Domain 2: Security and Compliance Flashcards

1
Q

Which AWS service provides central governance and management across multiple AWS accounts?

A

AWS Organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Configuring user permissions so that users can access only the resources they need to do their job follows what principle?

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Identity and Access Management, which term applies to a person or application that uses the AWS account root user, an IAM user, or an IAM role to sign in and make requests to AWS?

A

Principal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A new application needs temporary access to resources in AWS. How can this best be achieved?

A

Create an IAM Role and have the application assume the role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your company has recently migrated large amounts of data to the AWS cloud in S3 buckets. But it is necessary to discover and protect the sensitive data in these buckets. Which AWS service can do that?

A

Amazon Macie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After configuring your VPC and all of the resources within it, you want to add an extra layer of security at the subnet level. Which will you use to add this security?

A

Network ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are working with IAM and need to attach policies to users, groups, and roles. Which will you be attaching these policies to?

A

Identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are concerned about access to your top-secret application by stolen passwords. What additional layer of security can you add for logging in to AWS Management Console, in addition to user passwords?

A

Multi-Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Users need to access AWS resources from the command-line interface. Which IAM option can be used for authentication?

A

Access Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AWS uses the shared responsibility model. For security, which of the following are the responsibilities of AWS?

A

Network patching
Physically securing compute resources
Disk disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A small startup is configuring its AWS cloud environment. Which AWS service will allow grouping these users together and applying permissions to them as a group?

A

AWS IAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are creating a few IAM policies. This is the first time you have worked with IAM policies. Which tool can you use to test IAM policies?

A

IAM Policy Simulator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Microsoft has announced a new patch for its operating system. For a Platform as a Service solution, who would be responsible for applying the patch?

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

As an AWS account administrator, you are in charge of creating AWS accounts and securing those accounts. What steps can you take?

A

Create multi-factor authentication for the root account.

Add IP restrictions for all accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A software development team has requested IAM access to be able to work with AWS from the CLI. What will you provide these developers?

A

Access Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company is configuring IAM for its new AWS account. There are 5 departments with between 5 to 10 users in each department. How can they efficiently apply access permissions for each of these departments and simplify management of these users?

A

Create policies for each department that define the permissions needed. Create an IAM group for each department and attach the policy to each group. Add each department’s members to their respective IAM group.

17
Q

A company has a large number of S3 buckets and needs to manage and automate tasks on these buckets at one time. Which AWS feature can do this?

A

Resource Groups

18
Q

As an AWS account administrator, you are in charge of creating AWS accounts and securing those accounts. What steps can you take?

Add IP restrictions for all accounts

Store the root account credentials in sharepoint.

Grant admin access to all users.

Create multi-factor authentication for the root account.

Create functional groups for each department and use a common password for each group.

A

Add IP restrictions for all accounts

Create multi-factor authentication for the root account.

19
Q

After configuring your VPC and all of the resources within it, you want to add an extra layer of security at the subnet level. Which will you use to add this security?

A

Network ACL

A network access control list (ACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets. You might set up network ACLs with rules similar to your security groups to add an additional layer of security to your VPC.

20
Q

In Identity and Access Management, which term refers to the IAM resource objects that AWS uses for authentication?

A

Entities

IAM entities are the users (IAM users and federated users) and roles that are created and used for authentication.

21
Q

You need to set up a virtual firewall for your EC2 instance. Which would you use?

A

Security Group

A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. When you launch an instance in a VPC, you can assign up to five security groups to the instance. Security groups act at the instance level, not the subnet level. Therefore, each instance in a subnet in your VPC can be assigned to a different set of security groups.

22
Q

Which policy will provide information on performing penetration testing on your EC2 instances?

A

Customer Service Policy for Penetration Testing

23
Q

You are creating a few IAM policies. This is the first time you have worked with IAM policies. Which tool can you use to test IAM policies?

A

IAM Policy Simulator

24
Q

Which AWS service can be used to detect and prevent Distributed Denial of Service attacks against services hosted on AWS?

A

AWS Shield