Interview-Guide

AWS EKS exam

Single Choice

1)

Your customer wants to use AWS EKS to run a service. All the accounts are separated by permissions. The development team has asked the platform team to create an AWS EKS cluster. The EKS cluster was created successfully, but the customer cannot see the resources inside the cluster in the console.

Why are the resources not visible to the development team?

2)

Your organization has several applications developed in different languages. Managing centralized logging is a challenge. The centralized monitoring team has developed a monitoring helper microservice that can standardize logs and metrics from each of the ten microservices in a common format before ingesting them into a centralized log store.

What is the BEST way to run the monitoring helper container?

3)

Your customer is maturing their FinOps practice and cost efficiency is a big part of that effort. They host multiple applications on their shared EKS clusters. They are looking to charge back the EKS costs to the respective application teams.

What is the MOST efficient way to allocate costs across the application teams?

4)

A developer needs to use the Docker Container Runtime to start a container locally, using docker container run, and interact with it through the command line.

What command line flag is required so the session will be interactive using TTY?

Score: 1.00

Single Choice

5)

You have developed an application using a container hosting a web service. This web service is accessible via an ingress controller on your intranet and reads and writes data from a DynamoDB table. You want to be able to deploy this solution into different stages: dev, test, preprod and prod. You also want to be able to deploy the whole product with one command using parameters to specify the stage.

Which solution fulfills all your requirements?

Score: 1.00

Single Choice

6)

You are a DevOps engineer tasked with building a new continuous delivery pipeline to deploy applications on an EKS cluster. Your team is curious about using GitOps but needs to know the key difference between GitOps and traditional CI/CD workflow.

Which of the following BEST summarizes this difference?

Score: 1.00

Single Choice

7)

A company's security team needs to be able to detect whenever production containers attempt to communicate with known IP addresses associated with cryptocurrency-related activity. Automated vulnerability scanning of container images is performed in the CI/CD pipeline before deployment into managed node groups in EKS.

Which solution should the security team leverage to meet their requirement?

Score: 1.00

Single Choice

8)

You are a DevOps engineer in a Travel Booking company that has recently deployed its critical application to the Amazon Elastic Kubernetes Service (EKS). During the holiday season, the application experienced a sudden drop in performance, causing disruption to the end users. Following the recent challenges, your manager has emphasized the need for preventive measures to avoid similar issues in the future.

Which of the following observability strategies would be the most effective in detecting, investigating, and mitigating the underlying problem in the EKS cluster using metrics?

Score: 1.00

Single Choice

9)

You are a DevOps engineer at a financial services company. Your team is responsible for managing the company's AWS EKS cluster, which hosts hundreds of critical microservices. You need to create a new node group for a microservice with high performance requirements and must be highly available.

Which type of AWS EKS node group should you use?

Score: 0.00Correct answer(s):

AWS Fargate node group

Custom node group with on-demand instances

Managed node group with spot instances

Custom node group with spot instances

Multiple Choice

10)

You are the administrator for an EKS cluster that runs your company's applications. To comply with secutiry requirements, you enabled network policies on your EKS cluster and implemented a default-deny policy obtained from the security team. After this change, the monitoring team is complaining that they are not getting application health metrics on their monitoring dashboard.

Assuming that the monitoring pod runs in the same namespace as the application pods, how will you remediate this issue, while complying with security requirements? (Select TWO)

Score: 1.00

Single Choice

11)

As a tech lead, you are tasked with selecting the right Kubernetes solution for your company's needs.

Which of the following statements accurately describes the business value and features of EKS?

Score: 1.00

Single Choice

12)

You are asked to provide a high-level summary of the Kubernetes cluster architecture to your team.

Which of the following statements BEST describes the key components?

Score: 0.00Correct answer(s):

13)

You are deploying a new application to Kubernetes. You need to understand the core concepts of Kubernetes to successfully deploy and manage your application.

Which Kubernetes resource provides the BEST way to create and manage pods?

Score: 1.00

Single Choice

14)

A new startup company recently launched an E-commerce site hosted on Amazon EKS cluster that has multiple Microservices. Their CEO asked operations team to build a solution to capture application logs across the cluster, so that they can identify what microservice can be improved.

What action should the operations team take in order to capture application logs generated across the cluster?

Score: 1.00

Multiple Choice

15)

After deploying a EKS cluster you discover that all pods within the cluster can communicate with each other. Security has determined multi-tenant EKS clusters are acceptable, but individual pods should NOT have network access to other resources internal or external to the cluster. As the Solutions Architect, you decide to use the Amazon VPC CNI to enforce Network Policies to secure the traffic within the Kubernetes clusters.

What elements of Network Policies can you use to restrict or allow pod's traffic to other pods or external resources. (Select THREE)

Score: 1.00

Single Choice

16)

Your company is planning to move some on-premises applications to AWS. As a development lead, you consider moving these applications as containers to be a good idea.

What is the primary advantage of using containers for deploying and managing applications?

Score: 1.00

Single Choice

17)

You are the Kubernetes administrator for an organization that operates a shared cluster to host various applications. You need to ensure proper access control for different teams and different team members like developers, operators, security admin, etc., allowing them to manage resources in their namespaces while maintaining cluster-wide security standards.

Which configuration is the most efficient way to grant teams the right permissions within their namespaces and manage cluster-wide permissions?

Score: 0.00Correct answer(s):

Single Choice

18)

An e-commerce application team has more than 25 microservices running within a Kubernetes cluster. The platform architect for this Kubernetes cluster needs to expose 15 of these microservices to the internet.

What is the advantage of exposing these microservices via an Ingress resource compared to exposing them individually via a load balancer?

Score: 1.00

Single Choice

19)

You manage an EKS Cluster with one autoscaling group using an instance type that has an EC2 Instance Savings Plan and other autoscaling group using instance types that are on demand.

In order to optimize costs, which feature of Cluster Autoscaler can favour the autoscaling group covered by Instance Savings Plan to be used first in an scale-out event?

Score: 0.00Correct answer(s):

Single Choice

20)

You have developed a microservices based application that is being deployed to your Amazon EKS cluster. The application is deployed as multiple Kubernetes deployments and has various endpoints that need to be exposed outside of the cluster to allow for external users to make HTTP based API calls against. To reduce complexity for your end users, you would like to expose the different application endpoints on a single URL with different URL paths directing users to the proper endpoint.

Based on these requirements, what is the best way to accomplish exposing the application to your end users?

Score: 1.00

Single Choice

21)

You are deploying a front-end web app pod called web-app-pod that will handle user traffic in a Kubernetes cluster. The development team wants to ensure the pod does not use too many resources.

What is the most important thing to do when deploying web-app-pod?

Score: 1.00

Multiple Choice

22)

Your organization's software engineering team is new to containerizing applications and wants to know the artifacts to be included in their container images.

Which of the following elements would you advise the Software Engineering team to include in their container images? (Select THREE)

Score: 0.67Correct answer(s):
Multiple Choice

23)

A customer wants to expose an application to the internet. The application is running on multiple pods on EKS.

What options does the customer have? (Select TWO)

Score: 0.50Correct answer(s):

Single Choice

24)

As a Solutions Architect, you are asked to design a Kubernetes environment on AWS for a customer.

Which of the following statements BEST describes the components of an EKS cluster?

Score: 1.00

Single Choice

25)

You are working on a microservice application as a developer. While testing in your local environment, you found that your application container needs at least 128 MiB memory to run on the Kubernetes cluster efficiently. You need to prepare this application to run on a Kubernetes cluster.

How will you ensure your application container will get sufficient memory when deployed in a Kubernetes cluster?

Score: 1.00

Single Choice

26)

The Development team on Company A regularly pushes new images directly to ECR for Deployment. With Company A's recent concerns for security, specifically with common vulnerabilities and exposures, the DevOps team is tasked to create a plan to scan these images as soon as they are pushed to ECR AND have reports on vulnerabilities and exposure findings available on SecurityHub for the Security team.

How can the Devops team address ALL the requirements of this task?

Score: 1.00

Multiple Choice

27)

Your team has decided to move to a microservices architecture running on Kubernetes. You are tasked with deploying a new Kubernetes cluster running on AWS.

Which of the following statements describes the functions of a control plane? (Select THREE)

Score: 1.00

Single Choice

28)

You are teaching a class on containerization to a group of aspiring software developers. To assess their understanding of container concepts and features, you decide to ask the following question.

Which of the following BEST describes the key concepts and features of a container?

Score: 1.00

Single Choice

29)

You have developed a micro-services based web application that is being deployed to your Amazon EKS cluster. The application has multiple services that need to be exposed externally. You have decided that exposing the application endpoints using a Kubernetes Ingress controller and AWS ALB would meet all requirments. A central administration team deployed the EKS cluster you are leveraging and is using the default configuration, with no additional components installed.

You have created a Kubernetes Ingress manifest with the proper configuration options for the ALB and your applications, but upon applying the manifest, nothing happened. No load balancer was created and your application is not accessible externally.

What is a potential reason that your ingress resource is not being satisfied?

Score: 1.00

Multiple Choice

30)

Engineers working for a SaaS company noticed one of their Microservices running on EKS is sending packets to an unknown IP address. After a deeper investigation, they realized the application container had been compromised.

Knowing their deployment pipeline runs container image scanning, what are the possible causes for the breach? (Select Three)

Score: 1.00

Single Choice

31)

A DevOps engineer needs to revisit some recently deployed multiple web applications on Amazon EKS. Each web application was exposed with NodePort service type with URL path using AWS Application Load Balancer (ALB) and Amazon Route 53 to connect customers' requests to the web applications. Web applications must handle HTTP/HTTPS traffic and be reachable on the Internet.

Which recommendation is MOST likely cost-effective and has a reduced security risk?

Score: 1.00

Single Choice

32)

A DevOps engineer is setting up a GitOps pipeline using GitHub Actions to enable the Deployment of microservices to their EKS cluster. As a consultant, you are asked how to configure the EKS cluster credentials in the GitHub Actions workflow.

What will you advise?

Score: 1.00

Multiple Choice

33)

You've created an EKS cluster and then created a node group in the cluster. You noticed that there are no worker nodes visible inside the EKS cluster. There are EC2 instances being created in the EC2 management console. You've performed troubleshooting and observed that the EC2 instances have no IAM policies attached.

Which of the following policies would you attach to the worker node IAM role to help worker nodes join the EKS cluster but not have permission to do anything else.? (SELECT TWO)

Score: 0.50Correct answer(s):

Single Choice

34)

Your team manages an Amazon EKS cluster. The nodegroups are all in private subnets. You have a non-HTTP application running on TCP port 5000.

How can you expose this application to allow access over the public internet?

Score: 1.00

Single Choice

35)

A company is planning to containerize an existing Java application. Your team needs to review and prepare the code for containerization.

Which component will your team be responsible for?

Score: 1.00

Single Choice

36)

You are the cluster administrator for your organization's EKS cluster. You have been informed that your Organization purchased an EC2 instance savings plan for m6g.2xlarge and c6g.2xlarge instances.

How will you influence Karpenter to prefer these instance types first during a scale-out event?

Score: 0.00Correct answer(s):

Single Choice

37)

As a developer, you have deployed your application to an Amazon EKS cluster. You cluster's administrator has explained that the cluster has been configured with Cluster Autoscaler to automatically scale cluster nodes as needed to meet the demand of workloads.

You application experiences varying levels of demand with higher levels of traffic occurring during business hours. Since the Amazon EKS cluster has been configured with Cluster Autoscaler your expectation was that your workloads would automatically scale out to meet required demand; however, you have noticed that the number of application pods your deployment is using remains static despite the amount of load on your application.

