ITNW 1309 Final

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/62

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:32 PM on 11/22/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

63 Terms

1
New cards

Which statement about AWS Pricing is incorrect?

All inbound data transfers are charged

2
New cards

When you invest in Reserved Capacity like Amazon EC2 or Amazon RDS, what three pricing options are available?

AURI, NURI, PURI

3
New cards

Which pricing option offers you the opportunity to try various AWS services for free as long as you keep within specified thresholds of usage?

AWS Free Tier

4
New cards

Which of the following AWS services are offered at no charge? Choose three.

Amazon VPC, Elastic Beanstalk, IAM

5
New cards

Which AWS tool can you use to estimate your monthly costs for deploying resources on AWS?

AWS Pricing Calculator

6
New cards

What minimal level of support gives you access to a Technical Account Manager (TAM)?

Enterprise

7
New cards

Who can act as a dedicated voice for you within AWS and serve as your technical point of contact and advocate?

TAM

8
New cards

Which AWS support plans offer FULL Trusted Advisor benefits? Choose two.

Enterprise, Business

9
New cards

Which AWS support personnel can address all non-technical billing and account level inquiries?

AWS Support Concierge

10
New cards

Your finance team would like to be alerted when the cost of using a new AWS test/dev account is about to reach the approved budget for an upcoming project. Which AWS tool can you use to help you achieve this need?

AWS Budgets

11
New cards

What are the different severity levels associated with support services? Choose all that apply.

Low, Normal, High, Urgent, Critical

12
New cards

Which tool will enable you to view your AWS costs associated with the EC2 service from four months ago?

Cost Explorer

13
New cards

Your organization has multiple AWS Accounts for different purposes. Each account has its own set of services and incurs charges. Which AWS service can you use to take advantage of volume discounts by clubbing your Accounts together?

Consolidated Billing

14
New cards

What are characteristics of Business support plan? Choose three.

24/7 access via email, chat and phone, Access to full Trusted Advisor benefits, Unlimited contacts may open a case

15
New cards

Which of the following is NOT part of the AWS pricing philosophy?

Pay more when you use less

16
New cards

What are the different methods of accessing AWS services? Choose two.

AWS Command Line Interface, Software Development Kits (SDKs)

17
New cards

Which component of the AWS Global infrastructure does Amazon CloudFront use for low-latency delivery?

AWS edge locations

18
New cards

What is true about Availability Zones? Choose two.

AZs within a region are interconnected using high-speed private links, Each availability zone is designed as an independent failure zone

19
New cards

What are some of the important considerations for choosing an AWS Region for deploying your applications? Choose two.

Availability of services within the region, To meet regional compliance and data residency requirements

20
New cards

What service category does CloudFront fall under?

Networking and Content Delivery

21
New cards

True or False. Resources in one AWS region are automatically replicated to other regions

False

22
New cards

The AWS Shared Responsibility model divides security responsibilities between which two parties?

AWS, The AWS customer

23
New cards

What are two examples of AWS's responsibility in the Shared Responsibility mode.?

Physical security of the data center, Virtualization software on the host

24
New cards

Which of the following security actions are performed by customers of AWS? Choose two.

Implementing password policies, Patching the OS on an Amazon EC2 instance

25
New cards

What can be used to provide an application running on an EC2 instance, temporary credentials to access other resources within AWS?

IAM Roles

26
New cards

What type of credentials do you need to provide programmatic access to AWS services?

Access key ID and secret access key

27
New cards

How would a system administrator add an additional layer of login security to a user's AWS Management Console?

Enable Multi-Factor Authentication

28
New cards

Which service can identify the user that made the API call when an Amazon Elastic Compute Cloud instance is terminated?

AWS CloudTrail

29
New cards

What is an AWS root user account?

The email address used to set up the AWS account and always has full administrator access

30
New cards

What are the recommended best practices when assigning IAM permissions to users? Choose two.

Always follow the principle of least privilege, When assigning the same set of permissions to multiple IAM users, put the users in a group and attach the permissions to the group instead

31
New cards

What format are IAM policies written in?

JSON

32
New cards

True or False. IAM is a global service. It applies across all regions.

True

33
New cards

Which AWS service can be used to generate historical configuration change records for your AWS resources?

AWS Config

34
New cards

What are the recommended best practices for AWS root user account? Choose two.

Delete the root user access keys after login, The root user account should always be secured with MFA

35
New cards

Which of the following elements is NOT a part of the statement in an IAM policy document?

Key

36
New cards

IAM policies can be assigned in two ways

identity-based or resource-based

37
New cards

Using AWS shared security model, which of the following are customer responsibilities? Choose two.

Encrypting data, Configuring security groups

38
New cards

Where will you find a compliance document such as a PCI or SOC report?

AWS Artifact

39
New cards

Which is a managed DDOS protection service that safeguards applications running on AWS?

AWS Shield

40
New cards

Which AWS service enables you to create and manage encryption keys, and to control the use of encryption across a wide range of AWS services and your applications?

Amazon KMS

41
New cards

In VPCs with private and public subnets, database servers should be launched into:

private subnet

42
New cards

What component can you use to connect your VPC to the public Internet?

IGW

43
New cards

What would you use if you have multiple VPCs in your AWS account and you need to communicate between them without using the public Internet?

VPC peering

44
New cards

What two protocols are commonly permitted in security groups in order to permit remote administration of instances? Choose two.

RDP, SSH

45
New cards

You want to establish a private connection from the EC2 instance in your VPC to an S3 bucket. What will you use?

VPC endpoint

46
New cards

You have launched a Database server within the private subnet of your VPC. You need to allow the server to access the Internet for downloading patches. What do you need?

NAT Gateway

47
New cards

Which characteristics related to Amazon VPC are true? Choose two.

Each subnet in a VPC maps to a single Availability Zone, It is not possible to change the size of the VPC once it has been created

48
New cards

A Solutions Architect is designing a two-tier application architecture in an Amazon VPC. The web servers are deployed on EC2 instances and the web tier must read and write data to a database cluster. There should be no access to the database from the Internet, but the cluster must be able to obtain software patches from the Internet. Which VPC design meets these requirements?

Public subnets for the web tier and NAT Gateway, and private subnets for the database cluster

49
New cards

You have launched a Linux-based EC2 instance in the public subnet of your Test VPC. What will enable you to login to the instance via SSH?

Key pair

50
New cards

What is the difference between security groups and NACLs? Choose two.

For security groups, all rules are evaluated before the decision is made to allow traffic. For network ACLs, rules are evaluated in order of their numbers, Security groups can be configured to only use ALLOW rules whereas NACLs support both ALLOW and DENY rules

51
New cards

What is Amazon Route 53?

a highly available and scalable DNS service in AWS cloud

52
New cards

You are building a solution to extend a customer's on-premise data center to their AWS VPC . The customer has asked for a faster and more secure alternative to using the Internet. Which AWS product or feature satisfies this requirement?

AWS Direct Connect

53
New cards

For each subnet in a VPC, how many IP addresses are reserved by AWS?

5

54
New cards

Which of the following is true regarding peering VPCs in the same region?

The two VPCs cannot use overlapping address spaces

55
New cards

You have a subnet with a CIDR block 10.0.0.0/24 in your AWS VPC. Which of the following IPv4 addresses are available to you for use?

10.0.0.4

56
New cards

Your company has hundreds of VPCs distributed across multiple AWS accounts and Regions. As the company continues to grow, you anticipate that the VCP-to-VCP connections will grow quickly making management more complex and expensive. What solution can you propose to simplify your model?

Using AWS Transit Gateway

57
New cards

What is the contract length for Reserved instances (RI)?

1 to 3 years

58
New cards

You wish to deploy EC2 Instances in the Amazon AWS Cloud and utilize your existing Microsoft Volume Licenses to reduce costs. Which EC2 pricing option allows you to use your existing server licenses?

Dedicated Hosts

59
New cards

Which EC2 Instances are now billed on a per second basis?

Amazon Linux and Ubuntu

60
New cards

Which two types of root volume are available for Amazon EC2?

EBS, EC2 Instance store

61
New cards

______________ is a compute service that lets you run code without provisioning or managing servers.

AWS Lambda

62
New cards

Which of the following is a method for bidding on unused EC2 capacity?

Spot instance

63
New cards

You have a video encoding application. Currently there is a huge backlog of videos which needs to be processed. You need to add more instances, but you need these instances only until your backlog is reduced. Which of these would be an efficient way to do it?