IAM Flashcards
An organization is planning to create a user with IAM. They are trying to understand the limitations of IAM so that they can plan accordingly. Which of the below-mentioned statements is not true with respect to the limitations of IAM?
- One IAM user can be a part of a maximum of 5 groups
- Organization can create 100 groups per AWS account
- One AWS account can have a maximum of 5000 IAM users
- One AWS account can have 250 roles
- One IAM user can be a part of a maximum of 5 groups
You need to set up a security certificate for a cIient’s e-commerce website as it will use the HTTPS protocol. Which of the below AWS services do you need to access to manage your SSL server certificate?
A. AWS Directory Service
B. AWS Identity & Access Management
C. AWS CIoudFormation
D. Amazon Route 53
B. AWS Identity & Access Management
AWS Identity and Access Management (IAM) is a web service that enables Amazon Web Services (AWS) customers to manage users and user permissions in AWS.
All your SSL server certificates are managed by AWS Identity and Access management (IAM). Reference: http://docs.aws.amazon.com/IAM/latest/UserGuide/ManagingServerCerts.htm|
Within the IAM service a GROUP is regarded as a:
- A collection of AWS accounts
- It’s the group of EC2 machines that gain the permissions specified in the GROUP.
- There’s no GROUP in IAM, but only USERS and RESOURCES.
- A collection of users.
- A collection of users.
In an IAM Policy, what does “Version”: “2012-10-17” do?
- It is the version date the policy was last edited
- It is the version date the policy was created
- It is the version date of policy language
- This is internal use only by Amazon, and only used when a policy is made by the IAM policy generator
- It is the version date of policy language
The version statement is the version (though the version is denoted in date form) of the policy language for IAM. There are only 2 options currently, 2008-10-17 (the default) and 2012-10-17. If the version is not defined, IAM will use the 2008 version which does not include the more advanced language options such as policy variables. It is recommended to always state the latest version in your policies for all the latest features of the IAM language.
What is the default maximum number of MFA devices in use per AWS account (at the root account level)?
1
20
12
1
Which service enables AWS customers to manage users and permissions in AWS?
- AWS Access Control Service (ACS)
- AWS Identity and Access Management (IAM)
- AWS Identity Manager (AIM)
- AWS Identity and Access Management (IAM)
What does the following policy for Amazon EC2 do?
{
“Statement”:[{
“Effect”:”AI|ow”, “Action”:”ec2:Describe”, “Resource”:”” II
}
A. Allow users to use actions that start with “Describe” over all the EC2 resources.
B. Share an AMI with a partner
C. Share an AMI within the account
D. Allow a group to only be able to describe, run, stop, start, and terminate instances
A. Allow users to use actions that start with “Describe” over all the EC2 resources.
You log in to IAM on your AWS console and notice the following message. “Delete your root access keys.” Why do you think IAM is requesting this?
A. Because the root access keys will expire as soon as you log out.
B. Because the root access keys expire after 1 week.
C. Because the root access keys are the same for all users.
D. Because they provide unrestricted access to your AWS resource
D. Because they provide unrestricted access to your AWS resource
In AWS an access key is required in order to sign requests that you make using the command-line interface (CLI), using the AWS SDKs, or using direct API calls. Anyone who has the access key for your root account has unrestricted access to all the resources in your account, including billing information. One of the best ways to protect your account is to not have an access key for your root account. We recommend that unless you must have a root access key (this is very rare), that you do not generate one. Instead, AWS best practice is to create one or more AWS Identity and Access Management (IAM) users, give them the necessary permissions, and use IAM users for everyday interaction with AWS.
Reference: http://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.htmI#root-password
When you use the AWS Management Console to delete an IAM user, IAM also deletes any signing certificates and any access keys belonging to the user.
FALSE
This is configurable
TRUE
TRUE
An AWS customer is deploying an application that is composed of an AutoScaling group of EC2 Instances. The customers security policy requires that every outbound connection from these instances to any other service within the customers Virtual Private Cloud must be authenticated using a unique x.509 certificate that contains the specific instanceid. In addition an x.509 certificates must be designed by the customer’s Key management service in order to be trusted for authentication. Which of the following configurations will support these requirements?
