Security Flashcards

1
Q

CLI Access

Security

A

Access AWS services by command line

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Use (3)

Security CLI Access

A
  • Automation
  • Running scripts
  • Direct resource access

Security CLI Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access keys

Security

A

Key ID and Secret key pair created for CLI Access

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SDK

Security

A

Language specific APIs for application access

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Systems supported (3)

Security SDK

A
  • Programming languages (like JS, Python, .Net)
  • Mobile SDKs
  • IoT SDKs

Security SDK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CloudShell

Security

A

Browser based shell that includes preloaded tools

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

File management

CloudShell

A

can upload, edit, and download files

CloudShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Default region

CloudShell

A

The current region you are browsing

CloudShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shared Responsibility Model

Security

A

Both AWS and Customer have security and compliance responsibilities

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Employees

AWS Responsibility

A

Access and training for Amazon employees

AWS Responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical

AWS Responsibility

A

data centers, hardware, and network

AWS Responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Updates

AWS Responsibility

A

patching of cloud infrastructure and services

AWS Responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Users (2)

Customer responsibility

A
  • Training
  • Least privilege access

Customer responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data

Customer responsibility

A

security and encryption of data and code

Customer responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Configuration

Customer responsibility

A

OS, network, and firewall

Customer responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Updates

Customer responsibility

A

patching guest OS and custom applications

Customer responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Artifact

Compliance

A

self-service access to AWS agreements and compliance reports

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

GuardDuty

Compliance

A

Monitors accounts and workloads for malicious activity

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cognito

Security

A

provides user sign-up, sign-in, and access control for custom applications

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Federation

Security

A

can federate with social and enterprise identity providers

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Network ACL

Security

A

Security controls at the subnet level in a VPC

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Traffic control

Network ACL

A

May allow or deny traffic based on conditions

Network ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Default ACL

Network ACL

A

Allow all traffic

Network ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

VPN

Security

A

Encrypted tunnel over Internet into VPC

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Endpoint options (2)

VPN

A
  • Datacenter
  • individual clients

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Service types

VPN

A

Site-to-site or client

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Shield

Security

A

Managed detection and mitigation of DDoS attacks

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Macie

Security

A

Data leakage protection powered by ML

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Data protected

Macie

A

personal information and intellectual property

Macie

30
Q

Anomaly detection

Macie

A

detects unusual activity

Macie

31
Q

Inspector

Security

A

Scans EC2 Instances for security vulnerabilities

Security

32
Q

Secrets Manager

Security

A

secure way to store credentials, API keys, tokens

Security

33
Q

Services integrated (3)

Secrets Manager

A
  • RDS
  • DynamoDB
  • Redshift

Secrets Manager

34
Q

credential management feature

Secrets Manager

A

can auto-rotate credentials

Secrets Manager

35
Q

authorization

Secrets Manager

A

provides fine-grained access controls to secrets

Secrets Manager

36
Q

Access AWS services by command line

Security

A

CLI Access

Security

37
Q
  • Automation
  • Running scripts
  • Direct resource access

Security CLI Access

A

Use (3)

Security CLI Access

38
Q

Key ID and Secret key pair created for CLI Access

Security

A

Access keys

Security

39
Q

Language specific APIs for application access

Security

A

SDK

Security

40
Q
  • Programming languages (like JS, Python, .Net)
  • Mobile SDKs
  • IoT SDKs

Security SDK

A

Systems supported (3)

Security SDK

41
Q

Browser based shell that includes preloaded tools

Security

A

CloudShell

Security

42
Q

can upload, edit, and download files

CloudShell

A

File management

CloudShell

43
Q

The current region you are browsing

CloudShell

A

Default region

CloudShell

44
Q

Both AWS and Customer have security and compliance responsibilities

Security

A

Shared Responsibility Model

Security

45
Q

Access and training for Amazon employees

AWS Responsibility

A

Employees

AWS Responsibility

46
Q

data centers, hardware, and network

AWS Responsibility

A

Physical

AWS Responsibility

47
Q

patching of cloud infrastructure and services

AWS Responsibility

A

Updates

AWS Responsibility

48
Q
  • Training
  • Least privilege access

Customer responsibility

A

Users (2)

Customer responsibility

49
Q

security and encryption of data and code

Customer responsibility

A

Data

Customer responsibility

50
Q

OS, network, and firewall

Customer responsibility

A

Configuration

Customer responsibility

51
Q

patching guest OS and custom applications

Customer responsibility

A

Updates

Customer responsibility

52
Q

self-service access to AWS agreements and compliance reports

Compliance

A

Artifact

Compliance

53
Q

Monitors accounts and workloads for malicious activity

Compliance

A

GuardDuty

Compliance

54
Q

provides user sign-up, sign-in, and access control for custom applications

Security

A

Cognito

Security

55
Q

can federate with social and enterprise identity providers

Security

A

Federation

Security

56
Q

Security controls at the subnet level in a VPC

Security

A

Network ACL

Security

57
Q

May allow or deny traffic based on conditions

Network ACL

A

Traffic control

Network ACL

58
Q

Allow all traffic

Network ACL

A

Default ACL

Network ACL

59
Q

Encrypted tunnel over Internet into VPC

Security

A

VPN

Security

60
Q
  • Datacenter
  • individual clients

VPN

A

Endpoint options (2)

VPN

61
Q
  • Site-to-site
  • client

VPN

A

Service types (2)

VPN

62
Q

Managed detection and mitigation of DDoS attacks

Security

A

Shield

Security

63
Q

Data leakage protection powered by ML

Security

A

Macie

Security

64
Q

personal information and intellectual property

Macie

A

Data protected

Macie

65
Q

detects unusual activity

Macie

A

Anomaly detection

Macie

66
Q

Scans EC2 Instances for security vulnerabilities

Security

A

Inspector

Security

67
Q

secure way to store credentials, API keys, tokens

Security

A

Secrets Manager

Security

68
Q
  • RDS
  • DynamoDB
  • Redshift

Secrets Manager

A

Services integrated (3)

Secrets Manager

69
Q

can auto-rotate credentials

Secrets Manager

A

credential management feature

Secrets Manager

70
Q

provides fine-grained access controls to secrets

Secrets Manager

A

authorization

Secrets Manager