answers

    What defines a multi-cloud strategy in cloud computing?

    <p>Using multiple public cloud services simultaneously (B)</p> Signup and view all the answers

    What is one of the primary features of rapid elasticity in cloud services?

    <p>Automatic scaling of resources based on current load (A)</p> Signup and view all the answers

    What is the role of CloudFormation in the AWS infrastructure?

    <p>To synchronize logical resources with physical resources in your AWS account. (B)</p> Signup and view all the answers

    Which option correctly describes a namespace in CloudWatch?

    <p>A unique container for monitoring data that can be named freely, excluding AWS service names. (C)</p> Signup and view all the answers

    In CloudWatch, what is the significance of dimensions?

    <p>They separate data points for different perspectives within the same metric. (D)</p> Signup and view all the answers

    What triggers an alarm in CloudWatch?

    <p>The transition of metric states, such as OK or ALARM. (A)</p> Signup and view all the answers

    Which statement reflects the Shared Responsibility Model correctly?

    <p>AWS is responsible for the security of the cloud infrastructure itself, while customers manage the security of their applications. (C)</p> Signup and view all the answers

    What type of data does CloudWatch collect as metrics?

    <p>Dynamic, time-ordered sets of data points, such as CPU usage. (A)</p> Signup and view all the answers

    What is a characteristic of an alarm state in CloudWatch?

    <p>It can perform automated actions or send notifications based on performance thresholds. (B)</p> Signup and view all the answers

    What happens to an object that is not accessed for 30 days?

    <p>It shifts to Standard-IA. (D)</p> Signup and view all the answers

    How many stacks can a single template create in CloudFormation?

    <p>An unlimited number of stacks. (B)</p> Signup and view all the answers

    Which action is NOT part of S3 Object Lifecycle Management?

    <p>Replicating objects to a different region. (A)</p> Signup and view all the answers

    When implementing S3 replication between different accounts, what must be done?

    <p>A bucket policy must be added on the destination account. (D)</p> Signup and view all the answers

    What is the default behavior regarding object ownership in S3 replication?

    <p>Ownership of objects stays with the source bucket account. (B)</p> Signup and view all the answers

    What is the maximum time an object can remain in Standard-IA before transitioning to Glacier?

    <p>180 days. (D)</p> Signup and view all the answers

    Which statement about Intelligent-Tiering is correct?

    <p>It is beneficial for objects with unknown access patterns. (C)</p> Signup and view all the answers

    In the context of S3 replication, what is the role of the IAM policy?

    <p>It allows the S3 service to read source bucket objects. (D)</p> Signup and view all the answers

    What is the earliest an object can be purged after uploading?

    <p>90 days. (C)</p> Signup and view all the answers

    What is the primary purpose of a Trust Policy in an IAM Role?

    <p>To specify which identities can assume the role. (A)</p> Signup and view all the answers

    Which of the following best describes Temporary Security Credentials?

    <p>They are time-limited and need to be renewed through role reassumption. (B)</p> Signup and view all the answers

    In a Break Glass Situation, what is required to justify accessing restricted resources?

    <p>An established reason for the elevated access. (A)</p> Signup and view all the answers

    How does Web Identity Federation primarily facilitate access for applications with numerous users?

    <p>By allowing broader access through IAM roles. (A)</p> Signup and view all the answers

    What happens when the Permissions Policy of an IAM Role is updated?

    <p>The permissions of previously granted temporary security credentials are also affected. (A)</p> Signup and view all the answers

    What is the main advantage of using an IAM Role over attaching a policy directly to an identity?

    <p>Roles allow for better security and flexibility in assigning permissions. (A)</p> Signup and view all the answers

    What does the Secure Token Service (STS) facilitate in the context of IAM Roles?

    <p>It generates temporary security credentials when a role is assumed. (D)</p> Signup and view all the answers

    Which of the following statements about IAM Users and IAM Roles is accurate?

    <p>IAM Roles are primarily intended for short-term use by other identities. (A)</p> Signup and view all the answers

    What is a benefit of splitting subnets into different tiers within a VPC?

    <p>It facilitates easier management of resources by function. (B)</p> Signup and view all the answers

    Which of the following statements regarding the Custom VPC is accurate?

    <p>Hybrid networking allows a Custom VPC to connect to external networks. (C)</p> Signup and view all the answers

    What is the maximum size of an IPv4 CIDR block that can be allocated for a VPC?

    <p>/16 prefix (D)</p> Signup and view all the answers

    What is the main function of the DNS provided by Route 53 in a VPC?

    <p>To provide DNS hostnames for instances with public IPs. (C)</p> Signup and view all the answers

    Which statement correctly describes the purpose of dedicated tenancy in a Custom VPC?

    <p>It locks resources to dedicated hardware at a premium cost. (D)</p> Signup and view all the answers

    How does splitting a /16 subnet into 16 parts affect the individual subnet sizes?

    <p>Each subnet becomes a /20. (C)</p> Signup and view all the answers

    Which IPv6 CIDR block size can typically be assigned to a VPC?

    <p>/56 (A)</p> Signup and view all the answers

    What is a consequence of not allowing explicit configuration for traffic in and out of a VPC?

