AWS-Module 4-Knowledge Check

Ace your homework & exams now with Quizwiz!

In the shared responsibility model, which of the following are examples of "security in the cloud?" (Choose two). Compliance with compute security standards and regulation. Physical security of the facilities in which the services operate. Security group configurations. Encryption of data at rest and data in transit. Protecting the global infrastructure.

Security group configurations. Encryption of data at rest and data in transit.

In the shared responsibility model, AWS is responsible for providing what? (Select the best answer). Security of the cloud. Security to the cloud. Security for the cloud. Security in the cloud.

Security of the cloud.

Which of the following should be done by the AWS account root user? (Select the best answer). Secure access for applications. Integrate with other AWS services. Change granular permissions. Change the AWS support plan.

Change the AWS support plan.

After initial login, what does AWS recommend as the best practice for the AWS account root user? Delete the AWS account root user. Revoke all permissions on the AWS account root user. Restrict permission on the AWS account root user. Delete the access keys of the AWS account root user.

Delete the access keys of the AWS account root user.

How would a system administrator add an additional layer of login security to a user's AWS management console? Use Amazon Cloud Directory. Audit AWS Identity and Access Management (IAM) roles. Enable multi-factor authentication. Enable AWS CloudTrail.

Enable multi-factor authentication.

True or false? AWS key management service (AWS KMS) enables you to assess, audit, and evaluate the configurations of your AWS resources. True. False.

False. *AWS KMS is a service that allows you to create and manage encryption keys and control the use of encryption across a wide range of AWS services and in your applications.

Which of the following is the responsibility of AWS under the AWS shared responsibility model? (Select the best answer). Configuring third party applications. Maintaining physical hardware. Security application access and data. Managing custom Amazon machine images (AMI's).

Maintaining physical hardware.

Which of the following are best practices to secure your account using aws identity and access management? (Choose 2). Provide users with default administrative privileges. Leave unused and unnecessary users and credentials in place. Manage access to AWS resources. Avoid using IAM groups to grant the same access permissions to multiple users. Define fine-grained access rights.

Manage access to AWS resources. Define fine-grained access rights.

When creating an AWS Identity and Access Management (IAM) policy, what are the two types of access that can be granted to a user? (Choose two). Institutuional Access. Authorized Access. Programmatic Access. AWS Management Console Access. Administrative Root Access.

Programmatic Access. AWS Management Console Access.

True or false? AWS organizations enables you to consolidate multiple aws accounts so that you centrally manage them. True. False.

True.


Related study sets

25: The child with renal dysfunction

View Set

AP Biology: Final Exam Review (Unit One)

View Set

Highlighting Performance Q&A (Weave and Slice Quadrant)

View Set

Exam: 06.03 Graphing Systems of Linear Equations

View Set

APES - Unit 5 Part 2 Study Guide

View Set

Chapter 58 - Drugs Affecting Gastrointestinal Mobility

View Set