AWS Quizz Test your AWS knowledge! 🚀 Take our tech quiz to sharpen your skills, challenge your understanding, and compete with others. Start quizzing today! 1 / 14 1. You are running Docker containers on ECS. What is the most important metric to monitor? The instance health of each EC2 instance in your cluster from within CloudWatch. The running container count for each service from within CloudWatch. Monitor the EC2 service dashboard. Watch for posted outages to the ECS service. The memory consumption of each EC2 instance in your cluster from within CloudWatch. 2 / 14 2. What is the best EC2 instance class for a server that continuously has a heavy CPU load? C5 H1 R5 T2 3 / 14 3. Can you lose the public IP address associated with your EC2 instance? Yes, you can lose it when you edit the instance properties and release the IP address. Yes, you can lose it if you reboot the instance. Yes, you can lose it if you stop and start the instance. No, you will never lose the public IP address for your instance. 4 / 14 4. Which AWS service is valid data source for AppSync? none of these answers Step Functions DynamoDB table ElastiCache 5 / 14 5. When you launch an instance into a dedicated-tenancy VPC, what happens? Your instance launch fails, but AWS prompts you to launch a new one with the tenancy attribute set to dedicated You receive an error message notifying you that you must set your instance's tenancy attribute to dedicated Your instance is automatically a Dedicated instance, regardless of the instance's specific tenancy attribute Your instance launch fails immediately 6 / 14 6. Which is default user in Ec2 Linux-red hat/amazon. linux root Ec2user ec2-user 7 / 14 7. How do you limit access to an S3 bucket by source IP address? Create a bucket policy with a condition that limit access to a list of approved IP addresses. Attach this policy to the bucket. You can not limit access to an S3 bucket by IP address. Create the S3 bucket as a target for Application Load Balancer. Use Web Application Firewall (WAF) to create a rule to limit access to the S3 bucket by source IP. In the preperties of the S3 bucket, add an access control option that limit access to the bucket by source IP address. Input the list of IPs into dialog. 8 / 14 8. If you stop and restart an EC2 instance, does it retain its private IP address? Yes, the instance retains its private IP addresses No, it retains only the public IP addresses No, it does not retain its private IP addresses No, it retains only the Elastic IP addresses 9 / 14 9. Use the ___ protocol in a VPC security group to communicate with a DB instance. UDP TCP SSL SSH 10 / 14 10. All the Amazon EC2 instances you launch into a nondefault VPC are ___ by default. protected stateless private public 11 / 14 11. You created a VPC that has a public subnet and a private subnet. A web server was placed in the public subnet and a database server was placed in the private subnet. The web server is able to connect to the database server; however, the database server at 10.0.1.2 is unable to get software updates. What is the cause of this issue? There is no egress-only internet gateway attached to the private subnet of the VPC The router is not configured properly on the VPC. Add a route to route table for the VPC that routes all traffic for 0.0.0.0/0 to the ID of the internet gateway. There is no NAT gateway for the private subnet, so the database server has no routes that give it public internet access to download software updates. The database server needs to be assigned a public address from the pool, or assigned an Elastic IP similar to the instance 10.0.0.2. 12 / 14 12. Which of these AWS services can be related to Lambda via a trigger? SQS, DynamoDB all of these answers SNS, SQS Cognito Sync Trigger, SNS 13 / 14 13. Point out the wrong statement A number of tools are used to support EC2 services The metrics obtained by CloudWatch may be used to enable a feature called Auto Scaling None of the mentioned Amazon Machine Instances are sized at various levels and rented on a computing/hour basis 14 / 14 14. A new developer has been added to the team and you have been asked to provide access to the organization's AWS account. What is the best practice for granting access? Create a IAM user for the new developer. Assign the new developer the a developer group you already created for the other developers. Do not give the new developer access to the AWS console. Using the IAM user that is assigned to the development group, generate a new set of access keys and label these with the name of the developer. Give the new developer the IAM login that is assigned to the development team. This IAM user should already include all of the policies that a developer would need. Create a IAM user for the new developer. Manually assign policies to the new IAM user account. Your score is 0%