Security
Which tasks can you complete in AWS Artifact? (Select TWO.) A. Access AWS compliance reports on-demand. B. Consolidate and manage multiple AWS accounts within a central location. C. Create users to enable people and applications to interact with AWS services and resources. D.Set permissions for accounts by configuring service control policies (SCPs). E. Review, accept, and manage agreements with AWS.
A. Access AWS compliance reports on-demand. E. Review, accept, and manage agreements with AWS.
Which statement best describes an IAM policy? A. An authentication process that provides an extra layer of protection for your AWS account B. A document that grants or denies permissions to AWS services and resources C. An identity that you can assume to gain temporary access to permissions D. The identity that is established when you first create an AWS account
B. A document that grants or denies permissions to AWS services and resources
Which tasks are the responsibilities of customers? (Select TWO.) A. Maintaining network infrastructure B. Patching software on Amazon EC2 instances C. Implementing physical security controls at data centers D. Setting permissions for Amazon S3 objects E. Maintaining servers that run Amazon EC2 instances
B. Patching software on Amazon EC2 instances D. Setting permissions for Amazon S3 objects
You are configuring service control policies (SCPs) in AWS Organizations. Which identities and resources can SCPs be applied to? (Select TWO.) A. IAM users B. IAM groups C. An individual member account D. IAM roles E. An organizational unit (OU)
C. An individual member account E. An organizational unit (OU)
Which task can AWS Key Management Service (AWS KMS) perform? A. Configure multi-factor authentication (MFA). B. Update the AWS account root user password. C. Create cryptographic keys. D. Assign permissions to users and groups.
C. Create cryptographic keys.
Which statement best describes the principle of least privilege? A. Adding an IAM user into at least one IAM group B. Checking a packet's permissions against an access control list C. Granting only the permissions that are needed to perform specific tasks D. Performing a denial of service attack that originates from at least one device
C. Granting only the permissions that are needed to perform specific tasks
An employee requires temporary access to create several Amazon S3 buckets. Which option would be the best choice for this task? A. AWS account root user B. IAM group C. IAM role D. Service control policy (SCP)
C. IAM role
Which service helps protect your applications against distributed denial-of-service (DDoS) attacks? A. Amazon GuardDuty B. Amazon Inspector C. AWS Artifact D. AWS Shield
D. AWS Shield