{"id":8634,"date":"2020-01-11T08:05:42","date_gmt":"2020-01-11T08:05:42","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=8634"},"modified":"2021-11-13T12:07:29","modified_gmt":"2021-11-13T12:07:29","slug":"aws-interview-questions-and-answer-part-12","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/aws-interview-questions-and-answer-part-12\/","title":{"rendered":"AWS Interview Questions and Answer Part \u2013 12"},"content":{"rendered":"\n<p><strong>Which of the following is true of Network ACLs?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>All rules are processed and order of processing is not important<\/li><li><strong>Rules are processed in strict numeric order (Ans)<\/strong><\/li><\/ul>\n\n\n\n<p><strong>Which of the following describes an AWS Internet Gateway?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Non-scalable but redundant and highly available<\/li><li><strong>Horizontally scaled, redundant, highly available (Ans)<\/strong><\/li><li>Horizontally scaled but not redundant or highly available<\/li><li>Vertically scaled, redundant, highly available<\/li><\/ul>\n\n\n\n<p><strong>Which of the following represents a default route to an Internet Gateway called &#8220;igw-x&#8221;?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>255.255.255.0 igw-x<\/li><li><strong>0.0.0.0\/0 igw-x (Ans)<\/strong><\/li><li>255.255.255.255 igw.x<\/li><li>1.1.1.1\/0 igw-x<\/li><\/ul>\n\n\n\n<p><strong>What is the maximum number of rules in a Network ACL?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>200<\/li><li>100<\/li><li>50<\/li><li><strong>20 (Ans)<\/strong><\/li><\/ul>\n\n\n\n<p><strong>How can instances be assigned Public IPs?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Only automatically via the &#8220;Auto-assign Public IP&#8221; setting of the subnet<\/li><li><strong>Manually when launched, or via the &#8220;Auto-assign Public IP&#8221; setting of the subnet (Ans) (Ans)<\/strong><\/li><li>Instances cannot be assigned Public IP addresses<\/li><li>Only when initially launched<\/li><\/ul>\n\n\n\n<p><strong>What are the three major AWS components that need configuring when building an AWS VPN?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Customer Gateway, Virtual Private Gateway, Elastic Load Balancer<\/li><li><strong>Customer Gateway, Virtual Private Gateway, VPN Tunnel (Ans)<\/strong><\/li><li>Customer Gateway, Elastic Load Balancer, VPN Tunnel<\/li><li>Customer Gateway, Internet Gateway, VPN Tunnel<\/li><\/ul>\n\n\n\n<p><strong>Which of the following best describes Direct Connect?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>A dedicated private circuit from your infrastructure into an AWS Region via an approved 3rd party (Ans)<\/strong><\/li><li>A dedicated private circuit directly from your infrastructure into an AWS Region<\/li><\/ul>\n\n\n\n<p><strong>Which of the following is true of the Amazon NAT AMI instance?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>It allows stateful replies (Ans)<\/strong><\/li><li>It allows stateless replies<\/li><li>It allows outbound but not inbound packets<\/li><li>It allows inbound but not outbound packets<\/li><\/ul>\n\n\n\n<p><strong>AWS maintains a system baseline with what industry-standard?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>FedRAMP<\/li><li><strong>ISO 27001 (Ans)<\/strong><\/li><li>ISO 9001<\/li><li>PCI DSS<\/li><\/ul>\n\n\n\n<p><strong>What two features can be used to manage costs at AWS?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Tagging and consolidated billing (Ans)<\/strong><\/li><li>Tagging and multiple accounts<\/li><li>Multiple accounts and budget creation<\/li><li>Tagging and the Cost Explorer<\/li><\/ul>\n\n\n\n<p><strong>The CIA triad has three levels of impact when defining a security breach; list the three levels?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Moderate, high, catastrophic<\/li><li>Limited, moderate, high<\/li><li>Low, medium, high<\/li><li><strong>Low, moderate, high (Ans)<\/strong><\/li><\/ul>\n\n\n\n<p><strong>What rules define a company&#8217;s compliance standards?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Government rules and regulations<\/li><li>Internal rules<\/li><li><strong>Industry regulations (Ans)<\/strong><\/li><li>AWS defined standards<\/li><\/ul>\n\n\n\n<p><strong>What key data security feature is most valued when storing data in the cloud?