9. Security Flashcards

(26 cards)

1
Q

_ is the process of verifying the identity of a user or entity through credentials like a username and password combination.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_ determines which actions users are permitted to perform in a system or application

A

Authorization

action = api call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you grant or deny permissions to an IAM user?

A

the way that you grant or deny permission is to associate what is called an IAM policy to an IAM user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

temporary (time-bound) access is provided by _ .

A

assigning an IAM role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_ centralizes identity and access management across AWS accounts and applications.

A

IAM Identity Center

It can also connect to an existing identity source and provide your workforce with single sign-on access to all your connected AWS services and accounts. This is called federated identity management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_ provides a secure way to manage, rotate, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.

A

Secrets Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which AWS service helps you you can quickly access node information, such as ID and operating system details, and automate registry edits, user management, and security patching?

A

AWS Systems Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A financial services company wants to give its accountants access to a particular Amazon S3 bucket.

Which of these IAM controls is used to define this access?
1. IAM User
2. IAM Group
3. IAM Role
4. IAM Policy

A

4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A software development team needs to centrally manage its database credentials and API keys on AWS.

Which of these services should the team choose?

A

AWS Secrets Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AWS _ protects AWS resources from the most common, frequently occurring types of DDoS attacks and is built into AWS managed services like Elastic Load Balancing, CloudFront, and Route 53 at no extra cost.

A

Shield Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

security groups and ELB are regional services (T/F)

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An online boutique has recently suffered a series of targeted distributed denial of service (DDoS) attacks. The owner wants to enhance the security of the boutique’s web application using AWS infrastructure.

Which components can the boutique use to protect the web application on AWS from DDoS attacks? (Select TWO.)
1. Auto scaling groups
2. Security groups
3. Compute instances
4. Public subnets
5. Elastic Load Balancing (ELB)

A

2, 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

new objects that are uploaded to an S3 bucket are automatically encrypted at rest. (T/F)

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

With SSL and TLS, you use _ to verify the identity and subsequently establish an encrypted network connection from one system to another

A

certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Amazon DynamoDB, server-side encryption at rest is enabled on all table data using encryption keys stored in _ .

A

AWS Key Management Service
(KMS)

KMS helps you create and manage cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In KMS, is it possible to give access of cryptographic keys created by you, to another IAM user/role?

A

Yes.
You can set specific levels of access control for your keys. For example, you can specify which IAM users and roles are able to manage keys.

17
Q

_ service is used to monitor your sensitive data at rest to make sure it’s safe. It uses machine learning (ML) and automation to discover sensitive data stored in Amazon S3

18
Q

_ centralizes the management of your SSL/TLS certificates that provide data encryption in transit.

19
Q

Which processes involve locking and unlocking data with a special key so only authorized users can access it?
1. Tokenization and masking
2. Encryption and decryption
3. Authentication and authorization
4. Hashing and salting

20
Q

A tax preparation company needs to secure sensitive customer data moving from its database to its web application on AWS.

Which of these services can help them secure the data in transit?
1. AWS KMS
2. Amazon DynamoDB
3. Amazon Macie
4. AWS Certificate Manager (ACM)

21
Q

_ runs automated security assessments against your infrastructure.

A

Amazon Inspector

It helps to check on deviations of security best practices, exposure of Amazon EC2 instances, and vulnerable software version installations.

22
Q

_ service analyzes continuous streams of your account metadata and network activity as it looks for security threats. It uses integrated threat intelligence, such as known malicious IP addresses, anomaly detection, and machine learning to identify threats more accurately.

A

Amazon GuardDuty

23
Q

_ service automatically collects log data from your AWS resources across your accounts and uses machine learning and graph analytics to build interactive visualizations of detected issues.

A

Amazon Detective

24
Q

_ service, you can quickly see your AWS security and compliance state in one comprehensive view

25
A security team at a legal firm has detected a threat to their AWS environment. To investigate the root cause over time, they need interactive visualizations of security data. Which AWS service is the BEST choice for this investigation? 1. Amazon Inspector 2. Amazon GuardDuty 3. Amazon Detective 4. AWS Security Hub
3.
26
A local government agency needs to prepare for an upcoming compliance audit. The agency needs to automatically aggregate security findings from multiple AWS services into one comprehensive view. Which of these services should the agency choose? 1. Amazon Inspector 2. Amazon GuardDuty 3. Amazon Detective 4. AWS Security Hub
4.