In this Post we discuss about the AWS Cloud Security module answers. The key considerations and best practices that can help safeguard your valuable data and resources in the AWS environment. Whether you are a small business owner or an IT professional looking to enhance your understanding of AWS security, this post aims to equip you with foundational knowledge and actionable insights to bolster your cloud security posture.
Click Here For:Â Module 3 Quiz Answers
AWS Cloud SecurityÂ
Q1. What is the AWS Shared Security Model?
Answer:Â
AWS is responsible for protecting the infrastructure that runs all the services that are offered in the AWS Cloud. This infrastructure is composed of the hardware, software, networking, and facilities that run the AWS Cloud services. "Security of the cloud"
The customer is responsible for the encryption of data at rest and data in transit. The customer should also ensure that the network is configured for security and that security credentials and logins are managed safely. "Security in the cloud"
Based on the question select the answer, If the question asks like this,Â
- In the shared responsibility model, AWS is responsible for providing what ? Â
A. Configuring third party applications.
B. Maintaining physical hardware.
C. Security application access and data.
D. Managing custom Amazon machine images (AMI's).
Answer:Â
        Maintaining physical hardware.
Q4. When creating an AWS Identity and Access Management (IAM) policy, what are the twoÂ
   types of access that can be granted to a user? (Choose two).
A. Institutuional Access.
B. Authorized Access.
C. Programmatic Access.
D. AWS Management Console Access.
E. Administrative Root Access.
Answer:Â
Programmatic Access.
AWS Management Console Access.
Q5. True or false? AWS organizations enables you to consolidate multiple aws accounts so thatÂ
    you centrally manage them.
      True.
      False.
Answer:Â
          True.
Q6. Which of the following are best practices to secure your account using aws identity andÂ
     access management? (Choose 2).
A. Provide users with default administrative privileges.
B. Leave unused and unnecessary users and credentials in place.
C. Manage access to AWS resources.
D. Avoid using IAM groups to grant the same access permissions to multiple users.
E. Define fine-grained access rights.
Answer:Â
Manage access to AWS resources.
Define fine-grained access rights.
Q7. Which of the following should be done by the AWS account root user?Â
    (Select the best answer).
A. Secure access for applications.
B. Integrate with other AWS services.
C. Change granular permissions.
D. Change the AWS support plan.
Answer:Â
Change the AWS support plan.
Q8. After initial login, what does AWS recommend as the best practice for the AWS accountÂ
    root user?
A. Delete the AWS account root user.
B. Revoke all permissions on the AWS account root user.
C. Restrict permission on the AWS account root user.
D. Delete the access keys of the AWS account root user.
Answer:Â
Delete the access keys of the AWS account root user.
Q9. How would a system administrator add an additional layer of login security to a user'sÂ
    AWS management console?
A. Use Amazon Cloud Directory.
B. Audit AWS Identity and Access Management (IAM) roles.
C. Enable multi-factor authentication.
D. Enable AWS CloudTrail.
Answer:Â
Enable multi-factor authentication.
Q10. True or false? AWS key management service (AWS KMS) enables you to assess, audit,Â
     and evaluate the configurations of your AWS resources.
       True.
       False.
Answer:Â
          False.
Click Here For:Â Â Module 5 Quiz Answers