1. Using which of the following a user is validated by AWS to use a particular resource ?
MFA
Policy
Role
Access Keys
2. IAM user has a separate access key and secret access key to make API calls ?
True
False
3. An IAM Policy that is an inherent part of an IAM role It specifies which principals are allowed to use the role.
principle policy
None
signed policy
trust policy
4. The _____ policy template gives the Admins group permission to access all account resources, except your AWS account information.
Power user access
Administrator access
All the options
Read only access
5. A practice that adds increased security to an account by using multiple forms of authentication is______
root logging
logging
None
MFA
6. An IAM user can be a member of maximum of _____ groups
4
10
5
15
7. You can change the properties but not the user name using console in IAM
True
False
8. What is the practice of distributing responsibility among multiple people so that no one person has full control of everything?
seperation of responsibility
Seperation of duties
responsibility sharing
None
9. Which of the following is not an open I.D provider ?
SBI Account
facebook
google
amazon
10. Service linked roles are predefined by______
service
None
policy
AWS
11. The Security of the cloud is the responsibilitty of _____
None
Both
customers
AWS
13. AWS STS returns temporary security credentials with an Expiration time of _____
7 hours
15 minutes
1 hour
None
12. Operating system, data encryption, network traffic protection falls under the responsibilities of ______
AWS
Both
customers
None
14. AWS cloudtrail records all the API interactions and stores the data in S3 Buckets
False
True
15. Temporary security credentials are not stored with users.
False
True
16. An IAM role that grants permissions to an AWS service so it can access AWS resources. The policies that you attach to it determine which AWS resources the service can access and what it can do with those resources
selector role
permission role
service role
Granted role
17. You can set up your own password policy for users in IAM ?
False
True
18. Security is still considered as the major hurdle for the businesses to opt for cloud
False
True
19. Through which of the following interfaces is AWS Identity and Access Management available?
AWS CLI
management console
All the above
Query API
20. A root account credential can be used to log into your AWS account or buy a book on Amazon.com
False
True
Answers
Answered by
16
Hello.
Here is your answer
Option C is the correct answer
I hope you are well
Thanks for the questioning
Answered by
7
Answer:
in case of No. 1 the answer is role. In case of No. 2 the answer is True. In case of No. 3 the answer would be signed policy. In No. 4 the answer is administrator access.
These are some of the best options you can use in the perfect answering of the questions. You need to be sure before you sit to answer.
Explanation:
Similar questions