IAM & AWS CLI Flashcards

1
Q

IAM stands for

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is IAM a global service? (Globally Resilient)

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Created automatically when creating a new AWS account

A

Root User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Has full control of the AWS Account

A

Root User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bills to the AWS account payment method as they are consumed

A

Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Best practice that adds an extra layer of protection on top of your user name and password

A

AWS Multi-Factor Authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can the root User be restricted?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can be used by AWS services or for granting external access to your account

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Objects or documents which can be used to allow or deny access to AWS services when they are ATTACHED to groups, users, or roles

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Long term credentials in AWS

A

Access Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

policy created for a single IAM identity which has a strict one-to-one relationship to its associated IAM identity. Will be automatically deleted if you delete its associated identity.

A

Inline Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used for special or exceptional allows or denies

A

Inline Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Remains unchanged even if you delete its associated IAM identity, It doesn’t have a strict one-to-one relationship to its associated IAM identity

A

Standalone Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

First priority when evaluating policy logic

A

Explicit Denies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used by an unknown number of principals on a temporary basis that represents the level of access in an AWS Account

A

IAM Role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using an external identity provider and giving the external identities roles to perform actions

A

ID Federation

17
Q

Predefined IAM Role that is linked to a specific AWS Service

A

Service-linked roles

18
Q

Max IAM users per account

A

5000

19
Q

Manage your AWS services using the command-line

A

AWS CLI

20
Q

Manage your AWS services using a programming language

A

AWS SDK

21
Q

Used to audit permissions of your account

A

IAM Credentials Report & IAM Access Advisor

22
Q

Practice of not give more permissions than a user needs

A

Principle of Least Privilege

23
Q

Short-lived access tokens that act as temporary security credentials to allow access to your AWS resources

A

AWS Security Token Service (AWS STS)

24
Q

Policies you attach to IAM Users, Groups and Roles

A

Identity-based policies

25
Q

Policies that you attach to AWS services that support this type of policy, such as Amazon S3 buckets

A

Resource-based policies

26
Q

Element of a policy that specifies which IAM identities can access that resource

A

Principal element

27
Q

Term that refers to the process where principal proves their identity

A

Authenticate

28
Q

Term to allow or deny access to resources

A

Authorize

29
Q

Used when the identity store which is currently being used is not compatible with SAML

A

Custom identity broker application + STS to obtain temporary security credentials