2. IAM Flashcards

1
Q

What does IAM stand for in AWS?

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the root account in AWS, and how should it be used?

A

The root account is created by default and should not be used or shared, except for initial account setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: Users can belong to multiple groups in IAM.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can a group in IAM contain other groups?

A

No, groups only contain users, not other groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an IAM policy?

A

A JSON document that defines permissions for users or groups in AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which principle suggests giving the minimum permissions necessary for users?

A

The principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: IAM policies are written in _____ format.

A

JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the ‘Effect’ in an IAM policy statement used for?

A

It defines whether the statement allows or denies access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: A user must be part of a group in IAM.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Sid in an IAM policy statement?

A

It is an optional identifier for the statement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name two types of characters that can be required in an AWS password policy.

A

Uppercase letters and numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does MFA enhance security for IAM users?

A

MFA requires a second factor (device-based) in addition to a password, making it harder for accounts to be compromised if passwords are stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is one type of MFA device supported by AWS?

A

Virtual MFA device like Google Authenticator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: Access keys should be shared with other users.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: The IAM service that allows managing AWS services through code is the _____

A

AWS SDK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can users programmatically access AWS?

A

Using access keys through AWS CLI or AWS SDK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or False: IAM roles are only for human users.

A

False, IAM roles are for AWS services or applications as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary use of the IAM Credentials Report?

A

To provide an account-level report listing users and their credential statuses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What AWS tool can show the last access time for services permitted to a user?

A

IAM Access Advisor

20
Q

What is the purpose of the AWS CLI?

A

To manage AWS services using command-line commands.

21
Q

True or False: Access keys can be generated for IAM users through the AWS Console.

A

True

22
Q

What is the Shared Responsibility Model in IAM?

A

AWS manages infrastructure, while users manage their IAM configurations and permissions.

23
Q

Fill in the blank: AWS recommends enabling _____ for all accounts to enhance security.

A

MFA

24
Q

What AWS feature allows users to access services with minimal permissions granted by roles?

A

IAM Roles

25
Q

Can IAM roles be assigned to AWS Lambda functions?

A

Yes, IAM roles can be assigned to Lambda functions and other services.

26
Q

What should be avoided when using the root account?

A

Using it regularly; it should only be used for initial setup.

27
Q

What’s an example of a resource that IAM policies can restrict access to?

A

EC2 instances, S3 buckets, or any AWS resource.

28
Q

Fill in the blank: The AWS Management Console can be accessed with a _____ and optionally MFA.

A

password

29
Q

What does the ‘Action’ element in an IAM policy define?

A

The list of actions the policy allows or denies on AWS services.

30
Q

True or False: AWS SDKs are available for multiple programming languages.

A

True

31
Q

What is an example of an AWS SDK-supported language?

A

Python, JavaScript, Java, among others.

32
Q

What is the purpose of an IAM Role for an EC2 instance?

A

It grants permissions for the EC2 instance to access other AWS resources on behalf of the user.

33
Q

What is the least privileged approach in IAM policy design?

A

Providing users with only the permissions they absolutely need.

34
Q

Name one best practice for IAM users and groups.

A

Assign permissions to groups instead of individual users.

35
Q

What is an Access Key ID equivalent to?

A

A username for programmatic access.

36
Q

True or False: An IAM policy’s ‘Condition’ is mandatory.

A

False, it is optional.

37
Q

Fill in the blank: IAM _____ allow policies to be applied to groups of users.

A

Groups

38
Q

What are inline policies?

A

Policies that are embedded directly within IAM roles or users rather than being shared.

39
Q

What should an organization regularly do to IAM keys?

A

Rotate them often to maintain security.

40
Q

True or False: Users should share their Access Key and Secret Access Key to enhance collaboration.

A

False

41
Q

What feature in IAM can enforce password complexity and expiration?

A

Password policy

42
Q

True or False: The AWS CLI and SDK are both tools for programmatic access to AWS.

A

True

43
Q

What is the purpose of MFA in IAM?

A

To provide additional security by requiring a second factor in addition to the password.

44
Q

Fill in the blank: IAM _____ allows restricting permissions based on user actions.

A

policies

45
Q

What AWS security feature helps identify unused permissions by users?

A

IAM Access Advisor

46
Q

Name one IAM security best practice for managing user permissions.

A

Use IAM Credential Reports to audit and manage permissions regularly.