Domain 1: Design Secure Architectures Flashcards

1
Q

You work for a security company with a custom VPC and S3 buckets. You plan on allowing access to your trusted S3 buckets using a gateway endpoint. Which of the following would assist with this?

Create a bucket policy for trusted S3 buckets.

Create an object policy for trusted S3 objects.

Create an endpoint policy for your trusted VPCs.

Create an endpoint policy for your trusted S3 buckets.

A

Create a bucket policy for trusted S3 buckets.

This would not create a private connection to your VPC.

Selected

Create an endpoint policy for your trusted S3 buckets.

This is the best answer in the scenario. It allows you to create a trusted connection from your VPC to your trusted S3 buckets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your company has an internal web application that uses RDS in the backend with Multi-AZ deployment for redundancy. You have been asked to improve security and make sure the database credentials and API keys are encrypted and rotated on a regular basis. The internal web application should also use the latest version of the encrypted credentials when connecting to the RDS database. What is the easiest way to achieve this?

Store the API keys and database credentials in AWS Secrets Manager.

Store the API keys and database credentials in a public S3 bucket for access.

Store the API keys and database credentials in CloudWatch.

Store the API keys and database credentials in KMS.

A

Store the API keys and database credentials in AWS Secrets Manager.

AWS Secrets Manager is designed to store your key confidential data.

Store the API keys and database credentials in KMS.

You cannot store credentials in KMS.

Selected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have an S3 bucket that contains some vital files for your company. You need to be alerted if these files are deleted or have write operations performed on them. What AWS services are event notification destinations for S3 buckets?

SQS

SNS

Lambda

SES

A

SQS

You can use SQS as an event notification service for S3. Reference: Event notification types and destinations

SNS

You can use SNS as an event notification service for S3. Reference: Event notification types and destinations

Selected
Lambda

You can use Lambda as an event notification service for S3. Reference: Event notification types and destinations

Selected
SES

You cannot use SES as an event notification service for S3. Reference: Event notification types and destinations

Selected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You work for a security company that hosts a secure file storage service on S3. All files uploaded to the S3 buckets must have AES-256 encryption using Server Side Encryption (SSE-S3). Which of the following request headers must be used?

x-enable-server-side-encryption-s3

x-amz-server-side-encryption

x-enable-server-side-encryption

x-amz-server-side-encryption-enable-s3

A

x-amz-server-side-encryption

‘x-amz-server-side-encryption is the correct header to use. Reference: Using Server-Side Encryption`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You work for an online store that has a large number of EC2 instances. The company had a list of public keys and public IP addresses of the individual EC2 instances stored in an S3 bucket. However, this was accidentally deleted by an intern. You need to rebuild this list using an automated script. You create a script running a curl command to get the data on each EC2 instance and to write this to an S3 bucket. Which of the following should you query?

Instance Metadata

Amazon EBS

Amazon Machine Image

Instance Userdata

A

Instance Metadata

Instance Metadata describes all the data about the EC2 instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You work for a doctor’s surgery in New York City that has thousands of patients. The patients data is stored on-premises, but the backups need to be stored on S3 in the most secure way possible. Which of the following is the most secure way of achieving this?

Encrypt the data locally using your own encryption keys. Upload the data to AWS S3 using HTTPS. Use AES 256 server-side encryption on the S3 bucket to encrypt the bucket.

Store the data on AWS Fargate and use server-side encryption to encrypt the backups.

Encrypt the data locally using your own encryption keys. Upload the data to AWS S3 using HTTP. Use AES 256 server side encryption on the S3 bucket to encrypt the bucket.

Upload the backups directly to a public S3 bucket.

A

Encrypt the data locally using your own encryption keys. Upload the data to AWS S3 using HTTPS. Use AES 256 server-side encryption on the S3 bucket to encrypt the bucket.

This is the best solution in this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have recently terminated an employee from the company due to gross misconduct. Unfortunately, you discover they have been using a backdoor account to access your internal web application. They have been doing this from their home, which has a static IP address. You need to block access from this IP address immediately and then fix the backdoor. What is the fastest approach to achieve this?

Block the IP address on the public NACL.

Block the IP address using a security group.

Use Amazon Shield to block the IP address.

Block the IP address using an Internet Gateway.

A

Block the IP address on the public NACL.