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Durability (Ans)<\/strong><\/li><li>Lifecycle management<\/li><li>Encryption<\/li><li>Cleansing<\/li><\/ul>\n\n\n\n<p><strong>What is the default network operating model when launching an instance?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>VLAN<\/li><li>Virtual private network<\/li><li><strong>Virtual private cloud (Ans)<\/strong><\/li><li>Classic networking<\/li><\/ul>\n\n\n\n<p><strong>What is the term availability zone define when considering AWS components?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>A single data center in a safe geological zone<\/li><li>Availability zones map to area codes<\/li><li>An area in the world where Amazon services are offered<\/li><li><strong>Two or more data centers connected with high-speed links (Ans)<\/strong><\/li><\/ul>\n\n\n\n<p><strong>What to core services are utilized in every solution offered by AWS?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Compute and networking<\/li><li><strong>Compute and storage (Ans)<\/strong><\/li><li>Networking and database services<\/li><li>Storage and database services<\/li><\/ul>\n\n\n\n<p><strong>How does a customer install AWS security tools?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Security tools are hosted in the cloud. (Ans)<\/strong><\/li><li>Third-party solutions must be purchased and installed.<\/li><li>Downloaded and installed from a public GITHUB repository.<\/li><li>Opening a ticket and requesting access.<\/li><\/ul>\n\n\n\n<p><strong>What two words define the concept of governance in the cloud?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Security and performance<\/li><li>Auditing and identity access<\/li><li>Security and compliance<\/li><li><strong>Risk and complance (Ans)<\/strong><\/li><\/ul>\n\n\n\n<p><strong>Standardizing architecture at AWS can be best accomplished using what automation utility?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Cloud Formation (Ans)<\/strong><\/li><li>AWS Beanstalk<\/li><li>AWS CLI<\/li><li>AWS Config<\/li><\/ul>\n\n\n\n<p><strong>Monitoring acceptable performance at AWS can be carried out using what feature?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Cloud Watch alarms (Ans)<\/strong><\/li><li>Monitoring tools bundled with instances<\/li><li>Inspector and rules<\/li><li>Custom cloud trails<\/li><\/ul>\n\n\n<div class=\"epyt-gallery\" data-currpage=\"1\" id=\"epyt_gallery_21469\"><figure class=\"wp-block-embed wp-block-embed-youtube is-type-video is-provider-youtube epyt-figure\"><div class=\"wp-block-embed__wrapper\"><iframe loading=\"lazy\"  id=\"_ytid_99544\"  width=\"760\" height=\"427\"  data-origwidth=\"760\" data-origheight=\"427\" src=\"https:\/\/www.youtube.com\/embed\/?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;cc_lang_pref=&#038;iv_load_policy=1&#038;loop=0&#038;rel=1&#038;fs=1&#038;playsinline=0&#038;autohide=2&#038;theme=dark&#038;color=red&#038;controls=1&#038;disablekb=0&#038;\" class=\"__youtube_prefs__  no-lazyload\" title=\"YouTube player\"  data-epytgalleryid=\"epyt_gallery_21469\"  allow=\"fullscreen; accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen data-no-lazy=\"1\" data-skipgform_ajax_framebjll=\"\"><\/iframe><\/div><\/figure><div class=\"epyt-gallery-list\"><div>Sorry, there was a YouTube error.<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Which of the following is true of Network ACLs? All rules are processed and order of processing is not important Rules are processed in strict numeric order&#8230; <\/p>\n","protected":false},"author":1,"featured_media":8708,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[5633],"tags":[],"class_list":["post-8634","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aws"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/8634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=8634"}],"version-history":[{"count":3,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/8634\/revisions"}],"predecessor-version":[{"id":25161,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/8634\/revisions\/25161"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media\/8708"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=8634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=8634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=8634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}