AWS Interview Questions and Answers
Question - 71 : - How can you recover/login to an EC2 instance for which you have lost the key?
Answer - 71 : -
Follow the steps provided below to recover an EC2 instance if you have lost the key:
- Verify that the EC2Config service is running
- Detach the root volume for the instance
- Attach the volume to a temporary instance
- Modify the configuration file
- Restart the original instance
Question - 72 : - How do you allow a user to gain access to a specific bucket?
Answer - 72 : -
You need to follow the four steps provided below to allow access. They are:
- Categorize your instances
- Define how authorized users can manage specific servers.
- Lockdown your tags
- Attach your policies to IAM users
Question - 73 : - What is SnowBall?
Answer - 73 : -
To transfer terabytes of data outside and inside of the AWS environment, a small application called SnowBall is used.
Data transferring using SnowBall is done in the following ways:
- A job is created.
- The SnowBall application is connected.
- The data is copied into the SnowBall application.
- Data is then moved to the AWS S3.
Question - 74 : - What are the Storage Classes available in Amazon S3?
Answer - 74 : -
The Storage Classes that are available in the Amazon S3 are the following:
- Amazon S3 Glacier Instant Retrieval storage class
- Amazon S3 Glacier Flexible Retrieval (Formerly S3 Glacier) storage class
- Amazon S3 Glacier Deep Archive (S3 Glacier Deep Archive)
- S3 Outposts storage class
- Amazon S3 Standard-Infrequent Access (S3 Standard-IA)
- Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA)
- Amazon S3 Standard (S3 Standard)
- Amazon S3 Reduced Redundancy Storage
- Amazon S3 Intelligent-Tiering (S3 Intelligent-Tiering)
Question - 75 : - What Is Amazon Virtual Private Cloud (VPC) and Why Is It Used?
Answer - 75 : -
A VPC is the best way of connecting to your cloud resources from your own data center. Once you connect your datacenter to the VPC in which your instances are present, each instance is assigned a private IP address that can be accessed from your data center. That way, you can access your public cloud resources as if they were on your own private network.
Question - 76 : - Name and explain some security products and features available in VPC?
Answer - 76 : -
Here is a selection of security products and features:
- Security groups - This acts as a firewall for the EC2 instances, controlling inbound and outbound traffic at the instance level.
- Network access control lists - It acts as a firewall for the subnets, controlling inbound and outbound traffic at the subnet level.
- Flow logs - These capture the inbound and outbound traffic from the network interfaces in your VPC.
Question - 77 : - How do you monitor Amazon VPC?
Answer - 77 : -
You can monitor VPC by using:
- CloudWatch and CloudWatch logs
- VPC Flow Logs
Question - 78 : - When Would You Prefer Provisioned IOPS over Standard Rds Storage?
Answer - 78 : -
You would use Provisioned IOPS when you have batch-oriented workloads. Provisioned IOPS delivers high IO rates, but it is also expensive. However, batch processing workloads do not require manual intervention.
Question - 79 : - How Do Amazon Rds, Dynamodb, and Redshift Differ from Each Other?
Answer - 79 : -
Amazon RDS is a database management service for relational databases. It manages patching, upgrading, and data backups automatically. It’s a database management service for structured data only. On the other hand, DynamoDB is a NoSQL database service for dealing with unstructured data. Redshift is a data warehouse product used in data analysis.
Question - 80 : - What Are the Benefits of AWS’s Disaster Recovery?
Answer - 80 : -
Businesses use cloud computing in part to enable faster disaster recovery of critical IT systems without the cost of a second physical site. The AWS cloud supports many popular disaster recovery architectures ranging from small customer workload data center failures to environments that enable rapid failover at scale. With data centers all over the world, AWS provides a set of cloud-based disaster recovery services that enable rapid recovery of your IT infrastructure and data.