Chuyện là lại nhận được mail từ AWS với cơ hội nhận $100, nên mình làm tiếp và share đáp án cho mọi người.
Here’s How You Can Get $100 in AWS Promotional Credit
Want to earn some additional credit?
To end the year strong, we’re giving you the opportunity to earn up to $100 in AWS Promotional Credit if you complete a Cloud Career Pathway between now and December 31, 2019. Skill up on the cloud by starting any Cloud Career Pathway and we’ll send you $25 in AWS Promotional Credit. If you finish any pathway, we’ll give you an additional $75 in Promotional Credit for a max of $100 in credit.
Platforms
- Pip
- MSI installer
- API Gateway
- awscli library
2) What are the two types of virtualization offered by Linux Amazon Machine Images?
Group of answer choices
- PV-GRUB and API Gateway
- API Gateway and CloudFront
- ParaVirtual (PV) and Hardware Virtual Machine (HVM)
- Amazon EC2 and Amazon RDS
3) Partial) Which security features are within Amazon Virtual Private Cloud (VPC)? (Select all responses that apply)
Group of answer choices
- Routing Tables
- External Gateways
- Network ACLs
- Security Groups
4) Using the scenario below order each task as Step 1, Step 2, etc. to complete the scenario activity.
Scenario: Configure your VM before exporting it from the virtualization environment.
Group of answer choices
- Install the AWS CLI on your virtual machine to import it to Amazon EC2.
- Uninstall the VMware Tools from your VMware VM.
- Review the operating systems and image formats that VM Import/Export supports, and understand the limitations on importing instances and volumes.
- Disconnect any CD-ROM drives (virtual or physical).
- Disable any antivirus or intrusion detection software on your VM.
- Set your network to DHCP instead of a static IP address.
- Shut down your VM before exporting it.
Answer: Step 2 -> Step 4 -> Step 1 -> Step 5 -> Step 3 -> Step 6 -> Step 7
5) Which is a connectivity option for Amazon Virtual Private Cloud? (Select all that apply)
Group of answer choices
- Connect securely to your corporate datacenter
- Connect privately to other VPCs
- Connect directly to the Internet (public subnets)
- All answer choices
5) On Linux, OS X, or Unix operating system and environment which AWS CLI installation method should you use?
- Pip
- API Gateway
- MSI installer
- awscli library
6) How are Reserved Instances different from On-Demand DB Instances?
Group of answer choices
- CPU Resources
- Billing Method
- Storage Capacity
- Memory Resources
6) ______________ is a web service that provides resizeable computing capacity that you use to build and host your software systems.
Group of answer choices
- Amazon Elastic Compute Cloud (Amazon EC2)
- Amazon Simple Storage Service (Amazon S3)
- Amazon Virtual Private Cloud (Amazon VPC)
- Amazon Relational Database Service (Amazon RDS)
7) Which of the following are benefits of virtualization? (Select all that apply)
Group of answer choices
- Reduction in capital expenditures on IT infrastructure
- Increased energy consumption
- Speeds up the configuration and deployment of IT resources
- Deliver flexible and scalable IT resources
Network
1) What is the subnet mask for a Class B TCP/IP address?
Group of answer choices
- 255.255.255.0
- 255.0.0.0
- 255.255.0.0
- 255.255.255.255
2) How many Elastic IP addresses are allowed, by default, in an Amazon Web Services account?
Group of answer choices
- 3 Elastic IP
- 0 Elastic IP
- 5 Elastic IP
- 1 Elastic IP
3) You are building a system to distribute confidential training videos to employees. Using CloudFront, what method could be used to serve content that is stored in S3, but not publically accessible from S3 directly?
Group of answer choices
- Create a S3 bucket policy that lists the CloudFront distribution ID as the Principal and the target bucket as the Amazon Resource Name (ARN).
- Create an Origin Access Identity (OAI) for CloudFront and grant access to the objects in your S3 bucket to that OAI.
- Add the CloudFront account security group “amazon-cf/amazon-cf-sg” to the appropriate S3 bucket policy.
- Create an Identity and Access Management (IAM) User for CloudFront and grant access to the objects in your S3 bucket to that IAM User.
4) Which of the following will occur when an EC2 instance in a VPC (Virtual Private Cloud) with an associated Elastic IP is stopped and started? (Choose 2 answers)
Group of answer choices
- All data on instance-store devices will be lost
- The underlying host for the instance is changed
- All data on EBS (Elastic Block Store) devices will be lost
- The Elastic IP will be dissociated from the instance
5) The ____________ is used by the TCP/IP protocol to determine whether a host is on the local subnet or on a remote network.
Group of answer choices
- directory
- bundle
- packet
- subnet mask
6) How often is a user’s data backed up on AWS WorkSpaces?
Group of answer choices
- 6 hours
- 3 hours
- 9 hours
- 12 hours
7) What is the subnet mask for a Class A TCP/IP address?
Group of answer choices
- 255.0.0.0
- 255.255.0.0
- 255.255.255.255
- 255.255.255.0
8) To protect S3 data from both accidental deletion and accidental overwriting, you should:
Group of answer choices
- access S3 data using only signed URLs
- enable S3 versioning on the bucket
- enable Multi-Factor Authentication (MFA) protected access
- enable S3 Reduced Redundancy Storage
9) What does Amazon ElastiCache provide?
Group of answer choices
- A managed In-memory cache service.
- A service by this name doesn’t exist.
- An Amazon EC2 instance with the Memcached software already pre-installed
- A virtual server with a huge amount of memory.
10) __________ is a unit of data passed over a TCP/IP network or wide area network.
Group of answer choices
- Array
- Bundle
- Address
- Packet
Security
1) True or False.
By default, users can not access anything in your account until you grant permission to a user by creating a policy.
Group of answer choices
- True
- False
2) A security group acts as a virtual firewall to control the traffic for its associated in
stances. Your VPC comes with a default security group. When you launch an instance into your VPC what are the default security group settings?
Group of answer choices
- Allow all inbound traffic, Allow all outbound traffic and Does NOT allow instances associated with this security group to talk to each other
- Allow no inbound traffic, Allow all outbound traffic and Does NOT allow instances associated with this security group to talk to each other
- Allow no inbound traffic, Allow all outbound traffic and Allow instances associated with this security group to talk to each other
- Allow all inbound traffic, Allow no outbound traffic and Allow instances associated with this security group to talk to each other
3) AWS provides a variety of tools and features that you can use to keep your AWS Account and resources safe from unauthorized use. Which of the following features are AWS account security features?
Group of answer choices
- Trusted Advisor security checks
- the creation of separate IAM user accounts
- HTTPS endpoints for encrypted data transmission
- All answer choices
4) Which of the following is NOT a type of AWS credential for authentication?
Group of answer choices
- Access Keys
- Amazon CloudFront
- Passwords
- Multi-Factor Authentication (MFA)
5) True or False.
To provide non-AWS users access via identify federation between your authorization system and AWS you need to create user credentials and permissions using IAM.
Group of answer choices
- True
- False
Software Development
1) What does the following JavaScript statement instruct the browser to execute?
document.getElementById(“AWS”).innerHTML = “Hello World.”;
- Group of answer choices
- Display “Hello World.” in the browser title page
- Display “AWS” in the browser title page
- Write “Hello World.” inside an HTML element with id=”AWS”
- Write “AWS.” inside an HTML element with id=”Hello World”
2) True or False.
JavaScript is the programming language of HTML and the Web.
Group of answer choices
- True
- False
3) Which AWS service allows you to control multiple AWS services from the command line and automate them through scripts?
Group of answer choices
- Amazon Lambda
- API Gateway
- AWS Command Line Interface (CLI)
- Amazon EC2
4) On Microsoft Windows operating system and environment which AWS CLI installation method should you use?
Group of answer choices
- awscli library
- MSI installer
- API Gateway
- Pip
5) True or False.
JavaScript ignores multiple spaces.
Group of answer choices
- True
- False
==============
Final Assessment
1) To enhance data throughput you can adjust _______ settings such as window scaling and selective acknowledgement.
Group of answer choices
- IP
- Subnet
- API
- TCP
2) What is the network address for the TCP/IP address 32.0.0.10?
Group of answer choices
- 32
- 32.0.0.10
- 32.0.
- 32.0.0
3) Which AWS service allows you to easily provision cloud-based virtual desktops and provide users access to the documents, applications, and resources?
Group of answer choices
- Amazon WorkSpaces
- Amazon CloudFront
- Amazon DevOps
- Amazon EC2
4) What is the subnet mask for a Class B TCP/IP address?
Group of answer choices
- 255.255.255.255
- 255.255.255.0
- 255.0.0.0
- 255.255.0.0
5) What is the network address for the TCP/IP address 65.32.98.254?
Group of answer choices
- 65
- 65.32.98.254
- 65.32
- 65.32.98
6) Which AWS service makes it easy to set up and run Microsoft Active Directory (AD) in the AWS cloud, or connect your AWS resources with an existing on-premises Microsoft Active Directory?
Group of answer choices
- Amazon Elastic Compute Cloud
- AWS Directory Service
- API Gateway
- Amazon DevOps
7) True or False.
Rebuilding a WorkSpace will revert the volume to the prior state.
Group of answer choices
- True
- False
8) Which AWS Directory Service option is the best option if you have 5,000 or less users and you’re looking for the least expensive option?
Group of answer choices
- Simple AD
- AD Connector
- AWS Directory Service for Microsoft Active Directory (Enterprise Edition)
9) On Microsoft Windows operating system and environment which AWS CLI installation method should you use?
Group of answer choices
- MSI installer
- awscli library
- API Gateway
- Pip
10) On Linux, OS X, or Unix operating system and environment which AWS CLI installation method should you use?
Group of answer choices
- MSI installer
- API Gateway
- Pip
- awscli library
11) Which of the following is NOT an interface to access VM Import/Export?
Group of answer choices
- AWS Tools for Windows PowerShell
- AWS Command Line Interface (CLI)
- AWS SDKs and Tools
- Simple Queue Service
12) Using the scenario below order each task as Step 1, Step 2, etc. to complete the scenario activity.