The configuration of what resource may be missing that would allow the automatic scale out of application pods based on utilization?

Score: 1.00

Single Choice

38)

Your organization is concerned about unusual network traffic involving two pods in its EKS cluster. The DevOps team needs to create a Network Policy to block ingress and egress connections on Pods A and B only, both running on the same namespace. A deny all ingress and egress Network Policy is applied to the pod's namespace but, testing shows that ALL pods in the namespace have been blocked.

What should the Devops team do to fix the Network Policy and block only Pods A and B communication?

Score: 1.00

Single Choice

39)

A company is running a microservices application on Amazon EKS. The application consists of a front-end service, several back-end services, and a MongoDB database for persistence. The DevOps engineer wants to deploy MongoDB as a stateful workload.

Which Kubernetes resource should be used to deploy MongoDB for data persistence?

Score: 1.00

Single Choice

40)

You are responsible for managing the company's Kubernetes cluster, which hosts a handful of microservices. You are planning to add new nodes to the cluster to meet the increasing demand and are considering using two types of nodes: worker nodes and control plane.

What are the key differences between worker nodes and control plane?

Score: 1.00

Single Choice

41)

You are working as an SRE (Site Reliability Engineer) for a new company responsible for monitoring their Amazon EKS clusters. You started to receive complaints from the development team regarding one particular cluster. The developers are unable to observe new pods being created after they have created a new deployment. You confirmed that the deployment exists, but pods do not exist.

What could you check to figure out the root cause of the issue?

Score: 0.00Correct answer(s):

Single Choice

42)

You are the DevOps lead for your organization, and your team has manually deployed workloads to the EKS cluster till now. You want to improve it.

Which automated process in GitHub Actions will you utilize to run deployment steps whenever application code is pushed to the main branch?

Score: 1.00

Single Choice

43)

You manage a critical web application hosted on multiple pods in an Amazon EKS cluster. The development team releases a new version of the web application image multiple times monthly. You want to incorporate these new changes and do a rolling update to prevent any downtime for the web application.

In this scenario, which kubernetes object(s) can you use to support rolling update?

Score: 0.00Correct answer(s):

Single Choice

44)

You are configuring a Helm values file for a microservices-based application. Your team wants to ensure that the application can scale easily and that sensitive information, such as database credentials, is stored securely. Question: Which of the following options demonstrates the correct way to structure a Helm values file for this scenario?

Score: 1.00

Single Choice

45)

You are managing a Kubernetes cluster hosting an application consisting of a backend and database container. To optimize resource utilization, both containers are deployed within the same pod. The backend need to communicate with the database container.

What is the most suitable method to ensure effective communication between microservices?

Score: 0.00Correct answer(s):

Single Choice

46)

A software engineer is deploying two microservices, orders and products, to an Amazon EKS cluster. The microservices need to be accessible over the Internet. The engineer wants to ensure fault tolerance for the microservices.

Which combination of Kubernetes resources should the engineer use to achieve this?

Score: 1.00

Single Choice

47)

As a new developer on your team, you have been tasked with deploying an application to Kubernetes.

Which of the following BEST describes how kubectl can be used?

Score: 1.00

Single Choice

48)

As a solutions architect, you are evaluating Kubernetes for a new application.

Which statement BEST describes the differences between the control plane and worker nodes?

Score: 1.00

Single Choice

49)

A Devops engineer created an EKS cluster using a deployment IAM role. When the engineer tries to connect to the cluster with a personal IAM role through kubectl, they get "An error occurred (InvalidClientTokenId) when calling the AssumeRole operation: The security token included in the request is invalid". They repeatedly ran the eks update-kubeconfig command, which was completed without errors.

What actions will help to resolve this error most efficiently?

Score: 1.00

Single Choice

50)

What command option when used with kubectl will list all resources running in the "workshop" namespace ?