Domain 3: Design Secure Applications and Architectures Flashcards

1
Q

Scenario:

Encrypt EBS volumes restored from the unencrypted
EBS snapshots

A

Solution:

Copy the snapshot and enable encryption with a
new symmetric CMK while creating an EBS volume
using the snapshot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scenario:

Limit the maximum number of requests from a single
IP address.

A

Solution:

Create a rate-based rule i n AWS WAF and set the
rate l imit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scenario:

Grant the bucket owner full access to all uploaded
objects i n the S3 bucket.

A

Solution:

Create a bucket policy that requires users to set the
object’s ACL to bucket-owner-full-control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scenario:

Protect objects i n the S3 bucket from accidental
deletion or overwrite.

A

Solution:

Enable versioning and MFA delete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scenario:

Access resources on both on-premises and AWS
using on-premises credentials that are stored in Active
Directory.

A

Solution:

Set up SAML 2.0-Based Federation by using a
Microsoft Active Directory Federation Service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Scenario:

Secure the sensitive data stored in EBS volumes

A

Solution:

Enable EBS Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Scenario:

Ensure that the data-in-transit and data-at-rest of the
Amazon S3 bucket i s always encrypted

A

Solution:

Enable Amazon S3 Server-Side or use Client-Side
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Scenario:

Secure the web application by allowing multiple
domains to serve SSL traffic over the same IP
address.

A

Solution:

Use AWS Certificate Manager to generate an SSL
certificate. Associate the certificate to the
CloudFront distribution and enable Server Name
Indication (SNI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Scenario:

Control the access for several S3 buckets by using a
gateway endpoint to allow access to trusted buckets.

A

Solution:

Create an endpoint policy for trusted S3 buckets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scenario:

Enforce strict compliance by tracking all the
configuration changes made to any AWS services.

A

Solution:

Set up a rule i n AWS Config to i dentify compliant
and non-compliant services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Scenario:

Provide short-lived access tokens that acts as
temporary security credentials to allow access to AWS
resources.

A

Solution:

Use AWS Security Token Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scenario:

Encrypt and rotate all the database credentials, API
keys, and other secrets on a regular basis.

A

Solution:

Use AWS Secrets Manager and enable automatic
rotation of credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scenario:

A cost-effective solution for over-provisioning of
resources.

A

Solution:

Configure a target tracking scalingn ASG.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly