AWS Certified Data Analytics Specialty 2021 - Hands-On! - Amazon Redshift Security Concerns

AWS Certified Data Analytics Specialty 2021 - Hands-On! - Amazon Redshift Security Concerns

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial covers security aspects of Amazon Redshift, focusing on the use of Hardware Security Modules (HSM) and the configuration of trusted connections using client and server certificates. It also explains how to manage user permissions in Redshift using SQL commands like GRANT and REVOKE, providing examples of how to assign and remove access privileges for users and groups.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is required to establish a trusted connection between Redshift and an HSM?

An SSH key

A firewall configuration

A VPN connection

A client and server certificate

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must be done first when migrating an unencrypted Redshift cluster to an HSM encrypted cluster?

Delete the existing cluster

Create a new encrypted cluster

Install a new HSM

Backup the existing data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which SQL command is used to grant permissions to users in Redshift?

GRANT

ENABLE

ALLOW

PERMIT

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What SQL command would you use to remove permissions from a user in Redshift?

REMOVE

REVOKE

DENY

DELETE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a SQL command to grant select permissions on a table to a user?

PERMIT SELECT ON table_name TO user_name

ENABLE SELECT ON table_name TO user_name

ALLOW SELECT ON table_name TO user_name

GRANT SELECT ON table_name TO user_name