Security & Compliance COPY 2 Flashcards

1
Q

________ works by looking for threats on your account that are associated with common techniques used by attackers.

A

GuardDuty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Modify your support plan
  • Modify email address
  • Close your account
A

What can only the root user do?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which AWS service can help you identify the network, software, and OS/system-level updates within EC2?

A

AWS ConfiG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the Shared responsibility model what are the three customer’s responsibilities regarding EC2? (3)

A
    • Patching the guest operating system
    • Security controls
    • Installed applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the Shared responsibility model what are the two of the customer’s responsibilities regarding Lamda?

A
  • Storage of sensitive data
  • IAM for permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Using ____ helps you protect your instances from unauthorized access.

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IAM credential report: Lists all users and status of passwords, access keys, and MFA device. This is best used for _______ and _______.

A

auditing and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______ ___allows you to meet corporate, and regulatory compliance requirements for data security by using dedicated hardware for security in the cloud.

A

Cloud HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______ is a central repository for compliance reports from third-party auditors who have audited AWS.

A

Artifact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In AWS ____ can be assumed by any user or service that needs them.

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
    • Use consumption-based pricing
    • Implement cloud financial management
    • Measure overall efficiency

Which pillar of the Well-Architectured framework is represented above?

A

Cost Optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_________ identifies threats by continuously monitoring network activity and account behavior within your AWS environment.

A

GuardDuty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Use Cases for Cost OptimIzation: You can use ___________ to automatically move your data between access tiers based on your usage patterns.

A

S3 Intelligent-Tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the Shared responsibility model what are the two AWS responsibilities regarding Lamda?

A
  • Operating system
  • Software dependencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Scale horizontally for resilience
  • Reduce Idle resources
  • Test Recovery Procedures

Which pillar of the Well-Architectured framework is represented above?

A

Reliability

Which tell you to Design systems that work consistently and recover quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When using CloudHSM ____ does not have access to your encryption keys

A

AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • Enable MFA for privileged users.
  • Implement strong password policies.

Are examples of which Service best practices?

A

IAM best practices

18
Q
  • Encrypt Data in transit and at rest
  • Track who did what and when
  • Automate Security Tasks

Which pillar of the Well-Architectured framework is represented above?

A

Security tell you to focus on putting mechanisms in place that protect your systems and data you can do this by:

19
Q

___________ allows your users to sign in to your application through social media accounts like Facebook and Google.

A

Cognito

20
Q

In AWS Users are entities you create in IAM to represent

A

the person or application needing access to your AWS resources.

21
Q

______ _______ integrates with these 3 services:

RDS
Redshift
DocumentDB

A

Secrets Manager

22
Q

____ ________ has built-in rules to access your EC2 instances to find vulnerabilities and report by the level of severity.

A

AWS Inspector

23
Q

_______ identifies malicious or unauthorized activities in your AWS account using machine learning.

A

GuardDuty

24
Q

Use Cases for Security: You can use ______ to configure central logging of all actions performed in your account

A

CloudTrail

25
Q

A _____ is a collection of IAM users that helps you apply common access controls to all group members.

A

Group

26
Q

Use Cases for Reliability: You can use ______ ______ for enhanced availability and reliability of RDS databases.

A

Multi-AZ deployments

27
Q

What are the 2 AWS responsibilities regarding EC2 instances?

A
  • Patching the host operating system
  • Security of the physical server
28
Q

Use Cases for Performance Efficiency: You can use ___ _____ to run code with zero administration.

A

AWS Lambda

29
Q

___ _________ controls access to mobile and web applications by assisting with user Sign-up and sign-in & Provides authentication and authorization

A

AWS Cognito

30
Q

AWS Policies help you manage permissions for IAM users, groups, and roles by creating a policy document in ____ ______ and attaching it.

A

JSON format

31
Q

___ __________ is a service that checks applications for security vulnerabilities and deviations from security best practices.

A

AWS Inspector

32
Q

What service helps to improve the security and compliance of applications by running automated security assessments?

A

Amazon Inspector

33
Q

is a Hardware Security Module (HSM) used to generate and manage your own _____ ______.

A

CloudHSM

34
Q

Real-world use cases for IAM: Using Roles help you avoid sharing long-term credentials

A

like access keys

35
Q

From within ___ ________ you can review, accept, and manage agreements with AWS.

A

AWS Artifact

36
Q

______________ involves the effective use of computing resources to meet system and business needs while removing bottlenecks.

A

Performance Efficiency

37
Q

________ ________ allows you to manage and retrieve secrets (passwords or keys).

A

Secrets Manager

38
Q

Do not confuse security groups for EC2 with IAM groups. EC2 security groups acts as…

A

firewalls, while IAM groups are collections of users.

39
Q

Operational Excellence involves Creating applications that support production workloads 3 key takeaways are

A
  • Script Operations as Code
  • Plan for failure
  • Deploy Smaller reversible changes
40
Q
  • Create individual users instead of using root.
  • Use roles for Amazon EC2 instances.
A

IAM Best Practices

41
Q

The 5 pillars of the Well-Architected Framework describe design principles and best practices for running workloads in the cloud. They are:

C.O.R.P.S.

A
  • Cost OptimIzation
  • Operational Excellence
  • Reliability
  • Performance Efficiency
  • Security