Quiz #3: AWS Certified Cloud Practitioner – Security & Compliance Fundamentals
AWS Security & Compliance Challenge! 🔐🛡️
Test Your Security Knowledge! This 10-question AWS Security & Compliance quiz covers essential security services, compliance concepts, and identity management fundamentals. Critical for the Cloud Practitioner exam and real-world cloud security.
Select the best answer for each question. Click Check My Security Knowledge when you're ready to see your score and detailed explanations!
AWS Security Concepts Explained
Understand the reasoning behind each answer with detailed AWS security service explanations.
Select a Question to View Security Explanation
Click on any of the question tabs above to see detailed explanations of AWS security services and compliance concepts.
All explanations include AWS security best practices and compliance requirements.
Question 1: Identity and Access Management (IAM)
Correct Answer: C) AWS IAM
AWS Identity and Access Management (IAM) provides centralized control over who can access what in your AWS environment.
IAM Key Features:
- Manage users, groups, and their permissions
- Create and manage AWS access credentials
- Set up multi-factor authentication (MFA)
- Define fine-grained access policies using JSON
- Integrate with corporate identity systems
Why not others? Security Hub is for security findings aggregation, GuardDuty is threat detection, Config is for resource configuration tracking.
Question 2: Shared Responsibility Model
Correct Answer: B) Customer
In the AWS Shared Responsibility Model, the customer is responsible for security IN the cloud, while AWS is responsible for security OF the cloud.
Customer Responsibilities:
- Operating system security and patches
- Application security and data encryption
- IAM user access management
- Network traffic protection
AWS Responsibilities:
- Infrastructure security (hardware, software)
- Global infrastructure security
- Managed services security
Question 3: DDoS Protection
Correct Answer: D) AWS Shield Standard
AWS Shield Standard provides automatic protection against common DDoS attacks for all AWS customers at no additional cost.
Shield Standard Features:
- Always-on detection and automatic mitigation
- Protection against common network layer attacks
- No additional cost - included with AWS
- Works with Amazon CloudFront and Route 53
AWS Shield Advanced provides enhanced DDoS protection for additional costs with more features.
Question 4: Security Best Practices
Correct Answer: A) Principle of least privilege
The principle of least privilege means granting only the permissions required to perform a task - nothing more, nothing less.
Why Least Privilege Matters:
- Reduces attack surface
- Minimizes impact of credential compromise
- Complies with security best practices
- Supports regulatory compliance requirements
Always start with minimum permissions and add more only when necessary, rather than starting with broad permissions.
Question 5: Configuration Management
Correct Answer: C) AWS Config
AWS Config enables you to assess, audit, and evaluate the configurations of your AWS resources.
AWS Config Capabilities:
- Inventory of AWS resources
- Configuration history tracking
- Configuration change notifications
- Compliance checking against rules
- Relationship mapping between resources
Essential for security compliance, troubleshooting, and change management.
Question 6: Activity Monitoring
Correct Answer: B) Track user activity and API usage
AWS CloudTrail monitors and records account activity across your AWS infrastructure, providing event history of AWS API calls.
CloudTrail Features:
- Records API activity for accountability
- Helps with security analysis and troubleshooting
- Delivers log files to Amazon S3
- Integrates with CloudWatch Logs for monitoring
- Essential for compliance and auditing
Think of CloudTrail as the "security camera" for your AWS account.
Question 7: Encryption Key Management
Correct Answer: D) AWS KMS
AWS Key Management Service (KMS) makes it easy to create and control encryption keys used to encrypt your data.
KMS Key Features:
- Create and manage encryption keys
- Integrated with many AWS services
- Hardware security modules (HSMs) protection
- Key usage auditing with CloudTrail
- Automatic key rotation support
KMS is the foundation for data encryption across AWS services.
Question 8: Compliance Documentation
Correct Answer: A) Compliance documentation and reports
AWS Artifact is your go-to resource for compliance-related information that can help you meet regulatory requirements.
AWS Artifact Provides:
- Security and compliance reports (SOC, PCI, etc.)
- Online agreements
- Audit artifacts
- Certification documents
Available at no cost to help customers understand AWS compliance posture.
Question 9: Threat Detection
Correct Answer: C) AWS GuardDuty
AWS GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior.
GuardDuty Capabilities:
- Uses machine learning and anomaly detection
- Analyzes CloudTrail logs, VPC Flow Logs, DNS logs
- Detects compromised instances, reconnaissance, etc.
- Provides detailed findings with severity levels
- No security agents to deploy
Intelligent threat detection that gets smarter over time.
Question 10: Multi-Factor Authentication
Correct Answer: B) To add an extra layer of protection for user sign-in
Multi-factor authentication (MFA) adds an additional authentication method beyond just a password.
MFA Benefits:
- Requires something you know (password) + something you have (MFA device)
- Protects against stolen passwords
- Required for AWS root account best practices
- Available for IAM users as well
- Supports virtual and hardware MFA devices
Always enable MFA on your root account and privileged IAM users.
Resources / Study Guides:
by
What you will learn
- Develop core skills needed to work with AWS, Azure, and GCP
- Gain proficiency in compute, storage, and networking services across multi-cloud and hybrid-cloud environments
- Integrate cloud databases, big data, and machine learning services in multi-cloud environments
- Design and develop data pipelines, encompassing data ingestion, storage, processing, and visualization in the clouds
- Implement machine learning pipelines in multi-cloud environment
- Secure cloud infrastructure ecosystems with advanced cloud security services
Comments
Post a Comment