Week 2: AWS Compute and Networking

 

1. Which information is needed to create a virtual private cloud (VPC)?

  • The group of subnets that the VPC will reside in.
  • The Availability Zone that the VPC will reside in.
  • The subnet that the VPC will reside in.
  • The AWS Region that the VPC will reside in. 

2. Which of the following can a route table be attached to?

  • AWS Accounts
  • Availability Zone
  • Subnets 
  • Regions

3. A company wants to allow resources in a public subnet to communicate with the internet. Which of the following must the company do to meet this requirement?

  • Create a route to a private subnet
  • Attach an internet gateway to their VPC
  • Create a route in a route table to the internet gateway
  • A and B
  • B and C 

4. What is the compute as a service (CaaS) model?

  • The CaaS model requires that users purchase virtual machines and manually provision servers to run a workload.
  • The CaaS model offers computing resources (such as virtual machines that run on servers in data centers) on demand, by using virtual services. 
  • The CaaS model offers large discounts for computing resources. However, users must run the workload from the server that is stored on-premises.
  • The CaaS model delivers cloud-based applications to users across the globe, over the internet.

Explanation: CaaS, which stands for "compute as a service," is a paradigm of cloud computing that enables users to get access to computing resources on demand via the use of the internet. In this paradigm, customers are able to acquire and operate computing infrastructure, which includes virtualized servers, storage, and networking components, without having to make an investment in or maintain actual hardware.

 Within the realm of cloud computing, the Infrastructure as a Service (IaaS) category includes CaaS as one of its subcategories. Users are able to adjust the amount of computing resources they have available to them according to the demand, and they only pay for the resources that they really utilize. The adaptability of this paradigm, as well as its capacity to rapidly provide and manage computing resources in a way that is both efficient and economical, are its defining characteristics.

5. Which statement about the default settings of a security group is TRUE?

  • Allows all inbound traffic and blocks all outbound traffic by default.
  • Blocks all inbound traffic and allows all outbound traffic by default. 
  • Allows all inbound and outbound traffic by default.
  • Blocks all inbound and outbound traffic by default.

6. What does an Amazon Elastic Compute Cloud (Amazon EC2) instance type indicate?

  • Instance placement and instance size
  • Instance tenancy and instance billing
  • Instance family and instance size 
  • Instance Amazon Machine Image (AMI) and networking speed

Explanation: An instance type of Amazon Elastic Compute Cloud (Amazon EC2) provides information on the virtual hardware characteristics of the EC2 instance. The features of the virtual server that you are deploying in the Amazon Web Services cloud are defined by this information.

7. What is the relationship between Amazon Machine Images (AMIs) and Amazon Elastic Compute Cloud (Amazon EC2) instances?

  • When launching an EC2 instance, the first setting that users configure is the operating system (OS) that they want. Then, they select an AMI and manually install the OS, drives, and installation wizard.
  • The AMI is a virtual server that hosts a workload, but the EC2 instance is a template that models and defines an instance. One advantage of using EC2 instances is that they are reusable.
  • An AMI is a template that contains the software that is required to launch an instance. EC2 instances are live instantiations of what is defined in an AMI, much like a cake is a live instantiation of a cake recipe. 
  • An AMI is a collection of unique EC2 instances. Each time users create an EC2 instance, they must set up a new AMI template for their instance.

8. What is the difference between using AWS Fargate or Amazon Elastic Compute Cloud (Amazon EC2) as the compute platform for Amazon Elastic Container Service (Amazon ECS)?

  • With AWS Fargate, users need to manage cluster capacity and scaling.
  • With Amazon ECS on Amazon EC2, AWS manages and provisions the underlying EC2 instance for containers.
  • With AWS Fargate, AWS manages and provisions the underlying infrastructure for hosting containers. 
  • With Amazon ECS on Amazon EC2, users need to upload only the source code. Amazon ECS takes care of the rest.

9. Which statement about serverless is TRUE?

  • Users must manually scale serverless resources.
  • Users do not pay for idle resources. 
  • Users must provision and manage servers.
  • Users must manage availability and fault tolerance.

Explanation: Developers are able to concentrate on developing code for their applications while using a serverless architecture since they are not required to maintain the underlying infrastructure, which includes servers and scalability. As a result of the cloud provider's ability to manage scalability, execution, and maintenance of the apps automatically, developers are free to focus on developing features and functionality. In the context of cloud computing, the term "serverless" does not suggest that there are no servers involved; rather, it indicates that the responsibility for server maintenance is transferred to the cloud provider, and that developers are paid based on actual use rather than allocations of capacity.

10. True or False: AWS Lambda is always the best solution when running applications on AWS.

  • True
  • False 

Explanation: It is not always the optimal answer for every application or use case, despite the fact that AWS Lambda is a powerful serverless computing tool that is supplied by AWS. There are a number of criteria that determine whether or not AWS Lambda is suitable for an application. These include the nature of the program, its architecture, and the unique needs.

AWS Lambda is an excellent choice for functions that are event-driven, have a short runtime, and are stateless. The management of data processing, the response to events, and the execution of tiny, separate functions are all good examples of jobs that it excels at.

On the other hand, regular EC2 instances or other alternatives offered by Amazon Web Services can be better suitable for some applications that have certain needs. The decision is influenced by a number of variables, including the complexity of the program, the needs for resources, the amount of time required for execution, and overall architectural considerations. AWS services each have their own set of advantages, and the most suitable option is determined by the particular requirements of the application.

11. Which compute service does Amazon Elastic Compute Cloud (Amazon EC2) provide?

  • Container services
  • Serverless
  • Virtual machines (VMs) 
  • Analytics

Explanation: Elastic Compute Cloud, sometimes known as Amazon EC2, is a cloud-based computing platform that offers scalable computing power. On demand, it gives customers the ability to run virtual servers, which are referred to as instances. Amazon Elastic Compute Cloud (EC2) instances provide users the ability to choose the kind of instance, the operating system, and the applications that will run on this instance.

