Security and compliance Flashcards
Which of the following is an AWS Well-Architected Framework design principle related to operational excellence?
- Use serverless architectures first.
- Scale horizontally for resilience.
- Deploy smaller, reversible changes.
- Assign only the least privileges required.
Deploy smaller, reversible changes.
This is a design principle related to operational excellence. Smaller changes can easily be reverted, if necessary.
A developer doesn’t want to hardcode the database password in their application code when developing a new application. Which service will help with accessing the password without having to hardcode it?
- IAM credential report
- Secrets Manager
- Key Management Service (KMS)
- AWS Artifact
Secrets Manager
Secrets Manager allows you to manage and retrieve secrets (passwords or keys).
Which is the most efficient AWS feature that allows a company to restrict IAM users from making changes to a common administrator IAM role created in all accounts in their organization?
IAM user policy
GuardDuty IAM findings
Service control policies (SCPs)
Shield
Service control policies (SCPs)
AWS Organizations provides central governance and management for multiple accounts. Organization SCPs allow you to create permissions guardrails that apply to all accounts within a given organization. Service control policies (SCPs)
A customer has created an Administrators group in IAM containing 5 users. What does the customer attach to the group to ensure all the users have the needed administrative access?
-Service control policies (SCPs)
-IAM service role
-IAM policy
-IAM role
IAM policy
Policies can be attached to a group to ensure all users in the group have the same access. AWS even has a managed policy, Administrator Access, you can use.
What pillar of the Well-Architected Framework would include the use of information gathered through a workload process evaluation to drive adoption of new services or resources when they become available?
- Performance Efficiency
- Security
- Operational Excellence
- Reliability
Performance Efficiency
This Performance Efficiency pillar focuses on the effective use of resources to meet demand. In this pillar, you would use the information gathered through the evaluation process to actively drive adoption of new services or resources. You would also define a process to improve workload performance, and you would need to stay up-to-date on new resources and services.
A customer has noticed several of their AWS accounts were hacked and used to mine bitcoin. Who should the customer report the issue to?
- AWS Inspector
- AWS Support
- Developer Forums
- AWS Trust & Safety team
AWS Trust & Safety team
The customer should contact the AWS Trust & Safety team using the form or email.
In order to support their auditing and compliance efforts, a company needs to produce a report to audit the effects of password lifecycle requirements. How can they access a report that lists all users in their account along with the status of the various credentials?
AWS Artifact
IAM credential report
Redshift
QuickSight
IAM credential report
The IAM credential report lists all the users and the status of their various credentials, including passwords, access keys, server certificates, and MFA devices.
Under the shared responsibility model for EC2, who is responsible for patching the guest operating system?
choose 1
- The customer is responsible for patching the guest operating system.
- AWS is responsible for patching the guest operating system.
- The responsibility for patching the guest operating system is shared between the customer and AWS.
-The responsibility to patch the guest operating system is not part of the AWS shared responsibility model.
The customer is responsible for patching the guest operating system.
You are responsible for patching the guest operating system.
Which of the following acts like built-in firewalls per instance for your virtual servers?
choose 1
a. Security groups
b. Route tables
c. Availability Zones
d. Network access control lists
Security groups
Security groups act like built-in firewalls for your virtual servers — the rules you create define what is allowed to talk to your instances and how. Although network access control lists can be used to block or deny traffic, these operate at the subnet level (covering all instances in the subnet with the same ruleset), not per instance as the question specifies. Route tables tell traffic where it should go next to reach its destination, and an Availability Zone is a collection of data centers — which isn’t relevant in this question.
A huge department store sells products online and in-person. Most of their customers use credit cards instead of cash when making purchases. For security purposes, the credit card data must be encrypted at rest. Which services allow the department store to generate and store the encryption key used to secure the credit card numbers?
choose 2
a. Secrets Manager
b. CloudHSM
c. Macie
d. Key Management Service (KMS)
CloudHSM
CloudHSM is a hardware security module (HSM) used to generate and store encryption keys.
Key Management Service (KMS)
KMS allows you to generate and store encryption keys.
NO IS ———–
NO -Secrets Manager
why
Secrets Manager allows you to manage and retrieve secrets (passwords or keys).
A popular company that sells products online just experienced a distributed denial-of-service (DDoS) attack that consumed all available bandwidth on their network and didn’t allow legitimate requests to be processed. Which AWS services can the company integrate and combine going forward to prevent future attacks?
choose 4
1. Route 53
2. GuardDuty
3. Web Application Firewall (WAF)
4. CloudFront
5. AWS Shield
- Route 53
DDoS protection via Shield Advanced is supported on several services, including Route 53.
2. Web Application Firewall (WAF)
There is a rule type in WAF called a “rate-based” rule that protects you from web-layer DDoS attacks, brute-force login attempts, and bots. (Note: This requires very detailed knowledge of WAF and will probably not be on the exam, but it’s good to know just in case.)
- CloudFront
DDoS protection via Shield Advanced is supported on several services, including CloudFront.
- AWS Shield
Shield is a managed Distributed Denial of Service (DDoS) protection service. Shield Standard provides free protection against common and frequently occurring attacks. Shield Advanced provides enhanced protections and 24/7 access to AWS experts for a fee.
Which of the following are pillars found in the AWS Well-Architected Framework?
Choose2
a. Operational Excellence
b. Cost Optimization
c. Performance Optimization
d. Deploying to multiple Availability Zones
e. Encrypting data at rest
a. Operational Excellence
The Operational Excellence pillar focuses on building applications that effectively support your workloads.
b. Cost Optimization
The Cost Optimization pillar focuses on building resilient systems at the least cost.
Microsoft has announced a new patch for its operating system. For a platform-as-a-service solution, who would be responsible for applying the patch?
choose 1
a. Customer
b. Either can apply this patch.
c. AWS
d. The customer for Spot instances only.
AWS
The platform-as-a-service model removes the need for organizations to manage the underlying infrastructure (usually hardware and operating systems) and allows you to focus on the deployment and management of your applications.
A customer needs to identify vulnerabilities on their EC2 instances, such as unintended network access. Which services will provide a report of findings?
choose 1
a. Trusted Advisor
b. AWS Artifact
c. IAM credential report
d. Inspector
e. Macie
a. Trusted Advisor
Trusted Advisor is a tool that provides real-time guidance to help you provision resources following AWS best practices. It will check security groups for rules that allow unrestricted access (0.0.0.0/0) to specific ports.
IS NOT
Macie
Macie uses machine learning to discover sensitive data stored on Amazon S3.
A customer is managing multiple AWS accounts using AWS Organizations. What can the customer use to restrict the same permissions across all AWS accounts managed under AWS Organizations using minimal effort?
a. S3 bucket policy
b. IAM organization policy
c. IAM user policy
d. Service control policies
d. Service control policies
AWS Organizations provides central governance and management for multiple accounts. Organization service control policies (SCPs) allow you to create permissions guardrails that apply to all accounts within a given organization.
IS NOT —-
IAM organization policy
There is no such thing as an IAM organization policy.
Which service powers the creation of encrypted EBS volumes for Amazon EC2?
choose 1
a. CloudHSM
b.Identity and Access Management (IAM)
c. Secrets Manager
d. Key Management Service (KMS)
d. Key Management Service (KMS)
When you create an encrypted Amazon EBS volume, you’re able to specify a KMS customer master key.
IS NOT —-
a. CloudHSM
CloudHSM is a hardware security module (HSM) used to generate encryption keys. It is used for handling encryption keys in AWS, but does not work with EBS Volume Encryption
A company is configuring IAM for its new AWS account. There are 5 departments with between 5 to 10 users in each department. How can they efficiently apply access permissions for each of these departments and simplify management of these users?
a. Create an IAM group for each department. Add the department’s members to the group.
b. Create an IAM role defining the permissions needed. Create an IAM group and attach the policy to the group. Add the department’s members to the group.
c. Create policies for each department that define the permissions needed. Create an IAM group for each department and attach the policy to each group. Add each department’s members to their respective IAM group.
d. Create policies defining the permissions needed. Attach the policies to all users in each department.
c. Create policies for each department that define the permissions needed. Create an IAM group for each department and attach the policy to each group. Add each department’s members to their respective IAM group.
By creating an IAM group, all like users can be managed all at one time. Once the permissions are defined within the policy, it can be attached to the IAM group, allowing them access to the resources/services stated within the policy.
IS NOT—- B
Create an IAM role defining the permissions needed. Create an IAM group and attach the policy to the group. Add the department’s members to the group.
Policies assign permissions, not IAM roles. You can use IAM roles to delegate access to your AWS resources, but underneath an IAM role is a policy. The IAM role is not appropriate in this case, just a policy.
Which of the following AWS services can help you assess the fault tolerance of your AWS environment?
choose 1
a. AWS WAF
b. AWS Trusted Advisor
c. AWS Shield
d. AWS Inspector
b. AWS Trusted Advisor
AWS Trusted Advisor can help you assess the fault tolerance of your AWS environment. AWS Inspector can help you assess your security.
