Security Flashcards

1
Q

What does AWS Shield protect

A

It protects against DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Amazon GuardDuty?

A

Amazon GuardDuty is a threat detection service that continuously monitors, analyzes, and processes AWS data sources and logs in your AWS environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is it possible to disable GuardDurty

A

Yes it’s possible to suspend and disable it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the default security policy for TLS listeners created using the AWS Management Console?

A

The ELBSecurityPolicy-TLS13-1-2-2021-06 policy, which includes TLS 1.3, and is backwards compatible with TLS 1.2, is the default security policy for TLS listeners created using the AWS Management Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the type of resource-based policy which can be attached to an IAM role?

A

The IAM service supports only one type of resource-based policy called a role trust policy, which is attached to an IAM role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AWS WAF can protect:

A
  • Amazon CloudFront
  • Amazon API Gateway
  • Application Load Balancer
  • AWS AppSync
  • Amazon Cognito user pool
  • AWS App Runner service
  • AWS Verified Access instance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is AWS Security Hub?

A

AWS Security Hub gives you a comprehensive view of your high-priority security alerts and security posture across your AWS accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AWS WAF can use criteria like the following to allow or block requests:

A
  • IP address origin of the request
  • Country of origin of the request
  • String match or regular expression (regex) match in a part of the request
  • Size of a particular part of the request
  • Detection of malicious SQL code or scripting
  • You can also test for any combination of these conditions.
  • You can block or count web requests that not only meet the specified conditions, but also exceed a specified number of requests in a single minute.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can you share a KMS key with another accounts?

A

Yes. Cross-account access is supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the KMS default rotation time

A

1 year. Can be changed to a custom value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the AWS service that provides you with a comprehensive view of your security state in AWS and helps you assess your AWS environment against security industry standards and best practices?

A

AWS Security Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the AWS service that provides collects security data across AWS accounts, AWS services, and supported third-party products and helps you analyze your security trends and identify the highest priority security issues.

A

AWS Security Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a collection of AWS Config rules and remediation actions that can be easily deployed as a single entity in an account and a Region or across an organization in AWS Organizations.

A

Conformance pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GuardDuty foundational data sources?

A
  • AWS CloudTrail management events
  • VPC Flow Logs
  • Route53 Resolver DNS query logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SCPs affect:

A
  • the member accounts in your organization
  • IAM users and roles
  • the root user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SCPs don’t affect:

A
  • resource-based policies directly.
  • any service-linked role
  • users or roles in the management account
17
Q

What is the main difference between Security Groups and Network ACL in terms of inbound/outbound rules?

A
  • Security Groups: Stateful / inbound is enough.
  • Network ACLs: Stateless / both inbound and outbound required.