What are the three main types of cloud computing?
____________ as a Service typically provides access to networking features, computers (virtual or on dedicated hardware), and data storage space.
Infrastructure
____________ as a Service removes the need for you to manage underlying infrastructure (usually hardware and operating systems), and allows you to focus on the deployment and management of your applications.
Platform
____________ as a Service provides you with a complete product that is run and managed by the service provider, e.g. an end-user application (such as web-based email).
Software
To connect programmatically to an AWS service, you use an ____________.
endpoint
An endpoint is the URL of the entry point for an AWS web service.
Fill in the blank
____________ is a service that makes it easy for customers to find, subscribe to, and use third-party data in the AWS Cloud.
AWS Data Exchange
Fill in the blank
As a ____________ with AWS Data Exchcange you can track and manage all of your data grants and AWS Marketplace data subscriptions in one place.
data receiver
Fil in the blank
When you have access to an AWS Data Exchange data set, you can use compatible AWS or partner analytics and ____________ to extract insights from it.
machine learning
For data ____________, AWS Data Exchange eliminates the need to build and maintain any data delivery and entitlement infrastructure. Anyone with an AWS account can create and send data grants to data receivers.
senders
Fill in the blank
Amazon __________ handles user authentication and authorization for your web and mobile apps.
Cognito
In Amazon Cognito, you create a user ____________ when you want to authenticate and authorize users to your app or API.
pool
User pools are a user directory with both self-service and administrator-driven user creation, management, and authentication.
SQL ____________ is a cyberattack that injects malicious SQL code into an application, allowing the attacker to view or modify a database.
injection
Fill in the blank
AWS ____________ provides multiple ways to use Microsoft Active Directory (AD) with other AWS services.
Directory Service
What is a hardware security module (HSM)?
A physical computing device that safeguards and manages cryptographic keys and performs secure cryptographic operations.
AWS ____________ offers secure cryptographic key storage for customers by providing managed hardware security modules in the AWS Cloud.
CloudHSM
How are AWS KMS and AWS CloudHSM different?
With AWS KMS, you let Amazon handle the complexity of managing the keys (Amazon manages HSMs behind the scenes). KMS integrates seamlessly with other AWS services such as S3, EBS, RDS, etc. With CloudHSM, you operate the cloud-based HSMs yourself and you need to figure out use of the keys from any applications. CloudHSM offers way more control and accompanying overhead.