Security Flashcards

1
Q

During a review, a security team has flagged concerns over an Amazon EC2 instance querying IP addresses used for cryptocurrency mining. The EC2 instance does not host any authorized application related to cryptocurrency mining.

Which AWS service can be used to protect the EC2 instances from such unauthorized behavior in the future?

A

Amazon GuardDuty continuously monitors for malicious or unauthorized behavior to help protect your AWS resources, including your AWS accounts and access keys. GuardDuty identifies any unusual or unauthorized activity, like cryptocurrency mining or infrastructure deployments in a region that has never been used. Powered by threat intelligence and machine learning, GuardDuty is continuously evolving to help you protect your AWS environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company has moved its business critical data to Amazon EFS file system which will be accessed by multiple EC2 instances.

Why use VPC security groups?
Why use IAM policy to control access?

A

Use VPC security groups to control the network traffic to and from your file system

Attach an IAM policy to your file system to control which clients can mount your file system and with what permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which is easier to setup Dynamic Port Mapping or Reverse Proxy?

A

Dynamic Port Mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly