Ch12 Security Flashcards
Which is an operational process performed by AWS for data security?
A. Advanced Encryption Standard (AES)-256 encryption of data stored on any shared
storage device
B. Decommissioning of storage devices using industry-standard practices
C. Background virus scans of Amazon Elastic Block Store (Amazon EBS) volumes and
Amazon EBS snapshots
D. Replication of data across multiple AWS regions
E. Secure wiping of Amazon EBS data when an Amazon EBS volume is unmounted
B. All decommissioned magnetic storage devices are degaussed and physically destroyed
in accordance with industry-standard practices.
You have launched a Windows Amazon Elastic Compute Cloud (Amazon EC2) instance
and specified an Amazon EC2 key pair for the instance at launch. Which of the following
accurately describes how to log in to the instance?
A. Use the Amazon EC2 key pair to securely connect to the instance via Secure Shell
(SSH).
B. Use your AWS Identity and Access Management (IAM) user X.509 certificate to log
in to the instance.
C. Use the Amazon EC2 key pair to decrypt the administrator password and then
securely connect to the instance via Remote Desktop Protocol (RDP) as the
administrator.
D. A key pair is not needed. Securely connect to the instance via RDP.
C. The administrator password is encrypted with the public key of the key pair, and you
provide the private key to decrypt the password. Then log in to the instance as the
administrator with the decrypted password.
A Database security group controls network access to a database instance that is inside a
Virtual Private Cloud (VPC) and by default allows access from?
A. Access from any IP address for the standard ports that the database uses is provided
by default.
B. Access from any IP address for any port is provided by default in the DB security
group.
C. No access is provided by default, and any access must be explicitly added with a rule
to the DB security group.
D. Access for the database connection string is provided by default in the DB security
group.
C. By default, network access is turned off to a DB Instance. You can specify rules in a security group that allows access from an IP address range, port, or Amazon Elastic Compute Cloud (Amazon EC2) security group.
Which encryption algorithm is used by Amazon Simple Storage Service (Amazon S3) to
encrypt data at rest with Service-Side Encryption (SSE)?
A. Advanced Encryption Standard (AES)-256
B. RSA 1024
C. RSA 2048
D. AES-128
A. Amazon S3 SSE uses one of the strongest block ciphers available, 256-bit AES.
How many access keys may an AWS Identity and Access Management (IAM) user have active at one time? A. 0 B. 1 C. 2 D. 3
C. IAM permits users to have no more than two active access keys at one time.
Which of the following is the name of the security model employed by AWS with its customers? A. The shared secret model B. The shared responsibility model C. The shared secret key model D. The secret key responsibility model
B. The shared responsibility model is the name of the model employed by AWS with its
customers.
Which of the following describes the scheme used by an Amazon Redshift cluster
leveraging AWS Key Management Service (AWS KMS) to encrypt data-at-rest?
A. Amazon Redshift uses a one-tier, key-based architecture for encryption.
B. Amazon Redshift uses a two-tier, key-based architecture for encryption.
C. Amazon Redshift uses a three-tier, key-based architecture for encryption.
D. Amazon Redshift uses a four-tier, key-based architecture for encryption.
D. When you choose AWS KMS for key management with Amazon Redshift, there is a
four-tier hierarchy of encryption keys. These keys are the master key, a cluster key, a
database key, and data encryption keys.
Which of the following Elastic Load Balancing options ensure that the load balancer
determines which cipher is used for a Secure Sockets Layer (SSL) connection?
A. Client Server Cipher Suite
B. Server Cipher Only
C. First Server Cipher
D. Server Order Preference
D. Elastic Load Balancing supports the Server Order Preference option for negotiating
connections between a client and a load balancer. During the SSL connection negotiation
process, the client and the load balancer present a list of ciphers and protocols that they
each support, in order of preference. By default, the first cipher on the client’s list that
matches any one of the load balancer’s ciphers is selected for the SSL connection. If the
load balancer is configured to support Server Order Preference, then the load balancer
selects the first cipher in its list that is in the client’s list of ciphers. This ensures that the
load balancer determines which cipher is used for SSL connection. If you do not enable
Server Order Preference, the order of ciphers presented by the client is used to negotiate
connections between the client and the load balancer.
Which technology does Amazon WorkSpaces use to provide data security?
A. Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
B. Advanced Encryption Standard (AES)-256
C. PC-over-IP (PCoIP)
D. AES-128
C. Amazon WorkSpaces uses PCoIP, which provides an interactive video stream without
transmitting actual data.
As a Solutions Architect, how should you architect systems on AWS?
A. You should architect for least cost.
B. You should architect your AWS usage to take advantage of Amazon Simple Storage
Service’s (Amazon S3) durability.
C. You should architect your AWS usage to take advantage of multiple regions and
Availability Zones.
D. You should architect with Amazon Elastic Compute Cloud (Amazon EC2) Auto
Scaling to ensure capacity is available when needed.
C. Distributing applications across multiple Availability Zones provides the ability to
remain resilient in the face of most failure modes, including natural disasters or system
failures.
Which security scheme is used by the AWS Multi-Factor Authentication (AWS MFA) token? A. Time-Based One-Time Password (TOTP) B. Perfect Forward Secrecy (PFC) C. Ephemeral Diffie Hellman (EDH) D. Split-Key Encryption (SKE)
A. A virtual MFA device uses a software application that generates six-digit
authentication codes that are compatible with the TOTP standard, as described in RFC
6238.
DynamoDB tables may contain sensitive data that needs to be protected. Which of the
following is a way for you to protect DynamoDB table content? (Choose 2 answers)
A. DynamoDB encrypts all data server-side by default so nothing is required.
B. DynamoDB can store data encrypted with a client-side encryption library solution
before storing the data in DynamoDB.
C. DynamoDB obfuscates all data stored so encryption is not required.
D. DynamoDB can be used with the AWS Key Management Service to encrypt the data
before storing the data in DynamoDB.
E. DynamoDB should not be used to store sensitive information requiring protection.
B, D. Amazon DynamoDB does not have a server-side feature to encrypt items within a
table. You need to use a solution outside of DynamoDB such as a client-side library to
encrypt items before storing them, or a key management service like AWS Key
Management Service to manage keys that are used to encrypt items before storing them
in DynamoDB.
You have launched an Amazon Linux Elastic Compute Cloud (Amazon EC2) instance
into EC2-Classic, and the instance has successfully passed the System Status Check and
Instance Status Check. You attempt to securely connect to the instance via Secure Shell
(SSH) and receive the response, “WARNING: UNPROTECTED PRIVATE KEY FILE,”
after which the login fails. Which of the following is the cause of the failed login?
A. You are using the wrong private key.
B. The permissions for the private key are too insecure for the key to be trusted.
C. A security group rule is blocking the connection.
D. A security group rule has not been associated with the private key.
B. If your private key can be read or written to by anyone but you, then SSH ignores your
key.
Which of the following public identity providers are supported by Amazon Cognito Identity? A. Amazon B. Google C. Facebook D. All of the above
D. Amazon Cognito Identity supports public identity providers—Amazon, Facebook, and
Google—as well as unauthenticated identities.
Which feature of AWS is designed to permit calls to the platform from an Amazon Elastic
Compute Cloud (Amazon EC2) instance without needing access keys placed on the
instance?
A. AWS Identity and Access Management (IAM) instance profile
B. IAM groups
C. IAM roles
D. Amazon EC2 key pairs
A. An instance profile is a container for an IAM role that you can use to pass role
information to an Amazon EC2 instance when the instance starts.