Authentication and Authorization—AWS Identity and Access Management Flashcards

1
Q

Which of the following is the greatest risk posed by using your AWS account root user for day‐to‐day operations?
There would be no easy way to control resource usage by project or class.
There would be no effective limits on the effect of an action, making it more likely for unintended and unwanted consequences to result.
Since root has full permissions over your account resources, an account compromise at the hands of hackers would be catastrophic.
It would make it difficult to track which account user is responsible for specific actions.

A

C. Although each of the other options represents possible concerns, none of them carries consequences as disastrous as the complete loss of control over your account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You’re trying to create a custom IAM policy to more closely manage access to components in your application stack. Which of the following syntax‐related statements is a correct description of IAM policies?
The Action element refers to the way IAM will react to a request.
The * character applies an element globally—as broadly as possible.
The Resource element refers to the third‐party identities that will be allowed to access the account.
The Effect element refers to the anticipated resource state after a request is granted.

A

B. The * character does, indeed, represent global application. The Action element refers to the kind of action requested (list, create, etc.), the Resource element refers to the particular AWS account resource that’s the target of the policy, and the Effect element refers to the way IAM should react to a request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following will—when executed on its own—prevent an IAM user with no existing policies from launching an EC2 instance? (Choose three.)
Attach no policies to the user.
Attach two policies to the user, with one policy permitting full EC2 access and the other permitting IAM password changes but denying EC2 access.
Attach a single policy permitting the user to create S3 buckets.
Attach the AdministratorAccess policy.
Associate an IAM action statement blocking all EC2 access to the user’s account.

A

A, B, C. Unless there’s a policy that explicitly allows an action, it will be denied. Therefore, a user with no policies or with a policy permitting S3 actions doesn’t permit EC2 instance permissions. Similarly, when two policies conflict, the more restrictive will be honored. The AdministratorAccess policy opens up nearly all AWS resources, including EC2. There’s no such thing as an IAM action statement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following are important steps for securing IAM user accounts? (Choose two.)
Never use the account to perform any administration operations.
Enable multifactor authentication (MFA).
Assign a long and complex password.
Delete all access keys.
Insist that your users access AWS resources exclusively through the AWS CLI.

A

B, C. If you don’t perform any administration operations with regular IAM users, then there really is no point for them to exist. Similarly, without access keys, there’s a limit to what a user will be able to accomplish. Ideally, all users should use MFA and strong passwords. The AWS CLI is an important tool, but it isn’t necessarily the most secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To reduce your exposure to possible attacks, you’re auditing the active access keys associated with your account. Which of the following AWS CLI commands can tell you whether a specified access key is still being used?
aws iam get‐access‐key‐used –access‐key‐id <key_ID>
aws iam ‐‐get‐access‐key‐last‐used access‐key‐id <key_ID>
aws iam get‐access‐key‐last‐used access‐last‐key‐id <key_ID>
aws iam get‐access‐key‐last‐used ‐‐access‐key‐id <key_ID></key_ID></key_ID></key_ID></key_ID>

A

D. The top‐level command is iam, and the correct subcommand is get‐access‐key‐last‐used. The parameter is identified by ‐‐access‐last‐key‐id. Parameters (not subcommands) are always prefixed with ‐‐ characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You’re looking to reduce the complexity and tedium of AWS account administration. Which of the following is the greatest benefit of organizing your users into groups?
It enhances security by consolidating resources.
It simplifies the management of user permissions.
It allows for quicker response times to service interruptions.
It simplifies locking down the root user.

A

B. IAM groups are primarily about simplifying administration. It has no direct impact on resource usage or response times and only an indirect impact on locking down the root user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During an audit of your authentication processes, you enumerate a number of identity types and want to know which of them might fit the category of “trusted identity” and require deeper investigation. Which of these is not considered a trusted entity in the context of IAM roles?
A web identity authenticating with Google
An identity coming through a SAML‐based federated provider
An identity using an X.509 certificate
A web identity authenticating with Amazon Cognito

A

C. X.509 certificates are used for encrypting SOAP requests, not authentication. The other choices are all valid identities within the context of an IAM role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your company is bidding for a contract with a U.S. government agency that demands any cryptography modules used on the project be compliant with government standards. Which of the following AWS services provides virtual hardware devices for managing encryption infrastructure that’s FIPS 140‐2 compliant?
AWS CloudHSM
AWS Key Management Service
AWS Security Token Service
AWS Secrets Manager

A

A. AWS CloudHSM provides encryption that’s FIPS 140‐2 compliant. Key Management Service manages encryption infrastructure but isn’t FIPS 140‐2 compliant. Security Token Service is used to issue tokens for valid IAM roles, and Secrets Manager handles secrets for third‐party services or databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the best tool for authenticating access to a VPC‐based Microsoft SharePoint farm?
Amazon Cognito
AWS Directory Service for Microsoft Active Directory
AWS Secrets Manager
AWS Key Management Service

