Key Management Service basics Flashcards

1
Q

uses hardware security modules that make it easy for you to create and control your encryption keys.

A

AWS Key Management Service or KMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is KMS a regional service?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is KMS a public service?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

most basic resource in AWS KMS

A

Customer Master Key or CMK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a 256-bit key that is used for encryption and decryption

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an RSA key pair that is used for encryption and decryption or signing and verification (but not both), or an elliptic curve (ECC) key pair that is used for signing and verification

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Do keys leave KMS?

A

No it provides FIPS 140-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

type of key designed to encrypt and decrypt data at least once or possibly multiple times

A

Data Encryption Key (DEK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AWS KMS does store, manage, or track your data keys, or perform cryptographic operations with data keys

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can KMS keys leave a region

A

No they are isolated to a region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Keys that you (customer) have full control over

A

Customer Managed Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Keys that are created, managed, and used on your behalf
by an AWS service that is integrated with KMS

A

AWS managed Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

primary way to control access to KMS keys and determine who has permission to use the KMS key and how they can use it

A

Key Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Can you use IAM policies in tandem with Key Policies

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Without permission from the key policy, IAM policies that allow permissions have no effect

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A key policy controls access only to a KMS key in the same Region. It has no effect on KMS keys in other Regions

A

True