AWS KMS Exam Practice Flashcards

(43 cards)

1
Q

What does AWS KMS provide?

A) Virtual servers
B) Key management and encryption
C) Database service
D) DNS hosting

A

B) Key management and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two types of keys are used in KMS?

A) Access Keys and Secret Keys
B) CMKs and Data Keys
C) RSA and ECC Keys
D) S3 Keys and IAM Keys

A

B) CMKs and Data Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a CMK used for?

A) Encrypt EC2 instances
B) Encrypt and decrypt data keys
C) Configure VPC routing
D) Monitor CloudWatch metrics

A

B) Encrypt and decrypt data keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which key encrypts your data directly in KMS?

A) Data Key
B) IAM Key
C) Access Key
D) AWS Managed Key

A

A) Data Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which CMK type uses a public/private key pair?

A) Symmetric CMK
B) Asymmetric CMK
C) AWS-managed CMK
D) Data Key

A

B) Asymmetric CMK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which key type can be used for digital signatures?

A) Symmetric CMK
B) Asymmetric CMK
C) Data Key
D) AWS-managed CMK

A

B) Asymmetric CMK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which CMK type is automatically created and managed by AWS?

A) Customer-managed CMK
B) AWS-managed CMK
C) AWS-owned CMK
D) Data Key

A

B) AWS-managed CMK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In envelope encryption, what encrypts the actual data?

A) CMK
B) Data Key
C) IAM Key
D) AWS-managed CMK

A

B) Data Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which policy is the primary mechanism to control who can use a CMK?

A) IAM policy
B) Key policy
C) Access key
D) Data Key

A

B) Key policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which KMS option is used to encrypt S3 objects?

A) SSE-S3
B) SSE-KMS
C) SSE-C
D) AES-256

A

B) SSE-KMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you enable annual key rotation?

A) Enable rotation for AWS-managed CMK
B) Enable rotation for customer-managed CMK
C) Use CloudTrail
D) Create a new Data Key

A

B) Enable rotation for customer-managed CMK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can a Lambda function get temporary access to a CMK?

A) Attach IAM policy
B) Use a KMS grant
C) Both A and B
D) Create a new CMK manually

A

C) Both A and B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens to data if its CMK is deleted?

A) Remains encrypted but accessible
B) Becomes irrecoverable
C) Automatically decrypted
D) Backed up in S3

A

B) Becomes irrecoverable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which AWS service does NOT integrate with KMS?

A) S3
B) RDS
C) Lambda
D) Route 53

A

D) Route 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For large datasets, which encryption method is recommended?

A) Direct encryption
B) Envelope encryption
C) AWS-managed encryption
D) Manual AES

A

B) Envelope encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which CMK type is automatically created and managed by AWS?

A) Customer-managed CMK
B) AWS-managed CMK
C) AWS-owned CMK
D) Data Key,B

A

B) AWS-managed CMK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which CMK type can be automatically rotated?

A) AWS-owned CMK
B) Customer-managed CMK
C) Data Key
D) Access Key

A

B) Customer-managed CMK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following controls KMS key access?

A) IAM policies
B) Key policies
C) Grants
D) All of the above

A

D) All of the above

19
Q

Which KMS encryption method is recommended for large datasets?

A) Direct Encryption
B) Envelope Encryption
C) Manual Key Management
D) Server-side encryption with AES

A

B) Envelope Encryption

20
Q

Can a CMK be used across multiple regions?

A) Yes
B) No
C) Only for S3
D) Only for Lambda

21
Q

Which service records all KMS key usage for auditing?

A) CloudWatch
B) CloudTrail
C) S3
D) Lambda

A

B) CloudTrail

22
Q

What is the minimum waiting period before a CMK can be deleted?

A) 0 days
B) 7 days
C) 30 days
D) 60 days

23
Q

What is AWS KMS?

A

AWS Key Management Service (KMS) is a managed service that makes it easy to create and control cryptographic keys used to encrypt data across AWS services and applications.

24
Q

What are the two types of keys in AWS KMS?

A

Customer Master Keys (CMKs) and Data Keys. CMKs can be customer-managed or AWS-managed.

25
What is a CMK (Customer Master Key)?
A CMK is a logical key in KMS used to encrypt and decrypt data keys and to control access to encrypted data.
26
What is a Data Key in KMS?
A Data Key is a key generated by KMS to encrypt your data directly. It can be generated in plaintext or encrypted form by a CMK.
27
What are the types of CMKs in AWS KMS?
1. AWS-managed CMKs: Automatically created and managed by AWS. 2. Customer-managed CMKs: Created, managed, and controlled by the customer. 3. AWS-owned CMKs: Used internally by AWS services; cannot be seen by customers.,
28
Can CMKs be rotated automatically?
Yes, customer-managed CMKs can have automatic key rotation enabled, typically once per year
29
What is the difference between symmetric and asymmetric CMKs?
Symmetric CMKs use a single key for encryption and decryption. Asymmetric CMKs use a key pair (public and private) for encryption/decryption or signing/verification.
30
Which KMS key type supports digital signatures?
Asymmetric CMKs.
31
What are the two main ways to use KMS for encryption?
1. Envelope Encryption: Data is encrypted with a Data Key . 2. Direct Encryption: Data is encrypted directly using a CMK (not recommended for large data)
32
What is envelope encryption?
A method where a Data Key encrypts the data and the Data Key is encrypted with a CMK. It improves performance and security.
33
Can you use KMS keys across different AWS regions?
No, CMKs are region-specific. You must create a key in each region where it is needed
34
How does KMS control access to keys?
Through IAM policies, key policies, and optionally grants for temporary permissions
35
What is the difference between an IAM policy and a KMS key policy?
IAM policy grants AWS identity permissions to perform KMS actions. Key policy is the primary mechanism for controlling who can use and manage a CMK and can override IAM permissions if strict.
36
Can KMS be integrated with AWS CloudTrail?
Yes, KMS logs all key usage through CloudTrail for auditing
37
You want to encrypt S3 objects using a KMS key you manage. Which option would you use?
SSE-KMS (Server-Side Encryption with KMS-managed keys).
38
How do you ensure a KMS key can be automatically rotated each year?
Enable automatic key rotation for the customer-managed CMK.
39
A Lambda function needs temporary access to encrypt data with a CMK. How can this be granted?
Use KMS grants or attach an IAM policy that allows the Lambda role to use the CMK.
40
Can you immediately delete a CMK in KMS?
No, KMS requires a 7–30 day pending deletion period to prevent accidental deletion
41
What happens if a CMK used to encrypt data is deleted?
Data encrypted with that key becomes irrecoverable once the CMK is fully deleted.
42
Name 3 AWS services that integrate with KMS for encryption.
Amazon S3, Amazon EBS, Amazon RDS (also Lambda, Redshift, DynamoDB, etc.),KMS
43
Which KMS encryption option is recommended for large datasets?
Envelope encryption using Data Keys and CMKs.