Identity and Access Management

Identity and Access Management

KG

10 Qs

quiz-placeholder

Similar activities

AWS Restart Quiz 5 armazenamento

AWS Restart Quiz 5 armazenamento

Professional Development

15 Qs

Ziyotek-Quiz-2

Ziyotek-Quiz-2

1st Grade

10 Qs

Cloud Computing Quiz

Cloud Computing Quiz

KG

15 Qs

Sec. 4: IAM & AWS CLI

Sec. 4: IAM & AWS CLI

University

10 Qs

Sec. 4: IAM - Identity and Access Management

Sec. 4: IAM - Identity and Access Management

University

9 Qs

Sec. 11: Amazon S3 Introduction

Sec. 11: Amazon S3 Introduction

University

8 Qs

Sec. 19: Advanced Identity

Sec. 19: Advanced Identity

University

5 Qs

Sec. 3: What is Cloud Computing?

Sec. 3: What is Cloud Computing?

University

13 Qs

Identity and Access Management

Identity and Access Management

Assessment

Quiz

Instructional Technology

KG

Hard

Created by

Antoni Tzavelas

Used 76+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the greatest risk posed by using your AWS account root user for day-today operations?

There would be no easy way to control resource usage by project or class​

There would be no effective limits on the effect of an action, making it more likely for unintended and unwanted consequences to result​

Since root has full permissions over your account resources, an account compromise at the hands of hackers would be catastrophic​

It would make it difficult to track which account user is responsible for specific actions​

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following statements is a correct description of IAM policies?

The Action element refers to the way IAM will react to a request​

The * character applies an element globally—as broadly as possible​

The Resource element refers to the third-party identities that will be allowed to access the account​

The Effect element refers to the anticipated resource state after a request is granted​

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are important steps for securing IAM user accounts? (Choose two)​

Never use the account to perform any administration operations​

Enable multifactor authentication (MFA)​

Assign a long and complex password​

Delete all access keys​

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the greatest benefit of organizing your users into groups?​

It enhances security by consolidating resources​

It simplifies the management of user permissions​

It allows for quicker response times to service interruptions​

It simplifies locking down the root user​

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the function of Amazon Cognito identity pools?​

Give your application users temporary, controlled access to other services in your AWS account​

Add user sign-up and sign-in to your applications​

Incorporate encryption infrastructure into your application lifecycle​

Deliver up-to-date credentials to authenticate RDS database requests​

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

An employee with access to the root user on your AWS account has just left your company. Since you can’t be 100 percent sure that the former employee won’t try to harm your company, which of the following steps should you take? (Choose two)

Change the password and MFA settings for the root account​

Delete and re-create all existing IAM policies​

Change he passwords for all your IAM users​

Delete the former employee’s own IAM user (within the company account)​

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following elements will not play any role in crafting an IAM policy?​

Action

Region

Effect

Resource

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Instructional Technology