Identity and Access Management

Identity and Access Management

KG

10 Qs

quiz-placeholder

Similar activities

AWS 2 Session 1 Touchpoints

AWS 2 Session 1 Touchpoints

University

10 Qs

Modulo 1 Quiz

Modulo 1 Quiz

Professional Development

6 Qs

SP15-Quiz7

SP15-Quiz7

1st Grade

10 Qs

CONTROL PANEL APPLET

CONTROL PANEL APPLET

1st Grade

15 Qs

Sec. 12: Leveraging the AWS Global Infrastructure

Sec. 12: Leveraging the AWS Global Infrastructure

University

8 Qs

Digital Citizenship

Digital Citizenship

5th - 12th Grade

15 Qs

A Fusion of MFA and Conditional Access Strategies

A Fusion of MFA and Conditional Access Strategies

Professional Development

10 Qs

Sec. 18: Account Management, Billing & Support [1/2]

Sec. 18: Account Management, Billing & Support [1/2]

University

12 Qs

Identity and Access Management

Identity and Access Management

Assessment

Quiz

Instructional Technology

KG

Hard

Created by

Antoni Tzavelas

Used 76+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the greatest risk posed by using your AWS account root user for day-today operations?

There would be no easy way to control resource usage by project or class​

There would be no effective limits on the effect of an action, making it more likely for unintended and unwanted consequences to result​

Since root has full permissions over your account resources, an account compromise at the hands of hackers would be catastrophic​

It would make it difficult to track which account user is responsible for specific actions​

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following statements is a correct description of IAM policies?

The Action element refers to the way IAM will react to a request​

The * character applies an element globally—as broadly as possible​

The Resource element refers to the third-party identities that will be allowed to access the account​

The Effect element refers to the anticipated resource state after a request is granted​

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are important steps for securing IAM user accounts? (Choose two)​

Never use the account to perform any administration operations​

Enable multifactor authentication (MFA)​

Assign a long and complex password​

Delete all access keys​

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the greatest benefit of organizing your users into groups?​

It enhances security by consolidating resources​

It simplifies the management of user permissions​

It allows for quicker response times to service interruptions​

It simplifies locking down the root user​

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the function of Amazon Cognito identity pools?​

Give your application users temporary, controlled access to other services in your AWS account​

Add user sign-up and sign-in to your applications​

Incorporate encryption infrastructure into your application lifecycle​

Deliver up-to-date credentials to authenticate RDS database requests​

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

An employee with access to the root user on your AWS account has just left your company. Since you can’t be 100 percent sure that the former employee won’t try to harm your company, which of the following steps should you take? (Choose two)

Change the password and MFA settings for the root account​

Delete and re-create all existing IAM policies​

Change he passwords for all your IAM users​

Delete the former employee’s own IAM user (within the company account)​

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following elements will not play any role in crafting an IAM policy?​

Action

Region

Effect

Resource

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?