- Configure an IAM Role that grants access to an Amazon S3 object containing a signed certificate and configure the Auto Scaling group to launch instances with this role. Have the instances bootstrap get the certificate from Amazon S3 upon first boot.
- Embed a certificate into the Amazon Machine Image that is used by the Auto Scaling group. Have the launched instances generate a certificate signature request with the instance’s assigned instance-id to the Key management service for signature.
- Configure the Auto Scaling group to send an SNS notification of the launch of a new instance to the trusted key management service. Have the Key management service generate a signed certificate and send it directly to the newly launched instance.
- Configure the launched instances to generate a new certificate upon first boot. Have the Key management service poll the AutoScaling group for associated instances and send new instances a certificate signature that contains the specific instance-id.
- Configure the Auto Scaling group to send an SNS notification of the launch of a new instance to the trusted key management service. Have the Key management service generate a signed certificate and send it directly to the newly launched instance.
What happens to the security permissions of a tenant when an IAM role is granted? (Select two)
- tenant inherits only permissions assigned to the IAM role temporarily
- add security permissions of the IAM role to existing permissions
- previous security permissions are no longer in effect
- previous security permissions are deleted unless reconfigured
- tenant inherits only read permissions assigned to the IAM role
- tenant inherits only permissions assigned to the IAM role temporarily
- previous security permissions are no longer in effect
You are setting up some IAM user policies and have also become aware that some services support resource-based permissions, which let you attach policies to the service’s resources instead of to IAM users or groups. Which of the below statements is true in regards to resource-level permissions?
A. All services support resource-level permissions for all actions.
B. Resource-level permissions are supported by Amazon CIoudFront
C. All services support resource-level permissions only for some actions.
D. Some services support resource-level permissions only for some action
D. Some services support resource-level permissions only for some action
AWS Identity and Access Management is a web service that enables Amazon Web Services (AWS) customers to manage users and user permissions in AWS. The service is targeted at organizations with multiple users or systems that use AWS products such as Amazon EC2, Amazon RDS, and the AWS Management Console. With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users can access.
In addition to supporting IAM user policies, some services support resource-based permissions, which let you attach policies to the service’s resources instead of to IAM users or groups. Resource-based permissions are supported by Amazon S3, Amazon SNS, and Amazon SQS.
The resource-level permissions service supports IAM policies in which you can specify individual resources using Amazon Resource Names (ARNs) in the poIicy’s Resource element.
Some services support resource-level permissions only for some actions.
Reference: http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_SpecificProducts.html
IAM provides several policy templates you can use to automatically assign permissions to the groups you create. The _____ policy template gives the Admins group permission to access all account resources, except your AWS account information
- Read Only Access
- Power User Access
- AWS Cloud Formation Read Only Access
- Administrator Access
- Administrator Access
When you assume an IAM role, which of the following occurs? (Select 2)
- You are granted temporary permissions based on the policy attached to the IAM Role
- You are granted admin rights for the account you assume the role in
- Permissions granted to your IAM user account are temporarily removed
- You are granted temporary permissions based on the policy attached to the IAM Role while retaining your current permissions
- You are granted temporary permissions based on the policy attached to the IAM Role
- Permissions granted to your IAM user account are temporarily removed
When you assume an IAM role, you are granted the permissions specified in that Role’s attached policies. Any current permissions granted via policy, whether attached to your IAM User Account, a Group your account is a member of, or another Role you were utilizing will be temporarily stripped away while the newly assumed Role is active. Once you return to your user account, you will lose the permissions granted by the role and your normal permissions will be restored.
Every user you create in the IAM system starts with _________.
- Partial permissions
- Full permissions
- No permissions
- No permissions
You would like to create an IAM policy that allows an action to be performed between 2am and 3am every day and deny the action outside of that time. What would be the best way for this to be accomplished?
