An organization has hosted an application on the EC2 instances. There will be multiple users connecting to the instance for setup and configuration of application. The organization is planning to implement certain security best practices. Which of the below mentioned pointers will not help the organization achieve better security arrangement?
AWS Quiz - IAM_S3_EC2

Quiz
•
Other
•
Professional Development
•
Hard

Akshay Balagoni
Used 4+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Apply the latest patch of OS and always keep it updated.
Allow only IAM users to connect with the EC2 instances with their own secret access key.
Disable the password-based login for all the users. All the users should use their own keys to connect with the instance securely.
Create a procedure to revoke the access rights of the individual user when they are not required to connect to EC2 instance anymore for the purpose of application configuration.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
An organization is planning to create a user with IAM. They are trying to understand the limitations of IAM so that they can plan accordingly. Which of the below mentioned statements is not true with respect to the limitations of IAM?
One IAM user can be a part of a maximum of 5 groups
Organization can create 100 groups per AWS account
One AWS account can have a maximum of 5000 IAM users
One AWS account can have 250 roles
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
A company needs to deploy services to an AWS region which they have not previously used. The company currently has an AWS identity and Access Management (IAM) role for the Amazon EC2 instances, which permits the instance to have access to Amazon DynamoDB. The company wants their EC2 instances in the new region to have the same privileges. How should the company achieve this?
Create a new IAM role and associated policies within the new region
Assign the existing IAM role to the Amazon EC2 instances in the new region
Copy the IAM role and associated policies to the new region and attach it to the instances
Create an Amazon Machine Image (AMI) of the instance and copy it to the desired region using the AMI Copy feature
4.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Your organization is preparing for a security assessment of your use of AWS. In preparation for this assessment, which two IAM best practices should you consider implementing? Choose 2 answers
Create individual IAM users for everyone in your organization
Configure MFA on the root account and for privileged IAM users
Assign IAM users and groups configured with policies granting least privilege access
Ensure all users have been assigned and are frequently rotating a password, access ID/secret key, and X.509 certificate
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
An organization has created 50 IAM users. The organization has introduced a new policy which will change the access of an IAM user. How can the organization implement this effectively so that there is no need to apply the policy at the individual user level?
Use the IAM groups and add users as per their role to different groups and apply policy to group
The user can create a policy and apply it to multiple users in a single go with the AWS CLI
Add each user to the IAM role as per their organization role to achieve effective policy setup
Use the IAM role and implement access at the role level
6.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
When assessing an organization AWS use of AWS API access credentials which of the following three credentials should be evaluated? Choose 3 answers
Key pairs
Console passwords
Access keys
Signing certificates
Security Group memberships (required for EC2 instance access)
7.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Your organization’s security policy requires that all privileged users either use frequently rotated passwords or one-time access credentials in addition to username/password. Which two of the following options would allow an organization to enforce this policy for AWS users? Choose 2 answers
Configure multi-factor authentication for privileged IAM users
Create IAM users for privileged accounts
Implement identity federation between your organization’s Identity provider leveraging the IAM Security Token Service
Enable the IAM single-use password policy option for privileged users
Create a free account and access millions of resources
Similar Resources on Quizizz
31 questions
Cuestionario sobre Computación en la Nube

Quiz
•
Professional Development
27 questions
ETCHFLIX

Quiz
•
Professional Development
35 questions
FORGCF3

Quiz
•
Professional Development
30 questions
AWS Cloud Practitioner - Practice Questions

Quiz
•
Professional Development
30 questions
ET - P3

Quiz
•
Professional Development
25 questions
debug quiz part 2

Quiz
•
Professional Development
33 questions
Google Cloud Digital

Quiz
•
Professional Development
30 questions
IGA Expo 2024

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade