Security & Compliance COPY 2 Flashcards

1
Q

________ works by looking for threats on your account that are associated with common techniques used by attackers.

A

GuardDuty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Modify your support plan
  • Modify email address
  • Close your account
A

What can only the root user do?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which AWS service can help you identify the network, software, and OS/system-level updates within EC2?

A

AWS ConfiG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the Shared responsibility model what are the three customer’s responsibilities regarding EC2? (3)

A
    • Patching the guest operating system
    • Security controls
    • Installed applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the Shared responsibility model what are the two of the customer’s responsibilities regarding Lamda?

A
  • Storage of sensitive data
  • IAM for permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Using ____ helps you protect your instances from unauthorized access.

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IAM credential report: Lists all users and status of passwords, access keys, and MFA device. This is best used for _______ and _______.

A

auditing and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______ ___allows you to meet corporate, and regulatory compliance requirements for data security by using dedicated hardware for security in the cloud.

A

Cloud HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______ is a central repository for compliance reports from third-party auditors who have audited AWS.

A

Artifact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In AWS ____ can be assumed by any user or service that needs them.

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
    • Use consumption-based pricing
    • Implement cloud financial management
    • Measure overall efficiency

Which pillar of the Well-Architectured framework is represented above?

A

Cost Optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_________ identifies threats by continuously monitoring network activity and account behavior within your AWS environment.

A

GuardDuty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Use Cases for Cost OptimIzation: You can use ___________ to automatically move your data between access tiers based on your usage patterns.

A

S3 Intelligent-Tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the Shared responsibility model what are the two AWS responsibilities regarding Lamda?

A
  • Operating system
  • Software dependencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Scale horizontally for resilience
  • Reduce Idle resources
  • Test Recovery Procedures

Which pillar of the Well-Architectured framework is represented above?

A

Reliability

Which tell you to Design systems that work consistently and recover quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When using CloudHSM ____ does not have access to your encryption keys

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • Enable MFA for privileged users.
  • Implement strong password policies.

Are examples of which Service best practices?

A

IAM best practices

18
Q
  • Encrypt Data in transit and at rest
  • Track who did what and when
  • Automate Security Tasks

Which pillar of the Well-Architectured framework is represented above?

A

Security tell you to focus on putting mechanisms in place that protect your systems and data you can do this by:

19
Q

___________ allows your users to sign in to your application through social media accounts like Facebook and Google.

20
Q

In AWS Users are entities you create in IAM to represent

A

the person or application needing access to your AWS resources.

21
Q

______ _______ integrates with these 3 services:

RDS
Redshift
DocumentDB

A

Secrets Manager

22
Q

____ ________ has built-in rules to access your EC2 instances to find vulnerabilities and report by the level of severity.

A

AWS Inspector

23
Q

_______ identifies malicious or unauthorized activities in your AWS account using machine learning.

24
Q

Use Cases for Security: You can use ______ to configure central logging of all actions performed in your account

A

CloudTrail

25
A _____ is a collection of IAM users that helps you apply common access controls to all group members.
Group
26
Use Cases for Reliability: You can use ______ \_\_\_\_\_\_ for enhanced availability and reliability of RDS databases.
Multi-AZ deployments
27
What are the 2 AWS responsibilities regarding EC2 instances?
- Patching the host operating system - Security of the physical server
28
Use Cases for Performance Efficiency: You can use ___ \_\_\_\_\_ to run code with zero administration.
AWS Lambda
29
\_\_\_ _________ controls access to mobile and web applications by assisting with user Sign-up and sign-in & Provides authentication and authorization
AWS Cognito
30
AWS Policies help you manage permissions for IAM users, groups, and roles by creating a policy document in ____ \_\_\_\_\_\_ and attaching it.
JSON format
31
\_\_\_ __________ is a service that checks applications for security vulnerabilities and deviations from security best practices.
AWS Inspector
32
What service helps to improve the security and compliance of applications by running automated security assessments?
Amazon Inspector
33
is a Hardware Security Module (HSM) used to generate and manage your own _____ \_\_\_\_\_\_.
CloudHSM
34
Real-world use cases for IAM: Using Roles help you avoid sharing long-term credentials
like access keys
35
From within ___ \_\_\_\_\_\_\_\_ you can review, accept, and manage agreements with AWS.
AWS Artifact
36
\_\_\_\_\_\_\_\_\_\_\_\_\_\_ involves the effective use of computing resources to meet system and business needs while removing bottlenecks.
Performance Efficiency
37
\_\_\_\_\_\_\_\_ ________ allows you to manage and retrieve secrets (passwords or keys).
Secrets Manager
38
Do not confuse security groups for EC2 with IAM groups. EC2 security groups acts as...
firewalls, while IAM groups are collections of users.
39
Operational Excellence involves Creating applications that support production workloads 3 key takeaways are
* Script Operations as Code * Plan for failure * Deploy Smaller reversible changes
40
- Create individual users instead of using root. - Use roles for Amazon EC2 instances.
IAM Best Practices
41
The 5 pillars of the Well-Architected Framework describe design principles and best practices for running workloads in the cloud. They are: C.O.R.P.S.
- Cost OptimIzation - Operational Excellence - Reliability - Performance Efficiency - Security