Questions
stringlengths 5
360
⌀ | Answers
stringlengths 6
2.23k
⌀ |
---|---|
what is the maximum size of messages in sqs?
|
Answer: The maximum size of messages in SQS is 256 KB.
|
what are the types of queues in sqs?
| null |
what is multi az rds?
|
Answer: Multi -AZ (Availability Zone) RDS allows you to have a replica of your production database in another availability zone. Multi -AZ (Availability Zone) database is used for disaster recovery. You will have an exact copy of your database. So when your primary database goes down, your application will automatically failover to the standby database.
|
what are the types of backups in rds database?
|
Answer: There are 2 types of backups in RDS database . Automated backups Manual backups which are known as snapshots.
|
what is the difference between security groups and network access control list?
|
Answer: Security Groups Network access control list Can control the access at the instance level Can control access at the subnet level Can add rules for allow only Can add rules for both allow and deny Evaluates all rules before allowing the traffic Rules are processed in order number when allowing traffic. Can assign unlimited number of securit y groups Can assign upto 5 security groups. Statefull filtering Stateless filtering
|
what are the types of loadbalancer sinec2?
|
Answer: There are 3 types of load balancers, Application load balancer Network load balancer Classic load balancer
|
what is an del b?
| null |
what are the two types of access that you can provide when you are creating users?
|
Answer: Following are the two types of access that you can create. Programmatic access Console access
|
what are the benefits of auto scaling?
|
Follow Me : https://www.yo utube.com/c/SauravAgarwa l Answer: Following are the benefits of auto scaling Better fault tolerance Better availability Better cost management
|
what are security groups?
|
Answer: Security groups acts as a firewall that contains the traffic for one or more instances. You can associate one or more security groups to your instances when you launch then. You can add rules to each security group that allow traffic to and from it s associated instances. You can modify the rules of a security group at any time, the new rules are automatically and immediately applied to all the instances that are associated with the security group
|
what are shared am is?
| null |
what is the difference between the classic loadbalancer and application loadbalancer?
|
Answer: Dynamic port mapping, multiple port multiple listeners is used in Application Load Balancer, One port one listener is achieved via Classic Load Balancer
|
by default how many ip address does aws reserve in a subnet?
|
Answer: 5
|
what is meant by subnet?
| null |
how can you convert a public subnet to private subnet?
| null |
is it possible to reduce a ebs volume?
|
Answer: no its not possible, we can increase it but not reduce them
|
what is the use of elastic ip are they charged by aws?
|
Answer: These are ipv4 address which are used to connect the instance from internet, they are charged if the instances are not attached to it
|
one of mys3is bucket is deleted but i need to restore is there any possible way?
| null |
issue?
| null |
is it possible to stop ards instance how can i do that?
| null |
what is meant by parameter groups in rds and what is the use of it?
|
Answer: Since RDS is a managed service AWS offers a wide set of parameter in RDS as parameter group which is modified as per requirement
|
what is the use of tags and how they are useful?
| null |
how can i rectify it?
| null |
i dont want my aws account id to be exposed to users how can i avoid it?
| null |
by default how many elastic ip address does aws offer?
|
Answer: 5 elastic ip per region
|
you are enabled sticky session with elb what does it do with your instance?
|
Answer: Binds the user session with a specific instance Q67) Which type of load balancer makes routing decisions at either the transport layer or the Application layer and supports either EC2 or VPC. Answer: Classic Load Balancer
|
which is virtual network interface that you can attach to an instance in a vpc?
| null |
have selected ssh http https protocol why do we need to select ssh?
| null |
security group how will these changes be effective?
|
Answer: Changes are automatically applied to windows instances
|
loadbalancer and dns service comes under which type of cloud service?
| null |
this?
|
Answer: Create a snapshot of the unencrypted volume (applying encryption parameters), copy the. Snapshot and create a volume from the copied snaps hot Q73) Where does the user specify the maximum number of instances with the auto
|
scaling commands?
|
Answer: Auto scaling Launch Config
|
which are the types of ami provided by aws?
| null |
a single instance what setting can you use?
|
Answer: Sticky session
|
when doi prefer to provisioned iops over the standard rds storage?
| null |
db instance for read or write a operation along with to primary db instance?
|
Answer: Primary db instance does not working . Q78) Which the AWS services will you use to the collect and the process e -commerce data for
|
the nearby real time analysis?
|
Answer: Good of Amazon DynamoDB. Q79) A company is deploying the new two -tier an web application in AWS. The company has to limit ed on staff and the requires high availability, and the application requires to complex Follow Me : https://www.yo utube.com/c/SauravAgarwa l queries and table joins. Which configuration provides to the solution for companys
|
requirements?
