AWS Cloud Practitioner CLF-C02
Comprehensive Study Guide
AWS Certified Cloud Practitioner (CLF-C02) — Complete Study Guide
Built from 560 practice questions across all four exam domains
1. Exam Overview
Exam Format
| Detail | Info |
|---|---|
| Exam Name | AWS Certified Cloud Practitioner (CLF-C02) |
| Duration | 90 minutes |
| Number of Questions | 65 questions (50 scored + 15 unscored) |
| Passing Score | 700 out of 1000 |
| Question Types | Multiple choice (1 correct) + Multiple response (2+ correct) |
| Cost | $100 USD |
| Validity | 3 years |
Domain Weights
| Domain | Topic | Weight |
|---|---|---|
| Domain 1 | Cloud Concepts | 24% |
| Domain 2 | Security and Compliance | 30% |
| Domain 3 | Cloud Technology and Services | 34% |
| Domain 4 | Billing, Pricing, and Support | 12% |
Priority order: Domain 3 → Domain 2 → Domain 1 → Domain 4. Domains 2 and 3 together account for 64% of the exam.
2. Domain-by-Domain Breakdown
Domain 1 — Cloud Concepts (24%)
Key Concepts You MUST Know
Six Advantages of Cloud Computing (AWS Official List)
- Trade capital expense (CapEx) for variable expense (OpEx)
- Benefit from massive economies of scale
- Stop guessing capacity
- Increase speed and agility
- Stop spending money running and maintaining data centers
- Go global in minutes
Three Cloud Deployment Models
| Model | Description | Example |
|---|---|---|
| Public Cloud | Entirely on AWS infrastructure | Standard AWS workloads |
| Private Cloud | Dedicated infrastructure | On-premises VMware |
| Hybrid Cloud | Mix of on-premises + public cloud | AWS Outposts + AWS |
Three Cloud Service Models
| Model | AWS Example | Customer Manages |
|---|---|---|
| IaaS | Amazon EC2 | OS, middleware, apps, data |
| PaaS | Amazon RDS, Elastic Beanstalk | Apps, data |
| SaaS | Amazon WorkMail, WorkDocs | Only data |
| FaaS | AWS Lambda | Only code |
Five NIST Characteristics of Cloud Computing
- On-demand self-service
- Broad network access
- Resource pooling
- Rapid elasticity
- Measured service
Well-Architected Framework — Six Pillars
| Pillar | Focus |
|---|---|
| Operational Excellence | Run and improve operations; operations as code; small reversible changes |
| Security | Protect data and systems; least privilege; encryption |
| Reliability | Recover from failures; automatic recovery; scale horizontally |
| Performance Efficiency | Use right resources efficiently; select right instance types |
| Cost Optimization | Avoid unnecessary costs; right-sizing; Reserved Instances |
| Sustainability | Minimize environmental impact |
AWS CAF — Six Perspectives
| Perspective | Focus |
|---|---|
| Business | Cloud aligns with business outcomes |
| People | Skills, training, organizational change |
| Governance | Risk management, compliance, value delivery |
| Platform | Technical architecture, provisioning |
| Security | IAM, detective controls, data protection |
| Operations | Running and recovering workloads |
Seven Rs of Migration
| Strategy | Description | Example |
|---|---|---|
| Rehost | Lift and shift — no changes | Move EC2 as-is |
| Re-platform | Minor optimizations | Move DB to RDS |
| Re-architect | Redesign for cloud-native | Monolith to microservices |
| Repurchase | Move to SaaS | Self-hosted CRM to Salesforce |
| Retire | Decommission unused apps | Shut down legacy systems |
| Retain | Keep on-premises | Compliance-restricted apps |
| Relocate | Move to AWS without changes | VMware Cloud on AWS |
Disaster Recovery Strategies (Cheapest to Most Expensive)
| Strategy | RTO | Cost | Description |
|---|---|---|---|
| Backup and Restore | Hours | Lowest | No running resources; restore from backup |
| Pilot Light | Minutes | Low | Minimal core running; scale up on disaster |
| Warm Standby | Minutes | Medium | Scaled-down full environment running |
| Multi-site Active/Active | Near zero | Highest | Full capacity in multiple locations |
AWS Global Infrastructure
| Component | Description |
|---|---|
| Region | Geographic area with multiple AZs |
| Availability Zone | One or more data centers with independent power and networking |
| Edge Location | CloudFront CDN cache point; 400+ worldwide |
| Local Zone | AWS infrastructure extension near metro areas |
| Wavelength Zone | AWS infrastructure embedded in 5G networks |
| Outposts | AWS-managed hardware deployed on-premises |
Common Exam Traps
- "Eliminating all security responsibilities" is NOT an advantage of cloud — customers always retain security responsibilities
- "Guaranteed 100% uptime" is NOT a NIST characteristic of cloud computing
- Vertical scaling = changing to a larger instance type; Horizontal scaling = adding more instances
- Design for failure means assuming components WILL fail and building automatic recovery — not preventing failures
- Pilot light keeps only CORE components running (like databases); Warm standby keeps a scaled-down but FULLY FUNCTIONAL environment
Quick-Reference Cheat Sheet — Domain 1
CapEx = upfront fixed cost (on-premises hardware)
OpEx = variable pay-as-you-go cost (cloud)
Economies of scale = AWS buys in bulk, passes savings to customers
Agility = provision resources in minutes not weeks
Elasticity = scale up AND down based on demand
High availability = system stays up despite failures (multi-AZ)
Durability = data is not lost (S3 = 11 nines)
Reliability = system recovers from failures automatically
Domain 2 — Security and Compliance (30%)
Key Concepts You MUST Know
Shared Responsibility Model
| AWS Responsibility (Security OF the Cloud) | Customer Responsibility (Security IN the Cloud) |
|---|---|
| Physical data center security | IAM users, roles, policies |
| Hardware and networking | Data encryption choices |
| Hypervisor patching | OS patching (EC2) |
| Managed service infrastructure | Security group configuration |
| Global infrastructure | Application-level security |
Shared Responsibility by Service Type
| Service Type | AWS Manages | Customer Manages |
|---|---|---|
| EC2 (IaaS) | Hardware, hypervisor, network | OS, middleware, apps, data, security groups |
| RDS (PaaS) | OS, DB engine, patching, hardware | Schema, data, IAM, network access |
| Lambda (FaaS) | Runtime, OS, hardware | Code, IAM permissions, input validation |
| S3 (Managed) | Infrastructure, availability | Bucket policies, encryption, public access settings |
| ECS Fargate | Container runtime, infrastructure | Container images, code, IAM |
IAM Core Concepts
| Concept | Description |
|---|---|
| User | Individual identity with long-term credentials |
| Group | Collection of users; policies attach to group |
| Role | Temporary credentials; assumed by services, users, or accounts |
| Policy | JSON document defining allow/deny permissions |
| Permission Boundary | Maximum permissions an IAM entity can have |
| SCP | Maximum permissions for all accounts in an AWS Organization |
IAM Policy Evaluation Order
- Check for explicit Deny — if found, DENY (always wins)
- Check for explicit Allow — if found, ALLOW
- Default implicit Deny — if neither found, DENY
Key IAM Best Practices
- Enable MFA on root account — never use root for daily tasks
- Never create root access keys
- Follow principle of least privilege
- Use IAM roles instead of access keys for applications
- Use IAM groups to manage permissions for teams
- Rotate access keys regularly
- Use IAM Access Analyzer to detect unintended public access
Network Security — Security Groups vs Network ACLs
| Feature | Security Groups | Network ACLs |
|---|---|---|
| Level | Instance level | Subnet level |
| State | Stateful (return traffic auto-allowed) | Stateless (must allow both directions) |
| Rules | Allow rules only | Allow and Deny rules |
