D1
Threat Detection & Incident Response
Q1.
What AWS service continuously monitors for malicious activity and unauthorized behavior using threat intelligence?
✓ Explanation: Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior using threat intelligence feeds, ML, and anomaly detection.
📖 GuardDuty User Guide →
📖 GuardDuty User Guide →
Q2.
Which service aggregates security findings from multiple AWS services into a single dashboard?
✓ Explanation: AWS Security Hub provides a comprehensive view of security alerts and compliance status by aggregating findings from GuardDuty, Inspector, Macie, and other services.
📖 Security Hub User Guide →
📖 Security Hub User Guide →
Q3.
What does Amazon Detective help you do?
✓ Explanation: Amazon Detective makes it easy to analyze, investigate, and quickly identify the root cause of security findings by automatically collecting log data and using ML to build visualizations.
📖 Detective User Guide →
📖 Detective User Guide →
Q4.
Which AWS service can automatically remediate non-compliant resources using rules?
✓ Explanation: AWS Config rules can detect non-compliant resources and trigger automatic remediation actions through AWS Systems Manager Automation documents.
📖 AWS Config Remediation →
📖 AWS Config Remediation →
Q5.
GuardDuty analyzes which of the following data sources? (Select the BEST answer)
✓ Explanation: GuardDuty analyzes VPC Flow Logs, DNS logs, CloudTrail management events, and optionally S3 data events and EKS audit logs to detect threats.
📖 GuardDuty Data Sources →
📖 GuardDuty Data Sources →
Q6.
What is the first step in the AWS incident response framework?
✓ Explanation: The AWS incident response framework follows: Prepare, Detect, Contain, Eradicate, Recover, and Lessons Learned. Preparation is always the first step.
📖 AWS Security Incident Response Guide →
📖 AWS Security Incident Response Guide →
Q7.
Which service would you use to automatically respond to a GuardDuty finding?
✓ Explanation: Amazon EventBridge can capture GuardDuty findings as events and trigger AWS Lambda functions to perform automated remediation actions.
📖 GuardDuty EventBridge Integration →
📖 GuardDuty EventBridge Integration →
Q8.
What type of finding does GuardDuty generate when it detects cryptocurrency mining on an EC2 instance?
✓ Explanation: GuardDuty generates CryptoCurrency:EC2 finding types when it detects EC2 instances communicating with known cryptocurrency mining pools.
📖 GuardDuty EC2 Finding Types →
📖 GuardDuty EC2 Finding Types →
Q9.
Which AWS service scans EC2 instances and container images for software vulnerabilities?
✓ Explanation: Amazon Inspector automatically discovers and scans EC2 instances, Lambda functions, and container images in ECR for software vulnerabilities and unintended network exposure.
📖 Amazon Inspector User Guide →
📖 Amazon Inspector User Guide →
Q10.
During an incident, what is the recommended approach for an EC2 instance you suspect is compromised?
✓ Explanation: Best practice is to isolate the compromised instance by switching its security group to one that blocks all traffic, preserving the instance for forensic investigation.
📖 Isolate Affected Resources →
📖 Isolate Affected Resources →
Q11.
What does the 'Suppress' feature in GuardDuty do?
✓ Explanation: Suppression rules in GuardDuty automatically archive findings that match specified filter criteria, reducing noise from known acceptable behaviors.
📖 GuardDuty Suppression Rules →
📖 GuardDuty Suppression Rules →
Q12.
Which AWS service provides managed threat intelligence feeds?
✓ Explanation: GuardDuty integrates with AWS threat intelligence and third-party feeds (like CrowdStrike and Proofpoint) to identify known malicious IPs and domains.
📖 GuardDuty Threat Intelligence →
📖 GuardDuty Threat Intelligence →
Q13.
What is an Amazon EventBridge rule used for in security automation?
✓ Explanation: EventBridge rules match incoming events (like GuardDuty findings) against patterns and route them to targets such as Lambda, SNS, or Step Functions for automated response.
📖 EventBridge Rules →
📖 EventBridge Rules →
Q14.
Which service helps you create an automated incident response workflow with multiple steps?
✓ Explanation: AWS Step Functions lets you orchestrate multiple Lambda functions and AWS service actions into complex, multi-step incident response workflows with error handling.
📖 Step Functions Developer Guide →
📖 Step Functions Developer Guide →
Q15.
