Which features and services does AWS have?
AWS has, among other features: computing, management tools, mobile services,
storage, database, and media services.
Which storage item is commonly used for online storage?
S3 or S3 buckets
In IAM, which areas need to be considered with restrictions and access?
Computing, Storage, Database, and App services
What do Roles contain in AWS?
Roles are collections of policies to which services are assigned.
When working with Cognito, what are Identity pools?
Identity pools provide AWS credentials to grant your users access to other AWS services.
There are two ways to create a User Pool. What are they?
The two ways to create a User Pool are Review defaults and Step through settings.
What is Lambda's functionality, and why is it used with AWS?
AWS Lambda is a computing service that lets you run code without provisioning or
managing servers.
Can you use Oracle RDBMS with DynamoDB?
No, DynamoDB is for non-relational databases, and Oracle is a relational database.
What is Simple Storage Service (S3)?
S3 is an online storage service.
Which AWS IDE toolkit is beneficial for Developers to code, design, and run web
applications with AWS?
AWS Cloud9
What is Simple Notification Service (SNS), and how is it different from SQS?
SNS pushes its messages out to its subscribers, and SQS stores the messages until
someone reads them and processes them off the queue.
What is Simple Queue Service (SQS), and for what is it used?
SQS is useful for sending and receiving messages between apps.
Step functions are built on tasks and state machines. What are state machines?
State machines are made up of states, their relationships, and the input and output
defined by the Amazon States Language.
Which kinds of alarms can be implemented into your AWS monitoring and management
services with CloudWatch?
You can create high-resolution alarms and automated actions. These alarms can monitor
costs for your budget, metrics, events, and logs.
Elastic beanstalk creates a cloud formation stack. What does the cloud formation stack
do?
The cloud formation stack helps you configure and maintain your system.
CloudWatch alarms are part of Elastic Beanstalk, and there are two of them. What are the
two alarms?
CloudWatch has two alarms to monitor loads, and they trigger when the alarms are too
high or too low for the auto scaling group.
What are some benefits of CloudFront?
CloudFront is secure and quickly delivers data, video, applications, and APIs. This means
it has shorter distances to deliver and higher performance.
What is the AWS service ElastiCache?
ElastiCache manages a distributed in-memory cache.
Why is it important to clean up your AWS?
If you do not clean up your AWS, you may be charged for services you are no longer
using. Always check the billing services to see for what you are being billed.
How is the Cloud changing regarding mission-critical applications?
The Cloud is becoming more trusted, so business are moving more mission-critical
applications to the Cloud.
How can a business limit "Cloud sprawl" to save money using the public Cloud?
The business can shut down idle environment and implement limits on sandbox
environments.
You are building your business case for utilizing a Cloud service. Of the various benefits to
your company, which will you present to management as a quantitative benefit?
Uptime
FlowerWorld shares a Cloud service with other florists in the city for market information
from growers. This is an example of the _____ deployment method.
Community Cloud
ABC Corp is considering which Cloud provider to use. How will ABC calculate the data it
has available to make a decision?
by using a weighted ranking
How does a business use common patterns when deciding on a cloud provider?
Common patterns refer to matching the business' requirements to the right Cloud
provider.
Why should you look at general patterns when deciding on a public Cloud provider?
General patterns are associated with the features and functionality the four major Cloud
services provide.
What AWS system lets you monitor newly launched instances and capture log issues?
CloudWatch
How does AWS security compare with security provided by other Cloud services?
Security is lower, but AWS provides most of the needs of a business
When working with deployment and management, which AWS features should you look
for?
You want to look at the web interface, deployment automation, IAM, and monitoring
management.
When a business is engaged in the Cloud evaluation process, which Cloud service is
generally going to be included in the evaluation process?
AWS
Why does Microsoft Azure provide a virtual machine for customers considering using
Azure?
You can play around with the service to see how it functions for your applications.
Which kind of security services does Microsoft Azure have?
