Course Hero Logo

Which of the following willwhen executed on its

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 21 - 23 out of 86 pages.

3.Which of the following will—when executed on its own—prevent an IAM user with noexisting policies from launching an EC2 instance? (Choose three.)A.Attach no policies to the user.B.Attach two policies to the user, with one policy permitting full EC2 access and theother permitting IAM password changes but denying EC2 access.C.Attach a single policy permitting the user to create S3 buckets.D.Attach the AdministratorAccess policy.E.Associate an IAM action statement blocking all EC2 access to the user’s account.
4.Which of the following are important steps for securing IAM user accounts? (Choose two.)
5.To reduce your exposure to possible attacks, you’re auditing the active access keys associ-ated with your account. Which of the following AWS CLI commands can tell you whether aspecified access key is still being used?
180Chapter 6Authentication and Authorization—AWS Identity and Access ManagementC.aws iam get-access-key-last-used access-last-key-id <key_ID>D.aws iam get-access-key-last-used --access-key-id <key_ID>6.You’re looking to reduce the complexity and tedium of AWS account administration. Whichof the following is the greatest benefit of organizing your users into groups?
7.During an audit of your authentication processes, you enumerate a number of identity typesand want to know which of them might fit the category of “trusted identity” and requiredeeper investigation. Which of these isnotconsidered a trusted entity in the context ofIAM roles?A.A web identity authenticating with GoogleB.An identity coming through a SAML-based federated providerC.An identity using an X.509 certificateD.A web identity authenticating with Amazon Cognito
8.Your company is bidding for a contract with a U.S. government agency that demands anycryptography modules used on the project be compliant with government standards. Whichof the following AWS services provides virtual hardware devices for managing encryptioninfrastructure that’s FIPS 140-2 compliant?

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 86 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
NoProfessor
Tags
IP address, AWS, Amazon Elastic Compute Cloud

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture