AWS Security

AWS Security

Professional Development

20 Qs

quiz-placeholder

Similar activities

EC2_AWS

EC2_AWS

Professional Development

20 Qs

Chapter 6 AWS Resources

Chapter 6 AWS Resources

Professional Development

20 Qs

AWS pop quiz

AWS pop quiz

Professional Development

23 Qs

AWS ACF Módulo 4 - Segurança na nuvem

AWS ACF Módulo 4 - Segurança na nuvem

Professional Development

19 Qs

AWS Databases

AWS Databases

Professional Development

20 Qs

AWS Chapter 5  IAM

AWS Chapter 5 IAM

Professional Development

20 Qs

AWS Quiz Feb 17

AWS Quiz Feb 17

Professional Development

25 Qs

Linux Quiz 4

Linux Quiz 4

Professional Development

21 Qs

AWS Security

AWS Security

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Su Trinh

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is IAM Policies in AWS Security?

IAM Policies in AWS Security are permissions attached to identities (users, groups, roles) that define what actions they can perform on AWS resources.

IAM Policies are used for monitoring network traffic in AWS

IAM Policies are related to billing and payment methods in AWS

IAM Policies are used for managing physical security in AWS data centers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does VPC Security help in securing AWS resources?

VPC Security provides tools and configurations to manage and restrict access to AWS resources within a virtual private cloud environment.

VPC Security only works for on-premises servers

VPC Security is not necessary for cloud security

VPC Security allows unlimited access to all AWS resources

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the importance of Encryption Key Management in AWS Security.

Encryption Key Management is only relevant for non-sensitive data in AWS Security

Encryption Key Management is not necessary in AWS Security

Encryption Key Management does not impact data protection in AWS Security

Encryption Key Management in AWS Security is essential for protecting sensitive data, preventing unauthorized access, and ensuring compliance with security standards.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Security Groups and how are they used in AWS Security?

Security Groups are used to manage billing information in AWS.

Security Groups are physical devices that control network traffic in AWS.

Security Groups are virtual firewalls that control inbound and outbound traffic for instances in AWS.

Security Groups are used to deploy serverless functions in AWS.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Differentiate between Network Access Control Lists and Security Groups in AWS Security.

NACLs and Security Groups both operate at the instance level.

NACLs are stateless and operate at the subnet level, while Security Groups are stateful and operate at the instance level.

NACLs are stateful and operate at the instance level, while Security Groups are stateless and operate at the subnet level.

NACLs and Security Groups are interchangeable in AWS Security.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of CloudTrail Logging in AWS Security?

CloudTrail Logging is used for data storage only

CloudTrail Logging is responsible for network security in AWS

CloudTrail Logging is not relevant for AWS security

CloudTrail Logging plays a crucial role in enhancing security by providing detailed logs of API calls and user activity within AWS services.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do VPC endpoints enhance security in AWS?

VPC endpoints enhance security by allowing direct access to AWS services without any encryption.

VPC endpoints enhance security by exposing all traffic to the public internet.

VPC endpoints enhance security by sharing network resources with other VPCs.

VPC endpoints enhance security by providing private connectivity to AWS services within the VPC.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?