Microsoft has Active Directory for identity management.
How is Microsoft Azure positioned in the Cloud marketplace in terms of the number of
services it provides?
Azure has more services than Google and Alibaba, but fewer than AWS.
Although Microsoft's Azure Cloud platform is rapidly gaining market share in Cloud
services, what caution should you keep in mind?
Azure is accelerating beyond the speed of marketplace needs.
If you go into the Google Cloud Platform dashboard frequently, what will you notice?
You will notice that the number of services on the dashboard grows frequently.
Tech Solutions' IT Director asks you for your opinion of Google Cloud Platform security.
How would you accurately respond?
Google Cloud has been improving its core security capabilities over the past few years.
While Google Cloud Platform is one of the least used Cloud service providers, why do
some businesses prefer Google Cloud?
Google provides special focus on artificial intelligence.
How can you most fairly describe the services Google Cloud Platform provides?
Google provides the Cloud services it thinks most businesses are going to need.
How does Ali Cloud provide a strategic advantage for a company doing business
internationally?
Ali Cloud is the only alternative when doing business in China.
Which country created the Alibaba Cloud, primarily for its own market?
China
Which type of cloud deployment model does the organization own the hardware on which
the cloud runs?
Private
If you are leveraging cloud services over the open internet, which type of cloud are you
using?
Public
Why is cloud computing important for an organization?
It provides cost efficiency and promotes agile methodologies
AWS, Microsoft Azure, and Google Cloud Platform are examples of which type of cloud
service?
IaaS
In an SaaS model, what does the third-party provider host on behalf of the end user?
the application software
Why would Infrastructure as a Service (IaaS) be recommended for an organization?
A third-party provider hosts the software, hardware, services, and other aspects of the
system.
What comprises an Infrastructure as a Service (IaaS) model?
third-party provider that hosts, services, and maintains all aspects of the system on
behalf of the end user
Why should any student select only the workload that shows success?
Working incrementally and understanding basic concepts while learning new skills will
help students comprehend the material.
In which situation would you keep an application on-premises rather than transition it to
the cloud?
when it is not cost-effective to move to the cloud
The cost of migrating from existing traditional systems on-premise in the public Cloud-
based system is referred to as what?
transitional cost
When establishing cloud security, what is an essential element?
being proactive
Which term describes the process of looking at image life cycle management?
Control
What is the process of leveraging a new operating system, new memory modes, or new
storage systems?
re-platforming
When working on your first cloud project, what must you address first?
cloud strategy and readiness
When identifying which data to move to the cloud, why would you look at applications
that are bound to the data?
to lower operational costs of leveraging data
The ability to get resources in line as quickly as needed is an example of _____.
rapid elasticity
Which skill set for cloud professionals is generally the most difficult to find?
cloud architects
What are the three most important issues to consider when evaluating the criticality of
data?
security, compliance, and performance issues
Maintaining _____ is essential to ensuring that we have an understanding of what is
happening with cloud-based storage and retrieval.
centralized logs
What are some best practices for scrutinizing front door access to a system?
Review policies, APIs, and repositories.
How can blueprints be used to eliminate human error?
by mapping out how you will be implementing security services
Data analysis provides you with the ability to be _____, which is important to advance
cloud security.
proactive and predictive
When looking at security implementation and operations, to whom should the data be
available?
Everyone
What is the best way to enforce security and privacy on your platform?
by automating the process as much as possible
How can the goal of continuous operations be achieved?
by updating the software and placing it into production without service interruption
Which domain would Kubernetes, the open-source container system, fall under?
automation domain
_____ leverages continuous operations and your ability to have feedback loops that go
back to the developers, to make sure they are continuously improving these things.
CloudOps
Which ability allows a system to perceive it is not working properly and, without human
intervention, make adjustments to restore normal operations?
self-healing
Why is determining the transitional cost critical in understanding the TCO?
The organization will be looking for these costs to be recuperated over time.
Which aspect is the most important for cloud security?
monitoring and corrective action
Where should a business put its top priority when considering a security system?
availability responsiveness
_____ is an application that you rent over the open internet.
SaaS
Who is responsible for building applications on cloud platforms as efficiently as
possible?
cloud developers
In a _____ model, a third-party provider hosts application software on behalf of the
end user.
Software as a service
In the maturity model, when in cloud security planning do you reach minimum value
security?
after using the integrated tools
Which type of cloud deployment model reduces the complexity of building, testing,
and deploying applications by keeping the developers inside a well-defined
environment, which limits the ability for the developers to make mistakes?
Platform as a service
Why is redundancy core to good cloud operations?
to become very familiar with a certain process and improve on it
Active-active architecture provides _____ in the event one application fails.
redundancy
Which type of cloud deployment model uses both public and private clouds, allowing
you to run workloads on either cloud deployment models, and having them work
seamlessly together?
hybrid
How can you allocate computing the same way on different platforms?
by using resource governance
In an IaaS model, what does the third-party provider host on behalf of the end user?
hardware, operating systems, and systems to support running applications
How does PaaS reduce the complexity of building, testing, and deploying
applications?
by placing the developer in a limited environment
The management aspect of cloud operations means you understand how to be more
_____ going forward.
proactive
What are some metrics used for Total Cost of Ownership (TCO)?
the weight assigned to values, including agility, productivity, scalability, and revenue
The most effective security is _____.
proactive security
When planning for cloud migration, what does the breath analysis look at?
the general purpose of moving into the cloud
What is an advantage of using cloud storage?
Cloud services provide as-is storage, instead of anticipated storage.
What is the last step in creating a Linux file system from an EC2 instance?
running the mount command
If you have a large amount of data to upload to AWS, you can transfer the data to a(n)
_ and ship it to Amazon for upload.
Snowball
When planning to move into cloud computing, make sure you have a viable plan that
spans at least _.
3 years
Cloud storage providers, such as Dropbox, Box, and Amazon Web Services (AWS), use
which type of storage system?
file
Someone on your team is exceeding their storage limit and your monthly bill has
increased significantly. What can you do to mitigate this problem?
set up policy-limiting use of storage services
An online retailer wants to move its storage to the cloud. For each item it sells, the
company needs to store a picture, a warranty, and some videos. Which cloud storage
system is the best option for this retailer?
Object
What is an example of unstructured data?
multimedia content
When would you use block storage instead of object storage?
when setting up a virtual machine
Why is cloud storage beneficial for a business that needs to store a large amount of
data?
The amount of storage expands and contracts as needed.
What is the most common pain point for IT managers and professionals?
managing storage growth
Policies are _____.
a part of architectures guidelines hierarchy
_____ uses advanced analytics to identify potential attacks via patterns and external
data.
Predictive security
_____ uses advanced analytics to identify potential attacks via patterns and external
data.
predictive security
Payment Card Industry Data Security Standard (PCI-DSS) was set up in 2004 to reduce
the risk of credit card theft and transfer liability to merchants.
TRUE
What does HIPAA stand for?
Health Insurance Portability and Accountability Act
What does HIPAA stands for?
Health Insurance Portability and Accountability Act
What is Bouncy Castle an example of?
an encryption at rest tool
Bouncy Castle is an example of _____.
an encryption at rest tool
CA Access Control and CA Identity Manager are examples of _____.
third-party security tools
A primary use for IAM users is to supply employees identities which they can use to
sign in to the AWS Management Console and to make requests to AWS services.
TRUE
An IAM user is an entity that you create in AWS that _____.
provides a way to interact with AWS
What does data security include?
database level and record level
What are events, notifications, and alerts a part of?
application-level security
Cloud infrastructure includes _____.
Regions, Zones, and Edge
Employee data theft is _____.
a breach scenario that's often overlooked and has significant impact
What does cloud security mean?
