Search Header Logo

Day 6: EBS - AMI - EFS

Authored by An Bình

Computers

Professional Development

Used 6+ times

Day 6: EBS - AMI - EFS
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

___ is a supported and maintained image provided by AWS that provides the information required to launch an instance. You must specify it when you launch an instance

Instance Storage
AMI
EFS
EBS

2.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

___ provides block level storage volumes for use with EC2 instances. It behave like raw, unformatted block devices

Instance Storage
AMI
EFS
EBS

3.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Which of the following configuration details cannot be changed on an existing EC2 instance?

AMI
EBS Root volume
Security group
Public IP address

4.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Which EBS volume type suit for data that is infrequently accessed and scenarios where the lowest storage cost is important?

Cold HDD
Throughput-optimized HDD
General-purpose SSD
Provisioned-IOPS SSD

5.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Which of the following EBS options will you need to keep your data-hungry application that requires up to 20,000 IOPS happy?

Cold HDD
Throughput-optimized HDD
General-purpose SSD
Provisioned-IOPS SSD

6.

MULTIPLE SELECT QUESTION

1 min • 5 pts

Which of the following are benefits of instance store volumes? (Choose two.)

Instance volumes are physically attached to the server that’s hosting your instance, allowing faster data access.

Instance volumes can be used to store data even after the instance is shut down.
The use of instance volumes does not incur costs (beyond those for the instance itself).
You can set termination protection so that an instance volume can’t be accidentally<br />shut down.
Instance volumes are commonly used as a base for the creation of AMIs

7.

MULTIPLE SELECT QUESTION

1 min • 5 pts

Which three attributes of an incoming data packet are used by a security group to determine whether it should be allowed through?

Network port
Source address
Datagram header size
Network protocol
Destination address

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?