Q.1 Which of the following AWS service helps in the overall management of Security in the cloud?
A. Aurora
B. VPC
C. IAM
D. Cloudwatch
Ans : IAM
Q.2 An operating system, data encryption, and network traffic protection falls under the responsibilities of ___________.
A. AWS
B. Customers
C. Both AWS and customers
D. None of the options
Ans : Both AWS and customers
Q.3 Is it recommended to use the root account for regular use?
A. True
B. False
Ans : False
Q.4 Existing identity management systems like Microsoft AD can be integrated into AWS to manage permissions.
A. True
B. False
Ans : True
Q.5 AWS CloudTrail records all the API interactions and stores the data in S3 Buckets.
A. True
B. False
Ans : True
Q.6 IAM user needs to use both the access key ID and secret access key to make API calls.
A. True
B. False
Ans : True
Q.7 AWS Global Infrastructure consists of __________.
A. Edge Locations
B. Availability Zones
C. Regions
D. All the options
Ans : All the options
Q.8 Which IAM policy provides permissions to resolve issues with AWS?
A. System Administrator
B. Administrator
C. Power user
D. Support user
Ans : Power user
Q.9 Roles can be assigned to other AWS services.
A. True
B. False
Ans : True
Q.10 Custom policies are written in ____________.
A. XML
B. text
C. JSON
D. All the options
Ans : JSON
Q.11 __________ is used to validate a user by AWS to use a particular resource.
A. Policy
B. Role
C. Access Keys
D. MFA
Ans : Policy
Q.12 The maximum number of users that an AWS account can have is ________.
A. 500
B. 100
C. 5000
D. 1000
Ans : 5000
Q.13 Which of the following is not an open ID provider?
A. Google
B. SBI Account
C. Amazon
D. Facebook
Ans : Facebook
Q.14 Service linked roles are predefined by ______.
A. Service
B. AWS
C. Policy
D. None of the options
Ans : Service
Q.15 ________ is an inherent part of an IAM role, and it specifies the principals that are allowed to use the role.
A. Signed policy
B. Principle policy
C. Trust policy
D. None of the options
Ans : Trust policy
Q.16 Every user you create in IAM starts with _______.
A. No access
B. Partial permissions
C. Full access
D. None of the options
Ans : No access
Q.17 Role chaining is generally used in identity federation.
A. True
B. False
Ans : True
Q.18 AWS STS returns temporary security credentials with an expiration time of ______________.
A. 7 hours
B. 1 hour
C. 15 minutes
D. None of the options
Ans : None of the options
Q.19 Using which of the following a user is validated by AWS to use a particular resource ?
A. MFA
B. Policy
C. Access Keys
D. Role
Ans : Policy
Q.20 An IAM user can be a member of a maximum of _________ groups.
A. 5
B. 10
C. 4
D. 20
Ans : 5
Q.21 An IAM role that grants permissions to an AWS service so it can access AWS resources. The policies that you attach to it determine which AWS resources the service can access and what it can do with those resources.
A. Permission role
B. Granted role
C. Service role
D. Selector role
Ans : Permission role
Q.22 AWS Identity and Access Management are available through ____________ interfaces.
A. Query API
B. Management console
C. AWS CLI
D. All the options
Ans : All the options
Q.23 The security of the cloud is the responsibility of ___________.
A. Customers
B. AWS
C. Both the options
D. None of the options
Ans : AWS
Q.24 A practice that adds increased security to an account by using multiple forms of authentication is ______________.
A. Root logging
B. MFA
C. Logging
D. None of the options
Ans : MFA
Q.25 What is the practice of distributing responsibility among multiple people so that no one person has full control of everything?
A. Separation of responsibility
B. Separation of duties
C. Responsibility sharing
D. None
Ans : Separation of responsibility
Q.26 Temporary security credentials are not stored with users.
A. True
B. False
Ans : True
Q.27 Security is still considered as the major hurdle for businesses to opt for cloud.
A. True
B. False
Ans : True
Q.28 You can change the properties but not the user name using a console in IAM.
A. True
B. False
Ans : True