Search Header Logo

Identity and Access Management

Authored by Antoni Tzavelas

Instructional Technology

KG

Used 76+ times

Identity and Access Management
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the greatest risk posed by using your AWS account root user for day-today operations?

There would be no easy way to control resource usage by project or class​

There would be no effective limits on the effect of an action, making it more likely for unintended and unwanted consequences to result​

Since root has full permissions over your account resources, an account compromise at the hands of hackers would be catastrophic​

It would make it difficult to track which account user is responsible for specific actions​

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following statements is a correct description of IAM policies?

The Action element refers to the way IAM will react to a request​

The * character applies an element globally—as broadly as possible​

The Resource element refers to the third-party identities that will be allowed to access the account​

The Effect element refers to the anticipated resource state after a request is granted​

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are important steps for securing IAM user accounts? (Choose two)​

Never use the account to perform any administration operations​

Enable multifactor authentication (MFA)​

Assign a long and complex password​

Delete all access keys​

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the greatest benefit of organizing your users into groups?​

It enhances security by consolidating resources​

It simplifies the management of user permissions​

It allows for quicker response times to service interruptions​

It simplifies locking down the root user​

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the function of Amazon Cognito identity pools?​

Give your application users temporary, controlled access to other services in your AWS account​

Add user sign-up and sign-in to your applications​

Incorporate encryption infrastructure into your application lifecycle​

Deliver up-to-date credentials to authenticate RDS database requests​

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

An employee with access to the root user on your AWS account has just left your company. Since you can’t be 100 percent sure that the former employee won’t try to harm your company, which of the following steps should you take? (Choose two)

Change the password and MFA settings for the root account​

Delete and re-create all existing IAM policies​

Change he passwords for all your IAM users​

Delete the former employee’s own IAM user (within the company account)​

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following elements will not play any role in crafting an IAM policy?​

Action

Region

Effect

Resource

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?