| Default | Deny all inbound; allow all outbound | Allow all inbound and outbound |
| Evaluation | All rules evaluated | Rules evaluated in number order |
Key Security Services
| Service | Purpose |
|---|---|
| AWS WAF | Protects web apps from SQL injection, XSS, Layer 7 attacks |
| AWS Shield Standard | Free automatic DDoS protection for all customers |
| AWS Shield Advanced | Enhanced DDoS protection with 24/7 DRT access; costs extra |
| Amazon GuardDuty | Threat detection using CloudTrail, VPC Flow Logs, DNS logs |
| Amazon Inspector | Vulnerability scanning for EC2 instances and container images |
| Amazon Macie | Discovers and protects sensitive data (PII) in S3 |
| AWS Security Hub | Centralized security dashboard; aggregates findings |
| Amazon Detective | Investigates security findings; builds event timelines |
| AWS Firewall Manager | Centrally manages WAF, Shield, Security Groups across org |
| AWS Network Firewall | Managed stateful VPC firewall with deep packet inspection |
Encryption Services
| Service | Purpose |
|---|---|
| AWS KMS | Managed key management; customer managed keys or AWS managed keys |
| AWS CloudHSM | Dedicated hardware security module; customer controls keys |
| AWS ACM | Manages SSL/TLS certificates; auto-renewal |
| AWS Secrets Manager | Stores and auto-rotates secrets (DB passwords, API keys) |
| SSM Parameter Store | Stores config and secrets; free for standard parameters |
Encryption Types
| Type | Description |
|---|---|
| Encryption at rest | Protects stored data (SSE-S3, SSE-KMS, SSE-C) |
| Encryption in transit | Protects data moving over network (TLS/SSL) |
| Client-side encryption | Customer encrypts before sending; AWS never sees plaintext |
| SSE-S3 | AWS manages keys entirely |
| SSE-KMS | KMS manages keys; customer has more control |
| SSE-C | Customer provides key with each request; AWS discards after use |
Compliance and Auditing Services
| Service | Purpose |
|---|---|
| AWS Artifact | On-demand compliance reports (SOC, ISO, PCI, HIPAA BAA) |
| AWS CloudTrail | Records all API calls; who, when, what, from where |
| AWS Config | Tracks resource configuration changes over time |
| VPC Flow Logs | Captures network traffic metadata (not packet contents) |
| CloudTrail Insights | Detects unusual API activity automatically |
| CloudTrail Lake | Managed data lake for querying CloudTrail events with SQL |
Identity Services
| Service | Use Case |
|---|---|
| AWS IAM | AWS service and application access |
| IAM Identity Center | Enterprise SSO across multiple accounts; integrates with AD/Okta |
| Amazon Cognito | User sign-up/sign-in for mobile and web applications |
| AWS Directory Service | Managed Microsoft Active Directory in AWS |
| AWS STS | Issues temporary security credentials |
Common Exam Traps — Domain 2
- GuardDuty DETECTS threats but does NOT block traffic — Network Firewall or WAF blocks traffic
- Inspector scans for VULNERABILITIES — GuardDuty detects THREATS (behavioral)
- Security Hub AGGREGATES findings — it does not detect threats itself
- CloudTrail records API calls — VPC Flow Logs records network traffic metadata
- Config DETECTS non-compliance — it does not PREVENT it (use SCPs or IAM to prevent)
- Macie is specifically for S3 and PII data — not for general threat detection
- SSE-C means customer provides the key — AWS performs encryption but discards the key
- Client-side encryption means AWS NEVER sees plaintext — strongest privacy guarantee
- Permission boundaries LIMIT permissions — they do not GRANT permissions
- SCPs apply to entire accounts in an Organization — permission boundaries apply to individual IAM entities
- Root user tasks: change account name/email, close account, change support plan, enable MFA on root
- Groups CANNOT contain other groups — groups cannot be assumed by services
Quick-Reference Cheat Sheet — Domain 2
Shared Responsibility:
AWS = security OF the cloud (hardware, hypervisor, physical)
Customer = security IN the cloud (IAM, data, OS patching on EC2)
IAM Policy Evaluation:
Explicit Deny > Explicit Allow > Implicit Deny (default)
Security Groups = stateful, instance level, allow rules only
Network ACLs = stateless, subnet level, allow AND deny rules
WAF = Layer 7 web attacks (SQL injection, XSS)
Shield Standard = free DDoS protection
Shield Advanced = paid DDoS + 24/7 DRT
GuardDuty = threat detection (analyzes logs)
Inspector = vulnerability scanning (EC2, containers)
Macie = PII discovery in S3
Security Hub = centralized findings dashboard
Detective = security investigation and timeline
CloudTrail = API calls audit trail
Config = resource configuration history
Artifact = compliance reports (SOC, ISO, PCI, HIPAA)
KMS = managed key service (multi-tenant)
CloudHSM = dedicated HSM (single-tenant, customer controls)
Secrets Manager = auto-rotates secrets
ACM = SSL/TLS certificate management
Domain 3 — Cloud Technology and Services (34%)
Key Concepts You MUST Know
Compute Services
| Service | Type | Use Case |
|---|---|---|
| EC2 | IaaS | Virtual machines; full OS control |
| Lambda | FaaS/Serverless | Event-driven functions; max 15 min timeout |
| ECS | Container orchestration | Run Docker containers on AWS |
| EKS | Managed Kubernetes | Kubernetes workloads |
| Fargate | Serverless containers | ECS/EKS without managing EC2 |
| Elastic Beanstalk | PaaS | Deploy web apps without managing infrastructure |
| App Runner | Simplified containers | Simplest container web app deployment |
| AWS Batch | Batch computing | Large-scale batch jobs with job queues |
| AWS Outposts | On-premises AWS | AWS services on-premises |
| VMware Cloud on AWS | VMware migration | Migrate VMware workloads using VMware tools |
EC2 Instance Families
| Family | Optimized For | Examples |
|---|---|---|
| General Purpose (M, T) | Balanced CPU/memory/network | Web servers, dev environments |
| Compute Optimized (C) | High CPU | Batch processing, scientific modeling, gaming |
| Memory Optimized (R, X) | High RAM | In-memory databases, SAP HANA, Redis |
| Storage Optimized (I, D) | High I/O | Data warehousing, Hadoop, distributed file systems |
| Accelerated Computing (P, G, Inf, Trn) | GPU/custom chips | ML training, inference, video rendering |
EC2 Purchasing Options
| Option | Discount | Commitment | Use Case |
|---|---|---|---|
| On-Demand | None | None | Unpredictable workloads |
| Reserved (Standard) | Up to 75% | 1 or 3 years; specific type | Steady-state predictable workloads |
| Reserved (Convertible) | Up to 54% | 1 or 3 years; flexible type | Steady-state; need flexibility |
| Savings Plans (Compute) | Up to 66% | 1 or 3 years; $/hr commitment | Flexible across families, Regions, Lambda, Fargate |
| Savings Plans (EC2 Instance) | Up to 72% | 1 or 3 years; specific family/Region | Less flexible than Compute SP |
| Spot | Up to 90% | None; interruptible | Fault-tolerant, stateless workloads |
| Dedicated Instance | None | None | Dedicated hardware; no host control |
| Dedicated Host | None | Optional | BYOL; host-level visibility and control |
| Capacity Reservation | None | None | Reserve capacity in specific AZ |
Discount Comparison (Most to Least)
Standard RI (3yr All Upfront) > EC2 Instance SP > Compute SP > Convertible RI > On-Demand > Spot (variable)
EC2 Placement Groups
| Type | Purpose | Use Case |
|---|---|---|
| Cluster | Pack instances together; low latency | HPC, tightly coupled parallel computing |
| Spread | Each instance on distinct hardware | Critical instances that must not share hardware |
| Partition | Groups of instances on separate hardware | Large distributed systems (Hadoop, Cassandra) |