Data managed and stored by the proposed cloud solution protect against outside
threats like viruses, malware, interception, and theft.
How should you go about troubleshooting a problem with the network?
You should leverage tools to assist you in finding the problem.
How can you best monitor the cloud network?
You can watch, monitor, log, understand trends, and spot issues with the network.
How can you best ensure optimization and performance with hardware components?
Routers and switches must be maintained, optimized, and perform well.
When we are providing security to a public cloud, which kind of security is already
provided?
With the public cloud, there is already native security provided.
Why are software-defined networks important?
We can define networks through software instead of hardware and network upgrades.
What are the four types of cloud networking?
External, Public cloud, VPC, and Virtual Private Cloud networks
Why are external networks important in cloud networks?
There is a dedicated internet circuit with good performance, and you can maintain the
cloud computing system.
How can you best describe OpenFlow protocol?
OpenFlow is an OpenStack-based derivative of protocols when using the OpenStack-
based cloud.
What is cloud network governance?
Cloud network governance focuses on creating policies.
Why is logging important with encryption?
This has to do with managing the encryption. You should log what happened and put it
in a database.
Which Cloud network is very expensive, when security must be the first concern?
VPN
Which part does Google Cloud Interconnect play in cloud computing?
It extends Google's network with a highly available, low latency connection.
When working with AWS, why is Direct Connect so important?
It allows you private connectivity between AWS and your data center by using a
dedicated network connection.
When dealing with Cloud network operations, what is the first and second level priority?
Level one is talking to businesses and establishing priorities. Level two is working with a
team to set priorities and going to the next step.
Why are use cases essential when testing your cloud network?
Use cases create a test plan and lay out different scenarios to test your network.
When choosing a cloud network solution, what should you rely on first?
You should first rely on your requirements and understand what is needed.
Why have enterprise storage needs increased dramatically within the past decade?
Large social media files, such as photos and videos, need to be stored and analyzed.
Which AWS storage system is meant to store large amounts of data and can be used as a
backup and recovery system?
Glacier
In AWS, what is the name for a set of firewall rules that govern the traffic for an instance?
security group
An Amazon machine image can be created with which operating system?
Windows Server 2012
Which cloud service provider uses solid state storage?
Google
What is the name of Amazon's logging system?
CloudWatch
How is Amazon's Elastic Map Reduce (EMR) different from a traditional database?
It applies the schema at the time of the query.
What are the key points regarding the costs of cloud monitoring?
It looks at the governance of systems and their ability to protect, react proactively, and
leverage metrics to define value.
Why are long-term problems different than short-term problems?
Long-term problems are ongoing, do not pose an immediate threat, and can be
systematically identified and corrected.
Cloud-based data governance deals with which management areas?
Data Management, Business Process Management, Compliance Management, and
People Management
How would you best describe the major reasons for using secure cloud monitoring?
It reviews the ability to protect, provide proactive solutions, and look for solutions that
are self-updating.
When you are monitoring cloud health, which technologies are involved?
Logging, Trending, Alerting, Automation, Correction
What are the foundations of monitoring and operating?
Reporting, Governance, Performance, Security, Health, Cost
Which factors must be considered when evaluating another cloud monitoring solution?
There are many selections; most focus on niche issues and can be mixed with other
solutions.
What are some things that CloudHealth does?
It provides cloud visibility, usage reports, performance management, and migration
assessment.
Why is Librato CloudWatch a helpful tool?
It is a good alternative, complementary, an example of a non-native tool, and is cross-
cloud.
What is Datalog mostly designed to do?
It uses data from monitoring to spot trends and anomalies.
How does CloudWatch provide significant monitoring services?
It monitors Amazon EC2, other AWS resources, custom metrics, and monitors and stores
logs.
When you are determining what tool to use, which factor must you consider?
Understand that different tools are performing different roles, pick the right collection of
tools, and refresh them.
What are some features of the Microsoft cloud monitoring system?