|
Answer: An web application provide on Amazon DynamoDB solution.
|
which the statement use to cases are suitable for amazon dynamo db?
|
Answer:The storing metadata for the Amazon S3 objects& The Running of relational joins and complex an updates. Q81) Your application has to the retrieve on data from your users mobile take every 5 minutes and then data is stored in the DynamoDB, later every day at the particular time the data is an extracted into S3 on a per user basis and then your application is later on used to visualize the data to user. You are the asked to the optimize the architecture of the backend system can to
|
lower cost what would you recommend do?
| null |
mysql which is the best approaches to the meet these requirements?
| null |
setup of following would you be prefer?
|
Answer: The Replace the RDS instance with an 6 node Redshift cluster with take 96TB of storage. Q84) Let to Suppose you have an application where do you have to render images and also do
|
some of general computing which service will be best fit your need?
|
Answer:Used on Application Load Balancer. Q85) How will change the instance give ty pe for the instances, which are the running in your
|
applications tier and then using auto scaling where will you change it from areas?
|
Answer: Changed to Auto Scaling launch configuration areas. Q86) You have an content management system running on the Am azon EC2 instance that is the approaching 100% CPU of utilization. Which option will be reduce load on the Amazon EC2
|
instance?
|
Answer: Let Create a load balancer, and Give register the Amazon EC2 instance with it.
|
follow me https www you tubecomcsauravagarwalq87 what does the connection of draining do?
|
Answer: The re -routes traffic from the instances which are to be updated (or) failed an health to check. Q88) When the instance is an unhealthy, it is do terminated and replaced with an new ones,
|
which of the services does that?
|
Answer: The survice make a fault tolerance.
|
what are the lifecycle to hooks used for the auto scaling?
|
Answer: They are used to the put an additional taken wait time to the scale in or scale out events. Q90) An user has to setup an Auto Scaling group . Due to some issue the group has to failed for launch a single instance for the more than 24 hours. What will be happen to the Auto Scaling in
|
the condition?
|
Answer: The auto Scaling will be suspend to the scaling process. Q91) You have an the EC2 Securit y Group with a several running to EC2 instances. You changed to the Security of Group rules to allow the inbound traffic on a new port and protocol, and then the launched a several new instances in the same of Security Group.Such the new rules
|
apply?
| null |
region?
|
Answer: May be the selected on Route 53 Record Sets. Q93) An customers wants to the captures all client connections to get information from his load balancers at an interval of 5 minutes only, which cal select option should he choose for his
|
application?
|
Answer: The condition should be Enable to AWS CloudTrail for the loadbalancers.
|
which of the services to you would not use to deploy an app?
|
Answer: Lambda app not used on deploy.
|
how do the elastic beanstalk can apply to updates?
| null |
could be reason solution?
| null |
accomplish this?
|
Answer:The monitoring on Amazon CloudWatch Q98) The organization that is currently using the consolidated billing has to recently acquired to another company that alr eady has a number of the AWS accounts. How could an Administrator to ensure that all the AWS accounts, from the both existing company and then acquired company, is
|
billed to the single account?
| null |
this scenario?
| null |
use the aws credentials to access s3 bucket securely?
| null |
you accomplish the using the aws services?
| null |
setup?
| null |
availability?
| null |
disruptions during the ramp up traffic?
| null |
instances which are architectural choices should you make?
|
Answer: Deploy to 3 EC2 instances in one of availability zone and 3 in another availability of zones and to use of Amazon Elastic is Load Balancer. Q106) You are the designing an application tha t a contains protected health information. Security and Then compliance requirements for your application mandate that all protected to health information in application use to encryption at rest and in the transit module. The application to uses an three -tier architecture. where should data flows through the load balancers and is stored on the Amazon EBS volumes for the processing, and the results are stored in the Amazon S3 using a AWS SDK. Which of the options satisfy the security
|
requirements?
| null |
are will evenly distributed across to four web servers?
| null |
capacity most of effectively?
| null |
support these requirements?
|
Answer:The configure to the web application get authenticate end -users against the centralized access on the management system. Have a web application provisio n trusted to users STS tokens an entitling the download of the approved data directly from a Amazon S3. Q110) A Enterprise customer is starting on their migration to the cloud, their main reason for the migrating is agility and they want to the make their internal Microsoft active directory available to the many applications running on AWS, this is so internal users for only have to remember one set of the credentials and as a central point of user take control for the leavers and joiners. How could they ma ke their actions the directory secures and the highly available with minimal on -premises on infrastructure changes in the most cost and the time-
|
efficient way?