EC2 Key Features
| Feature | Description |
|---|---|
| User data | Script that runs on FIRST boot |
| Instance metadata | Info about running instance at 169.254.169.254 |
| AMI | Template with OS and pre-installed software |
| EC2 Image Builder | Automates AMI creation pipeline |
| Hibernate | Saves RAM to EBS; resumes from where it stopped |
| Instance store | Temporary local storage; lost on stop/terminate |
| Elastic IP | Static public IPv4 address |
| ENI | Elastic Network Interface; can move between instances |
| Enhanced Networking (ENA) | Higher bandwidth, lower latency |
| EFA | Elastic Fabric Adapter; OS-bypass for HPC |
| Nitro System | AWS hypervisor platform; near bare-metal performance |
| Bare Metal | Direct hardware access; no hypervisor |
| CPU options | Control vCPU count for licensing optimization |
EC2 Auto Scaling Features
| Feature | Description |
|---|---|
| Target tracking | Maintain a target metric value (e.g., 70% CPU) |
| Step scaling | Add/remove based on alarm severity |
| Scheduled scaling | Adjust at specific times |
| Predictive scaling | ML-based proactive scaling |
| Lifecycle hooks | Pause launches/terminations for custom actions |
| Instance refresh | Gradually replace instances with new configuration |
| Warm pools | Pre-initialized stopped instances for faster scale-out |
| Instance protection | Prevent specific instances from scale-in termination |
| Health check grace period | Wait before checking health of new instances |
Storage Services
| Service | Type | Use Case |
|---|---|---|
| S3 | Object storage | Files, backups, static websites, data lakes |
| EBS | Block storage | EC2 attached persistent storage |
| EFS | Shared file system (NFS) | Shared storage across multiple Linux EC2 instances |
| FSx for Windows | Managed Windows file system (SMB) | Windows apps needing shared file storage |
| FSx for Lustre | High-performance file system | HPC, ML, media processing |
| Instance store | Temporary block storage | Buffers, caches, temporary data |
| Storage Gateway | Hybrid storage | Bridge on-premises to cloud storage |
| DataSync | Online data transfer | Automate transfers between on-premises and AWS |
| Snow Family | Offline data transfer | Bulk data migration without network |
S3 Storage Classes
| Class | Access Pattern | Retrieval | Min Duration | Use Case |
|---|---|---|---|---|
| Standard | Frequent | Milliseconds | None | Active data |
| Intelligent-Tiering | Unknown/changing | Milliseconds | None | Auto-tiers based on access |
| Standard-IA | Infrequent (monthly) | Milliseconds | 30 days | Backups, DR |
| One Zone-IA | Infrequent; single AZ | Milliseconds | 30 days | Recreatable infrequent data |
| Glacier Instant Retrieval | Rare (quarterly) | Milliseconds | 90 days | Archives needing instant access |
| Glacier Flexible Retrieval | Rare | Minutes to hours | 90 days | Archives; flexible retrieval |
| Glacier Deep Archive | Very rare | 12 hours | 180 days | Long-term compliance archives |
S3 Key Features
| Feature | Description |
|---|---|
| Versioning | Keep multiple versions of objects |
| Object Lock | WORM protection; cannot delete or overwrite |
| MFA Delete | Requires MFA to permanently delete versions |
| Lifecycle policies | Automate transitions and deletions |
| Replication (SRR/CRR) | Copy objects within or across Regions |
| Transfer Acceleration | Speed up uploads using edge locations |
| Presigned URLs | Time-limited access to private objects |
| Access Points | Simplified access management for shared datasets |
| Multi-Region Access Points | Single global endpoint routing to nearest bucket |
| Static Website Hosting | Serve HTML/CSS/JS directly from S3 |
| Event notifications | Trigger Lambda/SQS/SNS on object events |
| EventBridge integration | Advanced filtering and routing of S3 events |
| S3 Select | Query data within a single object using SQL |
| Batch Operations | Bulk actions on billions of objects |
| Storage Lens | Organization-wide storage analytics |
| Inventory | Daily/weekly object reports |
| Analytics | Analyze access patterns for lifecycle recommendations |
| Default encryption | Auto-encrypt all new objects |
| Block Public Access | Prevent public exposure at account or org level |
| Strong consistency | All reads immediately return latest version (since Dec 2020) |
EBS Volume Types
| Type | Category | Max IOPS | Use Case |
|---|---|---|---|
| gp3 | SSD | 16,000 | General purpose; default choice |
| gp2 | SSD | 16,000 | General purpose; legacy |
| io2 Block Express | SSD | 256,000 | High-performance databases |
| io1 | SSD | 64,000 | I/O-intensive databases |
| st1 | HDD | N/A | Frequently accessed sequential (log processing) |
| sc1 | HDD | N/A | Infrequently accessed sequential; lowest cost |
EBS Key Features
| Feature | Description |
|---|---|
| Snapshots | Stored in S3; incremental; can copy across Regions |
| Fast Snapshot Restore | Immediate full performance from snapshot |
| Elastic Volumes | Modify type/size/IOPS without detaching |
| Multi-Attach | One io1/io2 volume to up to 16 instances in same AZ |
| Encryption by default | Auto-encrypt all new volumes at account level |
| Data Lifecycle Manager | Automate snapshot creation and retention |
Database Services
| Service | Type | Use Case |
|---|---|---|
| RDS | Relational (managed) | MySQL, PostgreSQL, Oracle, SQL Server, MariaDB |
| Aurora | Relational (cloud-native) | MySQL/PostgreSQL compatible; higher performance |
| Aurora Serverless | Relational (serverless) | Variable/unpredictable database workloads |
| DynamoDB | NoSQL key-value/document | High-scale, low-latency applications |
| ElastiCache (Redis) | In-memory cache | Rich data structures, pub/sub, persistence |
| ElastiCache (Memcached) | In-memory cache | Simple key-value caching; no persistence |
| DAX | DynamoDB accelerator | Microsecond reads for DynamoDB |
| MemoryDB | Redis-compatible durable DB | Redis with durability |
| Redshift | Data warehouse (OLAP) | Complex analytics on large datasets |
| Redshift Serverless | Serverless data warehouse | On-demand analytics |
| Redshift Spectrum | Query S3 from Redshift | Extend Redshift queries to S3 |
| Athena | Serverless SQL for S3 | Query S3 data with SQL; pay per TB scanned |
| DocumentDB | MongoDB-compatible | Document database; MongoDB migration |
| Neptune | Graph database | Social networks, fraud detection |
| QLDB | Ledger database | Immutable transaction history |
| Timestream | Time-series database | IoT and operational data |
RDS Key Features
| Feature | Description |
|---|---|
| Multi-AZ | Synchronous standby; automatic failover; HA |
| Read replicas | Asynchronous copies; scale reads; can be cross-Region |
| Automated backups | Point-in-time recovery up to 35 days |
| Manual snapshots | User-initiated; retained until deleted |
| Storage Auto Scaling | Automatically increases storage when running low |
| RDS Proxy | Connection pooling; reduces overhead for Lambda |
| Performance Insights | Top SQL statements, wait events, database load |
| Enhanced Monitoring | OS-level metrics at 1-second granularity |
| Snapshot export to S3 | Export to Parquet for Athena analysis |
| Cross-Region snapshot copy | Copy snapshot to another Region for DR |
| Event notifications | SNS alerts for failover, backup, low storage |
| Aurora Global Database | Multi-Region replication; sub-second RPO |
| Aurora Serverless v2 | Fine-grained auto-scaling; scales to near-zero |
DynamoDB Key Features
| Feature | Description |
|---|---|
| On-demand capacity | Auto-scales; pay per request; no capacity planning |
| Provisioned capacity | Specify RCUs and WCUs; can use Auto Scaling |
