Section 26: AWS Security and Encryption Flashcards

1
Q

A managed service that makes it easy for you to create and control the cryptographic keys that are used to protect your data

A

AWS Key Management Service (KMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How often do AWS Managed Keys rotate?

A

Once per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three types of KMS keys in AWS KMS?

A

AWS Managed Key
Customer Managed Keys (CMK) created in KMS
Customer Managed Keys Imported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True/False: KMS keys are global

A

False - KMS keys are scoped per region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two KMS Key Policy types?

A

Default KMS Key Policy
Custom KMS Key Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A capability of AWS Systems Manager that provides secure, hierarchical storage for configuration data management and secrets management

A

AWS Systems Manager Parameter Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AWS service that enables you to replace hardcoded credentials in your code, including passwords, with an API call to retrieve the secret programmatically

A

AWS Secrets Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AWS service that handles the complexity of creating, storing, and renewing public and private SSL/TLS X.509 certificates and keys that protect your AWS websites and applications

A

AWS Certificate Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True/False: AWS Web Application Firewall can be deployed on the following:
Network Load Balancer
API Gateway
CloudFront
AppSync GraphQL API
Cognito user Pool

A

False -
Application Load Balancer
API Gateway
CloudFront
AppSync GraphQL API
Cognito user Pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A managed DDoS protection service that safeguards applications running on AWS

A

AWS Shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security management service that allows you to centrally configure and manage firewall rules across your accounts and applications in AWS Organizations

A

AWS Firewall Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A security monitoring service that analyzes and processes data sources, such as AWS CloudTrail data events for Amazon S3 logs, CloudTrail management event logs, DNS logs, Amazon EBS volume data, Kubernetes audit logs, Amazon VPC flow logs, and RDS login activity

A

Amazon GuardDuty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A vulnerability management service that continuously scans your AWS workloads for software vulnerabilities and unintended network exposure

A

Amazon Inspector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A data security service that discovers sensitive data by using machine learning and pattern matching, provides visibility into data security risks, and enables automated protection against those risks

A

Amazon Macie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What three object types does Amazon Inspector evaluate?

A

EC2 instances, container images, and Lambda functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True/False: To enable In-flight Encryption (In-Transit Encryption), we need to have an HTTPS endpoint with an SSL certificate

A

True

17
Q

True/False: Server-Side Encryption means that the data is sent encrypted to the server.

A

False - The server encrypts the data for “data-at-rest”

18
Q

In Server-Side Encryption, where do the encryption and decryption happen?

A

Both happen on the server

19
Q

True/False: In Client-Side Encryption, the server must know our encryption scheme before we can upload the data

A

False - The server needs no information about the encryption scheme

20
Q

True/False: AWS KMS supports both symmetric and asymmetric KMS keys.

A

True

21
Q

You have a secret value that you use for encryption purposes, and you want to store and track the values of this secret over time. Which AWS service should you use?

A

SSM Parameter Store

22
Q

Your user-facing website is a high-risk target for DDoS attacks and you would like to get 24/7 support in case they happen and AWS bill reimbursement for the incurred costs during the attack. What AWS service should you use?

A

AWS Shield Advanced

23
Q

You have a website hosted on a fleet of EC2 instances fronted by an Application Load Balancer. What should you use to protect your website from common web application attacks (e.g., SQL Injection)?

A

AWS WAF

24
Q

You would like to analyze OS vulnerabilities from within EC2 instances. You need these analyses to occur weekly and provide you with concrete recommendations in case vulnerabilities are found. Which AWS service should you use?

A

AWS Inspector

25
Q

What is the most suitable AWS service for storing RDS DB passwords which also provides you automatic rotation?

A

AWS Secrets Manager

26
Q

Which AWS service allows you to centrally manage EC2 Security Groups and AWS Shield Advanced across all AWS accounts in your AWS Organization?

A

AWS Firewall Manager

27
Q

What are three AWS data sources that GuardDuty analyzes for malicious activity and unauthorized behavior?

A

AWS CloudTrail Events
Amazon VPC Flow Logs
DNS logs

28
Q

True/False: If you delete a customer master key (CMK) in AWS Key Management Service (AWS KMS), then the key is immediately lost

A

False - KMS enforces a waiting period of 7-30 days before the key is deleted

29
Q

If a company decides to stop using AWS GuardDuty, how can you ensure that all data gets deleted?

A

Disable the service in the general settings

30
Q

What resources can you protect using a Web Application Firewall (WAF)?

A

Amazon CloudFront distribution
Amazon API Gateway REST API
Application Load Balancer
AWS AppSync GraphQL API
Amazon Cognito user pool