Domain 5: Security, Compliance, and Governance of AI Solutions 14% Flashcards

1
Q

A web service that helps you manage and secure access to your AWS accounts and resources with which you can create and manage AWS users and grant them permissions to use services in your account.

A

AWS Identity and Access Management, or IAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F: It is possible to use IAM to restrict a user’s permissions to certain Regions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When you first create an AWS account, you begin with a single identity that has complete access to all AWS services and resources in the account. This identity is called the _____

A

root user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An IAM policy is a ___ document that allows or denies permissions to AWS services and resources.

A

JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An _____ is a collection of IAM users in which all users in the group are granted permissions specified by the policy.

A

IAM group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F: To manage groups, you might want to organize IAM groups by job functions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F: Best practice for IAM groups is to attach policies to groups and only attach to users any unique permissions that they should have.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An _____ is an identity that a person or an AWS service can assume to gain temporary access to other AWS resources or services, in which you get temporary security credentials for your session, which auto expire.

A

IAM role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Permissions policies that are associated with IAM users, groups, and roles are called _____.

A

identity-based policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ is when your users authenticate with an identity provider like Active Directory. After they authenticate, they are given temporary credentials for AWS. AWS IAM Identity Center lets you use an external identity provider like Active Directory to authenticate users, or you can create a directory in IAM Identity Center and use that to authenticate.

A

Identity federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IAM Identity Center refers to users as _____ or _____.

A

workforce users or workforce identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F: You can manage permissions for all accounts in one central repository using AWS Identity Center

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T/F: You can also use AWS Identity Center to put users into groups and assign permission sets at the group level.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ captures API calls and related events that are made by or on behalf of your AWS account, and it delivers the log files to an Amazon S3 bucket that you specify.

A

AWS CloudTrail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ captures all API calls for SageMaker except for invoking endpoints.

A

CloudTrail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ is a feature that you can use to block public access to all your objects. You can block them at the bucket or account level now, and in the future. If enabled at the bucket level, some buckets in your account might be open to the public. When enabled at the account level, no buckets, existing or new, can grant public access.

A

Amazon S3 Block Public Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

T/F: When S3 Block Public Access is enabled, it will override any public permissions granted by bucket policies or access control lists.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_____ provides three pre-configured role personas and predefined permissions for 12 ML activities. They include permissions to access other services like Amazon S3, AWS Glue, Amazon Athena, and Amazon CloudWatch.

A

SageMaker Role Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The _____ persona is for someone who needs to use SageMaker to perform general machine learning development and experimentation.

A

data scientist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The _____ persona is for someone who is managing models, pipelines, experiments, and endpoints, but doesn’t need to access the data in Amazon S3.

A

MLOps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The _____ persona is used for creating a role that SageMaker compute resources can use to perform tasks such as training and inference.

A

SageMaker compute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

T/F: All AWS services offer the ability to encrypt data at rest and in transit. By encrypting your data at rest, even if someone could access your data on a storage volume, they would not be able to read it.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____ are used together with an encryption algorithm to encrypt data before it’s written to storage.

A

Encryption keys

24
Q

Encryption can be accomplished on the _____ side where the customer encrypts the data before sending it to an AWS service. Or encryption can be accomplished on the _____side, where the AWS service encrypts the data.

A

client’s / server

25
Q

What’s the easiest way for a customer to ensure that encryption is implemented correctly and applied consistently?

A

Server-side encryption

26
Q

T/F: SageMaker will encrypt all the data on ML storage volumes, including the ones that are used by notebook instances, SageMaker jobs, and endpoints.

A

True

27
Q

Services with default encryption use keys that are owned by the _____.

A

service and not by the customer

28
Q

If you need more control of your keys, you can use the _____ for using encryption keys that belong to your account to create, manage, and use encryption keys in your AWS account.

A

AWS Key Management Service, or AWS KMS

29
Q

Using _____, you can control the use of the keys. By using policies to control which user or service can access a key, you’re adding another layer of protection to your data.