| Global Tables | Multi-Region multi-active replication |
| DAX | In-memory cache; microsecond reads |
| Streams | Item-level change capture; triggers Lambda |
| PITR | Restore to any second in last 35 days |
| On-demand backups | Full backup at any time; no performance impact |
| Global Secondary Index | Different partition and sort key; created anytime |
| Local Secondary Index | Same partition key; different sort key; created at table creation |
Networking Services
| Service | Purpose |
|---|---|
| VPC | Isolated virtual network |
| Subnets | Public (route to IGW) or private (no route to IGW) |
| Internet Gateway | Enables internet access for public subnets |
| NAT Gateway | Outbound internet for private subnets; managed; HA |
| NAT Instance | Customer-managed EC2 for NAT; legacy |
| Route Tables | Control traffic routing between subnets and gateways |
| VPC Peering | Direct connection between two VPCs; point-to-point |
| Transit Gateway | Hub connecting multiple VPCs and on-premises; scalable |
| Direct Connect | Dedicated private circuit from on-premises to AWS |
| Direct Connect Gateway | One DX connection to multiple VPCs/Regions |
| Site-to-Site VPN | IPsec VPN over internet; quick to set up |
| Client VPN | OpenVPN for individual remote users |
| PrivateLink | Private access to services without internet |
| VPC Gateway Endpoint | Private access to S3 and DynamoDB; free |
| VPC Interface Endpoint | Private access to most AWS services; ENI in subnet |
| VPC Flow Logs | Capture network traffic metadata |
| VPC Traffic Mirroring | Copy packets for deep inspection |
| VPC Sharing (RAM) | Share subnets with other accounts in org |
| Transit Gateway Connect | SD-WAN integration using GRE tunnels |
| Elastic IP | Static public IPv4 address |
| ENI | Elastic Network Interface; movable between instances |
Direct Connect vs Site-to-Site VPN
| Feature | Direct Connect | Site-to-Site VPN |
|---|---|---|
| Network | Private dedicated circuit | Public internet (encrypted) |
| Performance | Consistent; high bandwidth | Variable; depends on internet |
| Setup time | Weeks | Minutes to hours |
| Cost | Higher | Lower |
| Use case | Production; high bandwidth | Backup; quick connectivity |
Load Balancer Types
| Type | Layer | Use Case |
|---|---|---|
| ALB | Layer 7 (HTTP/HTTPS) | Content-based routing; URL path; hostname; auth |
| NLB | Layer 4 (TCP/UDP) | Ultra-high performance; static IPs; millions of RPS |
| GLB | Layer 3 | Third-party virtual appliances (firewalls, IDS/IPS) |
| Classic | Layer 4/7 | Legacy; do not use for new deployments |
ELB Key Features
| Feature | Description |
|---|---|
| Cross-zone load balancing | Distribute evenly across all AZs |
| Sticky sessions | Route user to same instance (session affinity) |
| Connection draining | Allow in-flight requests to complete before deregistering |
| Health checks | Remove unhealthy targets from rotation |
| ALB content-based routing | Route by URL path, hostname, headers, query strings |
| ALB authentication | Native auth with Cognito or OIDC |
| NLB static IPs | Supports Elastic IPs for client whitelisting |
CloudFront Key Features
| Feature | Description |
|---|---|
| Edge locations | 400+ worldwide; cache content close to users |
| Origin Access Control (OAC) | Restrict S3 access to CloudFront only |
| Geo-restriction | Block or allow users by country |
| Signed URLs | Time-limited access to specific content |
| Signed cookies | Time-limited access to multiple files |
| Lambda@Edge | Complex request/response processing at edge |
| CloudFront Functions | Lightweight JS for simple manipulations at edge |
| Cache behaviors | Different caching rules per URL path |
| Cache policies | Configure TTL, cache key (headers, cookies, query strings) |
| Origin groups | Primary + secondary origin for failover |
| Invalidations | Remove cached objects before TTL expires |
| Price classes | Limit edge locations to reduce cost |
| Custom SSL with ACM | HTTPS with custom domain; free certificates |
Route 53 Routing Policies
| Policy | Use Case |
|---|---|
| Simple | Single resource; no health checks |
| Weighted | Split traffic by percentage; A/B testing |
| Latency-based | Route to lowest latency Region |
| Failover | Primary/secondary; DNS-based DR |
| Geolocation | Route by user country/continent |
| Geoproximity | Route by distance; bias adjustment |
| Multivalue answer | Return up to 8 healthy IPs |
| IP-based | Route by client IP CIDR |
Messaging and Integration Services
| Service | Type | Use Case |
|---|---|---|
| SQS | Message queue | Decouple components; durable message storage |
| SNS | Pub/sub | Fan-out notifications to multiple subscribers |
| EventBridge | Event bus | Event-driven architecture; SaaS integration |
| Step Functions | Workflow orchestration | Coordinate multiple services with error handling |
| Amazon MQ | Managed message broker | Migrate ActiveMQ/RabbitMQ workloads |
| Kinesis Data Streams | Real-time streaming | Custom consumers; real-time processing |
| Kinesis Data Firehose | Streaming ETL | Load streams to S3/Redshift/OpenSearch; no code |
| Kinesis Data Analytics | Stream processing | Real-time SQL or Flink on streams |
| Kinesis Video Streams | Video streaming | Ingest and process video from devices |
Management and Monitoring Services
| Service | Purpose |
|---|---|
| CloudWatch | Metrics, logs, alarms, dashboards |
| CloudWatch agent | Collect OS-level metrics and custom logs from EC2 |
| CloudWatch Logs Insights | Query and analyze log data with SQL-like syntax |
| CloudWatch Metric Math | Mathematical operations on multiple metrics |
| CloudWatch Anomaly Detection | ML-based unusual metric detection |
| CloudWatch Composite Alarms | Combine multiple alarms with AND/OR logic |
| CloudWatch Billing Alarm | Alert when estimated charges exceed threshold |
| CloudTrail | API call audit trail |
| CloudTrail Insights | Detect unusual API activity |
| CloudTrail Lake | SQL queries on CloudTrail event history |
| AWS Config | Resource configuration history and compliance |
| Config conformance packs | Bundle of Config rules deployable across org |
| Config automatic remediation | Trigger SSM Automation to fix violations |
| CloudFormation | Infrastructure as code with JSON/YAML |
| CloudFormation change sets | Preview changes before applying |
| CloudFormation drift detection | Detect manual changes outside CloudFormation |
| CloudFormation Stack Sets | Deploy stacks across multiple accounts/Regions |
| CloudFormation cross-stack references | Share outputs between stacks |
| AWS CDK | Define infrastructure with Python/TypeScript/Java |
| AWS SAM | Simplified CloudFormation for serverless |
| Trusted Advisor | Recommendations across 5 categories |
| AWS Health Dashboard | Current AWS service status and personal alerts |
| Service Quotas | View and request limit increases |
| Systems Manager | Manage EC2 and on-premises instances |
| SSM Session Manager | Shell access without SSH ports or bastion hosts |
| SSM Run Command | Execute commands across fleet without SSH |
| SSM Patch Manager | Automated patching on schedule |
| SSM Parameter Store | Secure config and secrets storage; free standard |
| SSM Automation | Visual runbooks for operational tasks |
| SSM State Manager | Maintain desired state (run scripts on every start) |
Analytics Services
| Service | Purpose |
|---|---|
| Athena | Serverless SQL queries on S3; pay per TB scanned |
| Redshift | Petabyte-scale data warehouse (OLAP) |
| EMR | Managed Hadoop/Spark for big data |
| EMR Serverless | Run Spark/Hive without managing clusters |
| Glue | Serverless ETL; crawlers discover schema |
| Glue Studio | Visual ETL job creation without code |
| QuickSight | Serverless BI dashboards and visualizations |
| OpenSearch Service | Real-time search and log analytics |
| Kinesis | Real-time streaming data |
Migration Services
| Service | Purpose |
|---|---|
| Application Migration Service (MGN) | Lift-and-shift server migration |
| Database Migration Service (DMS) | Migrate databases to AWS |
| DataSync | Online data transfer (NFS, SMB, S3, EFS, FSx) |
| Snow Family | Offline bulk data transfer |
| Snowcone | Smallest Snow device; 8 TB; edge computing |
| Snowball Edge Compute | Edge computing in remote locations |
| Snowmobile | Exabyte-scale data center migration |
| VMware Cloud on AWS | Migrate VMware workloads using VMware tools |
Common Exam Traps — Domain 3
- Lambda maximum timeout is 15 minutes — use EC2/ECS/Batch for longer workloads
- NAT Gateway is managed and HA; NAT Instance is customer-managed EC2
- EBS snapshots are stored in S3 but NOT in your S3 bucket — managed by AWS
- S3 provides strong consistency since December 2020 — not eventual consistency
- RDS Multi-AZ is for HIGH AVAILABILITY (failover) — Read Replicas are for PERFORMANCE (scaling reads)
- DynamoDB DAX is for READ acceleration — not write acceleration
- ElastiCache Redis supports persistence and replication — Memcached does not
- VPC Gateway Endpoints are for S3 and DynamoDB ONLY — all other services use Interface Endpoints
- CloudFront OAC restricts S3 access to CloudFront only — not for authentication
- ALB supports content-based routing — NLB supports static IPs and ultra-high performance
- Fargate works with BOTH ECS and EKS — it is the compute engine, not the orchestrator
- EC2 user data runs on FIRST boot only — use SSM State Manager for every start
- Instance store is LOST on stop/terminate — EBS persists independently
- EBS Multi-Attach is only for io1/io2 volumes — not gp2/gp3
- Redshift is for OLAP analytics — RDS/Aurora is for OLTP transactions
- Athena charges per TB SCANNED — use columnar formats and partitioning to reduce costs
- DataSync is for ONLINE transfers — Snow Family is for OFFLINE bulk transfers
- Transit Gateway scales to thousands of VPCs — VPC Peering requires N*(N-1)/2 connections
- Direct Connect takes WEEKS to set up — VPN takes minutes to hours
Quick-Reference Cheat Sheet — Domain 3
Compute:
EC2 = IaaS; full OS control
Lambda = serverless; event-driven; max 15 min
ECS = Docker containers; AWS orchestration
EKS = Kubernetes; AWS managed control plane
Fargate = serverless compute for ECS and EKS
Elastic Beanstalk = PaaS; deploy without managing infra
App Runner = simplest container web app deployment
Storage:
S3 = object storage; 11 nines durability
EBS = block storage; attached to single EC2 (except Multi-Attach)
EFS = shared NFS file system; multiple Linux EC2 instances
FSx for Windows = SMB; Windows apps
FSx for Lustre = HPC; high-performance
Database:
RDS = managed relational; Multi-AZ for HA; Read Replicas for scale
Aurora = cloud-native MySQL/PostgreSQL; 6 copies across 3 AZs
DynamoDB = NoSQL; serverless; DAX for microsecond reads
Redshift = data warehouse; OLAP; Spectrum queries S3
Athena = serverless SQL on S3; pay per TB scanned
ElastiCache Redis = rich data structures; persistence; pub/sub
ElastiCache Memcached = simple key-value; no persistence
Networking:
Security Groups = stateful; instance level; allow only
NACLs = stateless; subnet level; allow and deny
NAT Gateway = managed; outbound internet for private subnets
VPC Gateway Endpoint = S3 and DynamoDB only; free
VPC Interface Endpoint = all other services; ENI in subnet
Transit Gateway = hub for multiple VPCs; scalable
VPC Peering = point-to-point; not transitive
Load Balancers:
ALB = Layer 7; content-based routing; auth
NLB = Layer 4; static IPs; ultra-high performance
GLB = Layer 3; virtual appliances
Messaging:
SQS = queue; decoupling; durable
SNS = pub/sub; fan-out
EventBridge = event bus; SaaS integration
Step Functions = workflow orchestration
Domain 4 — Billing, Pricing, and Support (12%)
Key Concepts You MUST Know
AWS Pricing Principles
- Pay for what you use — no minimum fees for most services
- Pay less when you reserve — commit for 1 or 3 years
- Pay less with volume — tiered pricing for S3, data transfer
- Data transfer INTO AWS is always free
- Data transfer OUT to internet incurs charges
- Data transfer between services in the same Region is generally free
- Data transfer between Regions incurs charges
Service Pricing Models
| Service | Pricing Basis |
|---|---|
| EC2 | Per second (Linux) or per hour (Windows) |
| Lambda | Per request + per GB-second (duration) |
| S3 | Per GB stored + per request + per GB transferred out |
| RDS | Per instance hour + storage + I/O + data transfer |
| DynamoDB | Per request (on-demand) or per RCU/WCU (provisioned) |
| Athena | Per TB of data scanned |
| CloudFront | Per GB transferred out + per HTTP request |
| Route 53 | Per hosted zone/month + per million DNS queries |
| VPC | Free for basic features; charges for NAT GW, VPN, PrivateLink |
| CloudFormation | Free; pay only for resources created |
| IAM | Always free |
| Organizations | Always free |
| CloudWatch | Free basic metrics; charges for detailed monitoring, custom metrics, logs |
Always Free Services
- AWS IAM
- AWS Organizations
- AWS CloudFormation
- Amazon VPC (basic features)
- AWS Auto Scaling
- AWS Elastic Beanstalk (pay for resources only)
- AWS Trusted Advisor (core checks)
- Amazon CloudWatch (basic monitoring)
12-Month Free Tier (Examples)
- EC2: 750 hours/month t2.micro or t3.micro
- S3: 5 GB storage
- RDS: 750 hours/month db.t2.micro or db.t3.micro
Always Free Tier (Never Expires)
- Lambda: 1 million requests/month + 400,000 GB-seconds
- DynamoDB: 25 GB storage + 25 WCU + 25 RCU
- CloudWatch: 10 custom metrics + 10 alarms
Cost Management Tools
| Tool | Purpose |
|---|---|
| AWS Pricing Calculator | Estimate costs BEFORE deployment; TCO analysis |
| AWS Cost Explorer | Analyze and visualize EXISTING costs; forecasting; RI recommendations; right-sizing |
| AWS Budgets | Set alerts for actual and forecasted spend; automated actions |
| Cost and Usage Report (CUR) | Most detailed billing data; load into Athena or Redshift |
| Cost Anomaly Detection | ML-based unusual spending detection; no manual thresholds |
| Cost allocation tags | Label resources; track costs by project/department/environment |
| Consolidated billing | Single bill for all accounts in Organization |
| Reserved Instance sharing | Unused RIs automatically shared across org accounts |
When to Use Which Cost Tool
| Scenario | Tool |
|---|---|
| Estimate costs before deploying | AWS Pricing Calculator |
| Analyze past spending trends | AWS Cost Explorer |
| Get notified when spending exceeds threshold | AWS Budgets |
| Automatically stop instances when budget exceeded | AWS Budgets + Lambda |
| Get most detailed billing data for custom analysis | Cost and Usage Report |
| Detect unexpected spending automatically | Cost Anomaly Detection |
| Right-size EC2 instances based on usage | Cost Explorer right-sizing recommendations |
| Get RI purchase recommendations | Cost Explorer |
| Identify idle resources and optimization opportunities | AWS Trusted Advisor |
| Track costs by department or project | Cost allocation tags |
AWS Support Plans
| Feature | Basic | Developer | Business | Enterprise On-Ramp | Enterprise |
|---|---|---|---|---|---|
| Price | Free | $29/mo | $100/mo | $5,500/mo | $15,000/mo |
| Support cases | None | Unlimited | Unlimited | Unlimited | Unlimited |
| Access | None | Email (biz hours) | 24/7 phone/chat/email | 24/7 phone/chat/email | 24/7 phone/chat/email |
| Sev 1 response | N/A | N/A | 1 hour | 30 minutes | 15 minutes |
| Sev 2 response | N/A | N/A | 4 hours | 4 hours | 1 hour |
| Sev 3 response | N/A | 12 hours | 4 hours | 4 hours | 4 hours |
| Trusted Advisor | Core checks | Core checks | All checks | All checks | All checks |
| TAM | None | None | None | Pool of TAMs | Dedicated TAM |
| IEM | No | No | Paid add-on | Limited | Included |
| Concierge | No | No | No | Limited | Yes |
| Support API | No | No | Yes | Yes | Yes |
| re:Post | Yes | Yes | Yes | Yes | Yes |
AWS Organizations Features
| Feature | Description |
|---|---|
| Consolidated billing | Single bill; volume discounts across all accounts |
| RI/SP sharing | Unused RIs and Savings Plans shared across accounts |
| Organizational Units (OUs) | Hierarchical account grouping |
| Service Control Policies (SCPs) | Maximum permission guardrails for accounts |
| Tag policies | Enforce consistent tagging standards |
| Backup policies | Enforce backup plans across org |
| AI services opt-out policies | Control data use for AI improvements |
Common Exam Traps — Domain 4
- AWS Pricing Calculator is for FUTURE cost estimates — Cost Explorer is for EXISTING spend analysis
- Cost and Usage Report provides the MOST detailed data — Cost Explorer provides visual analysis
- AWS Budgets can alert on BOTH actual AND forecasted spend — Cost Explorer only shows forecasts visually
- Consolidated billing provides SINGLE bill but individual account tracking is still available
- RI sharing is automatic in Organizations — unused RIs apply to other accounts automatically
- Basic Support does NOT allow opening support cases — Developer is the minimum for cases
- Business Support provides ALL Trusted Advisor checks — Basic and Developer provide only core checks
- Enterprise Support has a DEDICATED TAM — Enterprise On-Ramp has a POOL of TAMs
- IEM is INCLUDED in Enterprise Support — Business Support must purchase it as add-on
- Lambda free tier NEVER expires — EC2 and RDS free tiers expire after 12 months
- IAM and Organizations are ALWAYS free — no charges regardless of usage
- CloudFormation is FREE — you only pay for the resources it creates
- Data transfer INTO AWS is always FREE — data transfer OUT incurs charges
Quick-Reference Cheat Sheet — Domain 4
Pricing Calculator = estimate BEFORE deployment
Cost Explorer = analyze EXISTING spend + forecasts + RI recommendations
Budgets = alerts on actual and forecasted spend + automated actions
CUR = most detailed billing data for custom analysis
Cost Anomaly Detection = ML-based unusual spending alerts
Support Plans (minimum for each feature):
Open support cases = Developer
24/7 phone/chat = Business
All Trusted Advisor checks = Business
1-hour Sev 1 response = Business
15-minute Sev 1 response = Enterprise
Dedicated TAM = Enterprise
Pool of TAMs = Enterprise On-Ramp
IEM included = Enterprise
Free forever: IAM, Organizations, CloudFormation, VPC basics
Free tier never expires: Lambda, DynamoDB
Free tier 12 months: EC2, S3, RDS
Data transfer:
INTO AWS = always free
OUT to internet = charged
Between same-Region services = generally free
Between Regions = charged
3. Critical Comparisons
When to Use Which Service
SQS vs SNS vs EventBridge
| Feature | SQS | SNS | EventBridge |
|---|---|---|---|
| Type | Queue | Pub/Sub | Event bus |
| Consumers | One consumer per message | Multiple subscribers | Multiple targets |
| Use case | Decouple components; durable messages | Fan-out notifications | Event-driven; SaaS integration |
| Message retention | Up to 14 days | No retention | No retention |
RDS vs DynamoDB
| Feature | RDS | DynamoDB |
|---|---|---|
| Type | Relational (SQL) | NoSQL (key-value/document) |
| Schema | Fixed schema | Flexible schema |
| Scaling | Vertical + read replicas | Horizontal; automatic |
| Use case | Complex queries; transactions | High-scale; simple access patterns |
| Serverless option | Aurora Serverless v2 | On-demand capacity mode |
CloudWatch vs CloudTrail vs Config
| Service | Records | Use Case |
|---|---|---|
| CloudWatch | Metrics and logs | Monitor performance; set alarms |
| CloudTrail | API calls (who, when, what) | Audit trail; compliance |
| Config | Resource configuration changes | Compliance; configuration history |
EBS vs EFS vs S3
| Feature | EBS | EFS | S3 |
|---|---|---|---|
| Type | Block | File (NFS) | Object |
| Access | Single EC2 instance | Multiple Linux EC2 instances | Any client via HTTP |
| Persistence | Persists independently | Persists independently | Persists independently |
| Use case | OS volumes; databases | Shared content; CMS | Backups; static files; data lakes |
Secrets Manager vs Parameter Store
| Feature | Secrets Manager | Parameter Store |
|---|---|---|
| Cost | Charged per secret | Free for standard parameters |
| Auto-rotation | Built-in for RDS, Redshift, DocumentDB | No built-in rotation |
| Use case | Database passwords; API keys needing rotation | Configuration values; non-rotating secrets |
Direct Connect vs Site-to-Site VPN
| Feature | Direct Connect | Site-to-Site VPN |
|---|---|---|
| Network | Private dedicated circuit | Public internet (encrypted) |
| Performance | Consistent; up to 100 Gbps | Variable |
| Setup time | Weeks | Minutes to hours |
| Cost | Higher | Lower |
| Best for | Production; compliance; high bandwidth | Backup; quick setup; lower cost |
KMS vs CloudHSM
| Feature | KMS | CloudHSM |
|---|---|---|
| Hardware | Multi-tenant | Dedicated single-tenant |
| Key control | AWS manages infrastructure | Customer fully controls |
| Compliance | FIPS 140-2 Level 2 | FIPS 140-2 Level 3 |
| Cost | Lower | Higher |
| Use case | Most encryption needs | Regulatory requirements for dedicated HSM |
4. Exam Strategy
Time Management
- Total time: 90 minutes for 65 questions
- Time per question: approximately 83 seconds
- Target pace: complete first pass in 60 minutes; use remaining 30 minutes for review
- Flag difficult questions immediately and move on — do not spend more than 2 minutes on any single question
- Multiple-response questions take longer — budget extra time for these
How to Handle "Best Answer" Questions
The exam frequently asks for the "MOST cost-effective," "BEST," or "MOST appropriate" solution. Use this elimination process:
- Eliminate obviously wrong answers first — usually 1 or 2 answers are clearly incorrect
- Check for the constraint in the question — "without managing servers," "lowest cost," "highest availability"
- Apply the constraint to remaining answers — which answer best satisfies the specific requirement
- When cost is the constraint: Spot > Reserved/Savings Plans > On-Demand > Dedicated
- When availability is the constraint: Multi-AZ > Single-AZ; Multiple Regions > Single Region
- When simplicity/managed is the constraint: Fargate > ECS on EC2; RDS > self-managed on EC2; Lambda > EC2
Common Wrong Answer Patterns to Eliminate
- Answers that violate least privilege — granting admin access for convenience is always wrong
- Answers that use root account credentials — root should never be used for daily tasks
- Answers that hardcode credentials — always wrong; use IAM roles instead
- Answers that suggest manual processes — when automation is available, automation is correct
- Answers that use the wrong service category — GuardDuty cannot block traffic; Config cannot prevent changes
- Answers that over-engineer — the exam rewards the simplest solution that meets requirements
- Answers that suggest on-premises when cloud is available — unless compliance requires it
Specific Question Patterns
"Which service provides the LOWEST cost?"
- For storage: Glacier Deep Archive > Glacier Flexible > Glacier Instant > One Zone-IA > Standard-IA > Standard
- For compute: Spot > Savings Plans > Reserved > On-Demand > Dedicated
- For databases: DynamoDB on-demand (low traffic) vs RDS (steady workloads)
"Which service requires NO infrastructure management?"
- Lambda (serverless functions)
- Fargate (serverless containers)
- DynamoDB (serverless NoSQL)
- Aurora Serverless (serverless database)
- Athena (serverless SQL)
- S3 (fully managed object storage)
"Which service is used for COMPLIANCE and AUDITING?"
- API audit trail → CloudTrail
- Compliance reports → AWS Artifact
- Resource configuration compliance → AWS Config
- Security findings aggregation → AWS Security Hub
"Which service DETECTS vs PREVENTS?"
- Detects threats → GuardDuty
- Detects vulnerabilities → Inspector
- Detects sensitive data → Macie
- Detects config violations → Config
- Prevents web attacks → WAF
- Prevents DDoS → Shield
- Prevents unauthorized access → IAM, SCPs, Security Groups
Flag-and-Review Strategy
- Flag questions where you are choosing between two similar services
- Flag questions about specific numbers (response times, storage limits, timeouts)
- Flag multiple-response questions if unsure about all correct answers
- On review, re-read the question constraint carefully — the answer often becomes clear
- If still unsure between two answers, go with the more managed/serverless option
5. Last-Minute Cheat Sheet
Top 20 Most Important Facts
- Shared Responsibility: AWS = security OF the cloud; Customer = security IN the cloud
- IAM policy evaluation: Explicit Deny ALWAYS wins over Allow
- Security Groups are stateful (instance level); NACLs are stateless (subnet level)
- CloudTrail = API calls audit; Config = resource configuration history; CloudWatch = metrics and logs
- RDS Multi-AZ = High Availability (failover); Read Replicas = Performance (scale reads)
- S3 durability = 11 nines (99.999999999%); stored redundantly across multiple AZs
- Lambda maximum timeout = 15 minutes; scales automatically; charges per request + GB-second
- Spot Instances = up to 90% discount; interruptible with 2-minute warning
- Standard Reserved Instances = highest discount (up to 75%); least flexible
- Compute Savings Plans = most flexible; applies across instance families, Regions, Lambda, Fargate
- Data transfer INTO AWS = always free; data transfer OUT = charged
- IAM, Organizations, CloudFormation = always free services
- Lambda and DynamoDB free tier = never expires; EC2 and RDS free tier = 12 months only
- AWS Artifact = compliance reports (SOC, ISO, PCI, HIPAA BAA)
- Business Support = minimum for 24/7 phone/chat + all Trusted Advisor checks + 1-hour Sev 1
- Enterprise Support = dedicated TAM + 15-minute Sev 1 + IEM included
- VPC Gateway Endpoints = S3 and DynamoDB only; free; route-table based
- Transit Gateway = hub for thousands of VPCs; replaces complex VPC peering meshes
- GuardDuty detects threats but does NOT block traffic; WAF/Network Firewall blocks traffic
- AWS Pricing Calculator = estimate before deployment; Cost Explorer = analyze existing spend
Key Differentiators Between Similar Concepts
GuardDuty vs Inspector vs Macie vs Security Hub
GuardDuty = threat detection (analyzes CloudTrail, VPC Flow Logs, DNS)
Inspector = vulnerability scanning (EC2 instances, container images)
Macie = sensitive data discovery (PII in S3 buckets)
Security Hub = centralized dashboard aggregating ALL findings
CloudTrail vs Config vs CloudWatch
CloudTrail = WHO did WHAT API call and WHEN (audit trail)
Config = WHAT changed in resource configuration over time
CloudWatch = HOW is the system performing (metrics, logs, alarms)
SQS vs SNS vs EventBridge
SQS = queue; one consumer per message; decoupling
SNS = pub/sub; fan-out to multiple subscribers simultaneously
EventBridge = event bus; advanced routing; SaaS integration; schema registry
RDS Multi-AZ vs Read Replicas
Multi-AZ = synchronous replication; automatic failover; HIGH AVAILABILITY
Read Replicas = asynchronous replication; serve read traffic; PERFORMANCE
Secrets Manager vs Parameter Store
Secrets Manager = auto-rotation built-in; charged per secret
Parameter Store = free for standard; no built-in rotation; configuration values
Direct Connect vs Site-to-Site VPN
Direct Connect = private dedicated circuit; consistent performance; weeks to set up
Site-to-Site VPN = encrypted over internet; variable performance; minutes to set up
KMS vs CloudHSM
KMS = multi-tenant; AWS manages infrastructure; lower cost
CloudHSM = dedicated single-tenant HSM; customer controls keys; higher cost; FIPS 140-2 Level 3
NAT Gateway vs NAT Instance
NAT Gateway = fully managed by AWS; highly available; auto-scales; recommended
NAT Instance = customer-managed EC2; you handle patching, HA, scaling; legacy
ECS vs EKS vs Fargate
ECS = AWS container orchestration (proprietary)
EKS = AWS managed Kubernetes control plane
Fargate = serverless compute engine for BOTH ECS and EKS (no EC2 management)
ALB vs NLB vs GLB
ALB = Layer 7; HTTP/HTTPS; content-based routing; authentication
NLB = Layer 4; TCP/UDP; static IPs; ultra-high performance; millions of RPS
GLB = Layer 3; third-party virtual appliances (firewalls, IDS/IPS)
Critical Gotchas That Trip Up Test-Takers
Security Gotchas
- Root user tasks that ONLY root can do: change account name/email, close account, change support plan
- Groups CANNOT contain other groups — groups cannot be assumed by services
- Permission boundaries LIMIT permissions — they do NOT grant permissions
- SCPs apply to entire accounts — permission boundaries apply to individual IAM entities
- Config DETECTS violations — it does NOT prevent them (use SCPs or IAM to prevent)
- GuardDuty DETECTS threats — it does NOT block traffic (WAF and Network Firewall block)
- Client-side encryption = AWS NEVER sees plaintext — strongest privacy guarantee
Compute Gotchas
- EC2 user data runs on FIRST boot ONLY — use SSM State Manager for every start
- Instance store is LOST when instance stops, hibernates, or terminates
- Spot Instances receive 2-minute warning before interruption — not immediate
- Dedicated Instances = dedicated hardware but NO host-level visibility
- Dedicated Hosts = dedicated hardware WITH host-level visibility and control (BYOL)
- Lambda maximum timeout = 15 minutes — not 1 hour or unlimited
Storage Gotchas
- EBS snapshots stored in S3 but NOT in YOUR S3 bucket — AWS manages this
- S3 provides STRONG consistency since December 2020 — not eventual consistency
- EBS Multi-Attach only works with io1 and io2 volumes — not gp2/gp3
- S3 One Zone-IA stores in SINGLE AZ — data is lost if AZ is destroyed
- Glacier Deep Archive retrieval = 12 hours — not instant
Database Gotchas
- RDS Multi-AZ = HIGH AVAILABILITY not performance — Read Replicas = PERFORMANCE
- DynamoDB DAX accelerates READS not writes
- ElastiCache Memcached = no persistence, no replication — Redis = persistence + replication
- Aurora automatically maintains 6 copies across 3 AZs — not just 2 copies
Networking Gotchas
- VPC Gateway Endpoints = S3 and DynamoDB ONLY — all other services use Interface Endpoints
- Private subnets CANNOT receive inbound internet connections — only NAT Gateway for outbound
