sitbrazerzkidai.blogg.se

Aws solution architect associate cheat sheet
Aws solution architect associate cheat sheet





aws solution architect associate cheat sheet

No two items in a table can have the same partition key value.The output from the hash function determines the partition(this is simply the physical location in which the data is stored) Dynamodb uses the partition key 's value as input to an internal hash function.Partition key and Sort key (hash & Range) composed of 2 attributes Partition Key (Hash Key) composed of one attribute.Ĭomposite(Think unique ID and date Range) Here everything between brackets is Item and 1587, Alan etc. Strongly consistent reads:- It returns a result that reflects all writes that received successful response prior to the read.Īttributes(Like column of data in a table).Repeating a read after short time should return the updated data.(Best Read perf) Eventual consistent reads:- Consistency across all copies is usually reached within a sec.It is a fully managed DB and support both document and key value data models.It is great for IoT, mobile/web gaming, and many other apps. You can have AWS create a x.509 certificate and a private key that you can download, or you can upload your own certificate by using the security credentials page.ĭynamoDB is fast and flexible noSQL DB service for all application that need consistent single digit millisecond latency at any scale. X.509 certificates:- X.509 are only used to sign SOAP-based requests.This is often used by administrators to verify security policies of their networks and by attackers to identify services running on a host and exploit vulnerabilities.

aws solution architect associate cheat sheet

Port Scanning :- Port scanner is an application designed to probe a server or host for open ports.

aws solution architect associate cheat sheet

IP Spoofing involves modifying the packet header with a forged (spoofed) source IP address, a checksum, and the order value. IP spoofing :- IP Spoofing is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonate another machine by manipulating IP packets. Man in the Middle attacks(MITM) :- In cryptography and computer security, a man-in-the-middle attack (often abbreviated MitM, MiM attack, MitMA or the same using all capital letters) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

aws solution architect associate cheat sheet

In case of a Distributed Denial of Service (DDoS) attack, and the attacker uses multiple compromised or controlled sources to generate the attack. Typically, attackers generate large volumes of packets or requests ultimately overwhelming the target system. Amazon corporate network segregation:- Logically the amazon prod network is segregated from amazon corporate network by means of a complex set of network security/segregation devices.Īmazon protects from different type of attacks:-ĭDoS:- A Denial of Service (DoS) attack is a malicious attempt to affect the availability of a targeted system, such as a website or application, to legitimate end users.For customer who require additional security amazon provides Amazon VPC which provide private subnet within AWS cloud and the ability to use an IPsec VPN(Virtual private network) device to provide an encrypted tunnel between the amazon vpc and your data center.AWS DirectConnect :- Private connectivity between yours and AWS datacenter.You can connect to AWS access point via http or https using SSL.AWS Artifact :- To get details of all the AWS compliance reports from third-party auditors.







Aws solution architect associate cheat sheet