BOOK: AWS - Identity and Access Mgt (IAM) Flashcards

1
Q

What address do you use to get to the management dashboard for IAM?

A

https://console.aws.amazon.com/iam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three best practices for protecting the IAM “root” account?

A
  • Add MFA (multi-factor authentication)
  • Do not use the root account for daily actions
  • Use a strong password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For programmatic, or command-line access what will you need to authenticate?

A

access keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Opening a remote login session to a Linux instance on Elastic Compute Cloud (EC2) will require a valid ________________________.

A

set of access keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You can configure a password policy from the______________________ section of the IAM.

A

Account Settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MFA works by associating a physical device—either a ____________ or MFA-compliant device like ________, or a smartphone with the Authenticator app installed with your account.

A
  • Universal 2nd Factor (U2F)

- YubiKey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You can generate a new set of access keys while logged into the AWS Management Console from the _________________________.

A

Security Credentials page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After choosing the “Create New Access Key” button, you will have an option of downloading the key to your computer as a text file , or ______________________

A

showing the actual Access Key ID, and Secret Access Key values in the dialog, where you can copy and paste them somewhere safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The industry-standard tool for safely encrypting remote login sessions is the______________ protocol.

A

Secret Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When you launch a new EC2 Linux instance, you’ll be prompted either to use an existing ____________ or create a new one.

A

SSH key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False.
You’ll only get one opportunity to download the private half of your SSH key pair to your computer, when setting up the initial connection to an EC2 instance

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You’re better off creating users to whom you can assign only the permissions needed for a specific set of tasks. This adheres to what principle?

A

the principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If you wanted to create a primary admin to replace your root user for day-to-day administration, hyou would select the _________________ policy.

A

AdministratorAccess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If your AWS data is encrypted, AWS will invisibly decrypt your data only when______________.

A

the access request is accompanied by authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You can have S3 encrypt the objects of a bucket at any time—during or after bucket creation. You can select either ____________or____________ encryption.

A

S3-managed server-side encryption keys (SSE-S3),

KMS-managed keys (SSE-KMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If you want to apply client-side encryption to an S3, then you need to encrypt your data before uploading it to S3 using either a _______________or a ________________.

A

KMS-managed customer master key, client-side master key.

17
Q

AWS refers to documents that describe various regulatory standards as ____________.

A

artifacts

18
Q

Using standards such as _________ and _________________, you can incorporate external authentication into your AWS infrastructure.

A

SAML 2.0,

Microsoft Active Directory