Identity and Access Management (IAM) - Advanced Flashcards

1
Q

An account management service that enables you to consolidate multiple AWS accounts into a single unit that you create and centrally manage

A

AWS Organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of organization policy that you can use to manage permissions in your organization. This policy offers central control over the maximum available permissions for all accounts in your organization

A

Service Control Policies (SCPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True/False: Object level permission arns end with /* to represent all sub-objects.

A

True - ex: “Resource”:”arn:aws:s3:::test/*”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An advanced access management feature for using a managed policy to set the maximum permissions that an identity-based policy can grant to an IAM entity

A

Permissions boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AWS Directory Service that lets you run Microsoft Active Directory (AD) as a managed service

A

AWS Managed Microsoft AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A directory gateway with which you can redirect directory requests to your on-premises Microsoft Active Directory without caching any information in the cloud

A

Active Directory Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A standalone managed directory that is powered by a Samba 4 Active Directory Compatible Server

A

Simple Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AWS tool that orchestrates the capabilities of several other AWS services, including AWS Organizations, AWS Service Catalog, and AWS IAM Identity Center (successor to AWS Single Sign-On), to build a landing zone in less than an hour

A

AWS Control Tower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AWS Control Tower guardrail that uses SCPs to prevent accounts from doing something

A

Preventive Guardrail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AWS Control Tower guardrail that uses AWS Config to detect non-compliance

A

Detective Guardrail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What IAM condition key can use to allow API calls from a specified AWS region?

A

aws:RequestedRegion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This Resource Access Manager feature allows multiple AWS accounts to create their application resources into shared and centrally-managed Amazon Virtual Private Clouds (VPCs)

A

VPC sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Active Directory service that should be used if you only need to allow your on-premises users to log in to AWS applications and services with their Active Directory credentials

A

Active Directory (AD) Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active Directory service that allows you to run directory-aware workloads in the AWS Cloud

A

AWS Managed Microsoft Active Directory (AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The least expensive Active Directory service and your best choice if you have 5,000 or fewer users and don’t need the more advanced Microsoft Active Directory features such as trust relationships with other domains

A

Simple Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True/False: A Service control policy must explicitly allow an action in order for it to be performed by an IAM user under that policy

A

True

17
Q

AWS Organizations feature that allows you to share resources across your AWS accounts, within your organization or organizational units (OUs), and with IAM roles and users for supported resource types

A

AWS Resource Access Manager

18
Q

Which is the only resource-based policy that the IAM service supports?

A

Role Trust Policy

19
Q

An IAM policy that defines which principal entities (accounts, users, roles, and federated users) can assume a role

A

Role Trust Policy