Friday, June 16, 2017

Hiried AWS Architect Multiple choice Questions and Answers pdf

11. What is the relation between Instance and AMI?
An Amazon Machine Image (AMI) is a template that contains a software configuration (for example, an operating system, an application server, and applications). From an AMI, you launch an instance, which is a copy of the AMI running as a virtual server in the cloud.
You can launch different types of instances from a single AMI. An instance type determines the hardware of the host computer used for your instance. Each instance type offers different compute and memory capabilities.

12. What automation tools can you use to spinup servers?
Any of the following tools can be used:
Roll-your-own scripts, and use the AWS API tools.  Such scripts could be written in bash, perl or other language or your choice.
Use a configuration management and provisioning tool like puppet or its successor Opscode Chef.  You can also use a tool like Scalr.
Use a managed solution such as Rightscale.

13. What are the different deployment models for Cloud?
The different models are:
Private Cloud
Public Cloud
Hybrid Clouds

14. What is auto-scaling?  How does it work?
Autoscaling is a feature of AWS which allows you to configure and automatically provision and spinup new instances without the need for your intervention. You can do this by setting thresholds and metrics to monitor.  When those thresholds are crossed, a new instance of your choosing will be spun up, configured, and rolled into the load balancer pool.

15. What are the Security Best Practices for Amazon EC2?
There are several best practices for secure Amazon EC2. A few of them are given below:
Use AWS Identity and Access Management (IAM) to control access to your AWS resources.
Restrict access by only allowing trusted hosts or networks to access ports on your instance.
Review the rules in your security groups regularly, and ensure that you apply the principle of least
Privilege – only open up permissions that you require.
Disable password-based logins for instances launched from your AMI. Passwords can be found or cracked, and are a security risk.

Read More Questions:
AWS Architect Interview Questions Part1
AWS Architect Interview Questions Part2
AWS Architect Interview Questions Part3
AWS Architect Interview Questions Part4
AWS Architect Interview Questions Part5

No comments: