1/90
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is throttling in Amazon API Gateway?
Limits the number of API requests per second to prevent overload and ensure stability
What is enterprise identity federation?
Lets users sign in to AWS using their existing corporate credentials (like Active Directory) instead of creating separate AWS accounts
Why choose NoSQL over relational databases?
Better for unstructured data, can add more servers to grow (horizontal scaling), flexible design, fast with large workloads
What is Amazon DynamoDB?
NoSQL database that stores data as key-value pairs, fast and scales automatically
Why use VPC endpoints for S3 and DynamoDB?
Private, secure, fast access to S3 and DynamoDB without using the internet
What is AWS WAF (web app firewall)?
Monitors and protects HTTP(S) requests for AWS services.
A set of conditions that allows, blocks, or counts web requests to protect applications
Prebuilt WAF rules for common threats (SQL injection, XSS, bots, known CVEs), easier setup and management.
What are step scaling and simple scaling policies?
Step scaling: adjusts capacity in steps based on how much a metric changes.
Simple scaling: adds or removes a fixed amount of capacity when a condition is met.
What is a target tracking scaling policy?
Adjusts group capacity automatically to maintain a specific metric target (like CPU or request count).
What is the default termination policy in Auto Scaling?
shuts down oldest instances first to keep AZs balanced and use EC2 efficiently
What is Amazon API Gateway?
Service to create, deploy, and manage APIs so apps can securely talk to backend services at any scale.
What is a DynamoDB stream?
real-time log of changes (inserts, updates, deletes) made to items in a DynamoDB table
Real-time OS metrics for managed DB (CPU, memory, disk)
On-prem gateway, access cloud via NFS/SMB, stores files as S3 objects, supports lifecycle to Glacier
Requires clients to authenticate with a password before accessing the Redis database
How do you require password authentication on a Redis cluster?
Use the AUTH command to require clients to provide a password before accessing the database
Simplify and manage access to shared S3 buckets with unique names and policies
How do you enforce WORM storage in S3?
Turn on S3 Object Lock in Compliance mode with a set time to stop any changes or deletions
What is CORS (Cross-origin resource sharing) in Amazon S3?
Lets web apps from one domain (website) access S3 resources in another domain (another website)
How should you choose partition keys in DynamoDB?
Use attributes with lots of unique values so data spreads evenly
What is scheduled scaling in Amazon EC2 Auto Scaling?
Automatically changes capacity at specific times by setting start time and desired/min/max sizes (predictable lead changes)
Set start time + new min/max/desired sizes for Auto Scaling group
What is a custom Aurora endpoint used for?
Directs traffic to specific DB instances in an Aurora cluster (e.g., only readers, certain replicas, or custom group).
What EC2 metrics are available in Amazon CloudWatch?
CPU, memory, disk, network, and status checks for EC2 instances
Provides on-demand access to AWS security and compliance reports and select online agreements.
How can you serve private content securely using CloudFront?
Use signed URLs or signed cookies so only authorized users can access the content
How does client-side encryption with a master key work?
Client encrypts data with a data key, then encrypts the data key with the master key
Governance mode: protects objects from most users, can be overridden by admins.
Compliance mode: prevents all changes/deletions until retention period ends.
How is a legal hold different from a retention period?
Legal Hold: stops deletion until you remove it.
Retention period: stops changes or deletion for a set time you choose.
What is AWS Transfer for SFTP used for?
Lets you transfer files to and from S3 using the SFTP protocol
How do you protect S3 objects from accidental deletion?
Enable Versioning and MFA Delete to recover or secure objects from accidental deletion or overwrite.
What are the types of IAM policies?
Identity-based (attached to users, groups, roles)
Resource-based (attached directly to resources, like S3 buckets)
Read, write, and list access to objects in an S3 bucket.
Use Elastic Beanstalk, EC2, or container services (ECS/EKS) to run .NET apps in the cloud
Why is using S3 Infrequent Access storage alone not sufficient for accidental deletion prevention?
It only lowers storage cost but doesn’t protect objects from being deleted