Dashboard gives you a personalized view into the performance and availabilityof the AWS services underlying your AWS resources.The benefits of the AWS personal health dashboard include:**A personalized View of Service Health: Personal Health Dashboard gives you apersonalized view of the status of the AWS services that power yourapplications, enabling you to quickly see when AWS is experiencing issues thatmay impact you. For example, in the event of a lost EBS volume associated withone of your EC2 instances, you would gain quick visibility into the status of thespecific service you are using, helping save precious time troubleshooting todetermine root cause.**Proactive Notifications: The dashboard also provides forward lookingnotifications, and you can set up alerts across multiple channels, including emailand mobile notifications, so you receive timely and relevant information to helpplan for scheduled changes that may affect you. In the event of AWS hardwaremaintenance activities that may impact one of your EC2 instances, for example,you would receive an alert with information to help you plan for, and proactivelyaddress any issues associated with the upcoming change. Show
Terms in this set (90)A company is introducing a new product to their customers, and is expecting a surge in traffic to their web application. As part of their Enterprise Support plan, which of the following provides the company with architectural and scaling guidance? Infrastructure Event Management What does the AWS Personal Health Dashboard provide? View of AWS service health Troubleshooting guidance to events impacting resources Which of the following services allows customers to manage their agreements with AWS? AWS Artifact A company complains that they are wasting a lot of money on underutilized compute resources in AWS. Which AWS feature should they use to ensure that their applications are automatically adding/removing compute capacity to closely match the required demand? AWS Auto-scaling What is the AWS database service that allows you to upload data structured in key-value format? DynamoDB Key-value Data The simplest structure for storing data in a What does AWS provide to deploy popular technologies - such as IBM MQ - on AWS with the least amount of effort and time? AWS Quick Start reference deployments Which of the following are examples of AWS-Managed Services, where AWS is responsible for the operational and maintenance burdens of running the service? (Choose TWO) Elastic MapReduce DynamoDB You want to run a questionnaire application for only one day (without interruption), which Amazon EC2 purchase option should you use? On-demand instance According to the AWS Acceptable Use Policy, which of the following statements is true regarding penetration testing of EC2 instances? Performed by customers on their own instances without prior auth from AWS A company has moved to AWS recently. Which of the following would help them ensure that the right security settings are put in place? (Choose two) Amazon Inspector Trusted Advisor A company has an Enterprise Support subscription. They want quick and efficient guidance with their billing and account inquiries. Which of the following should the company use? AWS Support Concierge What should you do in order to keep the data on EBS volumes safe? (Choose two) Ensure EBS data is encrypted at rest Create EBS snapshots An organization has a large number of technical employees who operate their AWS Cloud infrastructure. What does AWS provide to help organize them in teams and then assign the appropriate permissions for each team? IAM Groups Which of the following S3 storage classes is ideal for data with unpredictable access patterns? s3 intelligent tiering The principle "design for failure and nothing will fail" is very important when designing your AWS Cloud architecture. Which of the following would help adhere to this principle? (Choose two) AZs ELB A developer is planning to build a two-tier web application that has a MySQL database layer. Which of the following AWS database services would provide automated backups to his application? Aurora You have discovered that some AWS resources are being used in malicious activities that could compromise your data. What should you do? Contact AWS Abuse team A company has deployed a new web application on multiple Amazon EC2 instances. Which of the following should they use to ensure that the incoming HTTP traffic is distributed evenly across the instances? AWS Application Load Balancer Using Amazon EC2 falls under which of the following cloud computing models? IaaS Which of the following enables you to monitor and collect log files from your Amazon EC2 instances?
CloudWatch Logs What are the connectivity options that can be used to build hybrid cloud architectures? (Choose two) AWS VPN AWS Direct Connect AWS Cloud9 cloud-based integrated development environment (IDE) that lets you write, run, and debug your code with just a browser. It includes a code editor, debugger, and terminal. Cloud9 comes prepackaged with essential tools for popular programming languages, including JavaScript, Python, PHP, and more, so you don't need to install files or configure your development machine to start new projects. Which of the following AWS services are free to use? (Choose two) CloudFormation Auto-scaling What is the primary storage service used by Amazon RDS DB instances? Amazon EBS What is the AWS service that enables you to manage all of your AWS accounts from a single master account? AWS Organizations An organization needs to analyze and process a large number of data sets. Which AWS service should they use? Amazon EMR Which of the following is equivalent to a user name and password and is used to authenticate your programmatic access to AWS services and APIs? Access Keys In your on-premises environment, you can create as many virtual servers as you need from a single template. What can you use to perform the same in AWS? AMI (Amazon Machine Image) Ensuring compliance is a key priority for most businesses. Which of the following AWS services will help them achieve this? CloudTrail Which of the following procedures will help reduce your Amazon S3 costs? Use the right combination of storage classes based on different use cases
Which of the following AWS security features is associated with an EC2 instance and functions to filter incoming traffic requests? Security Groups You are working on two projects that require completely different network configurations. Which AWS service will allow you to isolate resources and network configurations? VPC
Which of the following reserved instance payment options result in you paying a discounted hourly rate throughout the duration of the term? (Choose two) No upfront option Partial Upfront option Which AWS service can be used to store and reliably deliver messages across distributed systems? SQS "Amazon Simple Email Service" is incorrect. Amazon Simple Email Service (Amazon SES) is a cloud-based email sending service designed to help digital marketers and application developers send marketing, notification, and transactional emails. Which of the following AWS services is designed with native Multi-AZ fault tolerance in mind? (Choose two) S3 DynamoDB A company has created a solution that helps AWS customers improve their architectures on AWS. Which AWS program may support this company? APN Consulting Partners What are two advantages of using Cloud Computing over using traditional data centers? (Choose two) Dist. Infrastructure Eliminating single points of failure What is the AWS data warehouse service that supports a high level of query performance on large amounts of datasets? Redshift Which of the following will impact the price paid for an EC2 instance? (Choose two) Instance type Storage capacity Which of the following is the most appropriate means for developers to store Docker container images in the AWS Cloud? Amazon Elastic Container Service (Amazon ECS) is a fully managed container orchestration service. Customers such as Duolingo, Samsung, GE, and Cook Pad use ECS to run their most sensitive and mission critical applications because of its security, reliability, and scalability. Where to go to display the current status of any AWS service? Service Health Dashboard "AWS Personal Health Dashboard" is incorrect. While the Service Health Dashboard displays the general status of AWS services, Personal Health Dashboard gives you a personalized view of the status of the AWS services that power your applications (i.e. not all services), enabling you to quickly see when AWS is experiencing issues that may impact you. How can ELBs improve the fault tolerance of your application? Ensuring that only healthy targets receive traffic What is the minimum level of AWS support that provides 24x7 access to technical support engineers via phone and chat? Business Which of the following AWS services scale automatically without your intervention? (Choose two) Lambda & S3 You have spent a lot of time configuring your newly deployed Amazon EC2 instance. After the demand increases, you decide to provision another EC2 instance with the same configuration and type. How can you achieve this? Create an AMI An Amazon Machine Image (AMI) provides the information required to launch an instance, which is a virtual server in the cloud. You must specify an AMI when you launch an instance, and you can launch as many instances from the AMI as you need. You can also launch instances from as many different AMIs as you need. What can be used to call AWS services from different programming languages? AWS Software Dev Kit The AWS SDK can simplify using AWS services in your applications with an API tailored to your programming language or platform. Programming languages supported include Java, .NET, Node.js, PHP, Python, Ruby, Go, and C++. Which of the following statements best describes the AWS shared controls? Shared Controls are controls which apply to both the infrastructure layer and customer layers, but in completely separate contexts or perspectives. In a shared control, AWS provides the requirements for the infrastructure and the customer must provide their own control implementation within their use of AWS services. Examples include: Which of the following can be used to protect data at rest on Amazon S3? (Choose two) Permissions and Versioning What is the AWS tool that can help a company visualize their AWS spending in the last few months? Cost Explorer The AWS Billing and Cost Management console includes the Cost Explorer tool for viewing AWS cost data as a graph. The user can filter the graphs using the resource tags. If the company is using Consolidated Billing, it generates a report based on the linked accounts which can help to identify areas that require further inquiry. Using the Cost Explorer, the company can view trends and use them to understand their spending and to predict future costs. Which AWS support plan would help provide general guidance when you request Architecture Support? The developer support plan provides general guidance when you request Architecture Support. What does AWS offer to secure your network? (Choose two) ** AWS has a Built-in firewall that can be used to control traffic to your network. The other options are incorrect: "AWS-controlled network access control lists" is incorrect. Network access control lists are customer-controlled NOT AWS-controlled. Doodle, Inc. has a web application that ultimately stores billions of images and videos. All told, there is almost an exabyte of data stored in Doodle's system. Which of the following AWS services can best transfer the data to AWS? Snowmobile AWS Snowmobile is an Exabyte-scale data transfer service used to move extremely large amounts of data to AWS. You can transfer up to 100PB per Snowmobile, a 45-foot long ruggedized shipping container, pulled by a semi-trailer truck. Snowmobile makes it easy to move massive volumes of data to the cloud, including video libraries, image repositories, or even a complete data center migration. At exabyte scale, transferring data with Snowmobile is more secure, fast and cost effective.
Which of the following services help reduce the complexity and time needed to plan your application migration to the AWS Cloud? WS Application Discovery Service helps systems integrators quickly and reliably plan application migration projects by automatically identifying applications running in on-premises data centers, their associated dependencies, and their performance profiles. What are AWS' recommendations regarding root access keys? AWS recommends that you delete your root access keys because you can't restrict permissions for the root user credentials. If you want to manage services that require administrative access create an IAM user, grant administrator access to that user, then use those credentials to interact with AWS. What is a key benefit of accessing AWS Cloud services through an API? The Application Programming Interface (API) allows developers to easily work with various AWS services programmatically. What are the main benefits of using the AWS Service Catalog? AWS Service Catalog allows organizations to create and manage catalogs of IT services that are approved for use on AWS. These IT services can include everything from virtual machine images, servers, software, and databases to complete multi-tier application architectures. AWS Service Catalog allows you to centrally manage commonly deployed IT services, and helps you achieve consistent governance and meet your compliance requirements, while enabling users to quickly deploy only the approved IT services they need. You have just hired a skilled sys-admin to join your team. As usual, you have created a new IAM user for him to interact with AWS services. On his first day, you ask him to create snapshots of all existing Amazon EBS volumes and save them in a new Amazon S3 bucket. However, the new member reports back that he is unable to create neither EBS snapshots nor S3 buckets. What might prevent him from doing this simple job? When a new IAM user is created, that user has NO access to any AWS service. This is called a non-explicit deny. For that user, access must be explicitly allowed via IAM permissions. non-explicit deny When a new IAM user is created, that user has NO access to any AWS service. This is called a non-explicit deny. For that user, access must be explicitly allowed via IAM permissions. An organization starts to perform a TCO analysis to be able to make an informed decision about migrating to AWS. Which of the following should be taken into consideration when performing this analysis? (Choose two) Weighing the financial considerations of owning and operating a data center facility versus employing a cloud infrastructure requires detailed and careful analysis. In practice, it is not as simple as just measuring potential hardware expense alongside utility pricing for compute and storage resources. The Total Cost of Ownership (TCO) is often the financial metric used to estimate and compare direct and indirect costs of a product or a service. Cooling and power consumption, data center space, data center real estate and Labor IT cost are examples of the indirect costs of a physical data center and should be included in TCO analysis. Which services does AWS offer for free? (Choose two) AWS Identity and Access Management is a feature of your AWS account offered at no additional charge. You
will be charged only for use of other AWS services by your Users. For testing purposes, a developer has used one Linux instance for 2 hours, 5 minutes and 9 seconds, and one Windows instance for 4 hours, 23 minutes and 7 seconds. How much time will he be billed for? With per-second billing in EC2 you pay for only what you use. It takes cost of unused minutes and seconds in an hour off of the bill, so you can focus on improving your applications instead of maximizing usage to the hour. You have developed a document generator application that helps users create and modify PDFs. Which of the following allows you to publish your application? AWS Serverless Application Repository is used to share solutions with developers or to help your customers quickly understand the value of products and services you sell and support. Anyone with an AWS account can publish a serverless application or application component to the AWS Serverless Application Repository. You can share your published applications within your team, across your organization, or with the community at large. Publicly shared applications must include a link to the application's source code so others can view what the application does and how it works. Which of the following AWS services uses tiered pricing? S3 Server-based services include: Amazon EC2, Amazon RDS, Amazon Redshift and Amazon EMR. Serverless services include: AWS Lambda, AWS Fargate, Amazon SNS, Amazon SQS and Amazon DynamoDB. Which of the following storage classes is most appropriate to be used for a popular e-commerce website with stable access patterns? S3 Standard offers high durability, availability, and performance object storage for frequently accessed data. Because it delivers low latency and high throughput, S3 Standard is appropriate for a wide variety of use cases, including cloud applications, dynamic websites, content distribution, mobile and gaming applications, and big data analytics. Which of the following is not an AWS reservation model? There are no reservations in S3. You pay for what you use. While the cloud is well-suited for running variable workloads and rapid deployments, many cloud-based workloads display a more predictable pattern. For these stable applications, organizations can achieve significant cost savings by taking advantage of the available reservation models such as EC2 reserved instances, RDS reserved instances, ElastiCache Reserved Nodes, DynamoDB Reserved Capacity and Redshift Reserved Nodes. A company has infrastructure hosted in an on-premises data center. They currently have an operations team that takes care of ID management. If they decide to migrate to the AWS cloud, which of the following services would help them perform the same role in AWS? AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. You use IAM to control who is authenticated (signed in) and authorized (has permissions) to use resources. AWS Federation is incorrect. Federation enables users to access and use AWS resources using their existing corporate credentials. Which of the following are Amazon EC2 reserved instances types? (Select two) There are three types of EC2 reserved instances(RIs) that you can choose from based on your applications needs: Which of the following strategies helps protect your AWS root account?
Anyone who has root user access keys for your AWS account has unrestricted access to all the resources in your account, including billing information. If you don't already have an access key for your AWS account root user, don't create one unless you absolutely need to. If you do have an access key for your AWS account root user, delete it. If you must keep it, rotate (change) the access key regularly. What does AWS Cost Explorer provide to help manage your AWS spend? AWS Cost Explorer has an easy-to-use interface that lets you visualize, understand, and manage your AWS costs and usage over time. Which of the following services gives you access to all AWS auditor-issued reports and certifications? AWS Artifact is your go-to, central resource for compliance-related information that