Activity Logs, Alerts, Metrics, Service Health, and Workbooks
The CloudWatch dashboard provides which of the following services?
a comparison of metrics over time, instant view of the latest metrics, and a query builder
for logs
Which questions should we ask when defining cloud monitoring?
what, why, and how we are watching
What are some considerations when creating a cloud monitoring plan?
scheduling, deployment, and training
Which requirements should be primarily considered for cloud monitoring?
Cost, Features, and Company
What is the core function of the public cloud?
It provides a way to set up the virtual data center and to install servers, storage, and
databases.
When dealing with memory and disk sizes, what benefits do serverless cloud computing
environments offer?
Your serverless computing environment automatically allocates resources needed for
your application.
What is the most important concept with serverless computing?
It is a development model that leverages various types of architecture.
What is serverless computing?
Applying a layer to a single operating system that can span any number of hardware
platforms.
Which cloud computing serverless product do most cloud providers use?
AWS Lambda
What are Azure functions?
They are nanoservices, or microservices, that can be scaled based on demand.
Which serverless database can you use for serverless computing platforms?
AWS Aurora
What are the three major players in cloud-based serverless computing?
AWS Lambda, Microsoft Azure, and Google
What is OPC when deploying serverless applications?
Other People's Code
Why do you use the core fundamental test?
Each system has different commonalities. There are different steps to building an
application.
How do you plan your application with microservices or nanoservices?
Focus on service orientation and building applications as a set of services and functions.
Why are semantics a bit confusing when dealing with different platforms?
Functions are called "functions" in Lambda, and "nanoservices" with Microsoft Functions.
Why do you need to know the system differences when building Azure and Lambda
systems in a cloud serverless computing environment?
Each system has different commonalities. There are different steps to building an
application.
When creating a function in Azure, what is the resource group?
A collection of resources that share the same lifecycle permission policies.
What is the best way to test serverless platforms?
Integrate testing as part of the DevOps process.
When creating your serverless platform, which platform is recommended to fit
requirements and technology?
AWS Lamdba
_____ are the way organizations define governance tools at work.
Policies
An email notification about a governance breach is an example of which type of security
process?
Active
Which governance system monitors the use of microservices and API's?
API-based
Which governance domain provides a means to enforce policy in an automated way?
Resource-based
_____ have advanced knowledge of governance, and are an essential component of cloud
governance staffing.
Subject matter experts
Which process determines the value a technology can bring to an organization?
ROI
Which tool is not part of the Policies development process?
Services
People, machines, and processes are all examples of what?
Identities
Which directory service allows us to identify people, credential people, processes, and
machines, as well as make sure they are operating within the limits that we set within the
policies?
Active Directory
Where can you find a tool to store information about the services, keep track of what
these services are doing, and how they are being created?
Repository
A(n) _____ platform allows you to, in essence, sit at a higher level in the abstraction chain
and manage these things in very similar ways.
cloud management
Which process allows the flow of information from operations people describing what is
working, and what must be repaired?
feedback loop
Besides tool quality, which additional attribute should you consider essential in tool
testing?
ease of use
Which attribute is essential in picking a tool provider?
Organizational stability
What is the most important step in building a governance system?
understanding the requirements
Replicating data center operations in the cloud typically _____.
yields modest savings
Why would you hesitate to use a multicloud approach?
There is increased complexity.
Which characteristics make private clouds appealing?
security and compliance
What are the primary benefits of multicloud implementation?
cost and agility
Why are value calculations usually difficult to quantify precisely?
It is difficult to place values on soft costs.
Which providers currently dominate the cloud scene?
AWS, Azure, and Google
Which application would make the simplest candidate for migration to the cloud?
one written in Python for processing orders
What makes an application a poor candidate for migration to the cloud?
its age and reliance on antiquated technology
What is the difference between rehosting and replatforming?
Rehosting changes providers, while replatforming changes operating systems.
You have a very old application that is still essential for your operations. You wish to
retain it, but need to close your data center. What should you do?
