5 - Securing Your AWS Resources Flashcards

1
Q

Why is application and infrastructure security important in cloud deployments?

A

It is critically important to protect assets from catastrophic data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What role does IAM play in AWS security?

A

IAM controls authentication and authorization for access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the components of IAM that help manage access?

A
  • Users
  • Groups
  • Roles
  • Federated identities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the recommended best practice for protecting the root user?

A

Create a complex password and implement multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the risks of using the root user for regular tasks?

A

Compromised root credentials can lead to data theft or unauthorized charges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does multifactor authentication (MFA) add to account security?

A

A second layer of security requiring a temporary digital token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: The _______ is the user identity generated when an AWS account is created.

A

root user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a password policy in IAM?

A

To enforce minimum complexity for all user passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Password expiration is recommended by recent security thinking.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can AWS users authenticate programmatic access?

A

Using access keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the industry-standard tool for encrypting remote login sessions?

A

Secure Shell (SSH) protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should you do with the private key of an SSH key pair?

A

Download it securely and avoid exposing it publicly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the principle of least privilege in IAM?

A

Assign only the permissions necessary for users to perform their tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when you create a new IAM user?

A

You can assign specific permissions and access types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the benefit of using IAM groups?

A

To manage permissions for multiple users efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do IAM groups simplify permission management?

A

Users inherit permissions from the group they are attached to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a recommended action to take for the root user’s security?

A

Lock down the root user and use IAM users for daily tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What should you avoid when creating passwords?

A

Easy-to-guess passwords and password reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fill in the blank: A strong password should include _______.

A

uppercase and lowercase characters, numbers, and symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the first step in protecting your root user?

A

Set a high-quality password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the function of access keys in AWS?

A

To authenticate programmatic and command-line access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When should access keys ideally be assigned?

A

To users with limited system access necessary for their jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What should be done with access keys associated with the root account?

A

Delete them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the process to create a new SSH key pair?

A

Select the Key Pairs link from the EC2 Dashboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What can happen if the secret access key is exposed in plaintext?
It can lead to unauthorized access to your AWS account.
26
What happens if you do not download the private SSH key after creating it?
You will not have access to it again.
27
What is a recommended practice for IAM user creation?
Choose user names and attach appropriate permissions.
28
What is the primary function of the AWS IAM service?
Identity and access management
29
Which of the following are requirements you can include in an IAM password policy? (Choose three.)
* Require at least one uppercase letter. * Require at least one number. * Require at least one nonalphanumeric character.
30
Which of the following should you do to secure your AWS root user? (Choose two.)
* Enable MFA. * Create a strong password.
31
How does multifactor authentication work?
In addition to an access password, users also authenticate via a physical MFA device.
32
Which SSH command will successfully connect to an EC2 Amazon Linux instance with an IP address of 54.7.35.103 using a key named mykey.pem?
ssh -i mykey.pem ec2-user@54.7.35.103
33
What’s the most efficient method for managing permissions for multiple IAM users?
Assign users requiring similar permissions to IAM groups.
34
What is an IAM role?
A set of permissions allowing access to specified AWS resources
35
How can federated identities be incorporated into AWS workflows? (Choose two.)
* You can provide users authenticated through a third-party identity provider access to backend resources used by your mobile app. * You can use authenticated identities to import external data (like email records from Gmail) into AWS databases.
36
What is the purpose of IAM groups?
To efficiently control resource access for large numbers of users with different access needs.
37
What service manages encryption keys in AWS?
AWS Key Management Service (KMS)
38
What does AWS Artifact provide?
Access to official documentation on the compliance of AWS infrastructure relating to various regulatory standards.
39
What is the role of Amazon Inspector?
A security assessment service that helps users identify security vulnerabilities and deviations from security best practices in AWS resources.
40
What does Amazon GuardDuty do?
Continuously monitors AWS accounts for suspicious activities and malicious behavior.
41
What is the function of AWS Secrets Manager?
Helps protect and manage secrets, such as database credentials and API keys.
42
What is AWS Cloud HSM used for?
To secure sensitive data by generating and deploying cryptographic keys.
43
Fill in the blank: AWS provides a number of enterprise-strength _______ tools that are conveniently integrated into relevant services.
encryption
44
True or False: IAM roles are primarily used by people.
False
45
What is the key feature of AWS Resource Access Manager (AWS RAM)?
Allows you to share AWS resources with other AWS accounts within your organization.
46
What does AWS Security Hub provide?
A comprehensive view of your security profile across all of your AWS accounts.
47
What is the importance of a credential report in IAM?
Displays information about the state of your account security, including user login status and MFA enablement.
48
How can you encrypt data in S3?
Using S3-managed server-side encryption keys (SSE-S3) or KMS-managed keys (SSE-KMS).
49
What is the purpose of IAM users in AWS?
A set of IAM users given permission to access specified AWS resources
50
What do permissions granted to a trusted entity over specified AWS resources allow?
Permissions granted a trusted entity over specified AWS resources
51
Fill in the blank: Permissions granted an IAM user over specified AWS resources are called _______.
[IAM permissions]
52
How can federated identities be incorporated into AWS workflows? (Choose two.)
* You can provide users authenticated through a third-party identity provider access to backend resources used by your mobile app. * You can provide admins authenticated through AWS Microsoft AD with access to a Microsoft SharePoint farm running on AWS.
53
Which of the following are valid third-party federated identity standards? (Choose two.)
* SAML 2.0 * SSO
54
What information does the IAM credential report provide? (Choose one.)
The current state of security of your IAM users’ access credentials
55
What text format does the IAM credential report use?
CSV
56
Which IAM policy is the best choice for the admin user created to replace the root user for day-to-day administration tasks?
AdministratorAccess
57
What is required for a new IAM user who will use 'programmatic access' to AWS resources? (Choose one.)
An access key ID and secret access key
58
What will IAM users with AWS Management Console access need to successfully log in? (Choose one.)
Their username and password
59
Which of the following will encrypt your data while in transit between your office and Amazon S3?
SSE-KMS
60
Which AWS resources cannot be encrypted using KMS?
Existing AWS Elastic Block Store volumes
61
What does KMS use to encrypt objects stored on your AWS account?
KMS master key
62
Which standard governs AWS-based applications processing credit card transactions?
PCI DSS
63
What is the purpose of the Service Organization Controls (SOC) reports found on AWS Artifact?
They attest to AWS infrastructure compliance with data accountability standards like Sarbanes–Oxley.
64
What role can the documents provided by AWS Artifact play in your application planning? (Choose two.)
* They can help you confirm that your deployment infrastructure is compliant with regulatory standards. * They can provide insight into various regulatory and industry standards that represent best practices.