IS NOT —-D
AWS Inspector
Inspector works with EC2 instances to uncover and report vulnerabilities.
Which service might you use to provide Distributed Denial of Service (DDoS) protection to your applications running on AWS?
choose 1
a. DynamoDB
b. AWS Shield
c. AWS WAF
d.AWS Inspector
b. AWS Shield
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS.
Which policy will provide information on performing penetration testing on your EC2 instances?
choose 1
a. Customer Service Policy for Penetration Testing
b. AWS Customer Agreement
c. JSON policy
d. IAM policy
a. Customer Service Policy for Penetration Testing
AWS customers are welcome to carry out security assessments or penetration tests against their AWS infrastructure without prior approval for Amazon EC2 instances, NAT gateways, elastic load balancers, and 7 other services. Reference:
Which of the following is a design principle of the Well-Architected Framework’s reliability pillar?
choose 1
a. Scale vertically for resilience
b. Maximize utilization
c. Implement recovery procedures without testing
d. Recover from failure automatically
d. Recover from failure automatically
This is a focus of the reliability pillar. This pillar focuses on designing systems that work consistently and recover quickly.
A customer has set up an Amazon S3 bucket and wants to limit access to specific users. What is the most efficient way to do so?
a. AmazonS3FullAccess managed policy
b. IAM user policy
c. IAM role assumed by the user
d. Bucket access policy
d. Bucket access policy
You can add a bucket access policy directly to an Amazon S3 bucket to grant IAM users access permissions for the bucket and the objects in it.
A purchasing department staff member is set up as an AWS user in the company’s Procurement AWS account. At each month-end, the staff member needs access to an application running on EC2 in the company’s Accounts Payable AWS account to reconcile reports. Which of the following provides the most secure and operationally efficient way to give the staff member access to the Accounts Payable application?
choose 1
a. Configure Active Directory integration so you can federate the staff member’s access to the Accounts Payable AWS account.
b. Have the user request temporary security credentials for the application by assuming a role.
c. Create a user for the staff member in the Accounts Payable AWS account.
d. Invoke an AWS Lambda function to run the application in the Accounts Payable AWS account.
b. Have the user request temporary security credentials for the application by assuming a role.
The staff member should be given the ability to assume a role programmatically with the permissions necessary to run the Accounts Payable application.
Which policy will provide information on performing penetration testing on your EC2 instances?
choose 1
a. AWS Customer Agreement
b. JSON policy
c. Customer Service Policy for Penetration Testing
d. IAM policy
c. Customer Service Policy for Penetration Testing
AWS customers are welcome to carry out security assessments or penetration tests against their AWS infrastructure without prior approval for Amazon EC2 instances, NAT gateways, elastic load balancers, and 7 other services.
A customer needs to identify vulnerabilities on their EC2 instances, such as unintended network access. Which services will provide a report of findings?
choose 2
a. Inspector
b. Trusted Advisor
c. IAM credential report
d. AWS Artifact
e. Macie
a. Inspector
Inspector works with EC2 instances to uncover and report vulnerabilities.
b. Trusted Advisor
Trusted Advisor is a tool that provides real-time guidance to help you provision resources following AWS best practices. It will check security groups for rules that allow unrestricted access (0.0.0.0/0) to specific ports.
An IAM user with administrative access is attempting to close the AWS account. After troubleshooting, the admin user uncovers they need to sign in with root user credentials in order to perform this task. What other tasks require root user credentials?
choose 4
a. Activate IAM access to the Billing and Cost Management console
b. Changing the email address associated with the account
c. Configuring an Amazon S3 bucket to enable MFA (multi-factor authentication)
d. Modifying the support plan
e. Create a user with administrative access
A, B, C, D
What is the recommended way to give your applications running in EC2 permission to other AWS resources?
choose 1
a. Create an IAM group with appropriate permissions and assign it to the instance.
b. Create an IAM user with appropriate permissions and assign it to the instance.
c. Create an IAM role with appropriate permissions and assign it to the instance.
d. Create a root access key and use it in the application.
C. Create an IAM role with appropriate permissions and assign it to the instance.
You should use IAM roles wherever possible to enable applications running on EC2 instances to access other AWS resources. This is the most secure method to do so.
IS NOT A—-
Create an IAM group with appropriate permissions and assign it to the instance.
It is not possible to assign an IAM group or user to an instance.