Which services are integrated with KMS encryption? (choose 2)
• https://aws.amazon.com/kms/features/
Under the AWS shared responsibility model what is the customer responsible for? (choose 2)
Which service records API activity on your account and delivers log files to an Amazon S3 bucket?
The IAM service can be used to manage which objects? (choose 2)
Under the shared responsibility model, what are examples of shared controls? (choose 2)
Which of the following are features of Amazon CloudWatch? (choose 2)
Which statement below is incorrect in relation to Security Groups?
• Security groups are stateful meaning that if traffic is allowed in one direction, the return traffic is automatically allowed regardless of whether there is a matching rule for the traffic
What constraints apply to customers when performing penetration testing? (choose 2)
Which statement below is incorrect in relation to Network ACLs?
Which feature can you use to grant read/write access to an Amazon S3 bucket?
Which AWS service is used to enable multi-factor authentication?
Which AWS service gives you centralized control over the encryption keys used to protect your data?
How can a security compliance officer retrieve AWS compliance documentation such as a SOC 2 report?
Which service provides visibility into user activity by recording actions taken on your account?
A new user is unable to access any AWS services, what is the most likely explanation?
Which of the following compliance programs allows the AWS environment to process, maintain, and store protected health information?
• AWS enables covered entities and their business associates subject to the U.S. Health Insurance Portability and Accountability Act of 1996 (HIPAA) to use the secure AWS environment to process, maintain, and store protected health information
Which file format is used to write AWS Identity and Access Management (IAM) policies?
• You manage access in AWS by creating policies and attaching them to IAM identities or AWS resources. A policy is an object in AWS that, when associated with an entity or resource, defines their permissions. AWS evaluates these policies when a principal, such as a user, makes a request. Permissions in the policies determine whether the request is allowed or denied. Most policies are stored in AWS as JSON documents
At what level is a Network ACL applied?
Which AWS service protects against common exploits that could compromise application availability, compromise security or consume excessive resources?
How can an organization assess application for vulnerabilities and deviations from best practice?
Which of the following is NOT one of the five AWS Trusted Advisor categories?
• The five categories are cost optimization, performance, security, fault tolerance and service limits
Which of the following are AWS recommended best practices in relation to IAM? (choose 2)
Which of the following security operations tasks must be performed by AWS customers? (choose 2)
• The customer is responsible for installing security updates on EC2 instances and enabling MFA. AWS is responsible for security of the physical data center and the infrastructure upon which customer services run
Which services are involved with security? (choose 2)