AWS Questions
AWS Questions
AWS Questions
Elastic Compute Cloud (EC2): Provides scalable compute capacity in the cloud.
Simple Storage Service (S3): Offers scalable object storage for data backup and
retrieval.
Relational Database Service (RDS): Manages relational databases in the cloud.
Lambda: Allows you to run code without provisioning or managing servers.
Elastic Load Balancer (ELB): Distributes incoming traffic across multiple EC2
instances.
Virtual Private Cloud (VPC): Provides an isolated virtual network within AWS.
3. What is the difference between EC2 and Lambda?
Answer: EC2 is a virtual server that you can provision and manage, whereas Lambda is a
serverless compute service. With EC2, you are responsible for managing the servers,
whereas with Lambda, AWS takes care of server management and scaling for you.
Lambda allows you to run code in response to events without provisioning or managing
servers.
Answer: VPC (Virtual Private Cloud) is a logically isolated virtual network within AWS. It
allows you to define your own virtual network environment, including IP address ranges,
subnets, routing tables, network gateways, and security settings. VPC enables you to
launch AWS resources, such as EC2 instances, within a virtual network that you control.
Answer: AWS provides several services and features to secure data at rest, including:
Encryption: You can use AWS Key Management Service (KMS) to manage
encryption keys and encrypt data at rest.
IAM Policies: Implementing proper IAM (Identity and Access Management)
policies ensures only authorized users have access to the data.
S3 Bucket Policies: You can define policies that enforce encryption for objects
stored in Amazon S3 buckets.
Database Encryption: AWS services like RDS and DynamoDB offer built-in
encryption options for data at rest.
8. What is the difference between Amazon RDS and Amazon Redshift?
Answer: Amazon RDS (Relational Database Service) is a managed service for deploying
and managing relational databases in the cloud. It supports multiple database engines
such as MySQL, PostgreSQL, Oracle, and SQL Server. On the other hand, Amazon
Redshift is a fully managed data warehousing service designed for analytical queries on
large datasets. It is optimized for online analytic processing (OLAP) workloads and is
based on a columnar storage architecture.
Answer: EC2 instances come in various types, each optimized for specific use cases.
Some common types include:
Answer: AWS Lambda is a serverless computing service that lets you run your code
without provisioning or managing servers. It allows you to execute code in response to
events from various AWS services or custom events you define. Lambda automatically
scales your application based on the incoming request volume, and you only pay for the
compute time consumed by your code.
Answer: AWS employs several security measures to ensure data security in transit,
including:
Answer: Amazon S3 is designed for frequent and rapid access to data. It provides low-
latency storage for objects of any size and is suitable for frequently accessed data. On
the other hand, Amazon Glacier is a low-cost storage service for data archiving and
long-term backup. It is optimized for infrequent access and offers lower retrieval costs
but with longer retrieval times.
Answer: Serverless computing refers to the execution of code without the need to
provision or manage servers. AWS Lambda is a popular serverless computing service in
AWS. With Lambda, you can upload your code, and it will be executed in response to
events. The service automatically scales based on incoming request volume, and you
only pay for the actual compute time consumed by your code. Serverless computing
allows developers to focus on writing code and eliminates the need for server
management.
Answer: An Amazon Machine Image (AMI) is a template used to create virtual servers
(EC2 instances) within AWS. It contains the necessary operating system, software, and
configurations required to launch an instance. AMIs are pre-configured images that can
be customized and used to launch multiple instances with consistent configurations,
reducing the time and effort needed for instance provisioning.
Answer: To secure access to AWS resources, you can implement the following measures:
Identity and Access Management (IAM): Define granular permissions and policies
to control access to AWS services and resources.
Multi-Factor Authentication (MFA): Enable MFA for user accounts to provide an
additional layer of security for authentication.
Security Groups: Configure security groups to control inbound and outbound
traffic to your EC2 instances.
Network Access Control Lists (NACLs): Use NACLs to control inbound and
outbound traffic at the subnet level.
AWS Secrets Manager: Securely store and manage sensitive information such as
database credentials, API keys, and passwords.
https://k21academy.com/terraform-iac/terraform-interview-questions
https://www.turing.com/interview-questions/terraform