Quiz 1 of 0
Design Secure Applications and Architectures – Part B
Anastasia-Instructor January 10, 2024
Time limit: 0
Quiz Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
Your new educational app for high-school students uses Amazon Cognito to handle user authentication and authorization. Now, you are thinking to add another method of authentication in addition to just a username and password to make the app more secure.
What solution will you implement to add the extra layer of security?
CorrectIncorrect -
Question 2 of 10
2. Question
A company wants to add an additional layer of protection from web attacks that attempt to exploit vulnerabilities to its web app. The company needs to create rules to filter web traffic based on specific IP addresses and block common web exploits like SQL injection and cross-site scripting.
Which of the following AWS service meet these requirements?
CorrectIncorrect -
Question 3 of 10
3. Question
You have set up a VPC with a public subnet and the Internet gateway attached. You set up an EC2 instance with a public IP as well. The rule type and the rule source of the security group are ‘All Traffic’ and ‘0.0.0.0/0’ respectively. However, you are still not able to connect to the instance via the Internet.
How to resolve the issue in this case?
CorrectIncorrect -
Question 4 of 10
4. Question
A company wants to incorporate a single sign-on feature from its corporate Active Directory. The company also wants to restrict access for each individual user to a designated user folder in an S3 bucket.
Which of the following statements can meet the requirement? (Select all that apply)
CorrectIncorrect -
Question 5 of 10
5. Question
For data privacy, a European company has been asked to comply with the General Data Protection Regulation (GDRP). They have been told that all of the data being transferred and stored to Amazon Simple Storage Service (S3) must be encrypted.
What is the best option to do this? (Choose all that apply)
CorrectIncorrect -
Question 6 of 10
6. Question
In your startup, there is a requirement to allow one IAM user to modify the configuration of the security groups and placement groups which are used in a specific project. Each engineer and developer in your startup has an individual IAM user and they usually move from one project to another.
Which of the following would be the best way to allow this access?
CorrectIncorrect -
Question 7 of 10
7. Question
You have been tasked to implement a solution for providing single sign-on to existing staff that manage on-premise web applications and need access to the AWS management console to manage resources in the AWS cloud.
Which of the following services will you use to meet the requirement?
CorrectIncorrect -
Question 8 of 10
8. Question
You are developing an educational mobile app that uploads the user’s performance of individuals lessons to DynamoDB. Amazon Cognito is being used for authentication, authorization, and user management, and users sign-in with Facebook IDs and Google IDs. In order to securely store data in DynamoDB, the design should use temporary AWS credentials.
Which of the following feature of Amazon Cognito is used to obtain temporary credentials to access AWS services?
CorrectIncorrect -
Question 9 of 10
9. Question
You have been hired by a company to implement a solution to meet the following requirement.
The company handles sensitive data in their private subnet, the data is processed by the EC2 instances and then delivered to S3. You have been instructed that the data shouldn’t be passed through the public Internet.How should you design this solution so that the data does not pass through the public Internet?
CorrectIncorrect -
Question 10 of 10
10. Question
You are developing a new Social Media App and accidentally you deleted a file hosted in Amazon Amazon Simple Storage Service (S3) which has caused disruption of service.
Which of the following solution will prevent this from happening again?
CorrectIncorrect