Time limit: 0
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
Which of the following AWS service is a security management service which allows you to centrally configure and manage firewall rules across your accounts and applications in AWS Organization?
CorrectIncorrect -
Question 2 of 20
2. Question
Which of the following options below is a control which a customer fully inherits from AWS in accordance with the AWS shared responsibility model?
CorrectIncorrect -
Question 3 of 20
3. Question
Which of the following guidelines is not considered as a best practice for Amazon S3?
CorrectIncorrect -
Question 4 of 20
4. Question
Your company needs to deny any permission to any user to perform any Amazon S3 operations on objects in an S3 bucket unless the request originates from the range of 83.122.40.0/24 IP addresses. Which of the following should you use to meet the requirement?
CorrectIncorrect -
Question 5 of 20
5. Question
You have been tasked to implement a solution to attach policies to multiple users at one time. Which AWS service will help you to meet the requirement?
CorrectIncorrect -
Question 6 of 20
6. Question
Which of the following AWS services support Access Control Lists (ACLs)? (Choose all that apply.)
CorrectIncorrect -
Question 7 of 20
7. Question
Which of the following actions you can follow to improve the security of your Identity and Access Management (IAM) users? (Select all that apply.)
CorrectIncorrect -
Question 8 of 20
8. Question
Assuming you are in the Identity and Access Management (IAM) dashboard of your AWS Management Console, which of the following services below can you manage? (Select all that apply)
CorrectIncorrect -
Question 9 of 20
9. Question
In compliance with PCI DSS, an EU-based company is required to provide compliance documents, such as Payment Card Industry (PCI). Where are these AWS compliance documents located?
CorrectIncorrect -
Question 10 of 20
10. Question
You have been tasked to increase the security of your VPC to control traffic in and out of your company’s subnets. Which of the following services will you use to complete the task?
CorrectIncorrect -
Question 11 of 20
11. Question
Which of the following AWS services is a fully managed data security service that uses machine learning and pattern matching to discover, classify, and help you protect your sensitive data in Amazon S3?
CorrectIncorrect -
Question 12 of 20
12. Question
Which of the followings are considered prohibited activities when you conduct security assessments and penetration testing against AWS infrastructure? (Choose all that apply.)
CorrectIncorrect -
Question 13 of 20
13. Question
AWS customers are welcome to carry out security assessments or penetration tests against AWS infrastructure without prior approval for 8 services. Which of the following services are included? (Choose all that apply.)
CorrectIncorrect -
Question 14 of 20
14. Question
Which of the following should you use if you need to provide temporary AWS credentials for users who have been authenticated via their social media logins as well as for guest users who do not require any authentication?
CorrectIncorrect -
Question 15 of 20
15. Question
Which of the following tasks fall under the sole responsibility of customer based on the shared responsibility model?
CorrectIncorrect -
Question 16 of 20
16. Question
Which of the following are valid important characteristics of an IAM Group? (Choose all that apply.)
CorrectIncorrect -
Question 17 of 20
17. Question
What you can use to delegate access to users, applications, or services that don’t normally have access to your AWS resources?
CorrectIncorrect -
Question 18 of 20
18. Question
Which of the following policies are available for granting permission to your Amazon S3 resources and use JSON-based access policy language? (Choose all that apply.)
CorrectIncorrect -
Question 19 of 20
19. Question
Recently your company migrated to AWS and now you are responsible to implement a solution to identify unexpected and potentially unauthorized or malicious activity in your AWS environment. Which of the following AWS services will you implement to meet the requirement?
CorrectIncorrect -
Question 20 of 20
20. Question
Which of the following are some common things you can do with the policy simulator? (Choose all that apply.)
CorrectIncorrect