matters to you. It provides on-demand access to AWS' security and compliance reports and select online agreements. Reports available in AWS Artifact include AWS Service Organization Control (SOC) reports, Payment Card Industry (PCI) reports, and certifications from accreditation bodies across geographies and compliance verticals that validate the implementation and operating effectiveness of AWS security controls. Agreements available in AWS Artifact include the Business Associate Addendum (BAA)
and the Nondisclosure Agreement (NDA). Which of the following AWS services uses Puppet to automate how EC2 instances are configured? AWS OpsWorks is a configuration management service that provides managed instances of Chef and Puppet. Chef and Puppet are automation platforms that allow you to use code to automate the configurations of your servers. OpsWorks lets you use Chef and Puppet to automate how servers are configured, deployed, and managed across your Amazon EC2 instances or on-premises compute environments. Which of the following will affect how much you are charged for storing objects in S3? (Choose two) S3 pricing is based on four factors: For Amazon RDS databases, What does AWS perform on your behalf? (Choose two) In relation to Amazon RDS databases: AWS is responsible for: The customer
is still responsible for: Which of the following are factors to consider for Amazon EBS pricing? (Choose two) Amazon EBS pricing has three factors: What are some key advantages of AWS security? (Choose two) The Benefits of AWS Security include : Which of the following would you use to manage your encryption keys in the AWS Cloud? (Choose two) AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses FIPS 140-2 validated hardware security modules to protect the security of your keys. AWS Key Management Service is integrated with most other AWS services to help you protect the data you store with these services. AWS Key Management Service is also integrated with AWS CloudTrail to provide you with logs of all key usage to help meet your regulatory and compliance needs. AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud. With CloudHSM, you can manage your own encryption keys using FIPS 140-2 Level 3 validated HSMs. CloudHSM offers you the flexibility to integrate with your applications using industry-standard APIs, such as PKCS#11, Java Cryptography Extensions (JCE), and Microsoft CryptoNG (CNG) libraries. Which service helps you by collecting important metrics from a running EC2 instance? Amazon CloudWatch is a monitoring service for AWS cloud resources and the applications you run on AWS. You can use Amazon CloudWatch to collect and track metrics, collect and monitor log files, set alarms, and automatically react to changes in your AWS resources. Your web application currently faces performance issues and suffers from long delays. Which of the following could help you in this situation? AWS X-Ray helps you identify performance bottlenecks. X-Ray's service maps let you see relationships between services and resources in your application in real time. You can easily detect where high latencies are occurring, visualize node and edge latency distribution for services, and then drill down into the specific services and paths impacting application performance. What are some key benefits of using AWS CloudFormation? (Choose two) The benefits of using AWS CloudFormation include: Your company experiences fluctuations in traffic patterns to their e-commerce website when running flash sales. What service can help your company dynamically match the required compute capacity to handle spikes in traffic during flash sales? AWS Auto Scaling monitors your applications and automatically adjusts capacity to maintain steady, predictable performance at the lowest possible cost. Using AWS Auto Scaling, you maintain optimal application performance and availability, even when workloads are periodic, unpredictable, or continuously changing. When demand spikes, AWS Auto Scaling automatically increases the compute capacity, so you maintain performance. When demand subsides, AWS Auto Scaling automatically decreases the compute capacity, so you pay only for the resources you actually need. You manage a blog on AWS that has different stages such as development, testing, and production. How can you create a custom console in each stage to view and manage your resources easily? If you work with multiple resources in multiple stages, you might find it useful to manage all the resources in each stage as a group rather than move from one AWS service to another for each task. Resource Groups help you do just that. By default, the AWS Management Console is organized by AWS service. But with the Resource Groups tool, you can create a custom console that organizes and consolidates information based on your project and the resources that you use. What can you use to assign permissions to an IAM user? The policy is a JSON document that consists of: Which of the following must an IAM user provide to interact with AWS services using the AWS Command Line Interface (AWS CLI)? Access Keys You