May 22, 2018 at 7:12 am #100034172Bilal ImtiazParticipant
Question 1 – Which Amazon Web Services you need?
One of your customers is a large multi-national company whose infrastructure on AWS has grown significantly over the past year. The CIO has come to you asking how the huge amount of data that is being generated can be accessed in real-time which would give them a significant edge over all of their competitors. You know that AWS can provide a range of analytics but which of the following would be best to try and accomplish this?
1. Amazon EMR
2. AWS Data Pipeline
3. Amazon Kinesis
4. Amazon CloudWatch
5. AWS Import/Export
6. AWS CloudTrail
Question 2 – Using AWS for High Availability and Disaster Recovery
An organization is setting up an application on AWS to have HA and DR. The organization wants to have both RPO and RTO of 10 minutes. Which of the below mentioned service configurations does not help the organization achieve the said RTP and RTO?
1. Take a snapshot of the data every 10 minutes and copy it to the other region.
2. Use an AMI copy to keep the AMI available in other regions.
3. Create ELB with multi- region routing to allow automated failover when required.
4. Use an elastic IP to assign to a running instance and use Route 53 to map the user’s domain with that IP.
AWS provides an on demand, scalable infrastructure. AWS EC2 allows the user to launch On-Demand instances and the organization should create an AMI of the running instance. Copy the AMI to another region to enable DR in case of region failure. The organization should also use EBS for persistent storage and take a snapshot every 10 minutes to meet RTO. They should also setup an elastic IP and use it with Route 53 to route requests to the same IP.
When one of the instances fails the organization can launch new instances and assign the same EIP to a new instance to achieve HA. The ELB works only for a particular region and does not route requests across regions.
Learn More –
Question 3 – Setup of VPC (Virtual Private Cloud) with Auto Scaling in Amazon Web Services
An organization is trying to setup AWS VPC with Auto Scaling. Which of the below mentioned steps is not required to be configured by the organization to setup AWS VPC?
1. Configure the Auto Scaling Launch configuration with multiple subnets of the VPC to enable the Multi AZ feature.
2. Configure the Auto Scaling Launch configuration which does not allow assigning a public IP to instances.
3. Configure the Auto Scaling group with the VPC ID in which instances will be launched.
4. Configure the Auto Scaling Launch configuration with the VPC security group.
The Amazon Virtual Private Cloud (Amazon VPC) allows the user to define a virtual networking environment in a private, isolated section of the Amazon Web Services (AWS) cloud. The user has complete control over the virtual networking environment. Within this virtual private cloud, the user can launch AWS resources, such as an Auto Scaling group. Before creating the Auto Scaling group it is recommended that the user creates the Launch configuration. Since it is a VPC, it is recommended to set the parameter which does not allow assigning a public IP to the instances.
The user should also set the VPC security group with the Launch configuration and select the subnets where the instances will be launched in the AutoScaling group. The HA will be provided as the subnets may be a part of separate AZs.
Question 4 – How to manage Security on EC2 (Elastic Cloud Compute)
An organization is setting up their website on AWS. The organization is working on various security measures to be performed on the AWS EC2 instances. Which of the below mentioned security mechanisms will not help the organization to avoid future data leaks and identify security weaknesses?
1. Run penetration testing on AWS with prior approval from Amazon.
2. Perform SQL injection for application testing.
3. Perform a Code Check for any memory leaks.
4. Perform a hardening test on the AWS instance.
AWS security follows the shared security model where the user is as much responsible as Amazon. Since Amazon is a public cloud it is bound to be targeted by hackers. If an organization is planning to host their application on AWS EC2, they should perform the below mentioned security checks as a measure to find any security weakness/data leaks:
• Perform penetration testing as performed by attackers to find any vulnerability. The organization must take an approval from AWS before performing penetration testing
• Perform hardening testing to find if there are any unnecessary ports open
• Perform SQL injection to find any DB security issues
The code memory checks are generally useful when the organization wants to improve the application performance.
QUESTION 5 – Consolidate Billing in AWS
Your manager has come to you saying that he is very confused about the bills he is receiving from AWS as he is getting different bills for every user and needs you to look into making it more understandable. Which of the following would be the best solution to meet his request?
1. Consolidated Billing
2. Deferred Billing
3. Aggregated Billing
4. AWS Billing Aggregation
Consolidated Billing enables you to consolidate payment for multiple AWS accounts within your company by designating a single paying account. Consolidated Billing enables you to see a combined view of AWS costs incurred by all accounts, as well as obtain a detailed cost report for each of the individual AWS accounts associated with your “Paying Account”. Consolidated Billing is offered at no additional charge.
- You must be logged in to reply to this topic.