Exams > Amazon > AWS-SysOps: AWS Certified SysOps Administrator
AWS-SysOps: AWS Certified SysOps Administrator
Page 44 out of 91 pages Questions 431-440 out of 910 questions
Question#431

Does Amazon RDS support SSL encryption for SQL Server DB Instances?

  • A. Yes, for all supported SQL Server editions
  • B. No
  • C. Yes, but only when the instances are in a single region
  • D. No, encryption using SSL is supported only in the GovCloud.
Discover Answer Hide Answer

A
Amazon RDS supports SSL encryption for SQL Server DB Instances. Using SSL, you can encrypt connections between your applications and your SQL Server
DB Instances. This is available for all the versions of Microsoft SQL Server.
Reference:
http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Concepts.DBEngine.SQLServer.html

Question#432

Amazon Cognito supports web identity federation through _____.

  • A. custom sign-in code or own user identities
  • B. Facebook, Google, and Amazon
  • C. a configuration check for rules that deny access to specific ports
  • D. an AWS user group
Discover Answer Hide Answer

B
Amazon Cognito supports developer authenticated identities, in addition to web identity federation through Facebook, Google, and Amazon.
Reference:
http://docs.aws.amazon.com/cognito/devguide/identity/developer-authenticated-identities/

Question#433

A user has created an application which will be hosted on EC2. The application makes API calls to DynamoDB to fetch certain data. The application running on this instance is using the SDK for making these calls to DynamoDB. Which of the below mentioned statements is true with respect to the best practice for security in this scenario?

  • A. The user should create an IAM user with permissions to access DynamoDB and use its creden-tials within the application for connecting to DynamoDB
  • B. The user should create an IAM user with DynamoDB and EC2 permissions. Attach the user with the application so that it does not use the root account credentials
  • C. The user should attach an IAM role to the EC2 instance with necessary permissions for making API calls to DynamoDB.
  • D. The user should create an IAM role with EC2 permissions to deploy the application
Discover Answer Hide Answer

C
With AWS IAM a user is creating an application which runs on an EC2 instance and makes requests to AWS, such as DynamoDB or S3 calls. Here it is recommended that the user should not create an IAM user and pass the user's credentials to the application or embed those credentials inside the ap-plication.
Instead, the user should use roles for EC2 and give that role access to DynamoDB /S3. When the roles are attached to EC2, it will give temporary security credentials to the application hosted on that EC2, to connect with DynamoDB / S3.
Reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_WorkingWithGroupsAndUsers.html

Question#434

A user is trying to create a list of IAM users with the AWS console. When the IAM users are creat-ed which of the below mentioned credentials will be enabled by default for the user?

  • A. IAM X.509 certificates
  • B. Nothing. Everything is disabled by default
  • C. IAM passwords
  • D. IAM access key and secret access key
Discover Answer Hide Answer

B
Newly created IAM users have no password and no access key (access key ID and secret access key). If the user needs to administer your AWS resources using the AWS Management Console, you can create a password for the user. If the user needs to interact with AWS programmatically (using the command line interface (CLI), the AWS SDK, or service-specific APIs), you can create an access key for that user. The credentials you create for users are what they use to uniquely identi-fy themselves to AWS.
Reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_WorkingWithGroupsAndUsers.html

Question#435

You are setting up security groups for both incoming traffic and outgoing traffic in your VPC net-work on the AWS CLI. Which of the following AWS CLI commands would you use for adding one or more incoming traffic rules to a security group?

  • A. authorize-security-group-egress
  • B. authorize-security-group-ingress
  • C. Grant-EC2SecurityGroupOutgress
  • D. Get-EC2SecurityGroup
Discover Answer Hide Answer

B
When setting up security groups for incoming traffic in your VPC network, to add one or more in-gress (incoming traffic) rules to a security group. authorize- security-group-ingress (AWS CLI). ec2-authorize (Amazon EC2 CLI). Grant-EC2SecurityGroupIngress (AWS Tools for Windows Pow-erShell) In computer networking, ingress filtering is a technique used to make sure that incoming packets are actually from the networks that they claim to be from. In computer networking, egress filtering is the practice of monitoring and potentially restricting the flow of information outbound from one network to another. Typically, it is information from a private TCP/IP computer network to the Internet that is controlled.
Reference:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html

Question#436

The IAM entity "AWS Account" is similar to:

  • A. The Unix concept of root or superuser
  • B. The Unix concept of a non privilege user
  • C. The Unix concept of guest user
  • D. The primary billing entity
Discover Answer Hide Answer

A
In IAM the AWS Account is the role with most important permissions. It's equivalent to the root account in a UNIX environment.
Reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/IAMBestPractices.html

Question#437

AWS KMS (Key Management Service) uses symmetric key cryptography to perform encryption and decryption. Symmetric key cryptography uses the same algorithm and key to both encrypt and de-crypt digital data. The unencrypted data is typically called plaintext whether it is text or not, and the encrypted data is typically called _____.

  • A. ciphertext
  • B. symtext
  • C. encryptext
  • D. cryptext
Discover Answer Hide Answer

A
Encryption and Decryption -
AWS KMS uses symmetric key cryptography to perform encryption and decryption. Symmetric key cryptography uses the same algorithm and key to both encrypt and decrypt digital data. The Unen-crypted data is typically called plaintext whether it is text or not. The encrypted data is typically called ciphertext.
Reference:
http://docs.aws.amazon.com/kms/latest/developerguide/crypto_overview.html

Question#438

Bob is an IAM user who has access to the EC2 services. Admin is an IAM user who has access to all the AWS services including IAM. Can Bob change his own password?

  • A. No, the IAM user can never change the password
  • B. Yes, only from AWS CLI
  • C. Yes, only from the AWS console
  • D. Yes, provided Admin has given Bob access to change his own password
Discover Answer Hide Answer

D
The IAM users by default cannot change their password. The root owner or IAM administrator needs to set the policy in the password policy page, which should allow the user to change their password. Once it is enabled, the IAM user can always change their own passwords from the AWS console or CLI.
Reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingUserPwdSelf.html

Question#439

ABC has three AWS accounts. They have created separate IAM users within each account.
ABC wants a single IAM login URL such as https://abc.signin.aws.amazon.com/console/ for use by IAM users in all three accounts.
How can this be achieved?

  • A. Merge all the accounts with consolidated billing
  • B. Create the S3 bucket with an alias name and use the redirect rule to forward requests to various accounts
  • C. Create the same account alias with each account ID
  • D. It is not possible to have the same IAM account login URL for separate AWS accounts
Discover Answer Hide Answer

D
Users can create an alias for they accounts, but the alias should be unique to the account. For example, the alias "abc" can be assigned to only one account. If a user wants the URL of the AWS IAM sign-in page to have a company name instead of the AWS account ID, he can create an alias for his AWS account ID.
Reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/AccountAlias.html

Question#440

Which of the following Identity and Access Management (IAM) policy keys of AWS Direct Con-nect is used for date/time conditions?

  • A. aws:CurrentTime
  • B. aws:UserAgent
  • C. aws:SourceIp
  • D. aws:SecureTransport
Discover Answer Hide Answer

A
AWS Direct Connect implements the following policy keys of Identity and Access Management: aws:CurrentTime (for date/time conditions) aws:EpochTime (the date in epoch or UNIX time, for use with date/time conditions) aws:SecureTransport (Boolean representing whether the request was sent using SSL) aws:SourceIp (the requester's IP address, for use with IP address conditions) aws:UserAgent (in-formation about the requester's client application, for use with string conditions)
Reference:
http://docs.aws.amazon.com/directconnect/latest/UserGuide/using_iam.html

chevron rightPrevious Nextchevron right