Security Advance Flashcards

1
Q

What is Symmetric encryption

A

Encryption key is given to end user for decryption; same key is used for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Asymmetric encryption

A

Public key is used for encryption and private key is used for decryption.data is encrypted using private key and it can only be decrypted using private key by end user.no private key is exchanged in this scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which encryption is good for local file storage encryption

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which encryption is used for file transfer

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is STS?

A

Security token service generate temporary credentials for assume role functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which is used to control who can assume the role

A

Trust policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can external Identity like Facebook access aws STS?

A

Yes as long as it is allowed in Trust policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If you role switch between AWS accounts does it use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Assume Role AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cross accounts access using role use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All identity federation access use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Do we get new temp credentials when we use AWS STS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to revoke temp credentials issued by AWS STS with out affecting other users?

A

Add AWS Revoke Older Session inline policy which will deny any sessions older than now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Steganography?

A

Hiding information in image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Does permission boundary affect identity permission?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Does permission boundary affect resource policy permission?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Does permission boundary allow any access?

A

No it define max permission and identity can have. It act like a wall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What will happen to permissions which are out side of permissions boundary?

A

Permission which are outside of permissions boundary will have no effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the multiple ways we can provide cross account access to S3

A

Bucket Policy
Access control policy
Assume Role using AWS STS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If a user upload object in S3 using bucket Policy or access controller list does bucket owner have access to the s3 object?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If a user upload object in S3 using assume Role with AWS STS does bucket owner have access to the s3 object?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When we use Canonical user id?

A

When we use legacy permissions model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Can we create one access control list for all S3 object?

A

No we have to create separate ACL for every object; we can’t apply one ACL to multiple objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Can we use bucket policy to provide access to individual objects?

A

No bucket policy provide access only to buckets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Can we use ACL to provide access to s3 objects and bucket level permissions?
Yes
26
Can SAML 2.0 directly access AWS console & CLI?
No it indirectly use on premise id to access AWS console & CLI
27
Which credentials can directly access AWS console & CLI?
Only aws credentials can do direct access with console & CLI
28
All enterprise Identity provider is compatible with SAML 2.0
Yes
29
If you need access with AWS do we need SAML 2.0 comparability?
Yes
30
If you have more than 5000 users which Identity federation is required?
SAML 2.0
31
If GOOGLE FACEBOOK OR TWITTER is not comparable with SAML 2.0 can we use it to access AWS?
No
32
How SAML 2.0 compatible Identity federation access AWS
Using IAM ROLE & AWS temp credentials
33
AWS temp credentials are valid upto how many hrs?
12 Hrs
34
Which service replace SAML 2.0 implementation?
AWS SSO
35
AWS SSO manages access to all AWS service and external application?
Yes
36
Any non aws identity need to be SAML 2.0 comparable to access AWS?
Yes
37
SAML based identify federation use aws STS?
Yes
38
If identity federation user access AWS console it is authenticated by identity federation and temp credentials are provided by AWS SSO end point or SAML Endpoint
Yes
39
If identity federation app access AWS api it is authenticated by identity federation and temp credentials are provided by AWS IAM end point
Yes
40
SAML 2.0 is replaced with?
AWS SSO
41
What is the legacy service Used to support identify federation ?
SAML 2.0
42
What is the latest service Used to support identify federation ?
AWS SSO
43
Microsoft ADFS support aws sso?
Yes
44
AWS SSO is free service?
Yes
45
Can we create AWS SSO access for applications?
Yes
46
Cognito user pool is used for?
Authentication
47
Cognito identity pool is Used for ?
Authorization
48
AWS Cognito is Used for
Web and mobile apps
49
What does Cognito user pool provide after successfull login?
JWT TOKEN
50
Can we use JWT TOKEN to access AWS resources?
Not all resources
51
What does cognito identify pool provide?
Temp AWS credentials to access AWS resources
52
Who gets guest access in conito identity pool?
Unauthenticated identity
53
Can we use identity federation like fb to login cognito user pool?
Yea
54
API GATEWAY accepts JWT?
Yes
55
Can we use fb login and get access to aws resources using cognito identity pool?
Yea
56
Can we use cogito user pool to get access to aws resources ?
No user pool is used only for authentication and identity pool is used for authorization
57
What does Identity pool provide?
Temp credentials to access AWS resources
58
Can we use AWS sso for web identification federation?
No AWS cognito
59
Can we use AWS cognito for workplace authentication?
No AWS sso
60
SCP is used for?
Restricting AWS accounts
61
Where we can attach SCP?
Root account, Organization Unit, or individual AWS accounts
62
If SCP is attached to OU does it affect all of its members accounts?
Yes
63
SCP restrict management account?
No
64
Which service is used for account permission boundary?
Service control policy
65
Can SCP restrict Root user?
Yes
66
Can we use SCP to grant permissions?
No
67
If you need access to a service it should be allowed in?
SCP & IAM