Security and Compliance Flashcards

1
Q

What framework specified requirements for establishing implementing operating monitoring reviewing maintaining and improving a documented information security management system

A

ISO 27001:2005

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What framework is government wide program that provides a standardized approach to security assessment authorization and continuous monitoring for cloud services

A

Fed ramp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What framework has the goal of the level to make it easier for people keep health insurance protect confidentiality and security of health information

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What framework is focused on critical infrastructure cyber security

A

NIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What framework is a widely accepted set of policies to optimize the scrutiny of card transactions

A

PCI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What AWS service protects against DDOS attacks

A

AWS shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What technologies mitigate a DDOS attack?

A
ELB
Route53
Cloudfront
wAF
Auto scaling
Cloudwatch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Do you need to request pen test authorization if you plan on using a pen testing product from the AWS marketplace?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What tools can you use to create custom policies?

A

JSON

Visual editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When can you attach roles to EC2 instances?

A

Anytime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When does a policy change take effect when made

A

Immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you enable MFA

A

CLI

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What service enables you to enforce MFA at the command line?

A

STS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What service allow temporary access to AWS resources?

A

STS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are three STS sources

A

Federation AD
Federation mobile apps
Cross account access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four logging services in AWS?

A

Cloudtrail
Config
Cloudwatch logs
VPC flow logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What logging service tracks API calls?

A

Cloudtrail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What log service track all configure changes?

A

AWS config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What log service tracks network traffic?

A

VPC flow logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Who can access AWS hypervisors?

A

AWS administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Do you need to scrub you EC2 instances before dcom?

A

No AWS will scrub post dcom and reallocation

22
Q

Can you deploy a Linux system with HVM?

A

No. Windows only.

23
Q

How is PV configured?

A

Hardware in ring 0

Guest in layer 1 and apps in layer 3

24
Q

Can AWS staff access you EC2 instance?

A

No

25
Q

You need to deploy an instance and ensure sockets, cored and host is is visible. As well as the affinity between host and instance. The instance placement must be targeted

A

Dedicated hosts

26
Q

Your software is server bound. What AWS option can fulfill this need?

A

Dedicated hosts

27
Q

Your administrator discovered a bug and you need to change a setting in thousands of instances

A

Ensure instances are tagged
Specify tag in run command
Ensure instances have a system manager role assigned

28
Q

Can you use SSM with on prem?

A

Yes, you will need to install SSM agent

29
Q

What service allows you to store information such as users, passwords, license keys to pass to a bootstrap script?

A

System manager parameter store

30
Q

T or F

System manger parameter store forces you to store values as encrypted?

A

False

You can use plain text also

31
Q

What is a S3 pre-signed URL?

A

T

32
Q

What is the command to created an S3 pre-signed URL from the CLI? Also ensure it expires in 300 seconds

A

aws s3 presign S3://bucket name/file name —expires-in 300

33
Q

What is the default length of time presigned urls exist for?

A

1 hour

34
Q

What are two key AWS S3 config rules

A

Bucket write prohibited

Bucket read prohibited

35
Q

What service does AWS inspector provide

A

Security assessment to improve security and compliance

36
Q

Your manager has asked for detailed list of security issues prioritized by severity and put into a report

A

Use AWS inspector

37
Q

Your manager has asked you to review the AWS infrastructure to identify ways to reduce cost, increase performance and improve security. What service should you use?

A

Trusted advisor

38
Q

What subscription do you need to unlock all trusted advisor recommendations?

A

Business or enterprise

39
Q

What are the 4 AWS inspector rules packages?

A

Common vuln
CIS operating system sec config bench
Sec BP
Runtime behaviour analysis

40
Q

What are the 4 things trusted advisor will check?

A

Cost optimization
Availability
performance
Security

41
Q

Sec groups are state full what does that mean?

A

If you open an inbound port the outbound port is also opened

42
Q

What port does SQL use

A

1433

43
Q

What port does http use?

A

80

44
Q

What port does ssh use

A

22

45
Q

You want to know you keeps provisioning instances in a large env when you have hundreds of developers with access?

A

Cloudtrail stores logs in S3, use Athena to grep out

46
Q

You are being audited and it has been requested you provide all the AWS compliance docs. How can you gather all these?

A

AWS artifact

47
Q

What is cloudHSM?

A

Cloud based hardware security module

48
Q

What is the difference between KMA and cloudHSM?

A

KMS is shared tenancy

CloudHSM provides isolated hardware to store and provides FIPS

49
Q

What services can be encrypted instantly

A

S3

50
Q

What services would require a migration to occur to facilitate a requirement to encrypt existing data

A

DynamoDB
RDS
EFS
EBS