Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following AWS service helps in the overall management of Security in the cloud?

Answer»

Which of the following AWS service HELPS in the OVERALL management of Security in the cloud?
CHOOSE the correct option from below list
(1)Aurora
(2)VPC
(3)Cloudwatch
(4)IAM

Answer:-(4)IAM

2.

You can set up your password policy for users in IAM.

Answer»

You can SET up your password policy for users in IAM.
Choose the CORRECT OPTION from below LIST
(1)True
(2)False

Answer:-(1)True

3.

Is it necessary to have a new bucket for CloudTrail logs?

Answer»

Is it necessary to have a new bucket for CloudTrail logs?
CHOOSE the correct option from below LIST
(1)False
(2)True

Answer:-(1)False

4.

Which storage service provides encryption services for both data in flight and data at rest?

Answer»

Which storage service provides encryption services for both data in flight and data at rest?
Choose the correct option from below LIST
(1)DynamoDB
(2)Relational Database Service (RDS)
(3)Simple Storage Service (S3)

ANSWER:-(3)Simple Storage Service (S3)

5.

An operating system, data encryption, and network traffic protection falls under the responsibilities of ___________.

Answer»

An operating system, data ENCRYPTION, and network TRAFFIC protection falls under the responsibilities of ___________.
Choose the correct option from below list
(1)NONE of the options
(2)AWS
(3)Both AWS and customers
(4)Customers

Answer:-(4)Customers

6.

Which of the following is not an open ID provider?

Answer»

Which of the following is not an OPEN ID PROVIDER?
Choose the correct option from below LIST
(1)Facebook
(2)SBI Account
(3)Amazon
(4)Google

Answer:-(2)SBI Account

7.

Why is it important to enforce a strict password policy for your AWS account?

Answer»

Why is it important to enforce a strict password POLICY for your AWS account?
Choose the CORRECT option from below list
(1)AMAZON will close your account if you get hacked.
(2)Your MOM said so.
(3)It's important to PROTECT your data.
(4)A and B

Answer:-(4)A and B

8.

Which is Amazon Web Services newest encryption tool?

Answer»

Which is Amazon Web SERVICES newest encryption tool?
Choose the correct option from below list
(1)AWS Identity and ACCESS Management
(2)Amazon Elastic BLOCK STORAGE Encryption
(3)Amazon S3

Answer:-(2)Amazon Elastic Block Storage Encryption

9.

Which is a recommended way to protect Access Keys?

Answer»

Which is a recommended way to protect Access Keys?
Choose the correct option from below list
(1)TRAIN developers how to better protect their access keys.
(2)DEFINE IAM policies.
(3)ENABLE CLOUDWATCH notifications.
(4)All of the above

Answer:-(4)All of the above

10.

What are the three authentication options offered by AWS?

Answer»

What are the THREE authentication options OFFERED by AWS?
Choose the correct option from below LIST
(1)Username and password, certificate, access keys
(2)Access MONITORING, password, LOCKING systems
(3)Access keys, system monitoring, password

Answer:-(1)Username and password, certificate, access keys

11.

Security is still considered as the major hurdle for businesses to opt for cloud.

Answer»

Security is still CONSIDERED as the major hurdle for businesses to opt for cloud.
Choose the CORRECT OPTION from below list
(1)TRUE
(2)False

Answer:-(1)True

12.

Every user you create in IAM starts with _______.

Answer»

Every user you create in IAM starts with _______.
Choose the correct option from below LIST
(1)Full ACCESS
(2)No access
(3)NONE of the options
(4)PARTIAL permissions

Answer:-(2)No access

13.

The maximum number of users that an AWS account can have is ________.

Answer»

The maximum number of users that an AWS account can have is ________.
CHOOSE the CORRECT OPTION from below list
(1)100
(2)1000
(3)500
(4)5000

Answer:-(4)5000

14.

Which IAM policy provides full access to resources in it but not for IAM?

Answer»

Which IAM policy PROVIDES full access to resources in it but not for IAM?
Choose the CORRECT OPTION from below list
(1)Power user
(2)Support user
(3)Administrator
(4)System Administrator

Answer:-(1)Power user

15.

IAM user needs to use both the access key ID and secret access key to make API calls.

Answer»

IAM user needs to USE both the access key ID and secret access key to make API calls.
Choose the correct OPTION from below list
(1)True
(2)False

Answer:-(1)True

16.

Existing identity management systems like Microsoft AD can be integrated into AWS to manage permissions.

Answer»

Existing identity management systems like Microsoft AD can be integrated into AWS to MANAGE permissions.
Choose the CORRECT OPTION from below list
(1)False
(2)TRUE

Answer:-(2)True

17.

AWS Global Infrastructure consists of __________.

Answer»

AWS GLOBAL Infrastructure CONSISTS of __________.
CHOOSE the correct option from below LIST
(1)All the options
(2)Availability Zones
(3)Edge Locations
(4)Regions

Answer:-(1)All the options

18.

Custom policies are written in ____________.

Answer»

Custom policies are WRITTEN in ____________.
CHOOSE the correct option from below list
(1)All the options
(2)text
(3)JSON
(4)XML

Answer:-(3)JSON

19.

AWS CloudTrail records all the API interactions and stores the data in S3 Buckets.

Answer»

AWS CloudTrail records all the API INTERACTIONS and stores the data in S3 Buckets.
Choose the CORRECT OPTION from below list
(1)False
(2)True

Answer:-(2)True

20.

Which IAM policy provides permissions to resolve issues with AWS?

Answer»

Which IAM policy provides PERMISSIONS to resolve ISSUES with AWS?
Choose the correct option from below LIST
(1)Power user
(2)System Administrator
(3)Administrator
(4)SUPPORT user

Answer:-(4)Support user

21.

What is the practice of distributing responsibility among multiple people so that no one person has full control of everything?

Answer»

What is the PRACTICE of distributing responsibility among multiple people so that no one PERSON has full control of everything?
Choose the correct OPTION from below list
(1)None
(2)Separation of responsibility
(3)Separation of DUTIES
(4)Responsibility sharing

Answer:-(3)Separation of duties

22.

Which of these Amazon's tools is for monitoring?

Answer»

Which of these Amazons tools is for monitoring?
CHOOSE the CORRECT option from below list
(1)CloudWatch
(2)CloudFront
(3)CloudSearch

Answer:-(1)CloudWatch

23.

You can change the properties but not the user name using a console in IAM.

Answer»

You can CHANGE the properties but not the USER name USING a console in IAM.
Choose the correct option from below list
(1)False
(2)True

Answer:-(2)True

24.

________ is an inherent part of an IAM role, and it specifies the principals that are allowed to use the role.

Answer»

________ is an inherent part of an IAM role, and it specifies the PRINCIPALS that are allowed to USE the role.
Choose the CORRECT option from below list
(1)None of the options
(2)SIGNED policy
(3)Principle policy
(4)Trust policy

Answer:-(4)Trust policy

25.

Temporary security credentials are not stored with users.

Answer» TEMPORARY security credentials are not stored with users.
Choose the correct OPTION from below LIST
(1)FALSE
(2)True

Answer:-(2)True
26.

__________ is used to validate a user by AWS to use a particular resource.

Answer»

__________ is USED to VALIDATE a user by AWS to use a PARTICULAR resource.
Choose the correct option from below list
(1)Access KEYS
(2)MFA
(3)Role
(4)Policy

Answer:-(4)Policy

27.

Which of the following service is used in the Data Exfiltration process in the cloud watch?

Answer»

Which of the following service is used in the Data Exfiltration process in the cloud watch?
Choose the CORRECT option from below list
(1)AWS LAMBDA
(2)S3
(3)IAM
(4)EC2

Answer:-(1)AWS Lambda

28.

Role chaining is generally used in identity federation.

Answer»

Role chaining is GENERALLY USED in IDENTITY federation.
Choose the correct OPTION from below list
(1)False
(2)True

Answer:-(2)True

29.

What can happen if a hacker gets a hold of your account key?

Answer»

What can happen if a hacker gets a hold of your account key?
Choose the CORRECT OPTION from below list
(1)Accounts can be hacked.
(2)Servers may be terminate
(3)DATA may be deleted.
(4)All of the above

Answer:-(4)All of the above

30.

A practice that adds increased security to an account by using multiple forms of authentication is ______________.

Answer»

A practice that adds increased security to an ACCOUNT by using multiple FORMS of authentication is ______________.
CHOOSE the CORRECT option from below LIST
(1)Logging
(2)MFA
(3)Root logging
(4)None of the options

Answer:-(2)MFA

31.

An IAM role that grants permissions to an AWS service so it can access AWS resources. The policies that you attach to it determine which AWS resources

Answer»

An IAM ROLE that grants permissions to an AWS service so it can access AWS resources. The policies that you attach to it determine which AWS resources the service can access and what it can do with those resources
Choose the CORRECT option from below list
(1)permission role
(2)service role
(3)SELECTOR role
(4)Granted role

Answer:-(2)service role

32.

The security of the cloud is the responsibility of ____________.

Answer»

The security of the cloud is the responsibility of ____________.
Choose the correct option from below list
(1)Both AWS and customers
(2)None of the OPTIONS
(3)AWS
(4)Customers

Answer:-(3)AWS

33.

Which IAM feature helps in managing users external to IAM?

Answer»

Which IAM feature helps in managing users external to IAM?
Choose the correct option from below list
(1)Policies
(2)Roles
(3)IDENTITY FEDERATION
(4)MFA

Answer:-(3)Identity federation

34.

SAML represents __________________.

Answer»

SAML represents __________________.
CHOOSE the correct OPTION from below list
(1)Secret Assertion Markup Language
(2)None of the options
(3)SUGGESTED Assertion Markup Language
(4)Security Assertion Markup Language

Answer:-(4)Security Assertion Markup Language

35.

Roles can be assigned to other AWS services.

Answer»

Roles can be assigned to other AWS services.
Choose the CORRECT option from below list
(1)True
(2)False

Answer:-(1)True