Security Flashcards

1
Q

When creating an IAM user group, is it best practice to attach a policy or role?

A

Policy

You can not attach a role to a group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have been asked by the auditors to produce regular reports in regards to your PCI compliance. Which service should you use to produce this as fast and as efficiently as possible?

A

AWS Audit Manager

AWS Audit Manager is an automated service that produces reports specific to auditors for PCI compliance, GDPR, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AWS service that acts as a single source to get the compliance-related information that matters to you, such as AWS security and compliance reports or select online agreements.

A

AWS Artifact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which web service can be used to provide users that you authenticate with short-term security credentials that can control access to your AWS resources?

A

AWS STS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Default Configuration of the Default NACL

A

Allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Default Configuration of a Custom NACL

A

Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Instance states in which an attached security group can be changed?

A

Running
Stopped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For auditing purposes you would like to be informed if an object is restored to S3 from Glacier. What is the most efficient way you can do this?

A

Configure S3 notifications for restore operations from Glacier

  • first add a notification configuration that identifies the events you want Amazon S3 to publish and the destinations where you want Amazon S3 to send the notification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steps to Authenticate with Cognito

A
  1. Authenticate and Get Tokens
  2. Exchage Token for AWS credentials
  3. Access AWS services using credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to easily generate Cost and Billing reports for multiple AWS Accounts?

A

AWS Cost and Usage Reports to generate reports,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to easily put AWS Cost and Usage Reports to generate reports in CSV format into an S3 bucket

A

Can be setup to automatically store updated reports in Amazon S3 every 24 hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WS service can help you optimize your AWS environment by giving recommendations to reduce cost, increase performance, and improve security

A

Trusted Advisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which AWS service can you use to help ensure you don’t have cost overruns for your AWS resources?

A

AWS Budgets

Allows you to have alerts when getting to a certain budget threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AWS AI service that is built to detect fraud in your data.

A

AWS Fraud Detector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This allows you to centrally set up and manage firewall rules across multiple AWS accounts and applications in AWS Organizations.

A

AWS Firewall Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You suspect an EC2 it is being used to mine bitcoin rather than for educational purposes. Somehow, your production environment has been compromised and you need to quickly identify the root cause of this compromise. Which service?

A

AWS Detective

17
Q

A Cloud Security Posture Management service that performs security best practice checks, aggregates alerts, and enables automated remediation.

A

AWS Security Hub

18
Q

AWS Service that can help run vulnerability scans on EC2 instances

A

AWS Inspector

19
Q

Continuous security monitoring service that analyzes and processes several AWS services using AI to detect if there is suspicious activity

A

AWS Guard Duty

20
Q

You want to distribute private content to users for a limited amount of time. Which CloudFront feature allows you to securely distribute this private content?

A

CloudFront Signed URLS

21
Q

How to add or deny access to another AWS Account or OU using AWS Organizations servic

A

Create a Service control Policy (SCP)

22
Q

How to grant cross account access if you do not have AWS Organizations setup?

A

You can use an IAM role to allow someone (a trusted principal) in a different account to access resources in your account. Roles are the primary way to grant cross-account access.

23
Q

An IAM user account was compromised, how to act immediately to deny any further access

A

1st update the Permission Policy AWSRevokeOlderSessions inline deny signs out all polices currently using role and implies new policies.

Trust Policy - then update trust policy. These do not impact current sessions but only new sessions.

24
Q

AWS Service that service that enables you to assess, audit, and evaluate the configurations of your AWS resources. Continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations.

A

AWS Config

25
Q

AWS Service that allows you to issue short-lived access tokens that act as temporary security credentials to allow access to your AWS resources?

A

AWS STS

26
Q

AWS Service that makes it easy to centrally manage Single Sign On access to multiple AWS accounts

A

AWS SSO

27
Q

What service can you use to create rate-based rules to prevent against HTTP flood attacks

A

AWS WAF

or AWS Shield Advanced

28
Q

Services you can use to help protect DDoS attacks

A

AWS Sheild
AWS WAF
CloudFront
Autoscaling

29
Q

I want a Lambda function to have access to my KMS key, what 2 steps do I need to do to ensure it has access

A

Add the kms:decrypt permission to the lambda exectution role

Add the lambda execution role to the KMS key policy with the kms:decrypt permission

30
Q

What can a SCP be attached to?

A

An orginizational root, an organizational unit (OU) or an account