AWS Access Management Interview Question-Answer

Q.1 Which of the following AWS service helps in the overall management of Security in the cloud?

       A. Aurora

       B. VPC

       C. IAM

       D. Cloudwatch

Ans : IAM

Q.2 An operating system, data encryption, and network traffic protection falls under the responsibilities of ___________.

       A. AWS

       B. Customers

       C. Both AWS and customers

       D. None of the options

Ans : Both AWS and customers

Q.3 Is it recommended to use the root account for regular use?

       A. True

       B. False

Ans : False

Q.4 Existing identity management systems like Microsoft AD can be integrated into AWS to manage permissions.

       A. True

       B. False

Ans : True

Q.5 AWS CloudTrail records all the API interactions and stores the data in S3 Buckets.

       A. True

       B. False

Ans : True

Q.6 IAM user needs to use both the access key ID and secret access key to make API calls.

       A. True

       B. False

Ans : True

Q.7 AWS Global Infrastructure consists of __________.

       A. Edge Locations

       B. Availability Zones

       C. Regions

       D. All the options

Ans : All the options

Q.8 Which IAM policy provides permissions to resolve issues with AWS?

       A. System Administrator

       B. Administrator

       C. Power user

       D. Support user

Ans : Power user

Q.9 Roles can be assigned to other AWS services.

       A. True

       B. False

Ans : True

Q.10 Custom policies are written in ____________.

       A. XML

       B. text

       C. JSON

       D. All the options

Ans : JSON

Q.11 __________ is used to validate a user by AWS to use a particular resource.

       A. Policy

       B. Role

       C. Access Keys

       D. MFA

Ans : Policy

Q.12 The maximum number of users that an AWS account can have is ________.

       A. 500

       B. 100

       C. 5000

       D. 1000

Ans : 5000

Q.13 Which of the following is not an open ID provider?

       A. Google

       B. SBI Account

       C. Amazon

       D. Facebook

Ans : Facebook

Q.14 Service linked roles are predefined by ______.

       A. Service

       B. AWS

       C. Policy

       D. None of the options

Ans : Service

Q.15 ________ is an inherent part of an IAM role, and it specifies the principals that are allowed to use the role.

       A. Signed policy

       B. Principle policy

       C. Trust policy

       D. None of the options

Ans : Trust policy

Q.16 Every user you create in IAM starts with _______.

       A. No access

       B. Partial permissions

       C. Full access

       D. None of the options

Ans : No access

Q.17 Role chaining is generally used in identity federation.

       A. True

       B. False

Ans : True

Q.18 AWS STS returns temporary security credentials with an expiration time of ______________.

       A. 7 hours

       B. 1 hour

       C. 15 minutes

       D. None of the options

Ans : None of the options

Q.19 Using which of the following a user is validated by AWS to use a particular resource ?

       A. MFA

       B. Policy

       C. Access Keys

       D. Role

Ans : Policy

Q.20 An IAM user can be a member of a maximum of _________ groups.

       A. 5

       B. 10

       C. 4

       D. 20

Ans : 5

Q.21 An IAM role that grants permissions to an AWS service so it can access AWS resources. The policies that you attach to it determine which AWS resources the service can access and what it can do with those resources.

       A. Permission role

       B. Granted role

       C. Service role

       D. Selector role

Ans : Permission role

Q.22 AWS Identity and Access Management are available through ____________ interfaces.

       A. Query API

       B. Management console

       C. AWS CLI

       D. All the options

Ans : All the options

Q.23 The security of the cloud is the responsibility of ___________.

       A. Customers

       B. AWS

       C. Both the options

       D. None of the options

Ans : AWS

Q.24 A practice that adds increased security to an account by using multiple forms of authentication is ______________.

       A. Root logging

       B. MFA

       C. Logging

       D. None of the options

Ans : MFA

Q.25 What is the practice of distributing responsibility among multiple people so that no one person has full control of everything?

       A. Separation of responsibility

       B. Separation of duties

       C. Responsibility sharing

       D. None

Ans : Separation of responsibility

Q.26 Temporary security credentials are not stored with users.

       A. True

       B. False

Ans : True

Q.27 Security is still considered as the major hurdle for businesses to opt for cloud.

       A. True

       B. False

Ans : True

Q.28 You can change the properties but not the user name using a console in IAM.

       A. True

       B. False

Ans : True

Leave a Comment