AWS Interview Questions-2023
AWS Interview Questions-2023
● Computing
● Storage
● Networking
Here are some of the AWS products that are built based on the three cloud service
types:
Computing - These include EC2, Elastic Beanstalk, Lambda, Auto-Scaling, and Lightsat.
Storage - These include S3, Glacier, Elastic Block Storage, Elastic File System.
3. What is auto-scaling?
Auto-scaling is a function that allows you to provision and launch new instances
whenever there is a demand. It allows you to automatically increase or decrease
resource capacity in relation to the demand.
Take home these interview Q&As and get much more. Download the complete AWS
Interview Guide here:
7. What are the tools and techniques that you can use in
AWS to identify if you are paying more than you should be,
and how to correct it?
You can know that you are paying the correct amount for the resources that you are
using by employing the following resources:
● Putty
● AWS CLI for Linux
● AWS CLI for Windows
● AWS CLI for Windows CMD
● AWS SDK
● Eclipse
AWS CloudTrail
This is a service that provides a history of the AWS API calls for every account. It lets
you perform security analysis, resource change tracking, and compliance auditing of
your AWS environment as well. The best part about this service is that it enables you to
configure it to send notifications via AWS SNS when new logs are delivered.
AWS Config
This helps you understand the configuration changes that happen in your environment.
This service provides an AWS inventory that includes configuration history,
configuration change notification, and relationships between AWS resources. It can also
be configured to send information via AWS SNS when new logs are delivered.
● AWS Shield
● AWS WAF
● Amazon Route53
● Amazon CloudFront
● ELB
● VPC
12. You are trying to provide a service in a particular
region, but you do not see the service in that region. Why is
this happening, and how do you fix it?
Not all Amazon AWS services are available in all regions. When Amazon initially
launches a new service, it doesn’t get immediately published in all the regions. They
start small and then slowly expand to other regions. So, if you don’t see a specific
service in your region, chances are the service hasn’t been published in your region yet.
However, if you want to get the service that is not available, you can switch to the
nearest region that provides the services.
● IAM
● Route 53
● Web Application Firewall
● CloudFront
When you use on-demand instances, you must pay for computing resources without
making long-term obligations.
Reserved instances, on the other hand, allow you to specify attributes such as instance
type, platform, tenancy, region, and availability zone. Reserved instances offer
significant reductions and capacity reservations when instances in certain availability
zones are used.
Amazon EC2 and Amazon S3 are two of the best-known web services that make up
AWS.
AIX is an operating system that runs only on Power CPU and not on Intel, which means
that you cannot create AIX instances in EC2.
Since both the operating systems have their limitations, they are not currently available
with AWS.
1. A job is created.
2. The SnowBall application is connected.
3. The data is copied into the SnowBall application.
4. Data is then moved to the AWS S3.
● Security groups - This acts as a firewall for the EC2 instances, controlling
inbound and outbound traffic at the instance level.
● Network access control lists - It acts as a firewall for the subnets, controlling
inbound and outbound traffic at the subnet level.
● Flow logs - These capture the inbound and outbound traffic from the network
interfaces in your VPC.
The T2 instances are General Purpose instance types and are low in cost as well. They
are usually used wherever workloads do not consistently or often use the CPU.
It further gives us Federated Access, which allows us to grant applications and users
access to resources without having to create IAM Roles.
By enabling this Connection Draining, we let the Load Balancer make an outgoing
instance finish its existing requests for a set length of time before sending it any new
requests. A departing instance will immediately go off if Connection Draining is not
enabled, and all pending requests will fail.
68. What is Power User Access in AWS?
The AWS Resources owner is identical to an Administrator User. The Administrator User
can build, change, delete, and inspect resources, as well as grant permissions to other
AWS users.
Administrator Access without the ability to control users and permissions is provided to
a Power User. A Power User Access user cannot provide permissions to other users but
has the ability to modify, remove, view, and create resources.
● AWS CloudFormation helps you provision and describe all of the infrastructure
resources that are present in your cloud environment. On the other hand, AWS
Elastic Beanstalk provides an environment that makes it easy to deploy and
run applications in the cloud.
● AWS CloudFormation supports the infrastructure needs of various types of
applications, like legacy applications and existing enterprise applications. On
the other hand, AWS Elastic Beanstalk is combined with the developer tools to
help you manage the lifecycle of your applications.
● Template parameters
● Output values
● Data tables
● Resources
● File format version
1. Get the list of instances and connect to AWS through API to list the Amazon
EBS volumes that are attached locally to the instance.
2. List the snapshots of each volume, and assign a retention period of the
snapshot. Later on, create a snapshot of each volume.
3. Make sure to remove the snapshot if it is older than the retention period.
74. Can you take a backup of EFS like EBS, and if yes,
how?
Yes, you can use the EFS-to-EFS backup solution to recover from unintended changes or
deletion in Amazon EFS. Follow these steps:
● As per procedure and best practices, take snapshots of the EBS volumes on
Amazon S3.
● Use AWS Ops Automator to handle all the snapshots automatically.
● This allows you to create, copy, and delete Amazon EBS snapshots.
Used if you require extreme performance and static IPs for your applications.
80. What are the different AWS IAM categories that you
can control?
Using AWS IAM, you can do the following:
81. What are the policies that you can set for your users’
passwords?
Here are some of the policies that you can set:
● You can set a minimum length of the password, or you can ask the users to
add at least one number or special characters in it.
● You can assign requirements of particular character types, including
uppercase letters, lowercase letters, numbers, and non-alphanumeric
characters.
● You can enforce automatic password expiration, prevent reuse of old
passwords, and request for a password reset upon their next AWS sign in.
● You can have the AWS users contact an account administrator when the user
has allowed the password to expire.
● An IAM role is an IAM entity that defines a set of permissions for making AWS
service requests, while an IAM user has permanent long-term credentials and
is used to interact with the AWS services directly.
● In the IAM role, trusted entities, like IAM users, applications, or an AWS
service, assume roles whereas the IAM user has full access to all the AWS
IAM functionalities.
● Manage IAM users and their access - AWS IAM provides secure resource
access to multiple users
● Manage access for federated users – AWS allows you to provide secure
access to resources in your AWS account to your employees and applications
without creating IAM roles
Hosted zone
A hosted zone is a container that holds information about how you want to route traffic
on the internet for a specific domain. For example, lms.simplilearn.com is a hosted
zone.
Amazon is a global service and consequently has DNS services globally. Any customer
creating a query from any part of the world gets to reach a DNS server local to them that
provides low latency.
Dependency
Optimal Locations
Route 53 uses a global anycast network to answer queries from the optimal position
automatically.
AWS Interview Questions for Config
You can use a CI to ascertain what your AWS resource looks like at any given point in
time. Whereas, by using CloudTrail, you can quickly answer who made an API call to
modify the resource. You can also use Cloud Trail to detect if a security group was
incorrectly configured.