What is the purpose of enabling GuardDuty in a delegated administrator account?
✓ Explanation: A delegated administrator account can enable and manage GuardDuty across all member accounts in an AWS Organization, providing centralized threat detection.
📖 GuardDuty with Organizations →
📖 GuardDuty with Organizations →
Q16.
Which finding type indicates that an IAM credential may be compromised?
✓ Explanation: GuardDuty has multiple IAM finding types including Recon:IAMUser, UnauthorizedAccess:IAMUser, and others that indicate different types of potentially compromised credential usage.
📖 GuardDuty IAM Finding Types →
📖 GuardDuty IAM Finding Types →
Q17.
What should you do with IAM access keys if you suspect they are compromised?
✓ Explanation: Compromised access keys should be immediately deactivated (not deleted initially, to preserve audit trail) and new keys issued if needed.
📖 Managing IAM Access Keys →
📖 Managing IAM Access Keys →
Q18.
Which service can you use to create a forensic copy of an EBS volume during an investigation?
✓ Explanation: EBS Snapshots allow you to create point-in-time copies of EBS volumes for forensic analysis without disrupting the original evidence.
📖 Amazon EBS Snapshots →
📖 Amazon EBS Snapshots →
Q19.
What does Amazon Detective use to build its behavior graph?
✓ Explanation: Detective automatically ingests CloudTrail logs, VPC Flow Logs, and GuardDuty findings to build a behavior graph that links related security events.
📖 Detective Source Data →
📖 Detective Source Data →
Q20.
How does GuardDuty detect threats without deploying agents?
✓ Explanation: GuardDuty is agentless — it analyzes AWS service logs (VPC Flow Logs, CloudTrail, DNS) directly from the AWS infrastructure backend.
📖 How GuardDuty Works →
📖 How GuardDuty Works →
Q21.
What is the recommended way to notify a security team about a critical GuardDuty finding?
✓ Explanation: Configure an EventBridge rule to match high-severity GuardDuty findings and send notifications to an SNS topic subscribed by the security team.
📖 GuardDuty Notifications →
📖 GuardDuty Notifications →
Q22.
Which AWS service performs automated security assessments against best practices?
✓ Explanation: Amazon Inspector runs automated security assessments that check for vulnerabilities and deviations from security best practices on your AWS workloads.
📖 Amazon Inspector Overview →
📖 Amazon Inspector Overview →
Q23.
In incident response, what does 'containment' mean?
✓ Explanation: Containment is the phase where you take actions to limit the scope and impact of an incident, such as isolating compromised resources while preserving evidence.
📖 Contain the Incident →
📖 Contain the Incident →
Q24.
What is the benefit of enabling GuardDuty S3 protection?
✓ Explanation: GuardDuty S3 protection monitors CloudTrail S3 data events to detect suspicious activities like unusual data access patterns or access from malicious IP addresses.
📖 GuardDuty S3 Protection →
📖 GuardDuty S3 Protection →
Q25.
Which AWS service can be used to run commands on EC2 instances during incident response without SSH?
✓ Explanation: Systems Manager Run Command lets you remotely and securely execute commands on EC2 instances without needing SSH access, useful for forensic data collection during incidents.
📖 SSM Run Command →
📖 SSM Run Command →
D2
Security Logging & Monitoring
Q1.
Which AWS service records API calls made in your AWS account?
✓ Explanation: AWS CloudTrail records API calls made in your account, providing a history of AWS API calls for auditing, compliance, and operational troubleshooting.
📖 CloudTrail User Guide →
📖 CloudTrail User Guide →
Q2.
What is the difference between CloudTrail management events and data events?
✓ Explanation: Management events capture control plane actions (e.g., creating an EC2 instance), while data events capture resource-level operations (e.g., S3 GetObject, Lambda Invoke).
📖 CloudTrail Event Types →
📖 CloudTrail Event Types →
Q3.
Which service provides real-time monitoring of AWS resources using metrics and alarms?
✓ Explanation: Amazon CloudWatch collects and tracks metrics, monitors log files, sets alarms, and automatically reacts to changes in your AWS resources in real-time.
📖 CloudWatch Overview →
📖 CloudWatch Overview →
Q4.
What are VPC Flow Logs used for?
✓ Explanation: VPC Flow Logs capture information about the IP traffic going to and from network interfaces in your VPC, useful for troubleshooting and security monitoring.
