Security Flashcards

1
Q

AWS Firewall that let’s you monitor HTTP and HTTPS

A

AWS WAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What services can be protected by an AWS WAF

A

CloudFront
Application Load Balancer (ALB)
API Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can be tracked with AWS WAF

A

IP address request comes form
Countryh request comes form
Values in request header
Strings in request (based on regex)
Lenght of request
SQL injuection
Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 types of allowed behavior for AWS WAF

A

Allow all requests except ones you specifiy
Block all requests except the once you specify
Count number of requests based on specs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What AWS service should you use if you want to prevent certain IP addresses or countries from hitting your CloudFront distribution

A

WAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What AWS service should you use to help prevent SQL injection or cross-site scripting on your Layer 7 application

A

WAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where does CloudTrail store it’s API logs

A

S3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to monitor all API calls in your account

A

Cloudtrail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Free DDoS protection for Layer 3 and Layer 4 SYN/UDP flood and reflection attacks

A

AWS Shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

More enhanced protection for ELB, Cloudfront and Route53 with near real-time notifications of DDoS attacks

A

AWS Shield Advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How much is Shield Advanced

A

$3000 / month

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Centralized Threat detection service that uses Machine Learning to continuously look for malicious activity in your account/s and lookups on known malicious IPs.

A

AWS GuardDuty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you respond to a threat found by GuardDuty?

A

Create a Cloudwatch Event to Trigger a Lambda function that addresses a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Centralize and set and manage firewall rules across AWS Organizations

A

Firewall Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Automated Security Detection Service that assessess applications for vulnerabilities on EC2 and VPC

A

AWS Inspector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2 Types of Assessments Inspector can give you

A

Network Assessment
Host Accessment

17
Q

TRUE or FALSE Inspector Host assessments can be turned on easily in EC2 Console

A

FALSE, must install agent on EC2 unless it is an instance that allows SSM manager run command

18
Q

3 Ways to Create CMK

A

AWS creates it for you and managed in KMS

Can import Key material

Use in CloudHSM

19
Q

What Encryption service you should use if you need a dedicated and full control of hardware

A

CloudHSM

20
Q

You want to use Secrets Manager for password rotation. You turned it on but now your application is having trouble authenticating with old password what happened?

A

Secrets Manager auto rotates the secret once and you had something hard coded in your app

21
Q

How many parameters can be stored in parameter store?

A

10,000

22
Q

Supported Services for AWS Certificate Manager

A

ELB
CloudFront
API Gateway

23
Q

Continuously audit and Compliance AWS Accounts for things like HIPPA

A

AWS Audit Manager

24
Q

Downloading Compliance reports in AWS for Audits

A

AWS Artifact

25
Q

What are Cognito User Pools

A

directories of users that can sign in

26
Q

What are Cognito Identity Pools

A

give users access to certain AWS services

27
Q

Analyze Investigate and Determine Root Cause of potential security issue using Machine Learning and Graph Theory to Triage Security Findings & Threat Hunting

A

AWS Detective

28
Q

Deploying physical firewall protection across VPCs fully managed by AWS for IPS

A

AWS Network Firewall

29
Q

How to filter traffic before it get’s to your internet Gateway

A

Use AWS Network Firewall

30
Q

Single place to view all security alerts from Guard Duty, Inpector, and Macie and AWS Firewall Manager across multiple AWS Accounts

A

AWS Security Hub

31
Q

How to grant EC2 permission to an RDS database using an authentication token

A

IAM database authentication