A

B. AWS Directory Service for Microsoft Active Directory provides Active Directory authentication within a VPC environment. Amazon Cognito provides user administration for your applications. AWS Secrets Manager handles secrets for third‐party services or databases. AWS Key Management Service manages encryption infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the function of Amazon Cognito identity pools?
Gives your application users temporary, controlled access to other services in your AWS account
Adds user sign‐up and sign‐in to your applications
Incorporates encryption infrastructure into your application lifecycle
Delivers up‐to‐date credentials to authenticate RDS database requests

A

A. Identity pools provide temporary access to defined AWS services to your application users. Sign‐up and sign‐in is managed through Cognito user pools. KMS and/or CloudHSM provide encryption infrastructure. Credential delivery to databases or third‐party applications is provided by AWS Secrets Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An employee with access to the root user on your AWS account has just left your company. Since you can’t be 100 percent sure that the former employee won’t try to harm your company, which of the following steps should you take? (Choose three.)
Change the password and MFA settings for the root account.
Delete and re‐create all existing IAM policies.
Change the passwords for all your IAM users.
Delete the former employee’s own IAM user (within the company account).
Immediately rotate all account access keys.

A

A, D, E. Options A, D, and E are appropriate steps. Your IAM policies will be as effective as ever, even if outsiders know your policies. Since even an account’s root user would never have known other users’ passwords, there’s no reason to change them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You need to create a custom IAM policy to give one of your developers limited access to your DynamoDB resources. Which of the following elements will not play any role in crafting an IAM policy?
Action
Region
Effect
Resource

A

B. IAM policies are global—they’re not restricted to any one region. Policies do, however, require an action (like create buckets), an effect (allow), and a resource (S3).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following are necessary steps for creating an IAM role? (Choose two.)
Define the action.
Select at least one policy.
Define a trusted entity.
Define the consumer application.

A

B, C. IAM roles require a defined trusted entity and at least one policy. However, the relevant actions are defined by the policies you choose, and roles themselves are uninterested in which applications use them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following uses authentication based on AWS Security Token Service (STS) tokens?
Policies
Users
Groups
Roles

A

D. STS tokens are used as temporary credentials to external identities for resource access to IAM roles. Users and groups would not use tokens to authenticate, and policies are used to define the access a token will provide, not the recipient of the access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What format must be used to write an IAM policy?
HTML
Key/value pairs
JSON
XML

A

C. Policies must be written in JSON format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If you need to allow a user full control over EC2 instance resources, which two of the following must be included in the policy you create?
“Target”: “ec2:
“Action”: “ec2:

“Resource”: “ec2:*”
“Effect”: “Allow”
“Effect”: “Permit”

A

B, D. The correct Resource line would read “Resource”: “”. And the correct Action line would read “Action”: “”. There is no “Target” line in an IAM policy. “Permit” is not a valid value for “Effect”.

17
Q

What is the function of Amazon Cognito user pools?
Gives your application users temporary, controlled access to other services in your AWS account
Adds user sign‐up and sign‐in to your applications
Incorporates encryption infrastructure into your application lifecycle
Delivers up‐to‐date credentials to authenticate RDS database requests

A

B. User pools provide sign‐up and sign‐in for your application’s users. Temporary access to defined AWS services to your application users is provided by identity pools. KMS and/or CloudHSM provide encryption infrastructure. Credential delivery to databases or third‐party applications is provided by AWS Secrets Manager.

18
Q

Which of the following best describe the “managed” part of AWS Managed Microsoft AD? (Choose two.)
Integration with on‐premises AD domains is possible.
AD domain controllers are launched in two availability zones.
Data is automatically replicated.
Underlying AD software is automatically updated.

A

C, D. An AWS managed service takes care of all underlying infrastructure management for you. In this case, that will include data replication and software updates. On‐premises integration and multi‐AZ deployment are important infrastructure features, but they’re not unique to “managed” services.

19
Q

Which of the following steps are part of the access key rotation process? (Choose three.)
Monitor the use of your new keys.
Monitor the use of old keys.
Deactivate the old keys.
Delete the old keys.
Confirm the status of your X.509 certificate.

A

B, C, D. Options B, C, and D are all parts of the key rotation process. In this context, key usage monitoring is only useful to ensure that none of your applications is still using an old key that’s set to be retired. X.509 certificates aren’t used for access keys.

20
Q

What tool will allow an Elastic Container Service task to access container images it might need that are being maintained in your account’s Elastic Container Registry?
An IAM role
An IAM policy
An IAM group
An AIM access key

A