Module 6: Security Flashcards
Are these tasks the responsibilities of customers or AWS?
- Configuring security groups on Amazon EC2 instances
- Maintaining network infrastructure
- Implementing physical security controls at data centers
- Patching software on Amazon EC2 instances
- Maintaining servers that run Amazon EC2 instances
- Setting permissions for Amazon S3 objects
- Customer
- AWS
- AWS
- Customer
- AWS
- Customer
Name the AWS service that allows you to manage access to AWS services and resources securely?
AWS Identity and Access Management (IAM)
What does IAM stand for in the context of AWS security?
A) Identity and Authorization Management
B) Internet Access Monitoring
C) Integrated Application Management
D) Identity and Access Management
D) Identity and Access Management
What is the primary purpose of AWS IAM?
A) To secure physical data centers.
B) To encrypt data in transit.
C) To manage access to AWS services and resources.
D) To monitor network traffic.
C) To manage access to AWS services and resources.
What is an IAM user in AWS IAM?
A) A user who can access the internet from within the AWS network.
B) A user with administrative access to the AWS Management Console.
C) A virtual machine instance with full access to all AWS services.
D) An entity that represents a person or service that interacts with AWS resources.
D) An entity that represents a person or service that interacts with AWS resources.
Which of the following statements about IAM policies is correct?
A) IAM policies are only used for encrypting data at rest.
B) IAM policies are applied to S3 buckets only.
C) IAM policies define permissions for users, groups, and roles.
D) IAM policies can be edited by all AWS users.
C) IAM policies define permissions for users, groups, and roles.
What is the purpose of an IAM role in AWS?
A) To restrict user access to specific IP addresses.
B) To assign administrative privileges to users.
C) To grant temporary permissions to AWS services or users.
D) To monitor network traffic for suspicious activity.
C) To grant temporary permissions to AWS services or users.
A practitioner is configuring
service control policies
(SCPs) in AWS
Organizations. Which
identities and resources can
SCPs be applied to? (Select
TWO.)
A) AWS Identity and Access Management (IAM) users
B) AWS Identity and Access Management (IAM) groups
C) An individual member account
D) AWS Identity and Access Management (IAM) roles
E) An organizational unit (OU)
C) An individual member account
E) An organizational unit (OU)
Which tasks can be
completed in AWS Artifact?
(Select TWO.)
A) Access AWS compliance reports on demand.
B) Consolidate and manage multiple AWS accounts within a
central location.
C) Create users to allow people and applications to interact with AWS services and resources.
D) Set permissions for accounts by configuring service control policies (SCPs).
E) Review, accept, and manage agreements with AWS.
A) Access AWS compliance reports on demand.
E) Review, accept, and manage agreements with AWS.
Match the AWS service to the correct description:
- Provides intelligent threat detections for AWS products and services.
- Offers encryption capabilities
- Provides protection against distributed denial of service (DDoS) attacks.
- Allows you to perform automated security assessments on your applications.
A. AWS Shield
B. AWS GuardDuty
C. Amazon Inspector
D. AWS Key Management Service (AWS KMS)
- B
- D
- A
- C
Which option describes an
AWS Identity and Access
Management (IAM) policy?
A) An authentication process that provides an extra layer of protection for an AWS account
B) A document that grants or denies permissions to AWS services and resources
C) An identity that a user can assume to gain temporary access to permissions
D) The identity that is established when a user first creates an AWS account
B) A document that grants or denies permissions to AWS services and resources
An employee requires
temporary access to create
several Amazon S3 buckets.
Which option should be
used for this task?
A) AWS account root user
B) AWS Identity and Access Management (IAM) group
C) AWS Identity and Access Management (IAM) role
D) Service control policy (SCP)
C) AWS Identity and Access Management (IAM) role
Which of the following
descriptions best describes
the concept of least
privilege?
A) Adding an AWS Identity and Access Management (IAM) user into at least one IAM group
B) Granting only the permissions that are needed to perform specific job tasks
C) Checking a packet’s permissions against an access control list
D) Performing a denial of service attack that originates from at least one device
B) Granting only the permissions that are needed to perform specific job tasks
Which service helps protect
your applications against
distributed denial of service
(DDoS) attacks?
A Amazon GuardDuty
B Amazon Inspector
C AWS Artifact
D AWS Shield
D) AWS Shield
Which task can AWS Key
Management Service (AWS
KMS) perform?
A) Configure multi-factor authentication (MFA)
B) Update the AWS account root user password
C) Create cryptographic keys
D) Assign permissions to users and groups
C) Create cryptographic keys