1.
What are the authentication options for Amazon Web Services?
Correct Answer
C. Username and password, certificate and access keys
Explanation
The authentication options for Amazon Web Services include username and password, certificate, and access keys. These options allow users to securely access and authenticate their accounts on the platform. The combination of username and password provides basic authentication, while the use of certificates adds an extra layer of security. Access keys, on the other hand, are used for programmatic access to AWS services. By using a combination of these authentication options, users can ensure the security and integrity of their AWS accounts.
2.
Which of the following is Amazon Web Services' latest encryption tool?
Correct Answer
A. Amazon Elastic Block Storage Encryption
Explanation
Amazon Elastic Block Storage Encryption is the correct answer because it is a service provided by Amazon Web Services (AWS) that allows users to encrypt their data at rest on Amazon Elastic Block Storage (EBS) volumes. This encryption tool ensures that data stored on EBS volumes is protected and secure, providing an extra layer of security for users' data.
3.
Which amongst the following tools is for monitoring?
Correct Answer
B. CloudWatch
Explanation
CloudWatch is the correct answer because it is a monitoring service provided by Amazon Web Services (AWS). It allows users to collect and track metrics, collect and monitor log files, and set alarms. CloudWatch provides insights into resource utilization, application performance, and operational health, enabling users to monitor their AWS resources and applications in real-time. It helps in identifying issues, troubleshooting, and making informed decisions to optimize resource utilization and improve overall performance.
4.
Which of these can happen if a hacker gets your Amazon Web Services key?
Correct Answer
D. All of the above
Explanation
If a hacker gets your Amazon Web Services key, all of the mentioned consequences can happen. The server can be terminated, meaning the hacker can shut down your server and disrupt your services. The hacker can also gain unauthorized access to your account, allowing them to manipulate your data, steal sensitive information, or carry out malicious activities. Additionally, the hacker can delete your data, causing significant data loss and potential damage to your business operations. Therefore, all of the mentioned scenarios are possible if a hacker obtains your AWS key.
5.
Which of these categories does Amazon Web Services fall into?
Correct Answer
C. Infrastructure as a service
Explanation
Amazon Web Services falls into the category of Infrastructure as a Service (IaaS). This means that AWS provides virtualized computing resources over the internet, such as servers, storage, and networking. With IaaS, users have more control over the underlying infrastructure and can manage and control their own operating systems, applications, and data. AWS offers a wide range of services and tools to help businesses build and manage their own IT infrastructure in a flexible and scalable manner.
6.
How much does Amazon Glacier charge per GB per month?
Correct Answer
B. 1 cent
Explanation
Amazon Glacier charges 1 cent per GB per month. This means that for every gigabyte of data stored on Amazon Glacier, the cost is only 1 cent per month. This pricing structure makes Amazon Glacier a cost-effective option for long-term storage of large amounts of data.
7.
Which of the following details is automated by Amazon Elastic Beanstalk?
Correct Answer
D. All of the above
Explanation
Amazon Elastic Beanstalk is a fully managed service that automates the deployment, scaling, and management of applications. It automates capacity provisioning by allowing users to easily deploy applications without having to worry about the underlying infrastructure. It also automates load balancing by distributing incoming traffic across multiple instances to ensure optimal performance. Additionally, it automates auto scaling by automatically adjusting the number of instances based on the application's needs, ensuring that it can handle varying levels of traffic. Therefore, all of the given details - capacity provisioning, load balancing, and auto scaling - are automated by Amazon Elastic Beanstalk.
8.
Amazon Web Sevices is available to customers in how many countries?
Correct Answer
D. 190
Explanation
Amazon Web Services (AWS) is a cloud computing platform that provides various services to customers. The correct answer is 190, which means that AWS is available in 190 countries. This indicates the global reach and widespread availability of AWS, allowing customers from a large number of countries to access and utilize its services for their computing needs.
9.
Which of these is a recommended way to protect access key?
Correct Answer
A. Define I am policies
Explanation
A recommended way to protect access keys is to define IAM (Identity and Access Management) policies. IAM policies allow you to specify permissions and control access to AWS resources. By defining IAM policies, you can ensure that access keys have only the necessary permissions required for specific tasks, reducing the risk of unauthorized access or misuse of resources.
10.
What is Amazon's policy concerning hacked accounts?
Correct Answer
B. Closure of accounts
Explanation
Amazon's policy concerning hacked accounts is to close the affected accounts. This is done to protect the account holder's personal information and prevent any further unauthorized access or fraudulent activity. By closing the hacked accounts, Amazon ensures the security and privacy of its customers and takes appropriate measures to resolve any issues related to the hacking incident.