| null |
what is cloud computing?
|
Answer:Cloud computing means it provides services to access programs, application, storage, network, server over the internet through browser or client side application on your PC, Laptop, Mobile by the end user without installing, updating and maintaining them.
|
follow me https www youtube comcsauravagarwalq112 why we go for cloud computing?
| null |
what are the deployment models using in cloud?
|
Answer: Private Cloud Public Cloud Hybrid cloud Community cloud 4
|
explain cloud service models?
| null |
what are the advantage of cloud computing?
| null |
what is a ws?
|
Answer: Amazon web service is a secure cloud services platform offering compute, power, database, storage, content delivery and other functionality to help business scale and grow. AWS is fully on -demand AWS is Flexibility, availability and Scalability Follow Me : https://www.yo utube.com/c/SauravAgarwa l AWS is Elasticity: scale up and scale down as needed.
|
what is mean by region availability zone and edge location?
| null |
how to access aws platform?
| null |
what is ec 2whatarethebenefitsinec2?
|
Amazon Elastic compute cloud is a web service that provides resizable compute capacity in the cloud.AWS EC2 provides scalable computing capacity in the AWS Cloud. These are the virtual servers also called as an instances. We can use the instances pay per use basis. Benefits: Easier and Faster Elastic and Scalable High Availability Cost-Effective
|
what are the pricing models available in awsec2?
| null |
what are the types using inawsec2?
|
Answer: General Purpose Compute Optimized Memory optimized Storage Optimized Accelerated Computing (GPU Based)
|
follow me https www youtube comcsauravagarwalq122 what is ami what are the types in ami?
| null |
how to addressing awsec2 instances?
| null |
what is security group?
|
Answer: AWS allows you to control traffic in and out of your instance through virtual firewall called Security groups. Security groups allow you to control traffic based on port, protocol and source/Destination.
|
when your instance show retired state?
| null |
start what is the reason for that and explain solution?
| null |
what is elastic beanstalk?
|
Answer:AWS Elastic Beanstalk is the fastest and simplest way to get an application up and running on AWS.Developers can simply upload their code and the service automatically handle all the details such as resource provisioning, l oad balancing, Auto scaling and Monitoring.
|
what is amazon light sail?
|
Follow Me : https://www.yo utube.com/c/SauravAgarwa l Answer:Lightsail designed to be the easiest way to launch and manage a virtual private server with AWS.Lightsail plans include everything you need to jumpstart your project a virtual machine, ssd based storage, data transfer, DNS Management and a static ip.
|
what is ebs?
|
Answer:Amazon EBS Provides persistent block level storage volumes for use with Amazon EC2 instances. Amazon EBS volume is automatically replicated with its availability zone to protect component failure offering high availability and durability. Am azon EBS volumes are available in a variety of types that differ in performance characteristics and Price.
|
how to compare ebs volumes?
| null |
what is cold hdd and throughput optimized hdd?
| null |
what is amazon ebs optimized instances?
| null |
what is ebs snapshot?
| null |
how to connect ebs volume to multiple instance?
|
Answer: We cant able to connect EBS volume to multiple instance, but we can able to connect multiple EBS Volume to single instance.
|
what are the virtualization types available in aws?
| null |
differentiate block storage and file storage?
|
Answer: Block Storage: Block storage operates a t lower level, raw storage device level and manages data as a set of numbered, fixed size blocks. File Storage: File storage operates at a higher level, the operating system level and manage data as a named hierarchy of files and folders.
|
what are the advantage and disadvantage of efs advantages
|
Answer: Fully managed service File system grows and shrinks automatically to petabytes Can support thousands of concurrent connections Multi AZ replication Throughput scales automatically to ensure consisten t low latency Disadvantages: Not available in all region Cross region capability not available More complicated to provision compared to S3 and EBS
|
what are the things we need to remember while creating s3 bucket?
|
Answer: Amazon S3 and Bucket names a re This means bucket names must be unique across all AWS Bucket names can contain upto 63 lowercase letters, numbers, hyphens and You can create and use multiple buckets You can have upto 100 per account by
|
follow me https www youtube comcsauravagarwalq139 what are the storage class available in amazon s3?
| null |
explain amazon s3 lifecycle rules?
| null |
what is the relation between amazon s3andawskms?
|
Answer: To encrypt Amazon S3 data at rest, you can use several v ariations of Server -Side Encryption. Amazon S3 encrypts your data at the object level as it writes it to disks in its data centers and decrypt it for you when you access itll SSE performed by Amazon S3 and AWS Key Management Service (AWS KMS) uses the 256 -bit Advanced Encryption Standard (AES).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.