An organization has hosted an application on the EC2 instances. There will be multiple users connecting to the instance for setup and configuration of application. The organization is planning to implement certain security best practices. Which of the below mentioned pointers will not help the organization achieve better security arrangement?
AWS Quiz - IAM_S3_EC2

Quiz
•
Other
•
Professional Development
•
Hard

Akshay Balagoni
Used 4+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Apply the latest patch of OS and always keep it updated.
Allow only IAM users to connect with the EC2 instances with their own secret access key.
Disable the password-based login for all the users. All the users should use their own keys to connect with the instance securely.
Create a procedure to revoke the access rights of the individual user when they are not required to connect to EC2 instance anymore for the purpose of application configuration.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
An organization is planning to create a user with IAM. They are trying to understand the limitations of IAM so that they can plan accordingly. Which of the below mentioned statements is not true with respect to the limitations of IAM?
One IAM user can be a part of a maximum of 5 groups
Organization can create 100 groups per AWS account
One AWS account can have a maximum of 5000 IAM users
One AWS account can have 250 roles
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
A company needs to deploy services to an AWS region which they have not previously used. The company currently has an AWS identity and Access Management (IAM) role for the Amazon EC2 instances, which permits the instance to have access to Amazon DynamoDB. The company wants their EC2 instances in the new region to have the same privileges. How should the company achieve this?
Create a new IAM role and associated policies within the new region
Assign the existing IAM role to the Amazon EC2 instances in the new region
Copy the IAM role and associated policies to the new region and attach it to the instances
Create an Amazon Machine Image (AMI) of the instance and copy it to the desired region using the AMI Copy feature
4.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Your organization is preparing for a security assessment of your use of AWS. In preparation for this assessment, which two IAM best practices should you consider implementing? Choose 2 answers
Create individual IAM users for everyone in your organization
Configure MFA on the root account and for privileged IAM users
Assign IAM users and groups configured with policies granting least privilege access
Ensure all users have been assigned and are frequently rotating a password, access ID/secret key, and X.509 certificate
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
An organization has created 50 IAM users. The organization has introduced a new policy which will change the access of an IAM user. How can the organization implement this effectively so that there is no need to apply the policy at the individual user level?
Use the IAM groups and add users as per their role to different groups and apply policy to group
The user can create a policy and apply it to multiple users in a single go with the AWS CLI
Add each user to the IAM role as per their organization role to achieve effective policy setup
Use the IAM role and implement access at the role level
6.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
When assessing an organization AWS use of AWS API access credentials which of the following three credentials should be evaluated? Choose 3 answers
Key pairs
Console passwords
Access keys
Signing certificates
Security Group memberships (required for EC2 instance access)
7.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Your organization’s security policy requires that all privileged users either use frequently rotated passwords or one-time access credentials in addition to username/password. Which two of the following options would allow an organization to enforce this policy for AWS users? Choose 2 answers
Configure multi-factor authentication for privileged IAM users
Create IAM users for privileged accounts
Implement identity federation between your organization’s Identity provider leveraging the IAM Security Token Service
Enable the IAM single-use password policy option for privileged users
Create a free account and access millions of resources
Similar Resources on Quizizz
28 questions
Quiz o Powiecie Przeworskim

Quiz
•
Professional Development
30 questions
Introduction to Cloud Computing

Quiz
•
Professional Development
27 questions
GCP - CDL

Quiz
•
Professional Development
30 questions
ET - P3

Quiz
•
Professional Development
33 questions
Google Cloud Digital

Quiz
•
Professional Development
30 questions
AZ-900 Mock Test - 15th Dec 2022

Quiz
•
Professional Development
33 questions
Intégration des connaissances UE 1.1 S1

Quiz
•
Professional Development
25 questions
Medical Gas Systems 2021 101-125

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade