Slide 1
Most trusted JOB oriented professional program
DevOps Certified Professional (DCP)

Take your first step into the world of DevOps with this course, which will help you to learn about the methodologies and tools used to develop, deploy, and operate high-quality software.

Slide 2
DevOps to DevSecOps – Learn the evolution
DevSecOps Certified Professional (DSOCP)

Learn to automate security into a fast-paced DevOps environment using various open-source tools and scripts.

Slide 2
Get certified in the new tech skill to rule the industry
Site Reliability Engineering (SRE) Certified Professional

A method of measuring and achieving reliability through engineering and operations work – developed by Google to manage services.

Slide 2
Master the art of DevOps
Master in DevOps Engineering (MDE)

Get enrolled for the most advanced and only course in the WORLD which can make you an expert and proficient Architect in DevOps, DevSecOps and Site Reliability Engineering (SRE) principles together.

Slide 2
Gain expertise and certified yourself
Azure DevOps Solutions Expert

Learn about the DevOps services available on Azure and how you can use them to make your workflow more efficient.

Slide 3
Learn and get certified
AWS Certified DevOps Professional

Learn about the DevOps services offered by AWS and how you can use them to make your workflow more efficient.

previous arrow
next arrow

AWS Interview Questions and Answer Part – 33

To take advantage of the greatest number of features available in Active Directory while having Amazon responsible for the management of the operating system and underlying hardware, you should choose:

  • LDAP
  • AD Redirector
  • Simple AD
  • Enterprise AD (Ans)
  • AD Connector

Which AWS Directory Services Offering does not store data in AWS but rather redirects all access to an on-premises Active Directory implementation?

  • Enterprise AD
  • AD Redirector
  • AD Connector (Ans)
  • LDAP
  • Simple AD

Which of the following is NOT an available effect?

  • Allow
  • Deny
  • Permit (Ans)

The root user credentials should be shared with all top-level administrators.

  • False (Ans)
  • True

The best way for administrators in one AWS account to backup administrators in another account (such as for vacation or sickness) is:

  • Create IAM users in each account for the administrators in the other account.
  • Share account names and passwords as needed.
  • Create roles in each account that can be assumed by administrators in the other account. (Ans)
  • Create a generic admin account for administrators in the other account to use.

Trusted advisor is designed to do which of the following:

  • Find unused IAM Groups
  • Reduce cost (Ans)
  • Report on compliance
  • Find IAM Users with excess permissions

To maximize the safety of data that has been backed up, you should:

  • Backup to two different S3 buckets in different regions.
  • Set permissions on the backup destination to forbid deleting content.
  • Use Lifecycle policies to manage backups and expire outdated ones.
  • Backup to a different account. (Ans)

Consolidated billing is used to:

  • Pay for all the charges in multiple AWS accounts. (Ans)
  • Report on the spending within an account.
  • Report on the spending across accounts.

Consolidated Billing can be used to secure volume discounts:

  • Within an account
  • Across multiple accounts (Ans)
  • Within a region

IAM roles are used when federating with users authenticated outside of AWS, such as Active Directory and Google.

  • True (Ans)
  • False

The Principle of Least Priviledge should be used to:

  • Create as few policies as possible
  • Grant users just enough permissions to do their jobs (Ans)
  • Grant as few policies as possible to users

If trusts are required between Active Directory domains hosted via AWS Directory Services, you must select:

  • AD Redirector
  • Enterprise AD (Ans)
  • ADConnector
  • Simple AD
  • LDAP

To utilize AWS Directory Services’ Enterprise AD offering, which VPC range must be excluded from those you can use:

  • 198.19.0.0/16 (Ans)
  • 10.255.0.0/16
  • 192.168.0.0/16
  • 172.16.0.0/16

Which of the following can occur if the root account is compromised?

  • None of these
  • Resources can be deleted
  • All of these (Ans)
  • Resorces can be created
  • Data can be stolen

An IAM user may have _ access keys maximum.

  • 5
  • 2 (Ans)
  • 1
  • unlimited
  • 3

IAM accounts can be used to enforce the principle of least privilege.

  • False
  • True (Ans)

Which of the following cannot be used to create an IAM policy?

  • Policy Creator (Ans)
  • Copying an AWS managed policy
  • Creating a policy in JSON
  • Policy Generator

Credential Report contains the following information:

  • Regions used by this IAM user
  • Access Key last used object
  • IAM user last used region
  • Access Key last used region (Ans)

Simple AD uses:

  • Samba (Ans)
  • Windows Active Directory
  • Novell eDirectory

Which of the following can have passwords assigned to them?

  • IAM Users (Ans)
  • IAM Groups
  • IAM Roles

Password policies can be set for which of the following?

  • All IAM users (all get the same policy applied) (Ans)
  • Each IAM user (individual settings for each user)
  • All IAM Groups (all get the same policy applied)
  • IAM Roles
  • Each IAM group (individual settings for each group)
Rajesh Kumar