- Default security group = deny all inbound; allow all outbound
- VPC peering is NOT transitive — use Transit Gateway for hub-and-spoke
- New security group = deny all inbound; allow all outbound
- New NACL = deny all inbound and outbound (custom NACLs start with deny all)
Billing Gotchas
- AWS Pricing Calculator = BEFORE deployment estimates
- Cost Explorer = EXISTING spend analysis + forecasting
- Lambda free tier = NEVER expires (1M requests + 400K GB-seconds per month)
- DynamoDB free tier = NEVER expires (25 GB + 25 WCU + 25 RCU)
- IAM and Organizations = ALWAYS free regardless of usage
- Basic Support = CANNOT open support cases — Developer is minimum
- Business Support = minimum for ALL Trusted Advisor checks
- Enterprise On-Ramp = POOL of TAMs; Enterprise = DEDICATED TAM
Response Time Quick Reference
| Support Plan | Sev 1 (Critical) | Sev 2 (Urgent) | Sev 3 (Important) |
|---|---|---|---|
| Developer | N/A | N/A | 12 hours |
| Business | 1 hour | 4 hours | 4 hours |
| Enterprise On-Ramp | 30 minutes | 4 hours | 4 hours |
| Enterprise | 15 minutes | 1 hour | 4 hours |
Numbers Worth Memorizing
S3 durability = 11 nines (99.999999999%)
S3 max object size = 5 TB
S3 multipart upload required = objects larger than 5 GB
Lambda max timeout = 15 minutes (900 seconds)
Lambda max memory = 10,240 MB (10 GB)
Lambda free tier = 1 million requests + 400,000 GB-seconds per month (never expires)
DynamoDB free tier = 25 GB storage + 25 WCU + 25 RCU (never expires)
EC2 free tier = 750 hours/month t2.micro or t3.micro (12 months)
RDS free tier = 750 hours/month db.t2.micro or db.t3.micro (12 months)
S3 free tier = 5 GB storage (12 months)
IAM users per account (default) = 5,000
EBS io2 Block Express max IOPS = 256,000
EBS gp3 max IOPS = 16,000
EBS Multi-Attach max instances = 16 instances in same AZ
RDS automated backup retention = up to 35 days
DynamoDB PITR retention = 35 days
Spot Instance warning = 2 minutes before interruption
Reserved Instance terms = 1 year or 3 years
Spot Instance max discount = up to 90% vs On-Demand
Standard RI max discount = up to 75% vs On-Demand
Compute Savings Plans discount = up to 66% vs On-Demand
CloudFront edge locations = 400+ worldwide
Route 53 multivalue answer = up to 8 healthy IP addresses
VPC CIDR max size = /16 (65,536 IP addresses)
VPC CIDR min size = /28 (16 IP addresses)
AWS reserved IPs per subnet = 5 IP addresses
AZs per Region (minimum) = 3
Aurora copies across AZs = 6 copies across 3 AZs
Aurora max read replicas = 15
RDS max read replicas = 5
Aurora storage auto-scaling = up to 128 TB in 10 GB increments
Glacier Deep Archive retrieval = 12 hours
Glacier Flexible retrieval = minutes to hours
Glacier Instant retrieval = milliseconds
EFS One Zone cost savings = approximately 47% less than EFS Standard
Passing score CLF-C02 = 700 out of 1000
Exam questions = 65 total (50 scored + 15 unscored)
Exam duration = 90 minutes
Exam validity = 3 years
Final Pre-Exam Checklist
Go through this list the night before your exam. If you cannot answer any item confidently, review that section.
Domain 1 — Cloud Concepts
- Can you name all six advantages of cloud computing in the AWS list
- Can you distinguish IaaS, PaaS, SaaS, and FaaS with AWS examples
- Can you name all six pillars of the Well-Architected Framework and their focus areas
- Can you name all six AWS CAF perspectives and what each covers
- Can you explain the difference between pilot light, warm standby, and multi-site active/active DR strategies
- Can you distinguish vertical scaling from horizontal scaling with examples
- Can you explain what design for failure means in practice
- Can you name the seven Rs of migration and give an example of each
Domain 2 — Security and Compliance
- Can you explain the Shared Responsibility Model for EC2, RDS, Lambda, S3, and Fargate
- Can you explain IAM policy evaluation order including explicit deny, explicit allow, and implicit deny
- Can you distinguish Security Groups from Network ACLs including stateful vs stateless
- Can you name the purpose of GuardDuty, Inspector, Macie, Security Hub, and Detective
- Can you explain the difference between KMS and CloudHSM
- Can you explain the difference between Secrets Manager and Parameter Store
- Can you name what AWS Artifact provides and when to use it
- Can you explain what CloudTrail, Config, and VPC Flow Logs each record
- Can you name the tasks that only the root user can perform
- Can you explain permission boundaries vs SCPs
Domain 3 — Cloud Technology and Services
- Can you name all EC2 instance families and their use cases
- Can you explain all EC2 purchasing options and when to use each
- Can you distinguish RDS Multi-AZ from Read Replicas
- Can you name all S3 storage classes in order from most to least expensive
- Can you explain when to use EBS vs EFS vs S3
- Can you distinguish ALB, NLB, and GLB use cases
- Can you explain the difference between VPC Gateway Endpoints and Interface Endpoints
- Can you explain when to use Transit Gateway vs VPC Peering
- Can you explain the difference between Direct Connect and Site-to-Site VPN
- Can you distinguish SQS, SNS, and EventBridge use cases
- Can you explain what CloudWatch, CloudTrail, and Config each do
- Can you name the key features of DynamoDB including DAX, Streams, Global Tables, and PITR
- Can you explain the difference between ElastiCache Redis and Memcached
- Can you name the Snow Family devices and their use cases
- Can you explain when to use Athena vs Redshift vs EMR
Domain 4 — Billing, Pricing, and Support
- Can you explain the difference between AWS Pricing Calculator and Cost Explorer
- Can you name the response times for each support plan at each severity level
- Can you name which support plan is the minimum for each key feature
- Can you explain how consolidated billing and RI sharing work in Organizations
- Can you name the services that are always free
- Can you name which free tier benefits never expire vs expire after 12 months
- Can you explain how data transfer pricing works (into vs out of AWS)
- Can you explain the difference between cost allocation tags and AWS Organizations for cost tracking
This study guide covers all concepts tested across 560 practice questions spanning the four CLF-C02 exam domains. Review the quick-reference cheat sheets for each domain the morning of your exam. Focus your final review on the gotchas section — these are the most common sources of incorrect answers on the actual exam.
What is the maximum number of IP addresses that a VPC with a /16 CIDR block can contain?
This Question is Locked
You're viewing 15 of 716 free questions.
trending_up Certified pros earn 20-30% more
Higher salary: IT certifications add $12,000-$25,000/year on average to your paycheck
Job security: 87% of hiring managers prefer candidates with certifications : you become irreplaceable
More opportunities: Freelance gigs, remote roles, and promotions open up instantly
Practice all questions: Comprehensive practice is the #1 predictor of passing
Mock Exam : Upgrade to Unlock
Available in Q&A + Course + Mock Exam package
You've already started : one exam away from a career upgrade.