Computer Science, asked by sandeep459238, 1 year ago

1. Using which of the following a user is validated by AWS to use a particular resource ?

MFA

Policy

Role

Access Keys

2. IAM user has a separate access key and secret access key to make API calls ?

True

False

3. An IAM Policy that is an inherent part of an IAM role It specifies which principals are allowed to use the role.

principle policy

None

signed policy

trust policy

4. The _____ policy template gives the Admins group permission to access all account resources, except your AWS account information.

Power user access

Administrator access

All the options

Read only access

5. A practice that adds increased security to an account by using multiple forms of authentication is______

root logging

logging

None

MFA

6. An IAM user can be a member of maximum of _____ groups

4

10

5

15

7. You can change the properties but not the user name using console in IAM

True

False

8. What is the practice of distributing responsibility among multiple people so that no one person has full control of everything?

seperation of responsibility

Seperation of duties

responsibility sharing

None

9. Which of the following is not an open I.D provider ?

SBI Account

facebook

google

amazon

10. Service linked roles are predefined by______

service

None

policy

AWS

11. The Security of the cloud is the responsibilitty of _____

None

Both

customers

AWS

13. AWS STS returns temporary security credentials with an Expiration time of _____

7 hours

15 minutes

1 hour

None

12. Operating system, data encryption, network traffic protection falls under the responsibilities of ______

AWS

Both

customers

None

14. AWS cloudtrail records all the API interactions and stores the data in S3 Buckets

False

True

15. Temporary security credentials are not stored with users.

False

True

16. An IAM role that grants permissions to an AWS service so it can access AWS resources. The policies that you attach to it determine which AWS resources the service can access and what it can do with those resources

selector role

permission role

service role

Granted role

17. You can set up your own password policy for users in IAM ?

False

True

18. Security is still considered as the major hurdle for the businesses to opt for cloud

False

True

19. Through which of the following interfaces is AWS Identity and Access Management available?

AWS CLI

management console

All the above

Query API

20. A root account credential can be used to log into your AWS account or buy a book on Amazon.com

False

True

Answers

Answered by sarveshkumar83
16

Hello.

Here is your answer

Option C is the correct answer

I hope you are well

Thanks for the questioning

Answered by aqibkincsem
7

Answer:

in case of No. 1 the answer is role. In case of No. 2 the answer is True. In case of No. 3 the answer would be signed policy. In No. 4 the answer is administrator access.

These are some of the best options you can use in the perfect answering of the questions. You need to be sure before you sit to answer.

Explanation:

Similar questions