Security and Compliance Flashcards
A company runs an application on a fleet of EC2 instances. The company wants to automate the traditional maintenance job of running timely assessments and checking for OS vulnerabilities. As a Cloud Practitioner, which service will you suggest for this use case?
Amazon Inspector
A company wants to have control over creating and using its own keys for encryption on AWS services. Which of the following can be used for this use-case?
customer managed key (CMK)
Which of the following AWS services has encryption enabled by default?
- AWS CloudTrail Logs
- Amazon Elastic Block Store (Amazon EBS)
- Amazon Relational Database Service (Amazon RDS)
- Amazon Elastic File System (Amazon EFS)
AWS CloudTrail Logs
A company uses reserved EC2 instances across multiple units with each unit having its own AWS account. However, some of the units under-utilize their reserved instances while other units need more reserved instances. As a Cloud Practitioner, which of the following would you recommend as the most cost-optimal solution?
Use AWS Organizations to manage AWS accounts of all units and then share the reserved EC2 instances amongst all units
A web application stores all of its data on Amazon S3 buckets. A client has mandated that data be encrypted before sending it to Amazon S3.
Which of the following is the right technique for encrypting data as needed by the customer?
Enable client-side encryption using AWS encryption SDK
AWS Web Application Firewall (WAF) offers protection from common web exploits at which layer?
Layer 7
A medical research startup wants to understand the compliance of AWS services concerning HIPAA guidelines. Which AWS service can be used to review the HIPAA compliance and governance-related documents on AWS?
AWS Artifact
Which security service of AWS is enabled for all AWS customers, by default, at no additional cost?
AWS Shield Standard
Which AWS Service can be used to mitigate a Distributed Denial of Service (DDoS) attack?
AWS Shield
Under the AWS Shared Responsibility Model, which of the following is a shared responsibility of both AWS and the customer?
Configuration Management
According to the AWS Shared Responsibility Model, which of the following are responsibilities of AWS? (Select two)
-Creating S3 bucket policies for appropriate user access
-Replacing faulty hardware of Amazon EC2 instances
- Operating the infrastructure layer, the operating system and the platform for the Amazon S3 service
- Enabling Multi Factor Authentication on AWS accounts in your organization
- Creating IAM role for accessing Amazon EC2 instances
- Replacing faulty hardware of Amazon EC2 instances
- Operating the infrastructure layer, the operating system and the platform for the Amazon S3 service
AWS Shield Advanced provides expanded DDoS attack protection for web applications running on which of the following resources? (Select two)
- Amazon API Gateway
- Amazon Route 53
- AWS CloudFormation
- AWS Global Accelerator
- AWS Elastic Beanstalk
- Amazon Route 53
- AWS Global Accelerator
Which of the following AWS services support VPC Endpoint Gateway for a private connection from a VPC? (Select two)
- Amazon Elastic Compute Cloud (Amazon EC2)
- Amazon Simple Queue Service (SQS)
- Amazon Simple Notification Service (SNS)
- Amazon Simple Storage Service (Amazon S3)
- Amazon DynamoDB
- Amazon Simple Storage Service (Amazon S3)
- Amazon DynamoDB
A cyber forensics team has detected that AWS owned IP-addresses are being used to carry out malicious attacks. As this constitutes prohibited use of AWS services, which of the following is the correct solution to address this issue?
Contact AWS Abuse Team
Which of the following is a recommended way to provide programmatic access to AWS resources?
Use Access Key ID and Secret Access Key to access AWS resources programmatically