📖 VPC Flow Logs →
📖 VPC Flow Logs →
Q5.
Where can VPC Flow Logs be published?
✓ Explanation: VPC Flow Logs can be published to Amazon CloudWatch Logs, Amazon S3, or Amazon Kinesis Data Firehose for storage and analysis.
📖 Flow Log Destinations →
📖 Flow Log Destinations →
Q6.
What does AWS Config continuously monitor and record?
✓ Explanation: AWS Config continuously monitors and records your AWS resource configurations and allows you to evaluate them against desired configurations using Config rules.
📖 AWS Config Overview →
📖 AWS Config Overview →
Q7.
Which CloudWatch feature allows you to search and analyze log data?
✓ Explanation: CloudWatch Logs Insights is an interactive query service that lets you search and analyze log data in CloudWatch Logs using a purpose-built query language.
📖 CloudWatch Logs Insights →
📖 CloudWatch Logs Insights →
Q8.
What is a CloudTrail trail?
✓ Explanation: A trail is a configuration that enables delivery of CloudTrail events to an Amazon S3 bucket, CloudWatch Logs, and/or CloudWatch Events.
📖 Creating a Trail →
📖 Creating a Trail →
Q9.
How can you ensure CloudTrail log file integrity?
✓ Explanation: CloudTrail log file validation creates a digitally signed digest file every hour, allowing you to verify that log files have not been modified or deleted.
📖 Log File Integrity Validation →
📖 Log File Integrity Validation →
Q10.
What is a CloudWatch alarm?
✓ Explanation: A CloudWatch alarm watches a single metric over a specified time period and performs one or more actions based on the metric value relative to a threshold.
📖 CloudWatch Alarms →
📖 CloudWatch Alarms →
Q11.
Which service can centralize logs from multiple AWS accounts?
✓ Explanation: You can centralize logs by configuring CloudTrail and other services to deliver logs to a central S3 bucket in a logging account, with cross-account access policies.
📖 Cross-Account Log Delivery →
📖 Cross-Account Log Delivery →
Q12.
What is the purpose of a CloudWatch metric filter?
✓ Explanation: Metric filters define the terms and patterns to look for in log data as it is sent to CloudWatch Logs, turning log data into numerical CloudWatch metrics.
📖 CloudWatch Metric Filters →
📖 CloudWatch Metric Filters →
Q13.
Which AWS service can stream real-time log data for processing?
✓ Explanation: Amazon Kinesis Data Streams can collect and process large streams of log data in real-time, enabling real-time security analytics and dashboards.
📖 Kinesis Data Streams →
📖 Kinesis Data Streams →
Q14.
What does enabling CloudTrail for all regions ensure?
✓ Explanation: An all-regions trail ensures that API activity in any AWS region is logged, preventing gaps in visibility if resources are created in unexpected regions.
📖 Multi-Region Trails →
📖 Multi-Region Trails →
Q15.
How can you be alerted when a specific API call is made (e.g., deleting a security group)?
✓ Explanation: Send CloudTrail logs to CloudWatch Logs, create a metric filter for the specific API call, then create a CloudWatch alarm on that metric to trigger an SNS notification.
📖 CloudTrail + CloudWatch Alarms →
📖 CloudTrail + CloudWatch Alarms →
Q16.
What is Amazon CloudWatch Logs?
✓ Explanation: CloudWatch Logs enables you to centralize logs from your systems, applications, and AWS services for monitoring, storage, and analysis.
📖 CloudWatch Logs Overview →
📖 CloudWatch Logs Overview →
Q17.
What is the retention period for CloudWatch Logs by default?
✓ Explanation: By default, CloudWatch Logs are kept indefinitely and never expire. You can configure a retention policy from 1 day to 10 years, or keep them indefinitely.
📖 Log Retention Settings →
📖 Log Retention Settings →
Q18.
Which feature allows you to automatically act on CloudWatch Logs data in real-time?
✓ Explanation: Subscription filters allow you to route log data in real-time to services like Lambda, Kinesis, or Firehose for processing, analysis, or alerting.
📖 Subscription Filters →
📖 Subscription Filters →
Q19.
What does CloudTrail Insights detect?
✓ Explanation: CloudTrail Insights detects unusual operational activity in your account, such as spikes in API call volume or elevated error rates, indicating potential security issues.
