0
0
AWScloud~10 mins

Services and tasks in AWS - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to create an AWS S3 bucket using AWS CLI.

AWS
aws s3api create-bucket --bucket [1] --region us-east-1
Drag options to blanks, or click blank then click option'
Acreate-bucket
Bmy-unique-bucket-123
Clist-buckets
Ddelete-bucket
Attempts:
3 left
💡 Hint
Common Mistakes
Using AWS CLI commands like 'list-buckets' instead of a bucket name.
Leaving the bucket name blank.
2fill in blank
medium

Complete the code to start an EC2 instance using AWS CLI.

AWS
aws ec2 start-instances --instance-ids [1]
Drag options to blanks, or click blank then click option'
Ai-1234567890abcdef0
Bstart-instances
Cdescribe-instances
Dstop-instances
Attempts:
3 left
💡 Hint
Common Mistakes
Using command names instead of instance IDs.
Using incorrect instance ID formats.
3fill in blank
hard

Fix the error in the AWS CLI command to list all running EC2 instances.

AWS
aws ec2 describe-instances --filters Name=instance-state-name,Values=[1]
Drag options to blanks, or click blank then click option'
Astopped
Bterminated
Cpending
Drunning
Attempts:
3 left
💡 Hint
Common Mistakes
Using 'stopped' or 'terminated' which show inactive instances.
Using 'pending' which shows instances starting but not yet running.
4fill in blank
hard

Fill both blanks to create a security group rule allowing inbound HTTP traffic on port 80.

AWS
aws ec2 authorize-security-group-ingress --group-id [1] --protocol [2] --port 80 --cidr 0.0.0.0/0
Drag options to blanks, or click blank then click option'
Asg-0a1b2c3d4e5f6g7h8
Bsg-1234567890abcdef0
Ctcp
Dudp
Attempts:
3 left
💡 Hint
Common Mistakes
Using UDP protocol instead of TCP for HTTP.
Using incorrect security group IDs.
5fill in blank
hard

Fill all three blanks to create an IAM user, attach a policy, and add the user to a group.

AWS
aws iam create-user --user-name [1]
aws iam attach-user-policy --user-name [2] --policy-arn [3]
aws iam add-user-to-group --user-name [2] --group-name Developers
Drag options to blanks, or click blank then click option'
Anewuser
Carn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
Darn:aws:iam::aws:policy/AdministratorAccess
Attempts:
3 left
💡 Hint
Common Mistakes
Using different user names in commands.
Attaching the wrong policy ARN.