Quiz – AWS

/5

Basics

1 / 5

Which is NOT a Cloud Computing Model?

2 / 5

Which service helps you in creating your virtual network in AWS cloud infrastructure?

3 / 5

If you want to import a large amount of structure data into a database. Which AWS service helps you achieve this?

4 / 5

Which of the following is considered as an advantage of cloud computing where you can scale up and down in few minutes?

5 / 5

Which AWS service lets you write, run, and debug your code with just a browser?

Your score is

The average score is 49%

0%

Exit

/5

Elastic Compute Cloud (EC2)

1 / 5

You are migrating your application from on-premises servers to AWS EC2 instances. You need block storage attached to your EC2 instances that can balance price and application performance. You require up to 166 TB volume size with IOPS up to 16000 per volume. Which block storage is suitable in this scenario?

2 / 5

Your application is running on AWS, you are managing an architecture that supports AWS EC2 auto scaling to handle the load of the application. Could you please select the statement which is NOT true about AWS EC2 auto scaling?

3 / 5

. It is possible to detach primary Ethernet (Eth0) from an EC2 instance and attach it to another EC2 instance.

4 / 5

Emmy is a solutions architect and is responsible for architect and design of highly available application. After the initial phase, he discovers that application is facing issues until security group is updated with port 443. How much time will the application take to work properly after adding port 443 to security group?

5 / 5

You have been assigned a task to decrease the amount of time required to build servers that are deployed as EC2 instances. As per the security standards these EC2 instances always has the same type of software installed. As an AWS solution architect what you will recommend decreasing the server build time?

Your score is

The average score is 21%

0%

Exit

/5

Identity and Access Management (IAM)

1 / 5

You have deployed your micro services application on AWS Elastic container service, the configuration file of these containers will be fetched from S3 bucket.

AWS ECS should have Amazon s3ReadOnlyAccess permission. How can you configure the permissions?

2 / 5

Your company application is hosted on AWS which uses DynamoDB to store data. To ease up the application sign in process, company has added identity providers so that user can access AWS resources using third-party application like google, Facebook. What solution should be created for the application to obtain temporary credentials to access DynamoDB?

3 / 5

You are working as a solution architect for financial company. Your development team is deploying an application on Amazon EC2 that must call AWS APIs. Development team needs your suggestion to select the appropriate method they will use to allow the application access to APIs in a secure way?

4 / 5

Among the following statements choose whether the statements are TRUE or FALSE:

a. New IAM user inherits all permissions once user is added to a group or by directly attaching policies to the user.

b. New IAM user inherits all permissions once you clone the permissions of an existing IAM user to new user.

5 / 5

You are assigned a task to manage permissions for API gateway, to accomplish that you need to setup the right level of permissions for developers, admins, and users.

Select the correct option to accomplish the task?

Your score is

The average score is 26%

0%

Exit

/5

Simple Storage Service (S3)

1 / 5

You are storing your application files on Amazon S3 bucket. You need to make sure your S3 files/objects are encrypted in transition for data security.

Select the methods to encrypt S3 objects in transition?

2 / 5

You are working for media entertainment company which is using S3 bucket for data storage. Users interact with S3 bucket to read/write the S3 objects.

Users started complaining that updates to a bucket are not being reflected. What can be the most likely reason behind this?

3 / 5

You have uploaded a text file in S3 bucket with content 'Happy'. Within few minutes you have overwritten the text file with content 'Sad'. You have made GetObject request immediately after overwriting, what output can you expect?

4 / 5

You are using S3 bucket to store application file. You currently use Cognito identity pools and user pools. To ease up the sign in process you are planning to include social identity federation like google etc.

How will you differentiate the Cognito identity pool and federated identity providers?

5 / 5

You are creating a social content sharing application which requires storage to store videos and pictures.

Which of the following is AWS object-based storage device you will choose?

Your score is

The average score is 20%

0%

Exit

/5

Database

1 / 5

You are working as a Cloud Architect in cloud consulting company. You deployed your auto-scaled EC2 instances in multiple Availability Zones with an Application Load Balancer in front and configured Multi-Availability Zone to your RDS instance to ensure high availability of both the web servers and the database of your web application. There is a spike in incoming requests in the past few hours and the performance of the primary database is starting to go down. What would happen to the database if the primary DB instance failed?

2 / 5

You are working as cloud engineer in an ecommerce company. Your application database is hosted on single instance MYSQL RDS instance in AWS. You have recently
started facing performance issues on database. You tried to scale up database instance and you are using SQS to pull up the queries in the queue. Among the
following options which can be added to rectify the performance with cost effective solution?

3 / 5

You are working as a solution architect in Ecommerce company. Your database is residing on single instance of MySQL RDS.
After few days your database server started facing performance issue. Suggest a solution to rectify this problem?

4 / 5

You are working as AWS architect, and you have hosted application on AWS. This application interacts with a DynamoDB table which has the Read capacity set to 15. You have started receiving CloudWatch alarms which indicated that throttling was occurring in the requests to the DynamoDB table. Select the correct option to resolve this issue and also ensure the issue does not occur in the future?

5 / 5

Your organization application is hosted on AWS which allows users to upload the images to a S3 bucket. These images are picked by EC2 instance for
processing and placed in to another S3 bucket. You need a storage for storing the images metadata. Among the following options what can be the best
suited data store in this scenario?

Your score is

The average score is 80%

0%

Exit

/5

SQS, SNS, Kinesis, ELB, EBS, EFS

1 / 5

Select the option which is NOT correct with respect to AWS SQS?

2 / 5

Select the statement which is incorrect with respect to EBS volume encryption?

3 / 5

You are working on IOT application which is hosted on AWS. Data collected from IOT sensors are sent to Kinesis stream with default settings.
Every alternate day, data from stream is sent to S3 for processing. It was noticed that S3 is not receiving all the data sent from Kinesis stream.
You are working on root cause, what can be the reason for this?

4 / 5

For your application, 4 Application load balancers are configured, each uses separated target group.
Traffic is growing and due to this load balancers cost is also increasing. Select appropriate answer to reduce the load balancers cost?

5 / 5

You are using AWS SNS service to send the notifications to your subscribers.
Among the give options which of the following is NOT an item of message attribute in AWS SNS?

Your score is

The average score is 0%

0%

Exit

/5

Please log-in to access the quiz!!

/5

Please log-in to access the quiz!!

/5

Please log-in to access the quiz!!

/5

Please log-in to access the quiz!!

/5

Please log-in to access the quiz!!