This is the best solution as it’s a static IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have a new intern starting at a security company who works on the developer team. She has access to the developer account but needs temporary write access to S3 in your production account. What is the most secure way to provide the intern with access?

Create an IAM username and password with S3 write access to the production account and share this user name and password with your intern.

Create an IAM username and password with Admin Access to the production account and share this user name and password with your intern.

Use AWS KMS to provide access.

Use AWS STS.

A

Use AWS STS.

This gives you temporary credentials to access an account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have started as the chief security officer at a major internet security company. They are migrating to AWS and you are tasked with creating the required IAM users, IAM roles, IAM groups, and IAM policies for the entire company. What is the best practice when creating IAM policies?

Grant all users power user access.

Use the concept of maximum privilege where you grant every permission possible.

Conduct extensive background research on your staff and if they pass grant them full admin access.

Use the concept of least privilege where you grant the permissions only required to complete a task.

A

Use the concept of least privilege where you grant the permissions only required to complete a task.

You should always use the concept of least privilege when granting permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have started at a new company that has recently had a major security breach in their AWS account. Somehow, someone was able to gain access to the entire account, and they were able to create EC2 instances to mine Bitcoin and share pirated material using S3. Your boss instructs you to find an automated threat detection service that can protect your entire AWS account. What AWS service should you recommend?

AWS Shield Advanced

Amazon Inspector.

Amazon Trusted Advisor

Amazon Guard Duty

A

Amazon Guard Duty

Amazon GuardDuty is a threat detection service that continuously monitors your AWS accounts and workloads for malicious activity and delivers detailed security findings for visibility and remediation. Reference: Amazon Guard Duty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You work for a government agency that needs to host a sensitive internal application on AWS. They have very strict encryption requirements, so they must control all keys and have root access to the HSM that generates the keys. What AWS service should they use?

AWS CloudHSM

KMS

KMS with HSM enabled.

AWS Inspector.

A

AWS CloudHSM

This is the best answer, as you have root-level access to HSM. Reference: Comparison of HSM to KMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are building an application on EC2 that will require access to S3 and DynamoDB. You need to provide access to these services in the most secure way possible to your developers. What should you use to achieve this?

Assign a role to the EC2 instance allowing access to S3 and DynamoDB.

Create a master IAM username and password with Admin Access and share this user name and password with your developers.

Create a master IAM username and password with power user access and share this user name and password with your developers.

Use AWS KMS to provide access to these resources.

A

Assign a role to the EC2 instance allowing access to S3 and DynamoDB.

This would be the most efficient solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your web application is designed to encourage people to vote for your chosen celebrity at a major national talent contest. Unfortunately, some hackers have managed to deploy a SQL injection against your application, and they have managed to drop your MySQL database. You have a backup, so you haven’t lost any data, but you need to prevent this from happening again. How should you complete this?

Refactor the application to use NeptuneDB as the backend database.

Use GuardDuty to set up SQL firewalls so that they cannot launch another SQL injection.

Discover the IP address from which the SQL injection was delivered and use NACLs to block the offending IP address.

Set up an AWS WAF and create rules that prevent SQL injections. Associate the WAF to your application load balancer.

A

Set up an AWS WAF and create rules that prevent SQL injections. Associate the WAF to your application load balancer.

This is the best answer, as AWS WAF is capable of this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have been evaluating the NACLs in your company. Most of the NACLs are configured the same:

100 All Traffic Allow
200 All Traffic Deny
* All Traffic Deny
What function does the * All Traffic Deny rule perform?

It is there in case no other rules are defined.

Traffic will be denied from specified IP addresses.

This rule ensures that if a packet doesn’t match any of the other numbered rules, it’s denied.

The * specifies that it is an example rule.

A

This rule ensures that if a packet doesn’t match any of the other numbered rules, it’s denied.

The default network ACL is configured to allow all traffic to flow in and out of the subnets with which it is associated. Each network ACL also includes a rule whose rule number is an asterisk. This rule ensures that if a packet doesn’t match any of the other numbered rules, it’s denied. You can’t modify or remove this rule. Reference: Network ACLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your company’s website, hosted on an on-premises solution, suffered a major DDoS attack that resulted in several days of downtime. Your boss has decided to migrate the website to AWS and has tasked you with selecting the most robust DDoS protection available from AWS. What should you recommend?

AWS Defender

AWS Defender - Advanced

AWS Shield Advanced

AWS Shield Standard

A

AWS Shield Advanced

AWS Shield Advanced is the most powerful DDoS protection service available from AWS. It provides extra DDoS mitigation features, round-the-clock access to a DDoS response team, and protection against bigger and more complex attacks, making it the ideal choice for situations requiring more complete protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You need to host a static website on S3. Your boss asks you to register a domain name for the website with Route 53. What is a prerequisite to ensure that you can achieve this?

You must have a bucket name that is the same as the domain name.

You must create an A Record in Route 53 to point to your bucket.

You must enable CORS in your S3 bucket in order to enable a static website.

You must configure a CNAME in Route 53 to point to your DNS address of your bucket.

A

You must have a bucket name that is the same as the domain name.

The bucket name must always be the same as the domain name.

17
Q

You work in the security team for a major insurance company that has hundreds of production AWS accounts. Recently, there was a major security breach across multiple AWS production accounts. The breaches were detected using GuardDuty, Inspector, Macie, and Amazon Firewall Manager; however, because people rarely log in to these individual AWS accounts, the breaches weren’t noticed for a long a time. You need to implement a solution that will allow you to view all your security alerts in a single place. Which AWS service should you use?

Amazon Inspector

Amazon Cloudwatch

AWS Security Hub

AWS Trusted Advisor

A

AWS Security Hub

AWS Security Hub is a single place to view all your security alerts from services like Amazon GuardDuty, Amazon Inspector, Amazon Macie, and AWS Firewall Manager.

18
Q

Your development team leverages Amazon ECS Fargate to run their containerized application in AWS. At this time, they are leveraging an internal image registry on Amazon EC2 instances for hosting image repositories due to requiring image scanning for software vulnerabilities. You have suggested they explore other options to avoid the operational overhead and unnecessary costs associated with the solution. What solution best fits the needs for the scenario?

Host images in Amazon ECR repositories with scan on push enabled.

Shift to the public Docker Hub. Image scanning is automatic.

Use Amazon S3 for image storage and Amazon Macie to find compromised images.

Use Amazon S3 for image storage and Amazon Athena for querying for vulnerabilities.

A

Host images in Amazon ECR repositories with scan on push enabled.

Amazon ECR offers the ability to enable scan on push, which enables software vulnerability scanning of all images pushed to your repositories. Reference: What is Amazon Elastic Container Registry? Creating a private repository

19
Q

You have a large fleet of EC2 instances on AWS. Recently, one of your EC2 instances is compromised using a well known vulnerability in Apache. You need an automated vulnerability management service that continually scans your EC2 fleet for software vulnerabilities and unintended network exposure. What AWS service should you recommend?

CloudTrail

CloudWatch

AWS Inspector

AWS Trusted Advisor

A

AWS Inspector

AWS Inspector satisfies the requirements for this scenario. Reference: AWS Inspector

20
Q

You have been assigned to migrate an application and the servers it runs on to the company AWS cloud environment. You have created a checklist of steps necessary to perform this migration. A subsection in the checklist is security considerations. One of the things that you need to consider is the shared responsibility model. Which option does the customer handle under the shared responsibility model?

Hardware infrastructure

Network infrastructure

Availability Zones

Identity and Access Management

A

Identity and Access Management

Identity and Access Management is the responsibility of the customer. AWS is responsible for protecting the infrastructure that runs all of the services offered in the AWS Cloud. This infrastructure is composed of the hardware, software, networking, and facilities that run AWS Cloud services. Customer responsibility will be determined by the AWS Cloud services that a customer selects. This determines the amount of configuration work the customer must perform as part of their security responsibilities. For example, a service such as Amazon Elastic Compute Cloud (Amazon EC2) is categorized as Infrastructure as a Service (IaaS) and, as such, requires the customer to perform all of the necessary security configuration and management tasks. Customers that deploy an Amazon EC2 instance are responsible for management of the guest operating system (including updates and security patches), any application software or utilities installed by the customer on the instances, and the configuration of the AWS-provided firewall (called a security group) on each instance. For abstracted services, such as Amazon S3 and Amazon DynamoDB, AWS operates the infrastructure layer, the operating system, and platforms, and customers access the endpoints to store and retrieve data. Customers are responsible for managing their data (including encryption options), classifying their assets, and using IAM tools to apply the appropriate permissions. https://aws.amazon.com/compliance/shared-responsibility-model/