In its most basic form, Amazon Elastic Compute Cloud (EC2) is a web service that offers scalable computing power in the cloud. This makes it simpler for developers to expand and manage applications. Users have the ability to create as many or as few virtual servers as they need, configure themselves for networking and security, and manage their storage. One of the most important services offered by Amazon Web Services (AWS), it serves as the foundation for a wide variety of applications and workloads.

12. Which stage of the instance lifecycle is an instance in when the account starts to accumulate charges?

  • When an instance is in a pending stage
  • When an instance is in a running stage 
  • When an instance is stopped
  • When an instance is terminated

13. Which component of the c5.4xlarge instance determines the instance family and generation number?

  • 4x
  • Large
  • 4xlarge
  • c5 

14. Which container runtime can be used to host a container on an Amazon Elastic Compute Cloud (Amazon EC2) instance?

  • Docker 
  • Container
  • Amazon Simple Storage Service (Amazon S3)
  • Amazon EC2

Explanation: Docker is a well-known container runtime that may be used to host containers on an Amazon Elastic Compute Cloud (EC2) instance. Docker is often used. Docker is a platform that allows for the development, distribution, and use of programs that are contained inside containers. By enabling you to bundle a program together with its dependencies into a container, it guarantees that the application will behave in the same manner across all contexts.

When you have Docker installed on an EC2 instance, you can use it to develop, deploy, and manage containers. This makes it much simpler to work with containerized apps whenever you are using Amazon Web Services (AWS). In addition, Amazon Web Services (AWS) offers services such as Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS), which streamline the process of orchestrating and managing containerized applications in a way that is both scalable and efficient.

15. What is an example of an event that invokes an AWS Lambda function?

  • An AWS API call that is made by an AWS Identity and Access Management (IAM) role
  • An upload of a file to the Amazon Simple Storage Service (Amazon S3) source bucket 
  • An incoming HTTP request to a website that is hosted on Amazon Elastic Compute Cloud (Amazon EC2)
  • A simple WordPress website that has no API integration

Explanation: An AWS Lambda function may be triggered or invoked by a number of different events. One such example is an event that originates from an Amazon S3 bucket. It is possible for a Lambda function to be triggered whenever an item is created, changed, or removed inside the S3 bucket that has been provided.

As an example, you may have a Lambda function that, whenever a new picture is uploaded to an S3 bucket, automatically produces thumbnail images for the image. The Lambda function is triggered by the S3 bucket event, which is the creation of an object. The Lambda function then processes the newly created picture.

The following are some more instances of events that might trigger the execution of AWS Lambda functions: modifications to a DynamoDB database, modifications to an Amazon Kinesis stream, modifications to an Amazon Simple Notification Service (SNS) topic, and several other examples. The serverless and event-driven architecture that Lambda functions provide is made possible by the fact that they can react to a wide range of events that occur across a number of AWS services.

16. True or False: With serverless, users do not need to provision and manage servers.

  • T​rue 
  • ​False

Explanation: Indeed! The users of serverless computing do not have to worry about the provisioning or management of servers. As a result of the cloud provider taking care of the underlying infrastructure, developers are free to concentrate entirely on building code for their apps. In an architecture that does not need servers, the cloud provider is responsible for handling operations such as the deployment, scaling, and maintenance of servers automatically. Instead of paying for capacity that has been allotted, users are invoiced based on the real amount of resources that they use. It is a paradigm change that places an emphasis on event-driven and function-based programming, which simplifies the process of developing and deploying applications.

17. True or False: All AWS services require users to configure a virtual private cloud (VPC).

  • T​rue
  • F​alse 

Explanation: Users are not required to construct a Virtual Private Cloud (VPC) in order to utilize all of the Amazon Web Services (AWS) services, despite the fact that many of these services may be used inside a VPC to improve network isolation and security.

Certain services offered by Amazon Web Services (AWS), particularly those that pertain to storage (for example, Amazon S3) and content delivery (for example, Amazon CloudFront), are intended to be available via the internet without the need of a virtual private cloud (VPC).

Nevertheless, when it comes to services that include computational resources, such as Amazon Elastic computational Cloud (EC2) or AWS Lambda, it is often advised that you configure a virtual private cloud (VPC) in order to offer a network environment that is both secure and separated for your applications.

Therefore, the need of a virtual private cloud (VPC) is contingent upon the particular needs of the service as well as the degree of network isolation that is required for your applications.

18. An engineer is working with networks in the AWS Cloud. What should the engineer use to configure the size of their network?

  • Classless Inter-Domain Routing (CIDR) notation 
  • IPv6 notation
  • IPv4 notation
  • IP addresses

Explanation: On Amazon Web Services (AWS), an engineer should make use of Amazon Virtual Private Cloud (Amazon VPC) in order to set the size of a network. Users have the ability to establish a virtual network in the AWS Cloud by using Amazon Virtual Private Cloud (VPC), which includes private and public subnets, route tables, and security groups.

19. What is the difference between network access control lists (ACLs) and security groups?

  • By default, network ACLs allow incoming traffic and block outgoing traffic from a subnet. Users can change these settings to provide an additional layer of security. However, the default configurations of security groups block all traffic.
  • By default, network ACLs block all traffic from a subnet. However, the default configurations of security groups allow all inbound and outbound traffic. Users can change these settings to provide an additional layer of security.
  • By default, network ACLs block incoming traffic and allow outgoing traffic. The default configurations of security groups block all traffic. Users can change these settings when they configure networking for their instance.

Post a Comment

Previous Post Next Post