AWS Identity and Access Management Quiz Question and Answers
AWS Global Infrastructure consists of __________.
- Edge Locations
- Availability Zones
- Regions
- All the options
An IAM user can be a member of a maximum of _________ groups.
- 5
- 10
- 4
- 20
An IAM role that grants permissions to an AWS service so it can access AWS resources. The policies that you attach to it determine which AWS resources the service can access and what it can do with those resources.
- Permission role
- Granted role
- Service role
- Selector role
AWS Identity and Access Management are available through ____________ interfaces.
- Query API
- Management console
- AWS CLI
- All the options
IAM user needs to use both the access key ID and secret access key to make API calls.
- True
- False
You can change the properties but not the user name using a console in IAM.
- True
- False
The maximum number of users that an AWS account can have is ________.
- 500
- 100
- 5000
- 1000
AWS CloudTrail records all the API interactions and stores the data in S3 Buckets.
- True
- False
Is it recommended to use the root account for regular use?
- True
- False
Existing identity management systems like Microsoft AD can be integrated into AWS to manage permissions.
- True
- False
Temporary security credentials are not stored with users.
- True
- False
Security is still considered as the major hurdle for businesses to opt for cloud.
- True
- False
Role chaining is generally used in identity federation.
- True
- False
Which IAM policy provides permissions to resolve issues with AWS?
- System Administrator
- Administrator
- Power user
- Support user
Roles can be assigned to other AWS services.
- True
- False
Which of the following is not an open ID provider?
- SBI Account
- Amazon
Custom policies are written in ____________.
- XML
- text
- JSON
- All the options
Which of the following AWS service helps in the overall management of Security in the cloud?
- Aurora
- VPC
- IAM
- Cloudwatch
An operating system, data encryption, and network traffic protection falls under the responsibilities of ___________.
- AWS
- Customers
- Both AWS and customers
- None of the options
__________ is used to validate a user by AWS to use a particular resource.
- Policy
- Role
- Access Keys
- MFA
Service linked roles are predefined by ______.
- Service
- AWS
- Policy
- None of the options
________ is an inherent part of an IAM role, and it specifies the principals that are allowed to use the role.
- Signed policy
- Principle policy
- Trust policy
- None of the options
Every user you create in IAM starts with _______.
- No access
- Partial permissions
- Full access
- None of the options
AWS STS returns temporary security credentials with an expiration time of ______________.
- 7 hours
- 1 hour
- 15 minutes
- None of the options
Using which of the following a user is validated by AWS to use a particular resource ?
- MFA
- Policy
- Access Keys
- Role
The security of the cloud is the responsibility of ___________.
- Customers
- AWS
- Both the options
- None of the options
A practice that adds increased security to an account by using multiple forms of authentication is ______________.
- Root logging
- MFA
- Logging
- None of the options
What is the practice of distributing responsibility among multiple people so that no one person has full control of everything?
- Separation of responsibility
- Separation of duties
- Responsibility sharing
- None
View Releated Quiz Questions:
👉 Cloud Computing Quiz
👉 Cloud Foundry Quiz