0% found this document useful (0 votes)
1K views3 pages

AWS Practice Exam Review Summary

Uploaded by

Shiva Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views3 pages

AWS Practice Exam Review Summary

Uploaded by

Shiva Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Tutorials Dojo Practice Exam – Review Mode – 1

Final Results 55.8 % (36/65) – 05/14/2023

Services to Review

 Amazon Redshift
 Amazon File Gateway / AWS Storage Gateway
 Amazon API Gateway
o Throttling limits
 Burst or Standard
 IAM DB Authentication
o MySQL and PostgreSQL
o No password – instead Authentication Token
 An authentication token is a unique string of characters that Amazon RDS
generates on request. Authentication tokens are generated using AWS
Signature Version 4. Each token has a lifetime of 15 minutes. You don’t need to
store user credentials in the database, because authentication is managed
externally using IAM. You can also still use standard database authentication.
o IAM database authentication provides the following benefits:
 Network traffic to and from the database is encrypted using Secure Sockets
Layer (SSL).
 You can use IAM to centrally manage access to your database resources, instead
of managing access individually on each DB instance.
 For applications running on Amazon EC2, you can use profile credentials specific
to your EC2 instance to access your database instead of a password, for greater
security.
 Amazon DynamoDB
o A DynamoDB stream is an ordered flow of information about changes to items in an
Amazon DynamoDB table. When you enable a stream on a table, DynamoDB captures
information about every modification to data items in the table.
o Whenever an application creates, updates, or deletes items in the table, DynamoDB
Streams writes a stream record with the primary key attribute(s) of the items that were
modified. A stream record contains information about a data modification to a single
item in a DynamoDB table. You can configure the stream so that the stream records
capture additional information, such as the “before” and “after” images of modified
items.
o Amazon DynamoDB is integrated with AWS Lambda so that you can create triggers—
pieces of code that automatically respond to events in DynamoDB Streams. With
triggers, you can build applications that react to data modifications in DynamoDB tables.
o If you enable DynamoDB Streams on a table, you can associate the stream ARN with a
Lambda function that you write. Immediately after an item in the table is modified, a
new record appears in the table’s stream. AWS Lambda polls the stream and invokes
your Lambda function synchronously when it detects new stream records. The Lambda
function can perform any actions you specify, such as sending a notification or initiating
a workflow.
 Lambda@Edge
o Accelerate authentication within CloudFront
 Amazon ElastiCache
o Using Redis AUTH command can improve data security by requiring the user to enter a
password before they are granted permission to execute Redis commands on a
password protected Redis server.
 Egress-only Internet Gateway
o An egress-only internet gateway is a horizontally scaled, redundant, and highly available
VPC component that allows outbound communication over IPv6 from instances in your
VPC to the internet and prevents it from initiating an IPv6 connection with your
instances.

 AWS Network Firewall


o AWS Network Firewall is a managed service that makes it easy to deploy essential
network protections for all of your Amazon Virtual Private Clouds (VPCs). The service
can be set up with just a few clicks and scales automatically with your network traffic, so
you don’t have to worry about deploying and managing any infrastructure. AWS
Network Firewall includes features that provide protection from common network
threats.
o AWS Network Firewall’s stateful firewall can incorporate context from traffic flows, like
tracking connections and protocol identification, to enforce policies such as preventing
your VPCs from accessing domains using an unauthorized protocol. AWS Network
Firewall’s intrusion prevention system (IPS) provides active traffic flow inspection so you
can identify and block vulnerability exploits using signature-based detection. AWS
Network Firewall also offers web filtering that can stop traffic to known bad URLs and
monitor fully qualified domain names.
 AWS DMS
o AWS Database Migration Service (AWS DMS) is a cloud service that makes it easy to
migrate relational databases, data warehouses, NoSQL databases, and other types of
data stores. You can use AWS DMS to migrate your data into the AWS Cloud or between
combinations of cloud and on-premises setups.
o With AWS DMS, you can perform one-time migrations, and you can replicate ongoing
changes to keep sources and targets in sync. If you want to migrate to a different
database engine, you can use the AWS Schema Conversion Tool (AWS SCT) to translate
your database schema to the new platform. You then use AWS DMS to migrate the data.
 AWS Elastic Beanstalk
o reduces management complexity without restricting choice or control. You simply
upload your application, and Elastic Beanstalk automatically handles the details of
capacity provisioning, load balancing, scaling, and application health monitoring. Elastic
Beanstalk supports applications developed in Go, Java, .NET, [Link], PHP, Python, and
Ruby. When you deploy your application, Elastic Beanstalk builds the selected supported
platform version and provisions one or more AWS resources, such as Amazon EC2
instances, to run your application.
o AWS Elastic Beanstalk for .NET makes it easier to deploy, manage, and scale your
[Link] web applications that use Amazon Web Services. Elastic Beanstalk for .NET is
available to anyone who is developing or hosting a web application that uses IIS.
 Amazon API Gateway
o Amazon API Gateway provides throttling at multiple levels including global and by
service call. Throttling limits can be set for standard rates and bursts. For example, API
owners can set a rate limit of 1,000 requests per second for a specific method in their
REST APIs and configure Amazon API Gateway to handle a burst of 2,000 requests per
second for a few seconds. Amazon API Gateway tracks the number of requests per
second. Any request over the limit will receive a 429 HTTP response. The client SDKs
generated by Amazon API Gateway retry calls automatically when met with this
response.

