Explore fundamental concepts of cloud computing, types of cloud services, and the practical steps to create your first EC2 instance using AWS. Learn distinctions between service models and best practices for getting started.
What is a key characteristic of cloud computing as defined by the National Institute of Standards and Technology (NIST)?
Explanation: Cloud computing allows users to access resources on-demand and share them efficiently, which is emphasized in the NIST definition. Mandatory private clouds are only one type, not required. Resources are not permanently allocated; elasticity is core. Access is not limited to dedicated hardware; virtualization is central.
Which service model provides fundamental resources such as virtual servers, storage, and networking?
Explanation: IaaS offers basic computing, storage, and networking building blocks. PaaS focuses on platforms for deploying applications, SaaS delivers ready-to-use software, and BaaS is not a commonly recognized cloud service model.
Which deployment model describes a cloud that combines public and private cloud features?
Explanation: Hybrid cloud blends features of both public and private clouds, allowing data or applications to move between them. Public and private clouds are distinct types, and distributed cloud is not a standard deployment model in this context.
What must you provide when signing up to create a new account to launch your first EC2 instance in the AWS Management Console?
Explanation: Creating an AWS account involves entering credentials, contact and payment details, confirming identity, and choosing a support plan. Hardware configuration and cloud project are set up within the account. Public IP is not required for account creation.
After setting up a new AWS account and launching resources, what is a recommended step to monitor future costs?
Explanation: Setting a billing alarm helps track and control spending as resources are used. Increasing instance size can increase costs rather than monitor them. Disabling security groups weakens security, and deleting the root user is not recommended.