Security Advance Flashcards

1
Q

What is Symmetric encryption

A

Encryption key is given to end user for decryption; same key is used for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Asymmetric encryption

A

Public key is used for encryption and private key is used for decryption.data is encrypted using private key and it can only be decrypted using private key by end user.no private key is exchanged in this scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which encryption is good for local file storage encryption

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which encryption is used for file transfer

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is STS?

A

Security token service generate temporary credentials for assume role functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which is used to control who can assume the role

A

Trust policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can external Identity like Facebook access aws STS?

A

Yes as long as it is allowed in Trust policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If you role switch between AWS accounts does it use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Assume Role AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cross accounts access using role use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All identity federation access use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Do we get new temp credentials when we use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to revoke temp credentials issued by AWS STS with out affecting other users?

A

Add AWS Revoke Older Session inline policy which will deny any sessions older than now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Steganography?

A

Hiding information in image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Does permission boundary affect identity permission?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Does permission boundary affect resource policy permission?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Does permission boundary allow any access?

A

No it define max permission and identity can have. It act like a wall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What will happen to permissions which are out side of permissions boundary?

A

Permission which are outside of permissions boundary will have no effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the multiple ways we can provide cross account access to S3

A

Bucket Policy
Access control policy
Assume Role using AWS STS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If a user upload object in S3 using bucket Policy or access controller list does bucket owner have access to the s3 object?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If a user upload object in S3 using assume Role with AWS STS does bucket owner have access to the s3 object?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When we use Canonical user id?

A

When we use legacy permissions model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Can we create one access control list for all S3 object?

A

No we have to create separate ACL for every object; we can’t apply one ACL to multiple objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Can we use bucket policy to provide access to individual objects?

A

No bucket policy provide access only to buckets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Can we use ACL to provide access to s3 objects and bucket level permissions?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Can SAML 2.0 directly access AWS console & CLI?

A

No it indirectly use on premise id to access AWS console & CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which credentials can directly access AWS console & CLI?

A

Only aws credentials can do direct access with console & CLI

28
Q

All enterprise Identity provider is compatible with SAML 2.0

29
Q

If you need access with AWS do we need SAML 2.0 comparability?

30
Q

If you have more than 5000 users which Identity federation is required?

31
Q

If GOOGLE FACEBOOK OR TWITTER is not comparable with SAML 2.0 can we use it to access AWS?

32
Q

How SAML 2.0 compatible Identity federation access AWS

A

Using IAM ROLE & AWS temp credentials

33
Q

AWS temp credentials are valid upto how many hrs?

34
Q

Which service replace SAML 2.0 implementation?

35
Q

AWS SSO manages access to all AWS service and external application?

36
Q

Any non aws identity need to be SAML 2.0 comparable to access AWS?

37
Q

SAML based identify federation use aws STS?

38
Q

If identity federation user access AWS console it is authenticated by identity federation and temp credentials are provided by AWS SSO end point or SAML Endpoint

39
Q

If identity federation app access AWS api it is authenticated by identity federation and temp credentials are provided by AWS IAM end point

40
Q

SAML 2.0 is replaced with?

41
Q

What is the legacy service Used to support identify federation ?

42
Q

What is the latest service Used to support identify federation ?

43
Q

Microsoft ADFS support aws sso?

44
Q

AWS SSO is free service?

45
Q

Can we create AWS SSO access for applications?

46
Q

Cognito user pool is used for?

A

Authentication

47
Q

Cognito identity pool is Used for ?

A

Authorization

48
Q

AWS Cognito is Used for

A

Web and mobile apps

49
Q

What does Cognito user pool provide after successfull login?

50
Q

Can we use JWT TOKEN to access AWS resources?

A

Not all resources

51
Q

What does cognito identify pool provide?

A

Temp AWS credentials to access AWS resources

52
Q

Who gets guest access in conito identity pool?

A

Unauthenticated identity

53
Q

Can we use identity federation like fb to login cognito user pool?

54
Q

API GATEWAY accepts JWT?

55
Q

Can we use fb login and get access to aws resources using cognito identity pool?

56
Q

Can we use cogito user pool to get access to aws resources ?

A

No user pool is used only for authentication and identity pool is used for authorization

57
Q

What does Identity pool provide?

A

Temp credentials to access AWS resources

58
Q

Can we use AWS sso for web identification federation?

A

No AWS cognito

59
Q

Can we use AWS cognito for workplace authentication?

A

No AWS sso

60
Q

SCP is used for?

A

Restricting AWS accounts

61
Q

Where we can attach SCP?

A

Root account, Organization Unit, or individual AWS accounts

62
Q

If SCP is attached to OU does it affect all of its members accounts?

63
Q

SCP restrict management account?

64
Q

Which service is used for account permission boundary?

A

Service control policy

65
Q

Can SCP restrict Root user?

66
Q

Can we use SCP to grant permissions?

67
Q

If you need access to a service it should be allowed in?