Scenario: Configure your VM before exporting it from the virtualization environment.
Group of answer choices
- Install the AWS CLI on your virtual machine to import it to Amazon EC2.
- Uninstall the VMware Tools from your VMware VM.
- Review the operating systems and image formats that VM Import/Export supports, and understand the limitations on importing instances and volumes.
- Disconnect any CD-ROM drives (virtual or physical).
- Disable any antivirus or intrusion detection software on your VM.
- Set your network to DHCP instead of a static IP address.
- Shut down your VM before exporting it.
Answer: Step 2 -> Step 4 -> Step 1 -> Step 5 -> Step 3 -> Step 6 -> Step 7
13) Which of the following is NOT a type of virtualization?
Group of answer choices
- Desktop
- Memory
- Mobile
- Hardware
14) How many subnets can I create per VPC?
Group of answer choices
- 100
- 200
- 50
- 150
15) True or False.
Virtualization is cloud computing.
Group of answer choices
- True
- False
16) True or False.
By default, users can not access anything in your account until you grant permission to a user by creating a policy.
Group of answer choices
- True
- False
17) True or False.
To provide non-AWS users access via identify federation between your authorization system and AWS you need to create user credentials and permissions using IAM.
Group of answer choices
- True
- False
18) Which of the following is NOT a type of AWS credential for authentication?
Group of answer choices
- Multi-Factor Authentication (MFA)
- Amazon CloudFront
- Passwords
- Access Keys
19) What is a Security Group?
Group of answer choices
- An Access Control List (ACL) for AWS resources.
- A list of users that can access Amazon EC2 instances.
- None of these.
- A firewall for inbound traffic, built-in around every Amazon EC2 instance
20) Which of the following are IAM Features?
Group of answer choices
- All answer choices
- Granular permissions
- Shared access to your AWS account
- Identity federation
21) O
n Linux, OS X, or Unix operating system and environment which AWS CLI installation method should you use?
Group of answer choices
- Pip
- MSI installer
- API Gateway
- awscli library
22) Which AWS service allows you to control multiple AWS services from the command line and automate them through scripts?
Group of answer choices
- Amazon EC2
- Amazon Lambda
- AWS Command Line Interface (CLI)
- API Gateway
23) What command is the following AWS Command Line Interface script executing?
Command Line script:
> pip install –upgrade awscli
Group of answer choices
- To download the installation script
- To check to see if Python is already installed
- To test the AWS CLI Installation
- To upgrade an existing AWS CLI installation
24) Which of the following is NOT a JavaScript statement?
Group of answer choices
- Expressions
- Comments
- Keywords
- Functions
25) What does the following JavaScript statement instruct the browser to execute?
document.getElementById(“AWS”).innerHTML = “Hello World.”;
Group of answer choices
- Write “AWS.” inside an HTML element with id=”Hello World”
- Write “Hello World.” inside an HTML element with id=”AWS”
- Display “Hello World.” in the browser title page
- Display “AWS” in the browser title page
Cloud Support Engineer Final Project v1.1
1) To support a client’s networking architecture and to troubleshoot problems, an AWS Cloud Support Engineer will need to work closely with the client’s?
- Helpdesk
- Computer Systems Analyst
- Software Developer
- Network Administrator
2) A Cloud Support Engineer may be involved in creating security solutions and implementing preventative measures to enhance security protocols. Which of the following shared responsibility models are offered by AWS? Select all that apply.
- 1…
- 2
- 3…
- 4…
3) In order to complete their annual network security audit, your client contacts you to check on several items related to their cloud infrastructure. Under the AWS Shared Responsibility Model. which of the following is AWS’s responsibility?
- “Windows updates were released to patch recently discoverd vulnerabilities. I want to be sure that these are applied to our virtual machines.”
- “Please disable our root API accses and ensure that no users or IAM Roles have root access.”
- “We need ensure that our cloud data remains encrypted under TLS at all times.”
- “Please apply the latest BIOS updates for processors being used in our EC2 virtual machines to patch flaws discovered in the architecture of the processors
4) Instance X and instant Y are running in two different subnets, X and Y, of a VPC. Instance X is not able to ping instance Y. Which of the following are possible causes? Select all that apply and select Submit when you are done.
- The two instances can not talk to one another via ICMP ping as that protocol is not allowed across subnet boundaries of a VPC.
- The policy linked to the IAM role on instance X is not configured correcly.
- The security groups assigned to either instance might not be properly configured to allow ICMP traffic out or in.
- The subnet nACLs (network access control list) might not be allowing traffic from one instance to the other.
DienDan.Edu.Vn Cám ơn bạn đã quan tâm và rất vui vì bài viết đã đem lại thông tin hữu ích cho bạn.DienDan.Edu.Vn! là một website với tiêu chí chia sẻ thông tin,... Bạn có thể nhận xét, bổ sung hay yêu cầu hướng dẫn liên quan đến bài viết. Vậy nên đề nghị các bạn cũng không quảng cáo trong comment này ngoại trừ trong chính phần tên của bạn.Cám ơn.