have discovered that some AWS resources are being used in malicious activities that could compromise your data. What should you do? Abuse Team Which of the following are examples of AWS-Managed Services, where AWS is responsible for the operational and maintenance burdens of running the service? (Choose TWO) Dynamo Elastic MapReduce AWS allows users to manage their resources using a web based user interface. What is the name of this interface? Management Console Which of the following services allows customers to manage their agreements with AWS? Artifact Sets with similar termsAWS Cloud Practitioner - Sample Exams 1, 2, 3, & 4205 terms jeffwindsor AWS Cloud Practitioner101 terms abramsse AWS Cloud Essentials62 terms tiffla92 Cloud Essestials CLO-001120 terms Chennai_King Sets found in the same folderCloud Practitioner #665 terms mettityl000 AWS - Practice Exam #165 terms takaj98 AWS Quiz 465 terms shane1233323 AWS Practitioner Exam - Security6 terms fusion10 Other sets by this creatorASA - Derek11 terms derekglenwilde Recent AWS Concepts103 terms derekglenwilde Trusted Advisor5 terms derekglenwilde Serverless Computing2 terms derekglenwilde Verified questions
COMPUTER SCIENCE On a roulette wheel, the pockets are numbered from 0 to 36. The colors of the pockets are as follows: $$ \begin{matrix} \text{• Pocket 0 is green.}\\ \text{• For pockets 1 through 10, the odd-numbered pockets are red and the even-numbered } \text{pockets are black.}\\ \text{• For pockets 11 through 18, the odd-numbered pockets are black and the even-numbered } \text{pockets are red.}\\ \text{• For pockets 19 through 28, the odd-numbered pockets are red and the even-numbered } \text{pockets are black.}\\ \text{• For pockets 29 through 36, the odd-numbered pockets are black and the even-numbered } \text{pockets are red.}\\ \end{matrix} $$ Write a program that asks the user to enter a pocket number and displays whether the pocket is green, red, or black. The program should display an error message if the user enters a number that is outside the range of 0 through 36. Verified answer
COMPUTER SCIENCE Write a program that first asks the user to type in today’s price of one dollar in Japanese yen, then reads U.S. dollar values and converts each to Japanese yen. Use 0 as the sentinel value to denote the end of dollar inputs. Then the program reads a sequence of yen amounts and converts them to dollars. The second sequence is terminated by another zero value. Verified answer
COMPUTER SCIENCE Show how to compute the length of an LCS using only 2 · min(m, n) entries in the c table plus O(1) additional space. Then show how to do the same thing, but using min(m, n) entries plus O(1) additional space. Verified answer
COMPUTER SCIENCE What is the purpose of interrupts? How does an interrupt differ from a trap? Can traps be generated intentionally by a user program? If so, for what purpose? Verified answer Recommended textbook solutionsFundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 726 solutions
Introduction to the Theory of Computation3rd EditionMichael Sipser 389 solutions Starting Out with Python4th EditionTony Gaddis 629 solutions Other Quizlet setsMDL240 Lab 2 Assessment16 terms MsBrucellaPLUS Exercise Science Chapter 820 terms Dric4565 Management 240 Final Exam40 terms maddygallll Animal Phys Quiz #393 terms Mackenzie_Kalchik Related questionsQUESTION The term "promiscuous mode" refers to configuring a network interface to read all frames that are broadcast on the network segment. 4 answers QUESTION What advantage does Amazon get by creating its own branded products? 15 answers QUESTION Which SQL clause is used to inform the database management system (DBMS) which tables should be interrogated by the query? 15 answers QUESTION How is it possible for every bit of data to be delivered reliably? 2 answers Which AWS service offers on demand access to AWS security and compliance reports?AWS Artifact is your go-to, central resource for compliance-related information that matters to you. It provides on-demand access to AWS' security and compliance reports and select online agreements.
Which AWS service can be used to meet the compliance requirements?AWS KMS is integrated with AWS CloudTrail to provide you with logs of all key usage to help meet your regulatory and compliance needs.
What is AWS artifact and AWS config?AWS Config collects data from multiple regions and multiple accounts through the use of an aggregator. AWS Artifact allows for agreements to be accepted on behalf of member accounts within an organization, even as new reports or accounts are added.
What is the purpose of the service Organisation controls SOC found on AWS artifact?AWS System and Organization Controls (SOC) Reports are independent third-party examination reports that demonstrate how AWS achieves key compliance controls and objectives. The purpose of these reports is to help you and your auditors understand the AWS controls established to support operations and compliance.
|