Move it to a managed service provider.
You have an application written in FORTRAN and COBOL that uses several databases. How
would you describe this application?
tangled and layered
How long will it take you to implement changes in the scale of a private cloud?
weeks to months
How does the use of multiple cloud providers impact your talent and labor needs?
It multiplies your needs for specialties in a variety of services.
What is the primary advantage of public cloud operations over private cloud operations?
Agility
How would you obtain quick cost estimates for migration to AWS?
via AWS Assess
Which platforms are available for Microsoft Azure?
Linux and Windows
What is the first step in your migration?
application portfolio assessment
Why would you build a minimum viable cloud?
to demonstrate efficacy of the initial cloud platform, including tools
Why should you establish a cloud business office?
to oversee implementation
Why would you want to implement DevOps along with your cloud migration?
to enable continuous updating of applications and data
How should you approach the implementation of cloud security?
Cloud security should be implemented before migrating and as an ongoing process.
Which type of governance solution is the most detailed or fine-tuned?
service-based
Before migrating an application, you should _____.
build a business justification
Why are cloud migration specialists in short supply?
Technology is rapidly evolving.
What is the best practice for user interface level security?
Grant-least privilege
What do the two basic types of data encryption include?
data at rest, and data in flight
Security is the sole responsibility of _____.
you, as cloud providers have little or no responsibility
What is the core goal of cloud security?
You must ensure the data managed and stored by a proposed cloud solution is
protected against outside threats like viruses, malware, interception, and theft.
An Operational Risk Committee (ORC) should meet periodically to discuss the threat and
compliance landscape.
TRUE
What should an Operational Risk Committee (ORC) do?
Meet periodically to discuss the threat and compliance landscape.
Encryption in flight can _____.
often cause performance issues.
DES and RSA are examples of _____.
approaches to cloud encryption
What are Trend Micro SecureCloud and Trend Micro Deep Security examples of?
third-party security tools
What is true about the Payment Card Industry Data Security Standard (PCI-DSS)?
It was set up in 2004 to reduce the risk of credit card theft and transfer liability to
merchants.
The COSO framework is _____.
principle based, rather than rules based
In the context of security, what can automation accomplish?
Automation helps you reduce human error.
Understanding security architecture, controls, and stakeholder requirements is a part of
what process?
Discovery
The cloud means a shift in thinking from product-centric to service-centric.
TRUE
How does continuous integration work?
Developers use a shared repository with a version control system.
A new breed of SaaS architectures require a new operating model.
TRUE
What happens when a company moves continuous deployment into production?
The operations automation processes kick in.
Which entity is the core foundation of DevOps that enables a flow of code?
continuous delivery
What is the primary goal for testing your code?
to reduce bugs
The larger value that continuous deployment brings is a tighter working relationship
between development, operations, and the end user.
TRUE
What makes continuous deployment important?
It breaks down most of the barriers between development and the end user.
Your team is reviewing a logical DevOps process. Which side of DevOps involves
architecture?
Release
A key consideration of DevOps is to _____.
automate as much as you can
When implementing DevOps you should _____.
focus on training
Which layer of data refers to access information and enables you to perform analytics?
APIs
What is a characteristic of agility?
continuous deployment
You are considering what to do with the applications in your DevOps environment. Which
advantage do you have today using the cloud versus the "old way"?
multitenancy and share resources
Which cloud provider offers CaaS and support Kubernetes?
Google
You are responsible for the DevOps in your company, and are not sure which cloud
provider to choose. What should you consider?
You can use many cloud providers.
_____ is a DevOps framework for application lifecycle management and automation.
AWS OpsWorks
_____ is an example of a DevOps tool on Microsoft Azure.
Visual Studio
Cloud and DevOps can significantly improve how Enterprise IT services are delivered.
TRUE
Which AWS product allows you to visualize and automate the different stages of your
software release cycle, as well as watch your code flow through the process?
CodePipeline