Question : In which of the following scenario you can use ELB? A. When you want to have your website to be served by EC2 instances across the regions. So that ELB can send your EC2 request to the any region which gives you better resiliency. B. You can use ELB for the website and hosted in single region. C. You have application servers in application layer and webservers are in web layer. Now, you need to balance the load from webserver to app server. Then also you can use it. D. If you want to have secure communication between end user and server using HTTPS, then also you can use ELB.
Correct Answer : Get Lastest Questions and Answer : Explanation: You cannot use ELB in front of EC2 instances which are across the regions. However, you can use it for any internet application service from single region with the fleet of EC2 instances, you can also configure the HTTPS to have secure communication. Similarly communication and load balancing on internal layer also possible using ELB.
Question : You have a website hosted on the AWS with EC severs behind the ELB . You have been informed that there will a commercial advertisement coming up on the TV, which will certainly increase the traffic by 30%-70%, however it cannot be predicted. What all are the possibilities by which you can configure the auto scaling group?
1. You can have configured auto scaling to handle 70% of extra traffic for a scheduled time based on commercial advertisement timings.
2. You can also configured auto scaling group so that manually you can auto scale.
Correct Answer : Get Lastest Questions and Answer : Explanation: You can configure auto scaling group with the following supported plans. - Manually scaling - Schedule the auto scaling - Based on dynamically scale - Whatever is the current scaling maintain it.
Question : When a network condition prevents the delivery of packets across the Internet, the gateways of your VPN delete their Security Associations and attempt to create new ones. What enables the VPN devices to detect such blocking event?
If you have a device that isn't in the preceding list of tested devices, this section describes the requirements the device must meet for you to use it with Amazon VPC. The following lists the requirement the customer gateway must adhere to, the related RFC (for reference), and comments about the requirement.
To provide context for the following requirements, think of each VPN connection as consisting of two separate tunnels. Each tunnel contains an IKE Security Association, an IPsec Security Association, and a BGP Peering. Note that you are limited to 2 Security Associations (SAs), one inbound and one outbound. Some devices use policy-based VPN and will create as many SAs as ACL entries. Therefore, you may need to consolidate your rules and then filter so you don't permit unwanted traffic.
The VPN tunnel comes up when traffic is generated from your side of the VPN connection. The AWS endpoint is not the initiator; your customer gateway must initiate the tunnels.
Utilize IPsec Dead Peer Detection The use of Dead Peer Detection enables the VPN devices to rapidly identify when a network condition prevents delivery of packets across the Internet. When this occurs, the gateways delete the Security Associations and attempt to create new associations. During this process, the alternate IPsec tunnel is utilized if possible.
Question : Which is the wrong statement regarding "Security Group" in VPC
1. Operates at the instance level (first layer of defense) 2. Supports allow rules only 3. Access Mostly Uused Products by 50000+ Subscribers 4. Is stateless: Return traffic must be explicitly allowed by rules 5. It evaluate all rules before deciding whether to allow traffic
Ans : 4 Exp :The following table summarizes the basic differences between security groups and network ACLs.
Security Group Operates at the instance level (first layer of defense) Supports allow rules only Is stateful: Return traffic is automatically allowed, regardless of any rules We evaluate all rules before deciding whether to allow traffic Applies to an instance only if someone specifies the security group when launching the instance, or associates the security group with the instance later on
Network ACL Operates at the subnet level (second layer of defense) Supports allow rules and deny rules Is stateless: Return traffic must be explicitly allowed by rules We process rules in number order when deciding whether to allow traffic Automatically applies to all instances in the subnets it's associated with (backup layer of defense, so you don't have to rely on someone specifying the security group)
Question : You are working with AWS resources e.g. S , RDS and Amazon Glacier. Now, you will be interacting these resources in a controlled manner and these all access controlled are defined in AWS IAM policy. Which all you can define in the IAM policy? A. User name and Password, which has access to AWS resources e.g. S3, Glacier B. Region specific to the user C. Actions what all user can do D. Service names on which user has permissions
Correct Answer : Get Lastest Questions and Answer : Explanation: First of all , please note the below facts about IAM policy and understand the concepts. - IAM policies are not specific to any region. It can be applied to any Principal in Any region, it should be an IAM user - IAM policy is about authorization (what user can do?) , because user is already authenticated. Hence, there is need to store user credentials in any IAM policy.