AWS Identity and Access Management (IAM)
AWS Identity and Access Management (IAM) provides fine-grained access control across all of AWS. With IAM, you can specify who can access which services and resources, and under which conditions. With IAM policies, you manage permissions to your workforce and systems to ensure least-privilege permissions.
Use cases
With IAM, you can manage AWS permissions for workforce users and workloads. For workforce users, we recommend that you use AWS Single Sign-On (AWS SSO) to manage access to AWS accounts and permissions within those accounts. AWS SSO makes it easier to provision and manage IAM roles and policies across your AWS organization. For workload permissions, use IAM roles and policies, and grant only the required access for your workloads.
Q.1 Which of the following AWS service helps in the overall management of Security in the cloud?
A. Aurora
B. VPC
C. IAM
D. Cloudwatch
Correct Answer : IAM
Q.2 An operating system, data encryption, and network traffic protection falls under the responsibilities of _.
A. AWS
B. Customers
C. Both AWS and customers
D. None of the options
Correct Answer : Both AWS and customers
Q.3 Is it recommended to use the root account for regular use?
A. True
B. False
Correct Answer : False
Q.4 Existing identity management systems like Microsoft AD can be integrated into AWS to manage permissions.
A. True
B. False
Correct Answer : True
Q.5 AWS CloudTrail records all the API interactions and stores the data in S3 Buckets.
A. True
B. False
Correct Answer : True
Q.6 IAM user needs to use both the access key ID and secret access key to make API calls.
A. True
B. False
Correct Answer : True
Q.7 AWS Global Infrastructure consists of __.
A. Edge Locations
B. Availability Zones
C. Regions
D. All the options
Correct Answer : All the options
Q.8 Which IAM policy provides permissions to resolve issues with AWS?
A. System Administrator
B. Administrator
C. Power user
D. Support user
Correct Answer : Power user
Q.9 Roles can be assigned to other AWS services.
A. True
B. False
Correct Answer : True
Q.10 Custom policies are written in __.
A. XML
B. text
C. JSON
D. All the options
Correct Answer : JSON
Q.11 __ is used to validate a user by AWS to use a particular resource.
A. Policy
B. Role
C. Access Keys
D. MFA
Correct Answer : Policy
Q.12 The maximum number of users that an AWS account can have is __.
A. 500
B. 100
C. 5000
D. 1000
Correct Answer : 5000
Q.13 Which of the following is not an open ID provider?
A. Google
B. SBI Account
C. Amazon
D. Facebook
Correct Answer : Facebook
Q.14 Service linked roles are predefined by __.
A. Service
B. AWS
C. Policy
D. None of the options
Correct Answer : Service
Q.15 __ is an inherent part of an IAM role, and it specifies the principals that are allowed to use the role.
A. Signed policy
B. Principle policy
C. Trust policy
D. None of the options
Correct Answer : Trust policy
Q.16 Every user you create in IAM starts with _.
A. No access
B. Partial permissions
C. Full access
D. None of the options
Correct Answer : No access
Q.17 Role chaining is generally used in identity federation.
A. True
B. False
Correct Answer : True
Q.18 AWS STS returns temporary security credentials with an expiration time of __.
A. 7 hours
B. 1 hour
C. 15 minutes
D. None of the options
Correct Answer : None of the options
Q.19 Using which of the following a user is validated by AWS to use a particular resource ?
A. MFA
B. Policy
C. Access Keys
D. Role
Correct Answer : Policy
Q.20 An IAM user can be a member of a maximum of _ groups.
A. 5
B. 10
C. 4
D. 20
Correct Answer : 5
Q.21 An IAM role that grants permissions to an AWS service so it can access AWS resources. The policies that you attach to it determine which AWS resources the service can access and what it can do with those resources.
A. Permission role
B. Granted role
C. Service role
D. Selector role
Correct Answer : Permission role
Q.22 AWS Identity and Access Management are available through __ interfaces.
A. Query API
B. Management console
C. AWS CLI
D. All the options
Correct Answer : All the options
Q.23 The security of the cloud is the responsibility of _.
A. Customers
B. AWS
C. Both the options
D. None of the options
Correct Answer : AWS
Q.24 A practice that adds increased security to an account by using multiple forms of authentication is __.
A. Root logging
B. MFA
C. Logging
D. None of the options
Correct Answer : MFA
Q.25 What is the practice of distributing responsibility among multiple people so that no one person has full control of everything?
A. Separation of responsibility
B. Separation of duties
C. Responsibility sharing
D. None
Correct Answer : Separation of responsibility
Q.26 Temporary security credentials are not stored with users.
A. True
B. False
Correct Answer : True
Q.27 Security is still considered as the major hurdle for businesses to opt for cloud.
A. True
B. False
Correct Answer : True
Q.28 You can change the properties but not the user name using a console in IAM.
A. True
B. False
Correct Answer : True