- This can be accomplished directly within the policy condition: block by using the “TimeGreaterThan” and “TimeLessThan” condition statements
- The policy condition: block would define a range for that day using “DateGreaterThan” and “DateLessThan” statements. A lambda function would run daily to update the policy to change the date within the condition statement
- The policy condition: block would define a range for that day using “TimeGreaterThan” and “TimeLessThan” statements, and a lambda function would run daily to update the policy to change the date/time within the condition statement
- This cannot be done
- The policy condition: block would define a range for that day using “DateGreaterThan” and “DateLessThan” statements. A lambda function would run daily to update the policy to change the date within the condition statement
The answer is “The policy condition: block would define a range for that day using “DateGreaterThan” and “DateLessThan” statements. A lambda function would run daily to update the policy to change the date within the condition statement”. The condition block does not have a TimeGreaterThan or TimeLessThan statement. Only a DateGreaterThan and DateLessThan is supported. The date statement includes a time as well, but does not support a wildcard for the date. Because of this, the question at hand is not directly supported but could be accomplished with a Lambda function to modify the policy directly on a daily basis. This would restrict the actions to be THAT DAY and between the times stated. Then each day, the policy would be updated to reflect the new date.
What statement correctly describes IAM architecture?
- IAM security is unified per region and replicated based on requirements for an AWS tenant account
- IAM security is defined per region for roles only on an AWS tenant account
- IAM security is globally unified across the AWS cloud for an AWS tenant account
- IAM security is defined separately per region and cross-region security enabled for an AWS tenant account
- IAM security is globally unified across the AWS cloud for an AWS tenant account
If you are to create an IAM policy with a statement that only allows the action to take place after a certain date, what element would I need to place statements within?
- Within the Effect: element
- Within the Action: element
- Within the Condition: element
- None – You cannot do this with IAM
- Within the Condition: element
Conditions are what would restrict or allow actions within a specific timeframe
Is there a limit to the number of groups you can have?
- Yes for all users except root
- No permissions
- Yes unless special permission granted
- Yes for all users
Yes for all users
The _____ service is targeted at organizations with multiple users or systems that use AWS products such as Amazon EC2, Amazon SimpleDB, and the AWS Management Console.
- Amazon RDS instance
- AWS Integrity Management
- AWS Identity and Access Management
- Amazon EMR
- AWS Identity and Access Management
What two statements correctly describe how to add or modify IAM roles to a running EC2 instance?
- attach an IAM role to an existing EC2 instance from the EC2 console
- replace an IAM role attached to an existing EC2 instance from the EC2 console
- attach an IAM role to the user account and relaunch the EC2 instance
- add the EC2 instance to a group where the role is a member
- attach an IAM role to an existing EC2 instance from the EC2 console
- replace an IAM role attached to an existing EC2 instance from the EC2 console
A company needs to deploy services to an AWS region that they have not previously used. The company currently has an AWS Identity and Access Management (IAM) role for the Amazon EC2 instances, which permits the instance to have access to Amazon DynamoDB. The company wants their EC2 instances in the new region to have the same privileges. How should the company achieve this?
- Create a new IAM role and associated policies within the new region
- Assign the existing IAM role to the Amazon EC2 instances in the new region
- Copy the IAM role and associated policies to the new region and attach it to the instances
- Create an Amazon Machine Image (AMI) of the instance and copy it to the desired region using the AMI Copy feature
- Assign the existing IAM role to the Amazon EC2 instances in the new region
You are setting up a blog on AWS. In which of the following scenarios will you need AWS credentials? (Choose 3)
- Sign in to the AWS management console to launch an Amazon EC2 instance
- Sign in to the running instance to instance some software
- Launch an Amazon RDS instance
- Log into your blog’s content management system to write a blog post
- Post pictures to your blog on Amazon S3
- Sign in to the AWS management console to launch an Amazon EC2 instance
- Launch an Amazon RDS instance
- Post pictures to your blog on Amazon S3
Groups can’t _____.
- be nested more than 3 levels
- be nested at all
- be nested more than 4 levels
- be nested more than 2 levels
- be nested at all