Chapter 6 AWS

Descripción

Ch6 of aws associate exam
Tim Urista
Test por Tim Urista, actualizado hace más de 1 año
Tim Urista
Creado por Tim Urista hace más de 6 años
365
0

Resumen del Recurso

Pregunta 1

Pregunta
Which of the following methods will allow an application using an AWS SDK to be authenticated as a principal to access AWS Cloud services? (Choose 2 answers)
Respuesta
  • Create an IAM user and store the user name and password for the user in the application’s configuration.
  • Create an IAM user and store both parts of the access key for the user in the application’s configuration.
  • Run the application on an Amazon EC2 instance with an assigned IAM role
  • Make all the API calls over an SSL connection.

Pregunta 2

Pregunta
Which of the following are found in an IAM policy? (Choose 2 answers)
Respuesta
  • Service Name
  • Region
  • Action
  • Password

Pregunta 3

Pregunta
Your AWS account administrator left your company today. The administrator had access to the root user and a personal IAM administrator account. With these accounts, he generated other IAM accounts and keys. Which of the following should you do today to protect your AWS infrastructure? (Choose 4 answers)
Respuesta
  • Change the password and add MFA to the root user.
  • Put an IP restriction on the root user.
  • Rotate keys and change passwords for IAM accounts.
  • Delete all IAM accounts.
  • Delete the administrator’s personal IAM account.
  • Relaunch all Amazon EC2 instances with new roles.

Pregunta 4

Pregunta
Which of the following actions can be authorized by IAM? (Choose 2 answers)
Respuesta
  • Installing ASP.NET on a Windows Server
  • Launching an Amazon Linux EC2 instance
  • Querying an Oracle database
  • Adding a message to an Amazon Simple Queue Service (Amazon SQS) queue

Pregunta 5

Pregunta
Which of the following are IAM security features? (Choose 2 answers)
Respuesta
  • Password policies
  • Amazon DynamoDB global secondary indexes
  • MFA
  • Consolidated Billing

Pregunta 6

Pregunta
Which of the following are benefits of using Amazon EC2 roles? (Choose 2 answers)
Respuesta
  • No policies are required.
  • Credentials do not need to be stored on the Amazon EC2 instance.
  • Key rotation is not necessary.
  • Integration with Active Directory is automatic.

Pregunta 7

Pregunta
Which of the following are based on temporary security tokens? (Choose 2 answers)
Respuesta
  • Amazon EC2 roles
  • MFA
  • Root user
  • Federation

Pregunta 8

Pregunta
Your security team is very concerned about the vulnerability of the IAM administrator user accounts (the accounts used to configure all IAM features and accounts). What steps can be taken to lock down these accounts? (Choose 3 answers)
Respuesta
  • Add multi-factor authentication (MFA) to the accounts.
  • Limit logins to a particular U.S. state.
  • Implement a password policy on the AWS account.
  • Apply a source IP address condition to the policy that only grants permissions when the user is on the corporate network.
  • Add a CAPTCHA test to the accounts.

Pregunta 9

Pregunta
You want to grant the individuals on your network team the ability to fully manipulate Amazon EC2 instances. Which of the following accomplish this goal? (Choose 2 answers)
Respuesta
  • Create a new policy allowing EC2:* actions, and name the policy NetworkTeam.
  • Assign the managed policy, EC2FullAccess, to a group named NetworkTeam, and assign all the team members’ IAM user accounts to that group.
  • Create a new policy that grants EC2:* actions on all resources, and assign that policy to each individual’s IAM user account on the network team.
  • Create a NetworkTeam IAM group, and have each team member log in to the AWS Management Console using the user name/password for the group.

Pregunta 10

Pregunta
What is the format of an IAM policy?
Respuesta
  • XML
  • Key/value pairs
  • JSON
  • Tab-delimited text
Mostrar resumen completo Ocultar resumen completo

Similar

Gramática para practicar el First Certificate I
Diego Santos
Álgebra lineal
Hugo Garzón
CONSTRUCTIVISMO Y APRENDIZAJE SIGNIFICATIVO
sugeytellez2192
Texto del FCE para Rellenar Espacios
Diego Santos
Should - Shouldn't
Miguel Hurtado
Teorías Antropológicas
tania veloz
Elementos de la COMUNICACIÓN
belladetormes
LA ACCIÓN DE TUTELA EN EL ORDENAMIENTO CONSTITUCIONAL COLOMBIANO
juli_franco98
Mapas conceptuales
Eve Contreras
Balanza de pagos
Marceline Gutierrez
HINDUISMOA 6B_ANE
Ane Núñez Escudero