Cloud Foundations - D282 (Security and Compliance)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/62

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

63 Terms

1
New cards

What is the number of security groups per VPX or per region?

500

2
New cards

Which AWS feature provides a constant monitoring service that assists in locating and solving malicious security breaches within your AWS infrastructure?

Amazon GuardDuty

3
New cards

What mode within IPSec has both the source and destination hosts performing cryptographic functions?

Transport Mode

4
New cards

According to the AWS shared responsibility model, which entity is responsible for protecting the AWS infrastructure that runs all of the services offered in the AWS Cloud?

AWS

5
New cards

Which service protects again SQL injection and cross-site scripting attacks?

AWS Web Application Firewall (WAF)

6
New cards

Which tool checks the compliance in IAM configurations to make sure it has a secure access to respective AWS resource, and validates ports 22, 3389, and 5500?

Trusted Advisor Tool

7
New cards

According to the AWS shared responsibility model, which entity is responsible for the patching of guest OSes and applications?

the customer

8
New cards

Which section of the IAM policy determines what assets the IAM policy will use?

The Resource section

9
New cards

What are two security options used within Amazon S3 that can be used for preventing accidental delete action?

Versioning and MFA Delete

10
New cards

Which AWS service would you use to review the full history of changes made to your application's data?

Amazon Quantum Ledger Database (QLDB)

11
New cards

Which specific security component manages several IAM users and gives you the ability to specify security permissions for a given set of users?

An AWS Identify and Access Management (IAM) group

12
New cards

Which section of an IAM policy determines the behaviors and actions of what policy will allow?

The Effects section

13
New cards

Which section of AWS Artifact provides you with compliance reporting from third-party auditors?

Artifact Reports

14
New cards

According to the AWS shared responsibility model, who is responsible for maintaining the infrastructure for virtualization?

AWS

15
New cards

Which standard requires companies to guarantee the secure processing and handling of the storing and transmission of credit card information?

Payment Card Industry Data Security Standard (PCI-DSS)

16
New cards

According to the AWS shared responsibility model, who is responsible for managing Availability Zones, Regions, and Edge Locations?

AWS

17
New cards

What are software packages/services offered as a single package, which automate cloud security?

Orchestration Systems

18
New cards

Which IAM policies are created and managed by AWS?

Manages Policies

19
New cards

Which document defines the security for a company's cloud controls, policies, responsibilities, and underlying technologies?

Security Policy Document

20
New cards

Which service provides DDoS protection?

AWS Shield

21
New cards

What allows multiple organizations to be able to use the same date for identification purposes?

Federations

22
New cards

Which component is a way of defining allowed or denied permissions for a user or resource by attaching this component?

AWS Identity and Access Management (IAM) policies

23
New cards

What is the term for a zone defined by a group of ports?

Hard Zoning

24
New cards

According to the AWS shared responsibility model, who needs to perform patching of the RDS database engines?

AWS

25
New cards

Which cloud component focuses on firewalls, intrusion detection, and encryption?

Security component

26
New cards

Which AWS resource is considered a federated tool that allows you to have your own single sign-on using identity providers such as Microsoft Active Directory Federation Services (ADFS) or Google?

AWS Cognito

27
New cards

Which type of control involves passing control from AWS specifically back to the customer?

Inherited Controls

28
New cards

According to the AWS shared responsibility model, who needs to set up security groups for EC2 instances?

The customer

29
New cards

What would you use to ensuring the integrity of digital messages as they are sent from one system to another?

Digital Signatures

30
New cards

In which two locations does Amazon recommend you store access keys for IAM users?

In the AWS credentials file and in the environment variables.

31
New cards

Which type of control under the shared responsibility model is considered a shared control between customers and AWS?

Patching, configuration, and training

32
New cards

Can you retrieve a deleted access key?

No

33
New cards

What access control method determines access rights based on the data comparing with the security properties of the system?

Mandatory Access Control (MAC)

34
New cards

What is defined as a framework/architecture which uses different protocols to provide integrity, confidentiality, and authentication of data over a TCP/IP network?

IP Security (IPSec)

35
New cards

How many access keys can you have for an IAM user or a root user?

Two

36
New cards

What is the type of AWS IAM policy that allows you to grant or deny permissions on AWS accounts or IAM users on specific objects within the Amazon S3 environment?

A bucket policy

37
New cards

According to the AWS shared responsibility model, which entity is responsible for identity and access management?

The customer

38
New cards

Which security mechanism secures access to storage resources by using an ordered list of permit and deny statements?

A Storage Access Control list (ACL)

39
New cards

Which service increases application compliance and reduces security concerns by continually scanning AWS workloads for vulnerabilities and unintended network exposure?

Amazon Inspector

40
New cards

What reduces the need to sign onto multiple systems to gain access?

Single Sign-On (SSO)

41
New cards

Where can you locate AWS compliance reports and access agreements made with AWS?

AWS Artifact

42
New cards

Which federal program outlines and standardizes security assessments, authorization, and continuous monitoring for cloud products/services?

Federal Risk and Authorization Management Program (FedRAMP)

43
New cards

According to the AWS shared responsibility model, which entity or entities is/are responsible for configuration management?

It is shared by AWS and the customer.

44
New cards

What is the security advantage of AWS Storage Snowball?

It bypasses a connection to the Internet and avoids the cost and security concerns of network data transfer.

45
New cards

According to the AWS shared responsibility model, who is responsible for upholding compliance standards in the cloud?

Both the customer and AWS

46
New cards

Which service allows you to perform data encryption using cryptographic keys?

AWS Key Management Service (KMS)

47
New cards

As a best practice what will you use for granting temporary access to employees?

AWS Identity and Access Management (IAM) role

48
New cards

When should you give out the IAM user root ID and password to an end user for logging into the system?

never

49
New cards

According to the AWS shared responsibility model, who is responsible for training the customer's IT employees?

The customer

50
New cards

Which SAN security process restricts storage access between initiators and targets?

Zoning

51
New cards

According to the AWS shared responsibility model, who has responsibility for the security of customer data in the cloud?

The customer

52
New cards

Which networking component mimics the job of a firewall and also controls the outbound and inbound traffic?

A security group

53
New cards

Which Amazon service can increase application compliance and reduce security concerns within an EC2 environment by automatically assessing vulnerabilities or changes to a system?

The Amazon Inspector

54
New cards

Which security best practice should you follow when setting permissions in IAM policies?

Granting Least Priviledge

55
New cards

Within the Amazon shared responsibility model, who is responsible for the security of AMI configurations, policies, data stores, data at rest, data in transit, applications, and operating systems?

Customers

56
New cards

What is the term for a zone that has a worldwide name?

Soft Zoning

57
New cards

What will you use to view a list of IAM users and the status of all their credentials?

AWS Identity and Access Management (IAM) credentials report

58
New cards

Which AWS resource provides an additional layer of security when implemented on the VPC side, where it acts like a logical firewall?

AWS Network Access Control List (ACL)

59
New cards

Which security credentials do you need for making programmatic calls to AWS?

Access Keys

60
New cards

Which AWS service provides a way to manage a ledger system that provides complete immutability for multiple parties to perform transactions?

Amazon Managed Blockchain

61
New cards

Who is responsible for security within the cloud, and who is responsible for security of the cloud?

Security within = customer

Security of = AWS

62
New cards

Which AWS Trusted Advisor pillar indicates a lack of backups, like EBS volumes that do not have snapshots taken of them?

Fault Tolerance

63
New cards

What does FISMA stand for?

Federal Information Security Management Act