A

IAM policies

30
Q

Do S3 and SageMaker use default encryption?

A

Yes

31
Q

Use _____ keys to control the key policies and _____ for the key, the key rotation, and to enable or disable the key.

A

customer-managed/IAM policies

32
Q

All AWS service endpoints support _____to create a secure HTTPS connection to make API requests.

A

TLS

33
Q

T/F: All requests to Amazon S3 and SageMaker through the APIs and console are made over a secure encrypted connection.

A

True

34
Q

SageMaker distributed training, uses _____.

A

multiple nodes in a cluster

35
Q

T/F: By default, inter-node traffic is not encrypted.

A

True

36
Q

_____ continually evaluates your S3 buckets and automatically generates an inventory of their size and state. It includes private or public access, shared access with other AWS accounts, and the encryption status, and it also uses ML and pattern matching to identify and alert you to sensitive data, such as personal identifiable information, or PII.

A

Amazon Macie

37
Q

At what point should PII be removed from training data?

A

At the point of ingestion and transformation

38
Q

What does Amazon provide for customers to configure their own private networks on AWS?

A

VPCs

39
Q

What will happen when you create a VPC in your account and specify your VPC when launching SageMaker Studio and notebooks?

A

It will create an elastic network interface in your VPC and attach it to the notebook instance.

40
Q

How do you control which traffic can access the internet when you’ve created your own VPC?

A

by configuring security groups, network access lists, and network firewalls

41
Q

To keep all network traffic going over only a private network, you can use _____, which connect your VPC directly to AWS services by using _____.

A

VPC interface endpoints / AWS PrivateLink

42
Q

An attacker can slightly manipulate input data in a way that will cause the model to misclassify it. This is called _____.

A

Adversarial inputs

43
Q

A sophisticated attacker can cause a model’s output to infer the training data. Known as _____, the attacker keeps feeding data into the model and studying the outputs.

A

model inversion

44
Q

In this kind of attack, an attacker gives malicious instructions to the model in the prompt with the goal of influencing its output.

A

prompt injection

45
Q

To help a model avoid being tricked, you should train models with _____.

A

adversarial input

46
Q

T/F: You should keep a separate set of data for validation purposes and validate your model after each re-training before deploying.

A

True

47
Q

_____ monitors the quality of Amazon SageMaker machine learning models in production. After deploying a model into your production environment, use this to continuously monitor the quality of your models in real time. You can use this to set up an automated alert system for deviations in model quality, such as data drift or anomalies, and it also can be used for monitoring data quality by comparing the data and model with baselines to generate statistics and metrics that are visible on SageMaker Studio and also sent to Amazon CloudWatch.

A

Amazon SageMaker Model Monitor

48
Q

_____ collect files of monitoring the model status. It notifies you when the quality of your model hits preset thresholds and stores the log files to an Amazon S3 bucket you specify.

A

Amazon CloudWatch Logs

49
Q

T/F: To be able to recreate a model, all the various artifacts that went into its development must be versioned and tracked. Code repositories, such as GitHub and AWS CodeCommit automatically retain versions of source code.

A

True

50
Q

How should training data be stored?

A

in Amazon S3 and partitioned with prefixes to uniquely identify the training dataset

51
Q

T/F: SageMaker automatically uniquely identifies each training job and stores other metadata such as hyperparameters and the unique identifiers for the container dataset and model output.

A

True

52
Q

Model versions can be stored in a model catalog by using _____. It also lets you maintain the status of a model such as spending, approved, or rejected.

A

SageMaker Model Registry

53
Q

_____ can be used to to create an immutable record of intended model uses, risk ratings, training details, and evaluation results and they can also be exported to PDF and shared with relevant stakeholders.

A

Model cards

54
Q

_____ automatically creates a graphical representation of all the elements of your end-to-end machine learning workflow.

A

Amazon SageMaker ML Lineage Tracking

55
Q
A