Q1 : Explain what is AWS?
A : AWS stands for Amazon Web Service; it is a collection of remote computing services also known as cloud computing platform. This new realm of cloud computing is also known as IaaS or Infrastructure as a Service.
Q2 : What Is The Importance Of Buffer In Amazon Web Services?
A : An Elastic Load Balancer ensures that the incoming traffic is distributed optimally across various AWS instances. A buffer will synchronize different components and makes the arrangement additional elastic to a burst of load or traffic. The components are prone to work in an unstable way of receiving and processing the requests. The buffer creates the equilibrium linking various apparatus and crafts them effort at the identical rate to supply more rapid services.
Q3 : What is the total number of buckets that can be created in AWS by default?
A : 100 buckets can be created in each of the AWS accounts. If additional buckets are required, increase the bucket limit by submitting a service limit increase.
Q4 : Explain what is AMI?
A : AMI stands for Amazon Machine Image. It’s a template that provides the information (an operating system, an application server, and applications) required to launch an instance, which is a copy of the AMI running as a virtual server in the cloud. You can launch instances from as many different AMIs as you need.
Q5 : What Is Lambda@edge In Aws?
A :
- In AWS, we can use Lambda@Edge utility to solve the problem of low network latency for end users.
- In Lambda@Edge there is no need to provision or manage servers. We can just upload our Node.js code to AWS Lambda and create functions that will be triggered on CloudFront requests.
- When a request for content is received by CloudFront edge location, the Lambda code is ready to execute.
- This is a very good option for scaling up the operations in CloudFront without managing servers.
Q6 : Are The Security Best Practices For Amazon Ec2?
A :
There are several best practices for secure Amazon EC2. Following are a few of them.
- Use AWS Identity and Access Management (AM) to control access to your AWS resources.
- Restrict access by only allowing trusted hosts or networks to access ports on your instance.
- Review the rules in your security groups regularly, and ensure that you apply the principle of least
- Privilege — only open up permissions that you require.
- Disable password-based logins for instances launched from your AMI. Passwords can be found or cracked, and are a security risk
Q6 : Explain what is S3?
A : S3 stands for Simple Storage Service. You can use S3 interface to store and retrieve any amount of data, at any time and from anywhere on the web. For S3, the payment model is “pay as you go”
Q7 : What is Auto-scaling? How Does It Work?
A : Autoscaling is a feature of AWS which allows you to configure and automatically provision and spin up new instances without the need for your intervention.
You do this by setting thresholds and metrics to monitor. When those thresholds are crossed, a new instance of your choosing will be spun up, configured, and rolled into the load balancer pool. Voila, you’ve scaled horizontally without any operator intervention!
Q8 : What Are The Main Features Of Amazon Cloud Front?
A : Some of the main features of Amazon CloudFront are as follows: Device Detection Protocol Detection Geo Targeting Cache Behavior Cross-Origin Resource Sharing Multiple Origin Servers HTTP Cookies Query String Parameters Custom SSL.
Q9 : How can you send a request to Amazon S3?
A : Amazon S3 is a REST service, you can send a request by using the REST API or the AWS SDK wrapper libraries that wrap the underlying Amazon S3 REST API.
Q10: What does an AMI include?
A : An AMI includes the following things
- A template for the root volume for the instance
- Launch permissions decide which AWS accounts can avail the AMI to launch instances
- A block device mapping that determines the volumes to attach to the instance when it is launched
Q11 : Can I connect my corporate data center to the Amazon Cloud?
A : Yes, you can do this by establishing a VPN(Virtual Private Network) connection between your company’s network and your VPC (Virtual Private Cloud), this will allow you to interact with your EC2 instances as if they were within your existing network.
Q12 : What parameters will you take into consideration when choosing the availability zone?
A : Performance, pricing, latency, and response time are some of the factors to consider when selecting the availability zone.
Q13 : Explain can you vertically scale an Amazon instance? How?
A : Yes, you can vertically scale on Amazon instance. For that
- Spin up a new larger instance than the one you are currently running
- Pause that instance and detach the root webs volume from the server and discard
- Then stop your live instance and detach its root volume
- Note the unique device ID and attach that root volume to your new server
- And start it again
Q14 : Is The Relation Between An Instance And Ami?
A : AMI can be elaborated as Amazon Machine Image, basically, a template consisting software configuration part. For example an OS, applications, application server. If you start an instance, a duplicate of the AMI in a row as an unspoken attendant in the cloud.
Q15 : What automation tools can I use to spinup servers
A : The buffer is used to make the system more robust to manage traffic or load by synchronizing different component. Usually, components receive and process the requests in an unbalanced way, With the help of buffer, the components will be balanced and will work at the same speed to provide faster services.Q17 : Is Amazon Ec2 Service?
A : Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable (scalable) computing capacity in the cloud. You can use Amazon EC2 to launch as many virtual servers you need. In Amazon EC2 you can configure security and networking as well as manage storage. Amazon EC2 service also helps in obtaining and configuring capacity using minimal friction.Q18 : While connecting to your instance what are the possible connection issues one might face?
A : The possible connection errors one might encounter while connecting instances are
- Connection timed out
- User key not recognized by the server
- Host key not found, permission denied
- Unprotected private key file
- Server refused our key or No supported authentication method available
- Error using MindTerm on Safari Browser
- Error using Mac OS X RDP Client
Q19 : If I’m using Amazon CloudFront, can I use Direct Connect to transfer objects from my own data center
A : Yes. Amazon CloudFront supports custom origins including origins from outside of AWS. With AWS Direct Connect, you will be charged with the respective data transfer rates.
Q20 : What is The Way To Secure Data For Carrying In The Cloud?
A : One thing must be ensured that no one should seize the information in the cloud while data is moving from point one to another and also there should not be any leakage with the security key from several storerooms in the cloud. Segregation of information from additional companies’ information and then encrypting it by means of approved methods is one of the options.
Q21 : Mention what are the key components of AWS?
A : The key components of AWS are
- Route 53: A DNS web service
- Simple E-mail Service: It allows sending e-mail using RESTFUL API call or via regular SMTP
- Identity and Access Management: It provides enhanced security and identity management for your AWS account
- Simple Storage Device or (S3): It is a storage device and the most widely used AWS service
- Elastic Compute Cloud (EC2): It provides on-demand computing resources for hosting applications. It is very useful in case of unpredictable workloads
- Elastic Block Store (EBS): It provides persistent storage volumes that attach to EC2 to allow you to persist data past the lifespan of a single EC2
- CloudWatch: To monitor AWS resources, It allows administrators to view and collect key Also, one can set a notification alarm in case of trouble.
Q22 : Explain what is T2 instances?
A : T2 instances are designed to provide moderate baseline performance and the capability to burst to higher performance as required by the workload.
Q23: Name The Several Layers Of Cloud Computing?
A : Here is the list of layers of the cloud computing
- PaaS – Platform as a Service
- IaaS – Infrastructure as a Service
- SaaS – Software as a Service
Q24 : Distinguish between Scalability And Flexibility?
A : The aptitude of any scheme to enhance the tasks on hand on its present hardware resources to grip inconsistency in command is known as scalability. The capability of a scheme to augment the tasks on hand on its present and supplementary hardware property is recognized as flexibility, hence enabling the industry to convene command devoid of putting in the infrastructure at all. AWS has several configuration management solutions for AWS scalability, flexibility, availability and management.
Q25 : hat Are The Different Types Of Events Triggered By Amazon Cloud Front?
A : Different types of events triggered by Amazon CloudFront are as follows:
Viewer Request: When an end user or a client program makes an HTTP/HTTPS request to CloudFront, this event is triggered at the Edge Location closer to the end user.
Viewer Response: When a CloudFront server is ready to respond to a request, this event is triggered.
Origin Request: When CloudFront server does not have the requested object in its cache, the request is forwarded to the Origin server. At this time this event is triggered.
Origin Response: When CloudFront server at an Edge location receives the response from the Origin server, this event is triggered
Q26 : What is the way to secure data for carrying in the cloud?
Comments are closed.