Consol Demonstration – Identity & Access Management Flashcards

1
Q

What does IAM stand for?

A

IAM stands for Identity and Access Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IAM used for in AWS?

A

IAM is used to securely control access to AWS resources by specific entities, such as EC2 instances or users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a role in IAM?

A

A role in IAM defines permissions that can be assumed by AWS entities, such as an EC2 instance. It allows these entities to access specific resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can a role be created in IAM?

A

A role can be created in IAM by navigating to the IAM console, clicking on “Roles,” and then selecting “Create role.” The trusted entity for the role is specified during this process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are policies in IAM roles?

A

Policies in IAM roles define the permissions associated with the role. They specify what actions an entity can perform on AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can policies be associated with an IAM role?

A

Policies can be associated with an IAM role during its creation or by editing the role later to add or modify policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the principle of least privilege in IAM?

A

The principle of least privilege in IAM ensures that entities or users have only the minimum permissions necessary to perform their tasks, reducing the risk of unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a group in IAM, and how is it used?

A

A group in IAM is a collection of IAM users. It is used to apply permissions to multiple users at once, simplifying permission management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can a group be created in IAM?

A

A group can be created in IAM by navigating to the IAM console, clicking on “Groups,” and then selecting “Create group.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are built-in policies in IAM, and how are they used?

A

Built-in policies in IAM are preconfigured policies that define common sets of permissions. They can be assigned to users or groups to grant specific access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can custom policies be created in IAM?

A

Custom policies can be created in IAM using the visual editor to choose services, actions, resources, and request conditions, or by writing policies in JSON format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the “IAM Roles” feature in the AWS Management Console?

A

The “IAM Roles” feature in the AWS Management Console allows users to create, manage, and assign roles to AWS entities like EC2 instances, defining their permissions and access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does IAM ensure secure access control in AWS?

A

IAM ensures secure access control in AWS by allowing granular permission management, role-based access control, and adherence to the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some examples of AWS entities that can be trusted in IAM roles?

A

Examples of AWS entities that can be trusted in IAM roles include EC2 instances, Lambda functions, AWS services, and users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some common policies that can be associated with IAM roles?

A

Common policies that can be associated with IAM roles include Amazon S3 full access, DynamoDB read-only access, and various other predefined or custom policies based on specific resource requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does IAM inheritance work for permissions?

A

IAM inheritance in AWS means that users or entities inheriting permissions from a group or role will have the same level of access as defined by the associated policies.