Security and Compliance Flashcards

1
Q

Company wishes to force users to change their passwords regularly

A

Create an IAM password policy and enabled password expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Need to restrict access to a bucket based on source IP range

A

Use bucket policy with “Condition”: “NotIpAddress”: statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Need to control access to group of EC2 instances with specific tags

A

Use an IAM policy with a condition element granting access based on the tag and attach an IAM policy to the user or groups that require access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IAM policy for SQS queue allows too much access. Who is responsible for correcting the issue?

A

According the AWS shared responsibility mode, this is a customer responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data is encrypted with AWS KMS customer-managed CMKs. Need to enable rotation ensuring the data remains readable

A

Just enable key rotation in AWS KMS for the CMK (backing key is rotated, data key is not changed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Company must rotate encryption keys once a year with least effort

A

Use customer-managed CMK and enabled automatic key rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

App uses KMS CMK with imported key material and references the CMK by alias in the application. Must be rotated every 6 months

A

To rotate, create a new CMK with new imported material and update the key alias to point to new CMK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Certificate request rejected by ACM

A

Submit a request for a certificate using the correct domain name NOT the ALB FQDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security findings are missing in Amazon Inspector

A

Verify agent installed on affected instances and restart agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security team need to verify vulnerabilities and exposures are addressed for EC2 instances regularly

A

Use Amazon Inspector and perform regular assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

There may be a vulnerable version of software installed on EC2 instances and need to check

A

Create and run an Amazon Inspector assessment template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Need to use information in request header to count requests from each front-end server

A

Use a string match statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Large amount of suspicious HTTP requests hitting an ALB from various source IPs

A

Block the traffic using AWS WAF with a rate-based rule and a defined threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Many 404 errors being sent to one IP address every minute. Bot may be collecting info

A

Use AWS WAF to block the activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Website has been deployed and penetration testing shows its vulnerable to cross-site scripting

A

Use AWS WAF to mitigate cross-site scripting attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application is under repeated DDoS attacks. Need to minimize downtime and require 24/7 support

A

Setup AWS Shield Advanced

17
Q

Company needs to understand the PCI status of the AWS infrastructure

A

Use AWS Artifact to locate this information

18
Q

Company uses LDAP and needs to implement access control in AWS as part of an integration between internal and cloud

A

Need to configure SAM federation of IAM users and groups with the LDAP DB and map LDAP user and groups to IAM roles

19
Q

Permissions policy for cross-account access must be created and attached. Who is responsible for doing this?

A

According to the AWS shared responsibility model, this is a customer responsibility

20
Q

Company wishes to move from IAM user accounts to using on-premises Active Directory accounts for AWS management console access

A

Configure a VPN tunnel and use Active Directory Connector