Security & Compliance Flashcards

1
Q

What AWS service allows you to control access to your AWS services and resources?

A

Identity and Access Management (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What AWS service helps protect your web applications against common web attacks?

A

Web Applications Firewall (WAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What AWS product provides a managed Distributed Denial of Service (DDoS) protection service?

A

Sheild

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What AWS product helps you discover and protect sensitive data?

A

Macie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What AWS product allows you to assess, audit, and evaluate the configurations of your resources?

A

Config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What AWS service provides an intelligent threat detection system that uncovers unauthorized behavior?

A

GuardDuty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What AWS service works with EC2 instances to uncover and report vulnerabilities?

A

Inspector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What AWS service offers on-demand access to AWS security and compliance reports?

A

Artifact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What AWS product helps you control user/customer access to mobile and web applications?

A

Cognito

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What AWS service allows you to generate and store encryption keys?

A

Key Management Service (KMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What AWS product provides a hardware security module used to generate encryption keys?

A

CloudHSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What AWS service allows you to manage and retrieve secrets (passwords or keys)?

A

Secrets Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What outlines your responsibilities vs AWS when it comes to security and compliance?

A

Shared Responsibility Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What describes design principles and best practices for running workloads in the cloud?

A

Well-Architected Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 6 Pillars of the Well-Architected Framework?

A

Operational Excellence, Security, Reliability, Performance Efficiency, Cost Optimization, Sustainability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of AWS Security object defines permissions that can be attached to a user or group?

A

Policy

17
Q

What type of security object is an identity you can create, has specific permissions with credentials that are valid for short durations, can be temporarily assumed by entities that you trust, and is not associated with a specific user or group?

A

Roles

18
Q

What type of security object defines an identity with long-term credentials that is used to interact with AWS in an account?

A

IAM User

19
Q

What type of security object is used to specify permissions for a collections of users?

A

User Group

20
Q

What type of security object is used to secure S3 buckets?

A

Bucket Access Policy

21
Q

What type of security object is used to protect an EC2 instance?

A

Security Group