Common questions

Powered by AI

The egress-only internet gateway is critical for managing outbound IPv6 traffic in a VPC as it allows instances to send information to the internet without accepting inbound traffic. This functionality is vital for maintaining security in IPv6 environments because it prevents the internet from initiating an IPv6 connection with instances inside a VPC, thereby reducing the potential attack surface and enforcing a stronger security posture by controlling how traffic exits the VPC .

Elastic Beanstalk simplifies the management of AWS applications by automating details such as capacity provisioning, load balancing, scaling, and application health monitoring. Developers only need to upload their application, and Elastic Beanstalk takes over the infrastructure management. Despite this automation, it leaves developers with the flexibility to choose the programming languages and frameworks (e.g., Go, Java, .NET, Node.js, PHP, Python, Ruby) for their applications, thus allowing them control over the development aspect while reducing operational complexities .

IAM database authentication provides several advantages, including the ability to centrally manage access to your database resources using IAM instead of managing access individually on each DB instance. This centralization allows for easier and more secure credential management. Additionally, it enhances security by encrypting network traffic to and from the database using SSL. Applications running on Amazon EC2 can use profile credentials specific to the EC2 instance to access the database, eliminating the need to manage passwords, thus reducing the surface for potential security vulnerabilities .

Amazon DynamoDB Streams interacts with AWS Lambda by enabling DynamoDB to capture changes to data items and writing stream records for these modifications. This integration allows you to create Lambda functions, known as triggers, which automatically respond to these data modification events. As soon as a new record appears in the DynamoDB stream, AWS Lambda triggers the associated function synchronously, enabling applications such as automatic notification systems, workflow initiations, or real-time data processing and analytics whenever data in DynamoDB changes .

The Redis AUTH command enhances security in Amazon ElastiCache by requiring users to present a password before executing Redis commands on a password-protected Redis server. This requirement helps to prevent unauthorized access by ensuring that only authenticated users can perform operations on the Redis database, thus ensuring data integrity and confidentiality. Implementing authentication via Redis AUTH adds a necessary layer of security, safeguarding the ElastiCache data from unauthorized interactions .

In IAM database authentication, SSL encryption is utilized to secure network traffic to and from the database. This layer of encryption is critical as it ensures data in transit is protected from eavesdropping, tampering, or man-in-the-middle attacks, thereby maintaining the confidentiality and integrity of the database operations. SSL encryption reinforces security by making sure only authorized users with the correct authentication token can communicate securely with the database .

Lambda@Edge can significantly enhance content delivery performance and security when integrated with CloudFront by running code closer to users at edge locations globally. This reduces latency for end-users since code execution occurs nearer to them. It can perform tasks like user authentication and request filtering at edge locations, providing a layer of security by addressing concerns on the fly before the requests reach the origin servers. Thus, it not only speeds up content delivery but also adds a customizable security layer that can handle complex scenarios dynamically at the edge .

AWS DMS facilitates database engine conversion by utilizing the AWS Schema Conversion Tool (AWS SCT), which translates the database schema from the source to the target database engine. This tool ensures that the schemas are appropriately converted to fit the new database environment, allowing DMS to then migrate the data seamlessly between different database engine platforms .

Amazon API Gateway manages traffic throttling by allowing API owners to set limits on the number of requests per second at both global and method-specific levels. By setting standard rate limits, you can control steady-state traffic flow, while burst limits manage temporary spikes in traffic. This capability helps to prevent overloads that could degrade performance, ensures the stability of the API under heavy utilization, and provides a mechanism for responding smoothly to unpredictable surges in demand without compromising service reliability. If the set limits are exceeded, the API returns a 429 HTTP response, and client SDKs generated by the API Gateway can automatically retry the requests .

AWS Network Firewall offers several features to protect VPCs, including stateful inspection, intrusion prevention, and web filtering. Its stateful firewall sets it apart by using traffic flow context for policy enforcement. This means it tracks the state of active connections and uses this information to make informed decisions, allowing it to block unauthorized protocols and stop access to dangerous domains. Furthermore, Network Firewall's intrusion prevention system provides active traffic inspection against vulnerability exploits through signature-based detection, thus enhancing the typical capabilities of a standard firewall by integrating more sophisticated threat detection and prevention methods .

You might also like