AWS Security Clase 5

AWS Security Clase 5

Professional Development

8 Qs

quiz-placeholder

Similar activities

Topic Quiz-1 : Python Basics

Topic Quiz-1 : Python Basics

Professional Development

10 Qs

Mothers Competition

Mothers Competition

Professional Development

10 Qs

FSDA OW Sec. Amsterdam

FSDA OW Sec. Amsterdam

Professional Development

10 Qs

JavaScript Quiz

JavaScript Quiz

Professional Development

10 Qs

Quiz Game

Quiz Game

KG - Professional Development

12 Qs

Quizizz

Quizizz

Professional Development

10 Qs

Digital Technology Office 365 - 29May2020

Digital Technology Office 365 - 29May2020

University - Professional Development

13 Qs

Trg@home 1

Trg@home 1

Professional Development

10 Qs

AWS Security Clase 5

AWS Security Clase 5

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Jorge Flores

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are hosting a web site via website hosting on an S3 bucket - http://demo.s3-website-us-east-l

.amazonaws.com. You have some web pages that use Javascript that access resources in another bucket which has web site hosting also enabled. But when

users access the web pages , they are getting a blocked Javascript error. How can you rectify this?

A. Enable CORS for the bucket

B. Enable versioning for the bucket

C. Enable MFA for the bucket

D. Enable CRR for the bucket

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have a vendor that needs access to an AWS resource. You create an AWS user account. You want to restrict access to the resource using a policy for just

that user over a brief period. Which of the following would be an ideal policy to use?

A. An AWS Managed Policy

B. An Inline Policy

C. A Bucket Policy

D. A bucket ACL

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company wants to have a secure way of generating, storing and managing cryptographic exclusive access for the keys. Which of the following can be used for

this purpose?

A. Use KMS and the normal KMS encryption keys

B. Use KMS and use an external key material

C. Use S3 Server Side encryption

D. Use Cloud HSM

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Your company has an EC2 Instance that is hosted in an AWS VPC. There is a requirement to ensure that logs files from the EC2 Instance are stored accordingly.

The access should also be limited for the destination of the log files. How can this be accomplished? Choose 2 answers from the options given below. Each

answer forms part of the solution

A. Stream the log files to a separate Cloudtrail trail

B. Stream the log files to a separate Cloudwatch Log group

C. Create an 1AM policy that gives the desired level of access to the Cloudtrail trail

D. Create an 1AM policy that gives the desired level of access to the Cloudwatch Log group

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your company has defined privileged users for their AWS Account. These users are administrators for key resources defined in the company. There is now a

mandate to enhance the security

authentication for these users. How can this be accomplished?

A. Enable MFA for these user accounts

B. Enable versioning for these user accounts

C. Enable accidental deletion for these user accounts

D. Disable root access for the users

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You have a 2 tier application hosted in AWS. It consists of a web server and database server (SQL Server) hosted on separate EC2 Instances. You are devising

the security groups for these EC2 Instances. The Web tier needs to be accessed by users across the Internet. You have created a web security group(wg-123)

and database security group(db-345). Which combination of the following security group rules will allow the application to be secure and functional. Choose 2

answers from the options given below.

A. wg-123 -Allow ports 80 and 443 from 0.0.0.0/0

B. db-345 - Allow port 1433 from wg-123

C. wg-123 - Allow port 1433 from wg-123

D. db-345 -Allow ports 1433 from 0.0.0.0/0

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your IT Security department has mandated that all data on EBS volumes created for underlying EC2 Instances need to be encrypted. Which of the following can

help achieve this?

A. AWS KMS API

B. AWS Certificate Manager

C. API Gateway with STS

D. IAM Access Key

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?