aws 4
when creating an aws identity and access management policy, what are the 2 types of access that can be granted to a user? choose 2.
1. aws management console access 2. programmatic access
in the shared responsibility model, which of the following are examples of "security in the cloud"? choose 2.
1. encryption of data at rest and data in transit 2. security group configurations
which of the following are best practices to secure your account using aws identity and access management? choose 2.
1. managing access to aws resources 2. defining fine-grained access rights
how would a system administrator add an additional layer of login security to a user's aws management console?
enable multi-factor authentication
true or false. aws key management service (aws kms) enables you to assess, audit, and evaluate the configurations of your aws resources
false. aws kms is a service that allows you to create and manage encryption keys and control the use of encryption across a wide range of aws services and in your applications
which of the following is the responsibility of aws under the shared responsibility model?
maintaining physical hardware
in the shared responsibility model, aws is responsible for providing what?
security OF the cloud
true or false. aws organizations enables you to consolidate multiple aws accounts so that you centrally manage them
true
which of the following should be done by the aws account root user
change the aws support plan
after initial login, what does aws recommend as the best practice for the aws account root user?
delete the access keys of the aws account root user