
IAM-AWS
Authored by Hemamthakumar J N
English
Professional Development
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You're trying to create a custom IAM policy to more closely manage access to components in your application stack. Which of the following syntax‐related statements is a correct description of IAM policies?
The Action element refers to the way IAM will react to a request.
The * character applies an element globally—as broadly as possible.
The Resource element refers to the third‐party identities that will be allowed to access the account.
The Effect element refers to the anticipated resource state after a request is granted.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What happens if you delete an IAM role that is associated with a running EC2 instance?
Any application running on the instance that is using the role will be denied access immediately.
The application continues to use that role until the EC2 server is shut down.
The application will have the access until the session is alive.
The application will continue to have access.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is the greatest risk posed by using your AWS account root user for day‐to‐day operations?
There would be no easy way to control resource usage by project or class.
There would be no effective limits on the effect of an action, making it more likely for unintended and unwanted consequences to result.
Since root has full permissions over your account resources, an account compromise at the hands of hackers would be catastrophic.
It would make it difficult to track which account user is responsible for specific actions.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
One of the vendors working with your organization wants to have access to your AWS resources to perform operations. As a security architect, what would be your recommended approach?
Create an Admin IAM account for them and provide them with credentials
Share your Access Key with the vendor
Build an IAM policy for your vendor
Create an IAM role and map it to your vendor AWS Account
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A developer in your team needs to access S3 bucket. As an IAM administrator, what would be your recommended approach?
Grant permission to the developers to access IAM account
Attach S3 Full access policy to developer IAM account
Create a Customer managed policy for the S3 bucket. Attach the policy to IAM account
Attach S3 Full access AWS managed policy to the Developer Group
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
As a IAM administrator, you have created a custom policy to give permission to access production account. After some time, you have updated the policy to add more permissions which have an unintended effect. The business has requested to roll it back. What is the best option you can use?
The policy cannot be rolled back, you need to rewrite the policy
Set the default version of customer managed policy to the older version
Delete the update to the policy, this will revert the permissions
Use an AWS-managed policy
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A developer working in your team has mistakenly eliminated AWS Access Key from your QA environment, and there is no back up available for those. How do you solve this problem?
Under IAM role, you can retrieve the lost Access Key
Provide Access Key from another IAM account
Redeploy the QA application, and the key will be restored
Inactivate the older key and generate a new key which should be updated in the QA environment
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?