Security Advance Flashcards

1
Q

What is Symmetric encryption

A

Encryption key is given to end user for decryption; same key is used for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Asymmetric encryption

A

Public key is used for encryption and private key is used for decryption.data is encrypted using private key and it can only be decrypted using private key by end user.no private key is exchanged in this scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which encryption is good for local file storage encryption

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which encryption is used for file transfer

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is STS?

A

Security token service generate temporary credentials for assume role functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which is used to control who can assume the role

A

Trust policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can external Identity like Facebook access aws STS?

A

Yes as long as it is allowed in Trust policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If you role switch between AWS accounts does it use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Assume Role AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cross accounts access using role use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All identity federation access use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Do we get new temp credentials when we use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to revoke temp credentials issued by AWS STS with out affecting other users?

A

Add AWS Revoke Older Session inline policy which will deny any sessions older than now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Steganography?

A

Hiding information in image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Does permission boundary affect identity permission?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Does permission boundary affect resource policy permission?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Does permission boundary allow any access?

A

No it define max permission and identity can have. It act like a wall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What will happen to permissions which are out side of permissions boundary?

A

Permission which are outside of permissions boundary will have no effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the multiple ways we can provide cross account access to S3

A

Bucket Policy
Access control policy
Assume Role using AWS STS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If a user upload object in S3 using bucket Policy or access controller list does bucket owner have access to the s3 object?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If a user upload object in S3 using assume Role with AWS STS does bucket owner have access to the s3 object?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When we use Canonical user id?

A

When we use legacy permissions model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Can we create one access control list for all S3 object?

A

No we have to create separate ACL for every object; we can’t apply one ACL to multiple objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Can we use bucket policy to provide access to individual objects?

A

No bucket policy provide access only to buckets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Can we use ACL to provide access to s3 objects and bucket level permissions?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Can SAML 2.0 directly access AWS console & CLI?

A

No it indirectly use on premise id to access AWS console & CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which credentials can directly access AWS console & CLI?

A

Only aws credentials can do direct access with console & CLI

28
Q

All enterprise Identity provider is compatible with SAML 2.0

A

Yes

29
Q

If you need access with AWS do we need SAML 2.0 comparability?

A

Yes

30
Q

If you have more than 5000 users which Identity federation is required?

A

SAML 2.0

31
Q

If GOOGLE FACEBOOK OR TWITTER is not comparable with SAML 2.0 can we use it to access AWS?

A

No

32
Q

How SAML 2.0 compatible Identity federation access AWS

A

Using IAM ROLE & AWS temp credentials

33
Q

AWS temp credentials are valid upto how many hrs?

A

12 Hrs

34
Q

Which service replace SAML 2.0 implementation?

A

AWS SSO

35
Q

AWS SSO manages access to all AWS service and external application?

A

Yes

36
Q

Any non aws identity need to be SAML 2.0 comparable to access AWS?

A

Yes

37
Q

SAML based identify federation use aws STS?

A

Yes

38
Q

If identity federation user access AWS console it is authenticated by identity federation and temp credentials are provided by AWS SSO end point or SAML Endpoint

A

Yes

39
Q

If identity federation app access AWS api it is authenticated by identity federation and temp credentials are provided by AWS IAM end point

A

Yes

40
Q

SAML 2.0 is replaced with?

A

AWS SSO

41
Q

What is the legacy service Used to support identify federation ?

A

SAML 2.0

42
Q

What is the latest service Used to support identify federation ?

A

AWS SSO

43
Q

Microsoft ADFS support aws sso?

A

Yes

44
Q

AWS SSO is free service?

A

Yes

45
Q

Can we create AWS SSO access for applications?

A

Yes

46
Q

Cognito user pool is used for?

A

Authentication

47
Q

Cognito identity pool is Used for ?

A

Authorization

48
Q

AWS Cognito is Used for

A

Web and mobile apps

49
Q

What does Cognito user pool provide after successfull login?

A

JWT TOKEN

50
Q

Can we use JWT TOKEN to access AWS resources?

A

Not all resources

51
Q

What does cognito identify pool provide?

A

Temp AWS credentials to access AWS resources

52
Q

Who gets guest access in conito identity pool?

A

Unauthenticated identity

53
Q

Can we use identity federation like fb to login cognito user pool?

A

Yea

54
Q

API GATEWAY accepts JWT?

A

Yes

55
Q

Can we use fb login and get access to aws resources using cognito identity pool?

A

Yea

56
Q

Can we use cogito user pool to get access to aws resources ?

A

No user pool is used only for authentication and identity pool is used for authorization

57
Q

What does Identity pool provide?

A

Temp credentials to access AWS resources

58
Q

Can we use AWS sso for web identification federation?

A

No AWS cognito

59
Q

Can we use AWS cognito for workplace authentication?

A

No AWS sso

60
Q

SCP is used for?

A

Restricting AWS accounts

61
Q

Where we can attach SCP?

A

Root account, Organization Unit, or individual AWS accounts

62
Q

If SCP is attached to OU does it affect all of its members accounts?

A

Yes

63
Q

SCP restrict management account?

A

No

64
Q

Which service is used for account permission boundary?

A

Service control policy

65
Q

Can SCP restrict Root user?

A

Yes

66
Q

Can we use SCP to grant permissions?

A

No

67
Q

If you need access to a service it should be allowed in?

A

SCP & IAM