Lec 5: IAM Flashcards
How does virtualization contribute to the benefits of cloud computing?
A. Virtualization eliminates the need for internet connectivity.
B. Virtualization increases hardware resource costs.
C. Virtualization enables efficient utilization of physical hardware by creating multiple virtual instances on a single server.
D. Virtualization limits the scalability of cloud services.
C. Virtualization enables efficient utilization of physical hardware by creating multiple virtual instances on a single server.
What is Amazon EC2 used for in AWS?
A. Managing DNS records for domains.
B. Storing and managing relational databases.
C. Scaling compute capacity and launching virtual servers in the cloud.
D. Sending and receiving emails.
C. Scaling compute capacity and launching virtual servers in the cloud.
Which of the following is NOT correct about cloud computing?
A. On-demand self service
B. Broad network access
C. Resource pooling
D. Slow elasticity
D. Slow elasticity
Which of the following best describes ARN?
A. a unique ID for AWS S3 buckets
B. a unique ID for AWS EC2 instances
C. a unique ID for AWS IAM users
D. a unique ID for any AWS resources
D. a unique ID for any AWS resources
Which of the following is the main feature of EBS?
A. A cloud-based email service for sending and receiving messages.
B. A service for launching and managing virtual servers in the cloud.
C. A block storage service that provides persistent storage.
D. A service that manages domain names and translates them to IP addresses.
C. A block storage service that provides persistent storage.
Which of the following statements are correct in cloud computing? (Select all that apply)
A. Cloud providers allow users to pay as they go.
B. Data centers are usually distributed globally.
C. Cloud computing is built upon data centers.
D. Cooling may not be needed for data centers.
A. Cloud providers allow users to pay as they go.
B. Data centers are usually distributed globally.
C. Cloud computing is built upon data centers.
Which of the following are the main types of application architecture? (Select all that apply)
A. Monolithic architecture.
B. Client/Server architecture.
C. Three-tier architecture.
D. Cloud-based serverless architecture.
A. Monolithic architecture.
B. Client/Server architecture.
C. Three-tier architecture.
D. Cloud-based serverless architecture.
Which of the following statements are correct? (Select all that apply)
A. Page tables translate virtual memory into physical memory in modern OS.
B. When translating a 32-bit virtual address, two levels of page tables are needed.
C. Ring 0 is the least privileged and Ring 3 is the most privileged.
D. The number of processes is much smaller than the number of physical CPUs.
A. Page tables translate virtual memory into physical memory in modern OS.
B. When translating a 32-bit virtual address, two levels of page tables are needed.
1 import boto3
2 s3_resource = boto3.resource(‘s3’)
3 s3_resource.Object(‘bucket-mst’, ‘A2.txt’).copy_from(CopySource =’bucket-mst/A1.txt’)
4 s3_resource.Object(‘bucket-mst’, ‘A1.txt’).delete()
Read the python code snippet above. Explain Line 3 and Line4 and conclude what essential file operation has been performed.
Line 3 copies the object named ‘A1.txt’ from the ‘bucket-mst’ bucket to a new object named ‘A2.txt’ within the same bucket.
Line 4 deletes ‘A1.txt’ from the ‘bucket-mst’ bucket.
The operation is to rename the object from A1.txt to A2.txt.
Read query and show its table output
aws dynamodb query \
–table-name MusicAlbum \
–key-condition-expression “Artist = :A1 or Artist = :A2” \
–expression-attribute-values ‘{“:A1”:{“S”:”Tom”}, “:A2”:{“S”:”Jerry”}}’
Outputs a table with Artist and Song, with Artist=Tom or Artist=Jerry
Name 3 of the keys in a Policy. Explain their role. An example of a key is “Version” that specifies the version of the policy syntax and is normally “Version”: “2012-10-17”
Statement: represents a permission rule.
Effect: what the effect will be when a user requests the specific action—this can be eitherAlloworDeny.
Action: defines a set of resource operations a user/application is allowed (or denied) to perform.
Resource: specifies AWS resources for which a user is allowed or denied to take actions.
Amazon DynamoDB: Maximum table throughput
By default, maximum table throughput does not apply and on-demand throughput is only limited by the default DynamoDB table quotas
What is cybersecurity?
It is about the protection of digital information from unauthorised access, harm or misuse.
This is done by preserving the CIA triad of the information, i.e., Confidentiality, Integrity and Availability.
What is confidentiality?
Confidentiality: keeps sensitive information private and ensures that only authorized individuals or entities have access to it.
What is integrity?
Integrity: maintains the accuracy, consistency, and reliability of information.
What is availability?
Availability: ensures that information such as services and data are accessible and operational for authorized users.
CIA can be extended to include…
Authentication
Authorization
Non-Repudiation
What is authentication?
Authentication: verifies the identity of a user, system, or entity trying to access a resource or system.
What is authorization?
Authorization: determines what actions or resources an authenticated user or system is allowed to perform or access.
What is non-repudiation?
Non-Repudiation: prevents individuals or entities from denying their involvement in a particular digital transaction.
What is cryptography?
It is the practice and study of techniques for secure communication in the presence of adversaries or potential threats.
It is mainly about the use of mathematical algorithms to transform plain, readable data (i.e., plaintext) into an unintelligible data (i.e., ciphertext) and vise versa
Attacker exploits the insecure channel between Alice and Bob
What is Caesar cipher?
Caesar cipher: an old-fashion substitution cipher where each letter in the plaintext is shifted a certain number of positions down the alphabet.
ROT3 (letter is shifted 3 times to the right/forward)
plaintext : HELLO
ciphertext : KHOOR
H > I > J > K
L > M > N > O
What are examples of modern cryptography methods?
Symmetric key cryptography
Asymmetric key cryptography (public key cryptography)
Hash functions
What is symmetric key cryptography?
Symmetric key cryptography: the same key is used for data transformation.
The transformation involves encryption and decryption:
Encryption: takes plaintext and converts it into ciphertext
Decryption: reverses the encryption process
What are examples of symmetric key cryptography?
DES (insecure), 3DES (insecure), AES (AES-128, AES-192, AES-256)
What are applications of symmetric key cryptography?
data (file, network packets) encryption (AES-256 used by S3)