Security Flashcards

(14 cards)

1
Q

Shared responsibility model

A

The shared responsibility model divides into customer responsibilities (commonly referred to as “security in the cloud”) and AWS responsibilities (commonly referred to as “security of the cloud”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AWS Identity and Access Management (IAM)

A

Enables you to manage access to AWS services and resources securely.

Root user
Users
Groups
Policies
Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AWS account root user

A

Access and control any resource in the account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AWS Organizations

A

Centralized management
Consolidated billing
Hierarchical groupings of accounts
AWS service and API actions access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are configuring service control policies (SCPs) in AWS Organizations. Which identities and resources can SCPs be applied to?

A

An individual member account
An organizational unit (OU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which tasks can you complete in AWS Artifact?

A

Access AWS compliance reports on-demand.
Review, accept, and manage agreements with AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial-of-service attacks

A

A deliberate attempt to make a website or application unavailable to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Groups

A

Only allow proper request traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Elastic Load Balancer (ELB)

A

Waits till the entire message is complete before moving it forward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption

A

Securing a message or data in a way that only authorized parties can access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IAM policy

A

A document that grants or denies permissions to AWS services and resources

IAM policies provide you with the flexibility to customize users’ levels of access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The principle of least privilege

A

Granting only the permissions that are needed to perform specific tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which service helps protect your applications against distributed denial-of-service (DDoS) attacks?

A

AWS Shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which task can AWS Key Management Service (AWS KMS) perform?

A

Create cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly