IAM & AWS CLI Flashcards

1
Q

IAM stands for

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is IAM a global service? (Globally Resilient)

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Created automatically when creating a new AWS account

A

Root User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Has full control of the AWS Account

A

Root User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bills to the AWS account payment method as they are consumed

A

Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Best practice that adds an extra layer of protection on top of your user name and password

A

AWS Multi-Factor Authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can the root User be restricted?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can be used by AWS services or for granting external access to your account

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Objects or documents which can be used to allow or deny access to AWS services when they are ATTACHED to groups, users, or roles

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Long term credentials in AWS

A

Access Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

policy created for a single IAM identity which has a strict one-to-one relationship to its associated IAM identity. Will be automatically deleted if you delete its associated identity.

A

Inline Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used for special or exceptional allows or denies

A

Inline Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Remains unchanged even if you delete its associated IAM identity, It doesn’t have a strict one-to-one relationship to its associated IAM identity

A

Standalone Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

First priority when evaluating policy logic

A

Explicit Denies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used by an unknown number of principals on a temporary basis that represents the level of access in an AWS Account

A

IAM Role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using an external identity provider and giving the external identities roles to perform actions

A

ID Federation

17
Q

Predefined IAM Role that is linked to a specific AWS Service

A

Service-linked roles

18
Q

Max IAM users per account

19
Q

Manage your AWS services using the command-line

20
Q

Manage your AWS services using a programming language

21
Q

Used to audit permissions of your account

A

IAM Credentials Report & IAM Access Advisor

22
Q

Practice of not give more permissions than a user needs

A

Principle of Least Privilege

23
Q

Short-lived access tokens that act as temporary security credentials to allow access to your AWS resources

A

AWS Security Token Service (AWS STS)

24
Q

Policies you attach to IAM Users, Groups and Roles

A

Identity-based policies

25
Policies that you attach to AWS services that support this type of policy, such as Amazon S3 buckets
Resource-based policies
26
Element of a policy that specifies which IAM identities can access that resource
Principal element
27
Term that refers to the process where principal proves their identity
Authenticate
28
Term to allow or deny access to resources
Authorize
29
Used when the identity store which is currently being used is not compatible with SAML
Custom identity broker application + STS to obtain temporary security credentials