Security Flashcards

1
Q

attack that attempts to make your website or application unavailable to your end users

A

DDoS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DDoS attack that is referred to as a SYN flood. Works on the transport layer (TCP)

A

Layer 4 DDoS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reflection attacks include things such as NTP, SSDP, DNS, CharGEN, and SNMP attacks

A

Amplification Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Occurs where a web server receives a flood of GET or POST requests usually from a botnet or large number of compromised computers

A

Layer 7 attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Enable operational and risk auditing, governance, and compliance of your AWS account. visibility into your user and resource activity

A

CloudTrail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

increases visibility into your user and resource activity by recording AWS actions and API calls

A

CloudTrail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Service that provides two levels of protection against DDoS attacks(Layer 3 and 4): Standard and Advanced

A

AWS Shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides expanded DDoS attack protection for your Amazon EC2 instances, Elastic Load Balancing load balancers, Amazon CloudFront distributions, and Amazon Route 53 hosted zones

A

AWS Shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Service that lets you monitor HTTP and HTTP requests that are forwarded to CloudFront or a Load Balancer

A

AWS WAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat detection service that uses machine learning to continuously monitor for malicious behavior

A

Amazon GuardDuty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

service automatically applies your WAF rules across your accounts and resources, even as you add new resources.

A

Firewall Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Service that uses machine learning and pattern watching to discover sensitive (PII, PHI, financial data) data stored in S3. Used for HIPAA and GDPR compliance

A

Macie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

automatically assesses applications for vulnerabilities or deviations from best practices. Used to perform vulnerability scans on both EC2 instances and VPC

A

Amazon Inspector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Detailed list of security findings prioritized by level of severity in Inspector

A

Assessment Findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Analysis to check for ports reachable from outside the VPC

A

Network Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is an inspector agent required for Network Assessments?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vulnerable software (CVE) host hardening (CIS Benchmarks), and security best practices

A

Host Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is an inspector agent required for Host Assessments

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

managed service that makes it easy for you to create and control the encryption keys used to encrypt your data

A

Key Management Service

20
Q

Provides you with centralized control of the lifecycle and permissions of your keys

21
Q

Key that is a logical representation of a master key. Includes metadata such as the key id creation date, description, and key state.

A

Customer master key (CMK)

22
Q

Is a physical computing device that safeguards and manages digital keys and performs encryption and decryption functions

A

Hardware security model (HSM)

23
Q

Primary way to manage access to your AWS KMS CMK is with

24
Q

policies attached to resources

A

resource-based policies

25
Easily general and use your own encryption keys on the AWS Cloud
CloudHSM
26
Dedicated HSM to you with full control of the underlying hardware
CloudHSM
27
Service that securely stores, encrypts, and rotates your database credentials and other secrets
Secrets Manager
28
Capability of AWS Systems manager that provides secure, hierarchical storage for configuration data management and secrets management
Parameter Store
29
Used if you need more than 10,000 parameters, key rotation, or the ability to generate passwords using CloudFormation
Secrets Manager
30
Web Address using an object owners own security credentials to grant time-limited permission to download objects from S3
Presigned URL
31
Provide access to multiple restricted files
Presigned Cookies
32
Service allows you to create manage and deploy public and private SSL certificates for use with other AWS services
Certificate Manager
33
Does Certificate manager allow you to not pay for SSL certificates?
Yes
34
Can Certificate manager automate the renewal of you SSL
Yes
35
Service that you can continually audit your AWS usage to make sure you stay compliant
Audit Manager
36
Automated service that produces reports specific to auditors for compliance
Audit Manager
37
Source to get compliance-related information that matters to you. Used to download compliance reports for audits
AWS Artifact
38
Provides authentication, authorization, and user management for your web and mobile apps in a single service
Cognito
39
two main components of Cognito are
User pools and identity pools
40
Directories of users that provide sign-up and sign-in options for your application users
User pools
41
Allows you to give you users access to other AWS services
Identity pools
42
Service to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activites
Detective
43
Pulls data from your AWS resources and used machine learning, statistical analysis, and graph theory to build a linked set of data that enables you to quickly figure out the root cause of your security issues
Detective
44
Used to deploy physical firewall protection across your VPCS. (Physical firewall that is managed by AWS)
Network Firewall
45
Service that provides an intrusion prevention system (IPS)
Network Firewall
46
Service that filters your network traffic before it reaches your internet gateway
Network Firewall
47