Security Flashcards

1
Q

attack that attempts to make your website or application unavailable to your end users

A

DDoS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DDoS attack that is referred to as a SYN flood. Works on the transport layer (TCP)

A

Layer 4 DDoS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reflection attacks include things such as NTP, SSDP, DNS, CharGEN, and SNMP attacks

A

Amplification Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Occurs where a web server receives a flood of GET or POST requests usually from a botnet or large number of compromised computers

A

Layer 7 attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Enable operational and risk auditing, governance, and compliance of your AWS account. visibility into your user and resource activity

A

CloudTrail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

increases visibility into your user and resource activity by recording AWS actions and API calls

A

CloudTrail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Service that provides two levels of protection against DDoS attacks(Layer 3 and 4): Standard and Advanced

A

AWS Shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides expanded DDoS attack protection for your Amazon EC2 instances, Elastic Load Balancing load balancers, Amazon CloudFront distributions, and Amazon Route 53 hosted zones

A

AWS Shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Service that lets you monitor HTTP and HTTP requests that are forwarded to CloudFront or a Load Balancer

A

AWS WAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat detection service that uses machine learning to continuously monitor for malicious behavior

A

Amazon GuardDuty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

service automatically applies your WAF rules across your accounts and resources, even as you add new resources.

A

Firewall Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Service that uses machine learning and pattern watching to discover sensitive (PII, PHI, financial data) data stored in S3. Used for HIPAA and GDPR compliance

A

Macie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

automatically assesses applications for vulnerabilities or deviations from best practices. Used to perform vulnerability scans on both EC2 instances and VPC

A

Amazon Inspector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Detailed list of security findings prioritized by level of severity in Inspector

A

Assessment Findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Analysis to check for ports reachable from outside the VPC

A

Network Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is an inspector agent required for Network Assessments?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vulnerable software (CVE) host hardening (CIS Benchmarks), and security best practices

A

Host Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is an inspector agent required for Host Assessments

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

managed service that makes it easy for you to create and control the encryption keys used to encrypt your data

A

Key Management Service

20
Q

Provides you with centralized control of the lifecycle and permissions of your keys

A

KMS

21
Q

Key that is a logical representation of a master key. Includes metadata such as the key id creation date, description, and key state.

A

Customer master key (CMK)

22
Q

Is a physical computing device that safeguards and manages digital keys and performs encryption and decryption functions

A

Hardware security model (HSM)

23
Q

Primary way to manage access to your AWS KMS CMK is with

A

Policies

24
Q

policies attached to resources

A

resource-based policies

25
Q

Easily general and use your own encryption keys on the AWS Cloud

A

CloudHSM

26
Q

Dedicated HSM to you with full control of the underlying hardware

A

CloudHSM

27
Q

Service that securely stores, encrypts, and rotates your database credentials and other secrets

A

Secrets Manager

28
Q

Capability of AWS Systems manager that provides secure, hierarchical storage for configuration data management and secrets management

A

Parameter Store

29
Q

Used if you need more than 10,000 parameters, key rotation, or the ability to generate passwords using CloudFormation

A

Secrets Manager

30
Q

Web Address using an object owners own security credentials to grant time-limited permission to download objects from S3

A

Presigned URL

31
Q

Provide access to multiple restricted files

A

Presigned Cookies

32
Q

Service allows you to create manage and deploy public and private SSL certificates for use with other AWS services

A

Certificate Manager

33
Q

Does Certificate manager allow you to not pay for SSL certificates?

A

Yes

34
Q

Can Certificate manager automate the renewal of you SSL

A

Yes

35
Q

Service that you can continually audit your AWS usage to make sure you stay compliant

A

Audit Manager

36
Q

Automated service that produces reports specific to auditors for compliance

A

Audit Manager

37
Q

Source to get compliance-related information that matters to you. Used to download compliance reports for audits

A

AWS Artifact

38
Q

Provides authentication, authorization, and user management for your web and mobile apps in a single service

A

Cognito

39
Q

two main components of Cognito are

A

User pools and identity pools

40
Q

Directories of users that provide sign-up and sign-in options for your application users

A

User pools

41
Q

Allows you to give you users access to other AWS services

A

Identity pools

42
Q

Service to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activites

A

Detective

43
Q

Pulls data from your AWS resources and used machine learning, statistical analysis, and graph theory to build a linked set of data that enables you to quickly figure out the root cause of your security issues

A

Detective

44
Q

Used to deploy physical firewall protection across your VPCS. (Physical firewall that is managed by AWS)

A

Network Firewall

45
Q

Service that provides an intrusion prevention system (IPS)

A

Network Firewall

46
Q

Service that filters your network traffic before it reaches your internet gateway

A

Network Firewall

47
Q
A