AWS Interview Questions
AWS Interview Questions
Q63) Which is virtual network interface that you can attach to an instance in a
VPC?
Answer: Elastic Network Interface
Q64) You have launched a Linux instance in AWS EC2. While configuring security
group, you Have selected SSH, HTTP, HTTPS protocol. Why do we need to select SSH?
Answer: To verify that there is a rule that allows traffic from EC2 Instance to your
computer
Q65) You have chosen a windows instance with Classic and you want to make some
change to the Security group. How will these changes be effective?
Answer: Changes are automatically applied to windows instances
Q66) Load Balancer and DNS service comes under which type of cloud service?
Q87) To create an mirror make a image of your environment in another region for
the disaster recoverys, which of the following AWS is resources do not need to be
recreated in second region?
Answer: May be the selected on Route 53 Record Sets.
Q88) An customers wants to the captures all client connections to get information
from his load balancers at an interval of 5 minutes only, which cal select option
should he choose for his application?
Answer: File a change request to get implement of Proxy Protocol support in the
application. Use of ELB with TCP Listener and A Proxy Protocol enabled to distribute the
load on two application servers in the different AZs.
Q98) Your application currently is leverages AWS Auto Scaling to the grow and
shrink as a load Increases/decreases and has been performing as well. Your
marketing a team expects and steady ramp up in traffic to follow an upcoming
campaign that will result in 20x growth in the traffic over 4 weeks. Your forecast
for approximate number of the Amazon EC2 instances necessary to meet peak
demand is 175. What should be you do avoid potential service disruptions
during the ramp up traffic?
Answer: Check the service limits in the Trusted Advisors and adjust as necessary, so that
forecasted count remains within the limits.
Q99) You have a web application running on the six Amazon EC2 instances,
consuming about 45% of resources on the each instance. You are using the
auto-scaling to make sure that a six instances are running at all times. The
number of requests this application processes to consistent and does not
experience to spikes. Then application are critical to your business and you
want to high availability for at all times. You want to the load be distributed
evenly has between all instances. You also want to between use same Amazon
Machine Image (AMI) for all instances. Which are architectural choices should
Answer: Deploy to 3 EC2 instances in one of availability zone and 3 in another availability
of zones and to use of Amazon Elastic is Load Balancer.
Q100) You are the designing an application that a contains protected health
information. Security and Then compliance requirements for your application
mandate that all protected to health information in application use to encryption
at rest and in the transit module. The application to uses an three-tier
architecture. where should data flows through the load balancers and is stored
on the Amazon EBS volumes for the processing, and the results are stored in
the Amazon S3 using a AWS SDK. Which of the options satisfy the security
requirements?
Answer: Use TCP load balancing on load balancer system, SSL termination on Amazon to
create EC2 instances, OS-level disk take encryption on Amazon EBS volumes, and The
amazon S3 with server-side to encryption and Use the SSL termination on load balancers,
an SSL listener on the Amazon to create EC2 instances, Amazon EBS encryption on the EBS
volumes containing the PHI, and Amazon S3 with a server-side of encryption.
Q101) A startup deploys its create photo-sharing site in a VPC. An elastic load
balancer distributes to web traffic across two the subnets. Then the load
balancer session to stickiness is configured to use of AWS-generated session
cookie, with a session TTL of the 5 minutes. The web server to change Auto
Scaling group is configured as like min-size=4, max-size=4. The startup is the
preparing for a public launchs, by running the load-testing software installed on
the single Amazon Elastic Compute Cloud (EC2) instance to running in
us-west-2a. After 60 minutes of load-testing, the web server logs of show the
following:WEBSERVER LOGS | # of HTTP requests to from load-tester system |
# of HTTP requests to from private on beta users || webserver #1 (subnet an
us-west-2a): | 19,210 | 434 | webserver #2 (subnet an us-west-2a): | 21,790 | 490 ||
webserver #3 (subnet an us-west-2b): | 0 | 410 || webserver #4 (subnet an
us-west-2b): | 0 | 428 |Which as recommendations can be help of ensure that
load-testing HTTP requests are will evenly distributed across to four web
servers?
Answer: Result of cloud is re-configure the load-testing software to the re-resolve DNS for
each web request.
Q102) To serve the Web traffic for a popular product to your chief financial
officer and IT director have purchased 10 m1.large heavy utilization of Reserved
Instances (RIs) evenly put spread across two availability zones: Route 53 are
used to deliver the traffic to on Elastic Load Balancer (ELB). After the several
months, the product grows to even more popular and you need to additional
capacity As a result, your company that purchases two c3.2xlarge medium
utilization RIs You take register the two c3.2xlarge instances on with your ELB
Answer: To use a separate ELB for the each instance type and the distribute load to ELBs
with a Route 53 weighted round of robin.
Q103) An AWS customer are deploying an web application that is the composed
of a front-end running on the Amazon EC2 and confidential data that are stored
on the Amazon S3. The customer security policy is that all accessing operations
to this sensitive data must authenticated and authorized by centralized access
to management system that is operated by separate security team. In addition,
the web application team that be owns and administers the EC2 web front-end
instances are prohibited from having the any ability to access data that
circumvents this centralized access to management system. Which are
configurations will support these requirements?
Answer: The configure to the web application get authenticate end-users against the
centralized access on the management system. Have a web application provision trusted to
users STS tokens an entitling the download of the approved data directly from a Amazon
S3.
Answer: By Using a VPC, they could be create an the extension to their data center and to
make use of resilient hardware IPSEC on tunnels, they could then have two domain
consider to controller instances that are joined to the existing domain and reside within the
different subnets in the different availability zones.
Answer:
Lower computing cost
Improved Performance
No IT Maintenance
Business connectivity
Easily upgraded
Device Independent
Answer:
Private Cloud
Public Cloud
Hybrid cloud
Community cloud 4
Answer:
Pay per use
Scalability
Elasticity
High Availability
Increase speed and Agility
Go global in Minutes
Answer: Amazon web service is a secure cloud services platform offering compute, power,
database, storage, content delivery and other functionality to help business scale and grow.
Answer:
AWS Console
AWS CLI (Command line interface)
AWS SDK (Software Development Kit)
Answer: Amazon Elastic compute cloud is a web service that provides resizable compute
capacity in the cloud. AWS EC2 provides scalable computing capacity in the AWS Cloud.
These are the virtual servers also called as an instances. We can use the instances pay per
use basis.
Benefits:
Easier and Faster
Elastic and Scalable
High Availability
Cost-Effective
Answer:
On-Demand Instances
Reserved Instances
Spot Instances
Dedicated Host
Answer:
General Purpose
Answer: Amazon machine image is a special type of virtual appliance that is used to create
a virtual machine within the amazon Elastic compute cloud. AMI defines the initial software
that will be in an instance when it is launched.
Types of AMI:
Published by AWS
AWS Marketplace
Generated from existing instances
Uploaded virtual server
Answer: Public Domain name system (DNS) name: When you launch an instance AWS
creates a DNS name that can be used to access the
Public IP: A launched instance may also have a public ip address This IP address assigned
from the address reserved by AWS and cannot be specified.
Elastic IP: An Elastic IP Address is an address unique on the internet that you reserve
independently and associate with Amazon EC2 instance. This IP Address persists until the
customer release it and is not tried to
Answer: AWS allows you to control traffic in and out of your instance through virtual
firewall called Security groups. Security groups allow you to control traffic based on port,
protocol and source/Destination.
Answer: Retired state only available in Reserved instances. Once the reserved instance
reserving time (1yr/3yr) ends it shows Retired state.\
Answer: AWS Elastic Beanstalk is the fastest and simplest way to get an application up and
running on AWS. Developers can simply upload their code and the service automatically
handle all the details such as resource provisioning, load balancing, Auto scaling and
Monitoring.
Answer: Lightsail designed to be the easiest way to launch and manage a virtual private
server with AWS. Lightsail plans include everything you need to jumpstart your project a
virtual machine, ssd based storage, data transfer, DNS Management and a static ip.
Answer: Amazon EBS Provides persistent block level storage volumes for use with Amazon
EC2 instances. Amazon EBS volume is automatically replicated with its availability zone to
protect component failure offering high availability and durability. Amazon EBS volumes
are available in a variety of types that differ in performance characteristics and Price.
Answer: Magnetic Volume: Magnetic volumes have the lowest performance characteristics
of all Amazon EBS volume types.
EBS Volume size: 1 GB to 1 TB Average IOPS: 100 IOPS Maximum
throughput: 40-90 MB
General-Purpose SSD: General purpose SSD volumes offers cost-effective
storage that is ideal for a broad range of workloads. General purpose SSD volumes are
billed based on the amount of data space provisioned regardless of how much of data you
actually store on the volume.
EBS Volume size: 1 GB to 16 TB Maximum IOPS: upto 10000 IOPS Maximum
throughput: 160 MB
Provisioned IOPS SSD: Provisioned IOPS SSD volumes are designed to meet
the needs of I/O intensive workloads, particularly database workloads that are sensitive to
storage performance and consistency in random access I/O throughput. Provisioned IOPS
SSD Volumes provide predictable, High performance.
EBS Volume size: 4 GB to 16 TB Maximum IOPS:
upto 20000 IOPS Maximum throughput: 320 MB
Answer: Cold HDD: Cold HDD volumes are designed for less frequently accessed workloads.
These volumes are significantly less expensive than throughput-optimized HDD volumes.
EBS
Volume size: 500 GB to 16 TB Maximum IOPS: 200 IOPS Maximum throughput: 250 MB
Throughput-Optimized HDD: Throughput-optimized HDD volumes are low cost HDD
volumes designed for frequent access, throughput-intensive workloads such as big data,
data warehouse.
EBS Volume size: 500 GB to 16 TB Maximum IOPS: 500 IOPS Maximum throughput: 500
MB
Answer: Amazon EBS optimized instances to ensure that the Amazon EC2 instance is
prepared to take advantage of the I/O of the Amazon EBS Volume. An amazon EBS-
optimized instance uses an optimized configuration stack and provide additional dedicated
capacity for Amazon EBS I/When you select Amazon EBS-optimized for an instance you
pay an additional hourly charge for that instance.
Answer:
It can back up the data on the EBS Volume. Snapshots are incremental backups.
If this is your first snapshot it may take some time to create. Snapshots are point in
time copies of volumes.
Answer: We can table to connect EBS volume to multiple instance multiple EBS Volume to
single instance.
Answer:
Block Storage: Block storage operates at lower level, raw storage device level and
manages data as a set of numbered, fixed size blocks.
File Storage: File storage operates at a higher level, the operating system level and manage
data as a named hierarchy of files and folders.