Pages

Thursday, July 2, 2020

AWS Q & A

Question 1 What Is Amazon Ec2 Service ?

Answer :

Amazon Elastic Compute Cloud (Amazon EC2) is a Amazon web service that provides resizable (scalable) computing capacity in the cloud. 

You can use Amazon EC2 to launch as many virtual servers you need. 

In Amazon EC2 you can configure security and networking as well as manage storage.


Amazon EC2 service also helps in obtaining and configuring capacity using minimal friction.

Question 2. What Are The Features Of The Amazon Ec2 Service ?

Answer :

As the Amazon EC2 service is a cloud service so it has all the cloud features.

Amazon EC2 provides the following features:
Virtual computing environment (known as instances)
Pre-configured templates for your instances (known as Amazon Machine Images – AMIs)
Amazon Machine Images (AMIs) is a complete package that you need for your server (including the operating system and additional software)
Amazon EC2 provides various configurations of CPU, memory, storage and networking capacity for your instances (known as instance type)
Secure login information for your instances using key pairs (AWS stores the public key and you can store the private key in a secure place)
Storage volumes of temporary data is deleted when you stop or terminate your instance (known as instance store volumes)
Amazon EC2 provides persistent storage volumes (using Amazon Elastic Block Store – EBS)
A firewall that enables you to specify the protocols, ports, and source IP ranges that can reach your instances using security groups
Static IP addresses for dynamic cloud computing (known as Elastic IP address)
Amazon EC2 provides metadata (known as tags)
Amazon EC2 provides virtual networks that are logically isolated from the rest of the AWS cloud, and that you can optionally (Salesforce Certification Training) connect to your own network (known as virtual private clouds – VPCs)

Monday, February 11, 2019

Point to remember for CISA exam

(1)In any given scenario, when objective is to ensure ‘confidentiality’, message has to be encrypted using receiver’s public key. 

(2)In any given scenario, when objective is to ensure ‘authentication’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest. 

(3)In any given scenario, when objective is to ensure ‘integrity’, HASH of the mes- sage has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest. 

(4)In any given scenario, when objective is to ensure ‘confidentiality & authen- tication’, following treatment is required: -Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation) -Message to be encrypted using receiver’s public key (to ensure confidentiality) 

(5)In any given scenario, when objective is to ensure ‘confidentiality & authen- tication & integrity’, following treatment is required: -Message to be encrypted using receiver’s public key (to ensure confidentiality) -Hash of the message to be encrypted using sender’s private key (to ensure au- thentication/non-pudiationation and integrity) 

(6)Below table summarizes the above provisions: