1. Amazon EFS(Elastic File System) Managed NFS (network file system) that can be mounted on many EC2EFS works with EC2 instances in multi-AZHighly available, scalable, expensive (3x gp2), pay per use Use cases: content management, web serfing, data sharing, WordpressUses NFSv4.1 protocolUses security group to control access to EFSCompatible with Linux based AMI (not Windows)Encryption at rest us..
1. You launched an EC2 instance to host a NodeJS application. After installing all the necessary software and configuring the application, you recorded the public IPv4 address of the EC2 instance for access. Then, you stopped the instance and restarted it to complete the application setup. However, after restarting, you were unable to access the EC2 instance and noticed that its public IPv4 addr..
1. Private vs Public IP (IPv4)โถ Networking has two sorts of IPs. IPv4 and IPv6: - IPv4 : 1.160.10.240 - IPv6: 3ffe: 1900:4545:3:200:f8ff:fe21:67cf โถ AWS supports IPv4 and IPv6 bothโถ IPv4 is still the most common format used online.โถ IPv6 is newer and solves problems for the Internet of Things (IoT).โถ IPv4 allows for 3.7 billion different addresses in the public space.โถ IPv4: [0-255].[0-255].[0-2..
1. Which of the following EC2 purchasing options offers the highest discount but is not suitable for databases or critical workloads?์ง๋ฌธ 1. ๋ค์ ์ค, ํ ์ธ ํญ์ด ๊ฐ์ฅ ํฌ๋, ๋ฐ์ดํฐ๋ฒ ์ด์ค ํน์ ์ค์ ์ ๋ฌด์๋ ์ ํฉํ์ง ์์ EC2 ๊ตฌ๋งค ์ต์ ์ ๋ฌด์์ธ๊ฐ์? โ๏ธ 1) Spot Instances (์คํ ์ธ์คํด์ค)โ 2) On-demand (์จ๋๋งจ๋)โ 3) Dedicated Hosts (์ ์ฉ ํธ์คํธ)โ 4) Reserved Instances (์์ฝ ์ธ์คํด์ค)Spot Instances are suitable for short-term workloads and are the most cost-effecti..
1. What's Security Groupsโถ Security Groups are the fundamental of network security.โถ They control how traffic is allowed into or out of our EC2 Instances.โญ Security groups only contain allow rules - ํ์ฉ๊ท์น๋ง ํฌํจ๋๋ฏ๋ก ๋ฌด์์ด ๋ค์ด๊ฐ๊ณ ๋๊ฐ๋ ์ง ์ ์ ์๋ค. โญ Security groups rules can reference by IP or by security group or other security groups - ๋ณด์ ๊ทธ๋ฃน์ IP์ฃผ์๋ฅผ ๊ธฐ์ค์ผ๋ก ๊ท์น์ ์์ฑํ๋ค. - ๋๋ ๋ค๋ฅธ ๋ณด์ ๊ทธ๋ฃน์ ์ฐธ์กฐํ์ฌ ์ค์ ํ ์ ์๋ค. (๋ณด์๊ทธ๋ฃน์ ์๋ก ์ฐธ์กฐ..
1. What are two common IAM (Identity and Access Management) security tools ?IAM Access AnalyzerShows the account creation time, whether the password is activated, the last time the password was changed, the last time the account was used, when the next password change is expected, whether MFA is enabled, whether access keys have been created, the last time the access key was rotated, the last ti..