    <p>Traffic is isolated, preventing external access unless configured. (C)</p> Signup and view all the answers

    Study Notes

    AWS Certified Solutions Architect - Associate Master Cheat Sheet Study Notes

    • Cloud Computing Fundamentals:

      • On-Demand Self-Service: Provision and terminate services via a UI/CLI without human interaction.
      • Broad Network Access: Access services over any network using standard protocols.
      • Resource Pooling: Economies of scale through shared resources.
      • Rapid Elasticity: Auto-scale resources to meet demand.
      • Measured Service: Pay for what you use.
    • AWS Fundamentals:

      • AWS Support Plans: Basic (free), Developer, Business, and Enterprise.
      • Public vs. Private Services:
        • Public Cloud: uses a public cloud provider like AWS, Azure, or Google Cloud.
        • Private Cloud: on-premises cloud infrastructure.
        • Multi-cloud: uses more than one public cloud in a single deployment
        • Hybrid cloud: uses both private and public clouds in one environment
    • AWS Global Infrastructure:

      • Regions: Specific geographic areas for AWS infrastructure (e.g., Ohio, California, Singapore).
      • Edge Locations: Local distribution points for faster data access for customers.
      • Management: Regions are connected, and some services are global (e.g., IAM).
    • Regions and AZs:

      • AWS regions are geographical areas.
      • Availability zones (AZs) are isolated within a region, offering fault tolerance.
    • Cloud Service Models:

      • On-Premises: The user manages all components.
      • Hosting: Vendor managed facilities, user provides the equipment.
      • IaaS (Infrastructure as a Service): Vendor provides servers up to the operating system, user manages the application on top.
      • PaaS (Platform as a Service): Vendor manages facilities, application, and OS, user manages the configurations of the application.
      • SaaS (Software as a Service): Vendor manages everything, including software and data.
    • AWS Support Plans:

      • Basic (free): One user; basic support.
      • Developer: One user, basic support, general guidance provided.
      • Business: Multiple users, support, personal guidance.
      • Enterprise: Technical account manager.
    • CloudWatch Basics:

      • Metrics, logs, and event hub.
      • Used to collect and manage operational data.
    • High Availability (HA), Fault-Tolerance (FT), and Disaster Recovery (DR):

      • Aims for high uptime, rapid recovery from failures, and disaster preparedness.
      • Fault tolerance ensures continoued proper working despite some components failing.
      • Disaster Recovery addresses recovery from potentially catastrophic events.
    • Domain Name System (DNS):

      • DNS translates human-readable domain names to IP addresses.
      • Includes parts such as DNS clients, resolvers, zones, zone files, and nameservers.
    • RDS (Relational Database Service):

      • Systems for storing and managing data.
      • Structure is defined via schemas comprised of tables.
      • SQL (Structured Query Language) is a feature used.
    • Security Groups:

      • Boundaries that filter network traffic.
      • Attached to a resource.
      • Stateful rules.
      • Implicit deny.
      • Must be configured.
    • Network Address Translation (NAT):

      • Changes source and destination of data packets to allow external access.
      • Requires an external public IP.
    • EC2 (Elastic Compute Cloud):

      • Provides virtual machines (VMs) for compute.
      • Infrastructure as a service
      • Different instance types.
      • Bootstrapping via user data.
    • IAM (Identity and Access Management):

      • Identity Policies: Statements allow or deny access to AWS resources.
      • Statement Components:
        • Statement ID (SID): Descriptive name for the statement.
        • Effect: Allow or Deny.
        • Actions: Specific operations.
        • Resources: Target resources.
      • Priority Level: Explicit Deny, Explicit Allow, and Default Deny (Implicit).
      • Policies: Inline Policies (individual) or Managed Policies (shared).
      • Users: For humans and applications accessing AWS services.
      • Groups: Logical groupings to manage permissions for multiple users.
      • Roles: Assumed roles grants permissions to other identities.
    • S3 (Simple Storage Service):

      • Object storage.
      • Private by default.
      • Uses Object Keys for identification within the bucket
      • Uses Bucket Policies to control access
      • Versioning is used to keep multiple versions of any object.
    • Static Hosting:

      • Enables to host static websites stored in S3.
    • Encryption at Rest:

      • Data in storage is encrypted. User Data
    • Encryption in Transit: Secure transmission of data over the Internet.

    • Object Versioning and MFA Delete:

      • Retain historical versions of objects. Adds extra security.
    • Cross-Account Access:

      • Allows access to resources in other AWS accounts through roles.
    • VPC (Virtual Private Cloud):

      • Isolated network.
      • Has route tables and subnets.
      • Enables using private IP addresses or public address.
    • Security Groups (and Network Access Control Lists (NACLs)):

      • Manage traffic in/out.
    • Internet Gateway:

      • To connect to the internet.
    • Gateway Endpoints:

      • Simplified access to public services within a VPC.
    • Interface Endpoints:

      • Private access to public services.
    • VPC Peering:

      • Networking connection between VPCs.
    • Hybrid and Migration:

      • Site-to-Site VPN: Connects on-premises network to VPC.
    • AWS Direct Connect: Direct connection to AWS network.

    • Storage Gateway: Hybrid storage capabilities.

    • Snowball/Snow Mobile: Physical devices to transfer large amounts of data.

    • AWS Directory Service:

      • Manages on-premises directories in AWS.
    • Advanced-VPC:

      • Detailed information about VPCs, including advanced features and concepts.
    • CloudWatch Logs:

      • Logs data, configured per region.
    • CloudWatch Events/EventBridge:

      • Orchestrates actions on other services in response to events.
    • Route 53: DNS service.

      • Hosted Zones: Data structures for controlling DNS records.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on AWS CloudTrail and cloud computing fundamentals. This quiz covers key concepts such as event logging, cloud service models, and the characteristics of public and private clouds. Perfect for those studying cloud technologies.

    More Like This

    AWS CloudTrail Quiz
    18 questions

    AWS CloudTrail Quiz

    FastGrowingBaltimore5920 avatar
    FastGrowingBaltimore5920
    AWS Security Specialty Exam Questions
    40 questions
    Use Quizgecko on...
    Browser
    Browser