CloudAcademy: Knowledge Check: Security (SAA-C03) 2 of 2 Flashcards
When you are creating a rule in AWS Web Application Firewall, the _____ rule option asks you to enter the maximum number of requests from a single IP within a five-minute timeframe.
A. regular
B. count-based
C. IP
D. rate-based
D. rate-based
Explanation:
When you select a rate-based rule option, and as you can see from the image, you are asked to enter the maximum number of requests from a single IP within a five-minute timeframe. When the count limit is reached, the action of the rule is triggered until the request rate falls back below the rate limit specified.
Fill in the blanks: During the identity federation process, one party acts as the _____ provider and the other acts as the _____ provider.
A. OAuth, SAML
B. access, manager
C. sign-on, authentication
D. identity, service
D. identity, service
Explanation:
During the federation process, one party would act as an identity provider, known as an IdP, and the other would be the service provider, an SP.
The Amazon Inspector service provides which of the following benefits? (Choose 2 answers)
A. It assesses the exposure of attack points.
B. It simplifies compliance.
C. It scales and centralizes security management.
D. It automates responses to security attacks.
A. It assesses the exposure of attack points.
B. It simplifies compliance.
Explanation:
The benefits of Amazon Inspector are simplifying security compliance and enforcing security standards.
AWS Security Hub runs continuous, account-level configuration and security checks based on AWS best practices and industry standards, and provides the result of these checks as a(n) _____.
A. security graph
B. readiness score
C. alert table
D. violation score
B. readiness score
Explanation:
Security Hub runs continuous, account-level configuration and security checks based on AWS best practices and industry standards. It provides the result of these checks as a readiness score, and identifies specific accounts and resources that require attention.
AWS _____ allows you to protect your VPCs from common network threats by implementing fine-grained firewall rules, enabling you to control which traffic is permitted and which should be blocked.
A. Resolver DNS Firewall
B. WAF
C. Network Firewall
D. Shield
C. Network Firewall
Explanation:
AWS Network Firewalls allow you to protect your VPCs from common network threats by implementing fine-grained firewall rules, enabling you to control which traffic is permitted and which should be blocked.
What service does AWS IAM Identity Center (formerly AWS SSO) provide?
A. It is used to manage access to AWS services and resources securely, by creating and managing AWS users and groups and by using permissions to allow and deny their access to AWS resources.
B. It is used to centrally manage and categorize multiple AWS accounts that you own, bringing them together into a single organization, helping to maintain your AWS environment from a security, compliance, and account management perspective.
C. It gives you a comprehensive view of your security alerts and security posture across your AWS accounts.
D. It helps you implement a federated access control system, providing a portal to your users that allows them to access multiple accounts within your AWS organization without having to supply IAM credentials for each one.
D. It helps you implement a federated access control system, providing a portal to your users that allows them to access multiple accounts within your AWS organization without having to supply IAM credentials for each one.
Explanation:
IAM Identity Center is used to help you implement a federated access control system, providing a portal to your users that allows them to access multiple accounts within your AWS organization without having to supply IAM credentials for each one.
Amazon Cognito _____ help to provide temporary-access AWS credentials for your users or guests that need access to AWS services.
A. identity pools
B. assertions
C. user pools
D. attributes
A. identity pools
Explanation:
The Amazon Cognito identity pools, also known as federated identities, help to provide temporary-access AWS credentials for your users or guests that need access to AWS services.
Which AWS service can assess the security state of your applications running on EC2 instances?
A. Amazon Inspector
B. Amazon GuardDuty
C. Amazon EventBridge
D. Amazon CloudTrail
A. Amazon Inspector
Explanation:
Amazon Inspector is an automated security service that can assess your network and the accessibility of your amazon EC2 instances. Additionally, Amazon Inspector can also assess the security state of your applications running on those instances.
AWS _____ is designed to help protect your infrastructure against distributed denial of service attacks, commonly known as DDoS.
A. Network Firewall
B. WAF
C. Resolver DNS Firewall
D. Shield
D. Shield
Explanation:
Shield Advanced Policy: The AWS Shield service is designed to help protect your infrastructure against distributed denial of service attacks, commonly known as DDoS.
Which is the typical order for rule priorities in AWS Web Application Firewall, from first to last?
A .bad signatures
denylisted IPs
allowlisted IPs
B. denylisted IPs
bad signatures
allowlisted IPs
C .denylisted IPs
allowlisted IPs
bad signatures
D. allowlisted IPs
denylisted IPs
bad signatures
D. allowlisted IPs
denylisted IPs
bad signatures
Explanation:
During both of their configurations, the web ACL or rule group, you’ll be asked to verify the rule priorities of the rules that have been added. And this is an important point as rules are executed in the order that they are listed. Typically, these are ordered as shown. Firstly, your allowlisted IPs are allowed; you then have your denylisted IPs, which are blocked, and then any bad signatures, which are also blocked.
AWS Shield Standard offers DDoS protection against which layer(s) of attacks?
A. three only
B. three, four, and seven
C. seven only
D. three and four
D. three and four
Explanation:
AWS Shield Standard is free to everyone–well, at least anyone who has an AWS account–and it offers DDoS protection against some of the more common layer three, or the network layer, and layer four, or the transport layer, DDoS attacks.
Amazon Cognito _____ allow(s) users to pick up where they left off in your application when switching devices.
A. identity pools
B. user pools
C. Sync
D. OAuth
C. Sync
Explanation:
Amazon Cognito answers another question that many web and mobile applications developers will need help with on some level: the question of how to sync your application’s user data across various platforms. This allows the users to pick up where they left off when switching devices. Amazon Cognito Sync can help take care of these data points for you, instead of you having to create your own backend that you would need to maintain and manage yourself.
Amazon GuardDuty uses data from which of the following AWS services to detect unusual and unexpected behavior? (Choose 3 answers)
A . VPC flow logs
B. CloudWatch Logs
C. AWS CloudTrail event logs
D. DNS logs
A . VPC flow logs
C. AWS CloudTrail event logs
D. DNS logs
Explanation:
Amazon GuardDuty is a regional-based intelligent threat detection service, the first of its kind offered by AWS, which allows users to monitor their AWS account for unusual and unexpected behavior by analyzing AWS CloudTrail event logs, VPC flow logs, and DNS logs. It then uses the data from logs and assesses them against multiple security and threat detection feeds, looking for anomalies and known malicious sources, such as IP addresses and URLs.
In AWS Web Application Firewall, _____ are used as the component that is associated with one of the supported resources to determine which web requests are considered safe and which ones are not.
A. rule routers
B. web access control lists
C. whitelisted IPs
D. IP lists
B. web access control lists
Explanation:
Web access control lists, or web ACLs, are the main building block of the WAF service. And an ACL is used as the component that is associated with one of the supported resources to determine which web requests are considered safe and which ones are not.
AWS _____ provide(s) a means of centrally managing and categorizing multiple AWS accounts that you own, bringing them together into a single organization, helping to maintain your AWS environment from a security, compliance, and account management perspective.
A. categories
B. accounts
C. organizations
D. Central
C. organizations
Explanation:
For those unfamiliar with AWS organizations, they provide a means of centrally managing and categorizing multiple AWS accounts that you own, bringing them together into a single organization, helping to maintain your AWS environment from a security, compliance, and account management perspective.