wrong answers security Flashcards

1
Q

Does Cloudtrail show dedicated configuration changes for an AWS resource?

A

No, AWS config does. Cloudtrail focuses on recording user API activity, but AWS config focusing on reporting the report of the configuration changes themselves, and the resulting state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Does AWS config record configuration changes for AWS resources?

A

Yes (for supported resource types)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can application load balancer be used as network layer?

A

No. Application Load balancer works on only level 7 (http).

Classic Load balancer ELB works on level 4 and 7, and network load balancer works on level 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is level 4 network layer?

A

Transport, TCP, UDP, port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is level 7 network layer?

A

Application (HTTP, FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does data key caching do?

A

Avoid generating new data keys all the time, uses cache instead. Improve performance, reduce cost, and help say in service limits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Does AWS shield do packet inspection?

A

No. AWS Shield does DDoS protection. For packet inspection you need a host-based intrusion detection system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the first step after detecting a compromised EC2 instance?

A

Investigate the instance for malware, and remove any discovered malware. AWS partner products can help search for malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which can be used to check for unencrypted AWS volumes, Guard Duty, AWS Inspector, or AWS Config?

A

AWS Config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What distinguishes CloudHSM from KMS

A

CloudHSM is a set of security features, including physical security, for FIPS-140-2 level 3 security.

With KMS only level 2 is possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What service can be used to check for high security vulnerabilities on EC2?

A

AWS Inspector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can cloudwatch track S3 bucket access requests?

A

No. Use Server Access Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What service is good for ah-hoc queries of ELB access logs?

A

AWS Athena, because it supports s3 as a data source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is it possible to import a root certificate authority in AWS Certificate Manager (ACM)?

A

No, a root CA needs to be created and cannot be imported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you create a highly available certificate issuing capability?

A

Root Certificate Authorities must be created in two different regions in the AWS Certificate Manager. The two CAs operate independently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Can an ACM certificate be installed into a new Route 53 record set?

A

No. The record set is used for DNS queries, and does not terminate SSL or TLS. Certificates are used for SSL/TLS or https termination

17
Q

If you have multiple certificates from AWS, do you need to create multiple listeners for the an application load balance to use both, or can one listener use both certificates?

A

Both certificates can be installed onto one ALB listener. It is not possible to have two listeners created for the same port on one ALB.

18
Q

How is it possible to use AWS Certificate Manager (ACM) with cloudfront?

A

To use an ACM certificate with cloudfront, request or import your certificate to us-east-1

19
Q

Is it possible to prevent an administrator from granting access to restricted services by creating an IAM policy?

A

Yes. Service control policies can be applied to organizational units with multiple accounts. These policies can deny access and override account permissions.

20
Q

What is difference between GuardDuty and Inspector?

A

Inspector can assess setting and configuration for problems when you deploy, but guard duty monitors accounts, workloads, and data stored in s3 with machine learning to alert about potential threats

21
Q

Does guard duty protect from DDoS?

A

No, AWS Shield Does

22
Q

What is up with AWS WAF, AWS firewall manager, and AWS shield? Is one service more low level and one more high level?

A

AWS Web application firewall is the base tool for protection before requests are forwarded to Cloudfourt, application gateway rest apis, or ALBs, ect.

AWS firewall manager helps automate and manage AWS WAF. AWS shield adds more features ontop of WAF (dedicated support, advanced reporting)

23
Q

How are custom config rules checked, to verify a policy contains the correct denies?

A

AWS config rules can be be checked upon configuration changes, and they can also be set to poll periodically with a set frequency (1 hour, 3 hours, 6.. ect)

24
Q

What is needed to configure social IdP for a mobile app?

A

App Client ID, App Client Secret, List of scopes

this is the app authorizing with the IdP, OIDC token would be the user authenticating, not the app

25
Q

using the aws kms encrypt and aws kms decrypt commands, when does the user need to supply the –key-id for a CMK?

A

The –key-id only needs to be provided for the encrypt step. For decrypting, the key id is stored in the metadata.

However best practices reccomend specifying the key-id for both steps

26
Q

Which exists, and assists maintaining log integrity? Cloud Trail Integrity Validation, or System Manager Configuration Compliance service?

A

Cloud Trail Integrity Validation is a real feature, and can allow make it impossible to modify or forge logtrail files without detection.

The System Manager Configuration Compliance Service cannot be used as a service to monitor policies

27
Q

What is the priority order for conflictin IAM policy allows and denys?

A

Explicit Deny overrides explicit allow, which overrides implicit deny

28
Q

What is on IAM credential report?

A

the status of the users’ credentials, including passwords, access keys, MFA devices, and signing certificates

29
Q

How does one encrypt cloudtrail logs?

A

One does not need to do anything. Cloudtrail logs are encrypted by s3 server side encryption by default

30
Q

What is the policy evaluation priority for Session Policies, Resource based policies, AWS Organization Service Control Policies, and Identity based policies?

A

Explicit deny evaluated first, then implicit deny from Org SCP, then resource based policy, then identity based policy, the permission boundary, then session policy checks

31
Q

What kind of security does AWS Macie provide?

A

Macie provides data security. Personally identifiable information leaks for example.

32
Q

was does AWS System patch manager do?

A

AWS system patch manager scans patches, keeps lists of auto approved patches, and can either report on missing ones or automatically apply them

33
Q

What service helps get compliance reports, for example Payment Cart Industry reports or Service Org Control reports?

A

AWS artifact

34
Q

Guard Duty vs Macie. What is the difference

A

Guard duty might try to detect if unauthorized behavior is accessing data, but Macie will detect if sensitive data is there to begin with

35
Q

For cross account file upload, is full permissions to bucket owner granted by object ACL, or by bucket policy?

A

The object owner must provide a ACL to the bucket, that the bucket owner can use to provide accesss to other users in the account.

36
Q

Cognito User Pool vs Cognito Identity Pool? What is the difference

A

Cognito identity pool is for authorization, i.e. access control. What can a user access. Identities can be created for users with access to aws services.

User pools are for identity verification. Is the user actually the user?

37
Q

How often is AWS managed key rotated? How about CMK?

A

AWS managed key is rotated every 3 years. CMK rotation is optional, and done every 1 year if selected.