AWS Developer Dominio 2: Seguridad

AWS Developer Dominio 2: Seguridad

University

10 Qs

quiz-placeholder

Similar activities

Preparatorio AWS Certified Solutions Unidad1

Preparatorio AWS Certified Solutions Unidad1

University

14 Qs

k8s-1

k8s-1

University - Professional Development

10 Qs

AWS Exercises #1

AWS Exercises #1

University

15 Qs

Cloud QUIZ

Cloud QUIZ

University - Professional Development

12 Qs

AWS Restart CCP

AWS Restart CCP

University

11 Qs

AWS Certified Developer - Associate (DVA-C02) - Sample Questions

AWS Certified Developer - Associate (DVA-C02) - Sample Questions

University

10 Qs

CIS 533 - Week 4 Quiz

CIS 533 - Week 4 Quiz

University

10 Qs

Cloud Computing - Security and IAM service

Cloud Computing - Security and IAM service

University

10 Qs

AWS Developer Dominio 2: Seguridad

AWS Developer Dominio 2: Seguridad

Assessment

Quiz

Computers

University

Hard

Created by

Juan Cano

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which tool helps you audit an IAM policy to identify allowing and denying access to a particular resource?

IAM Policy Simulator

IAM Profile Control

IAM Control Simulator

IAM Access Simulator

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Wich element of an IAM Policy is optional, and allows to control when the included permissions are effective?

Statment ID (Sid)

ID

Action

Condition

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What is not possible way to athenticate a principal via IAM?

User name and password

Access Key

Access Key/Session Token

Service Account

4.

MULTIPLE SELECT QUESTION

1 min • 5 pts

Security and compliance is a shared responsibility between AWS and the customer. Which of the following activities are the resposibility of the customer while using AWS Cloud services? (Choose all thar apply)

To able to stop unauthorized access to the physical data center

Make sure the servers have been kept up to date

Setting up networking firewall rules

Encryption of sensitive data at rest

Management of user credentials via IAM

5.

MULTIPLE SELECT QUESTION

1 min • 5 pts

A company is using Amazon API Gateway for its REST APIs in an AWS account. The security team wants to allow only IAM users from another AWS account to access the APIs.

Which combination of actions should the security team take to satisfy these requirements? (Select TWO.)

Create an IAM permission policy and attach it to each IAM user. Set the APIs method authorization type to AWS_IAM. Use Signature Version 4 to sign the API requests.

Create an Amazon Cognito user pool and add each IAM user to the pool. Set the method authorization type for the APIs to COGNITO_USER_POOLS. Authenticate using the IAM credentials in Amazon Cognito and add the ID token to the request headers.

Create an Amazon Cognito identity pool and add each IAM user to the pool. Set the method authorization type for the APIs to COGNITO_USER_POOLS. Authenticate using the IAM credentials in Amazon Cognito and add the access token to the request headers

Create a resource policy for the APIs that allows access for each IAM user only.

Create an Amazon Cognito authorizer for the APIs that allows access for each IAM user only. Set the method authorization type for the APIs to COGNITO_USER_POOLS.

Answer explanation

A, D - A resource policy can be used to grant API access to one AWS account to users in a different AWS account using Signature Version 4 (SigV4) protocols.

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

A company is using a Redshift cluster to store their data warehouse. There is a requirement from the Internal IT Security team to encrypt data for the Redshift database. How can this be achieved?

Encrypt the EBS volumes of the underlying EC2 Instances.

Use AWS KMS Customer Default master key.

Use SSL/TLS for encrypting the data.

Use S3 Encryption.

7.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

A customer wants to create a stream of EBS Volumes in AWS. The data on the volume is required to be encrypted at rest. How can this be achieved?

Create an SSL Certificate and attach it to the EBS Volume.

Use KMS to generate encryption keys which can be used to encrypt the volume.

Use CloudFront in front of the EBS Volume to encrypt all requests.

Use EBS Snapshots to encrypt the requests.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?