📖 CloudTrail Insights →
📖 CloudTrail Insights →
Q20.
Where should you store long-term CloudTrail logs for cost-effective archival?
✓ Explanation: Store CloudTrail logs in S3 with lifecycle policies that transition older logs to S3 Glacier or Glacier Deep Archive for cost-effective long-term archival.
📖 S3 Lifecycle Policies →
📖 S3 Lifecycle Policies →
Q21.
What are AWS Config conformance packs?
✓ Explanation: Conformance packs are collections of Config rules and remediation actions that can be deployed as a single entity, useful for compliance frameworks like PCI DSS or HIPAA.
📖 Config Conformance Packs →
📖 Config Conformance Packs →
Q22.
Which service helps you visualize and analyze AWS resource configurations over time?
✓ Explanation: AWS Config provides a configuration timeline that shows how a resource's configuration changed over time, helping you troubleshoot and audit changes.
📖 Config Resource Timeline →
📖 Config Resource Timeline →
Q23.
What is the purpose of an S3 access log?
✓ Explanation: S3 server access logging provides detailed records for all requests made to a bucket, including requester, bucket name, request time, action, and response status.
📖 S3 Server Access Logging →
📖 S3 Server Access Logging →
Q24.
How can you monitor unauthorized access attempts to your AWS account?
✓ Explanation: Configure CloudTrail to log all API calls, create CloudWatch metric filters for failed authentication or authorization events, and set alarms to notify your security team.
📖 Monitoring with CloudTrail →
📖 Monitoring with CloudTrail →
Q25.
What is the benefit of using Amazon OpenSearch Service for security logs?
✓ Explanation: Amazon OpenSearch Service provides powerful full-text search, log analytics, and visualization (via OpenSearch Dashboards) for centralized security log analysis.
📖 OpenSearch Service Overview →
📖 OpenSearch Service Overview →
D3
Infrastructure Security
Q1.
What is an Amazon VPC?
✓ Explanation: Amazon VPC (Virtual Private Cloud) lets you provision a logically isolated section of the AWS cloud where you can launch resources in a virtual network you define.
📖 Amazon VPC User Guide →
📖 Amazon VPC User Guide →
Q2.
What is the difference between a security group and a network ACL (NACL)?
✓ Explanation: Security groups are stateful (return traffic automatically allowed) and operate at the instance level. NACLs are stateless (must define both inbound and outbound rules) and operate at the subnet level.
📖 VPC Security Comparison →
📖 VPC Security Comparison →
Q3.
Which AWS service protects web applications from common web exploits?
✓ Explanation: AWS WAF (Web Application Firewall) protects web applications from common web exploits like SQL injection, XSS, and allows you to create custom rules to filter traffic.
📖 AWS WAF Developer Guide →
📖 AWS WAF Developer Guide →
Q4.
What does AWS Shield protect against?
✓ Explanation: AWS Shield provides protection against DDoS attacks. Shield Standard is free and automatic; Shield Advanced provides enhanced protections and 24/7 DDoS response team access.
📖 AWS Shield Overview →
📖 AWS Shield Overview →
Q5.
What is a bastion host used for?
✓ Explanation: A bastion host (jump box) is a server in a public subnet that provides secure access to instances in private subnets, minimizing the attack surface.
📖 Bastion Host Best Practices →
📖 Bastion Host Best Practices →
Q6.
Which AWS service can replace traditional bastion hosts for remote access?
✓ Explanation: Systems Manager Session Manager provides secure shell access to EC2 instances without opening inbound ports, managing SSH keys, or using bastion hosts.
📖 Session Manager →
📖 Session Manager →
Q7.
What is a VPC endpoint?
✓ Explanation: VPC endpoints enable private connections between your VPC and supported AWS services without requiring an internet gateway, NAT device, or VPN connection.
📖 VPC Endpoints →
📖 VPC Endpoints →
Q8.
What are the two types of VPC endpoints?
✓ Explanation: Gateway endpoints (for S3 and DynamoDB) route traffic via route tables. Interface endpoints (powered by PrivateLink) create ENIs in your subnet for most other AWS services.
📖 VPC Endpoint Types →
📖 VPC Endpoint Types →
Q9.
What does AWS WAF rate-based rule do?
✓ Explanation: WAF rate-based rules automatically block IP addresses that send requests exceeding a configurable threshold within a 5-minute period, helping prevent HTTP floods.
📖 WAF Rate-Based Rules →
📖 WAF Rate-Based Rules →
Q10.
What is network segmentation in AWS?
✓ Explanation: Network segmentation uses subnets, security groups, NACLs, and route tables to isolate groups of resources, limiting blast radius and enforcing least-privilege network access.
📖 VPC Security Best Practices →
📖 VPC Security Best Practices →
Q11.
What is the default behavior of a security group?
✓ Explanation: By default, a security group denies all inbound traffic and allows all outbound traffic. You must explicitly add inbound rules to allow traffic.
📖 Security Group Rules →
📖 Security Group Rules →
Q12.
What is the default behavior of a network ACL?
✓ Explanation: The default NACL allows all inbound and outbound traffic. Custom NACLs deny all traffic by default until you add allow rules.
📖 Network ACLs →
📖 Network ACLs →
Q13.
Which AWS service provides a managed firewall for your VPC?
✓ Explanation: AWS Network Firewall is a managed network firewall and intrusion prevention service that lets you filter traffic at the perimeter of your VPC.
📖 AWS Network Firewall →
📖 AWS Network Firewall →
Q14.
What is AWS PrivateLink?
✓ Explanation: AWS PrivateLink provides private connectivity between VPCs, AWS services, and on-premises networks without exposing traffic to the public internet.
📖 AWS PrivateLink →
📖 AWS PrivateLink →
Q15.
What is the purpose of a NAT Gateway?
✓ Explanation: A NAT Gateway enables instances in private subnets to connect to the internet for outbound traffic (like software updates) while preventing inbound connections from the internet.
📖 NAT Gateways →
📖 NAT Gateways →
Q16.
What does AWS Shield Advanced provide beyond Shield Standard?
✓ Explanation: Shield Advanced provides enhanced DDoS detection, real-time metrics, access to the AWS DDoS Response Team (DRT), cost protection during attacks, and WAF integration.
📖 Shield Advanced Features →
📖 Shield Advanced Features →
Q17.
How can you restrict access to an S3 bucket to only traffic from your VPC?
✓ Explanation: Create a VPC gateway endpoint for S3 and add a bucket policy condition (aws:sourceVpce) to restrict access to only requests coming through that specific VPC endpoint.
📖 S3 VPC Endpoint Policies →
📖 S3 VPC Endpoint Policies →
Q18.
What is AWS Systems Manager Patch Manager used for?
✓ Explanation: Patch Manager automates the process of patching managed instances with security-related and other updates for operating systems and applications.
📖 Patch Manager →
📖 Patch Manager →
Q19.
What is a public subnet vs. a private subnet?
✓ Explanation: A public subnet has a route table entry pointing to an internet gateway, allowing resources with public IPs to communicate with the internet. A private subnet has no such route.
📖 VPC Subnets →
📖 VPC Subnets →
Q20.
What is the purpose of AWS Firewall Manager?
✓ Explanation: AWS Firewall Manager lets you centrally configure and manage firewall rules for WAF, Shield Advanced, security groups, Network Firewall, and Route 53 Resolver DNS Firewall across your organization.
📖 AWS Firewall Manager →
📖 AWS Firewall Manager →
Q21.
What is a security group rule evaluation order?
✓ Explanation: Security groups evaluate all rules before deciding whether to allow traffic. If any rule allows the traffic, it is permitted. There is no deny rule in security groups.
📖 Security Group Rule Evaluation →
📖 Security Group Rule Evaluation →
Q22.
How are NACL rules evaluated?
✓ Explanation: NACL rules are evaluated in order starting with the lowest numbered rule. The first rule that matches the traffic is applied, and subsequent rules are not evaluated.
📖 NACL Rule Evaluation →
📖 NACL Rule Evaluation →
Q23.
What AWS service provides DNS-level protection for your VPC?
✓ Explanation: Route 53 Resolver DNS Firewall lets you filter and regulate outbound DNS traffic from your VPC, blocking access to known malicious domains.
📖 Route 53 DNS Firewall →
📖 Route 53 DNS Firewall →
Q24.
What is the purpose of a VPN connection in AWS?
✓ Explanation: AWS VPN creates encrypted tunnels between your on-premises network (or client devices) and your AWS VPC, extending your network securely into the cloud.
📖 AWS Site-to-Site VPN →
📖 AWS Site-to-Site VPN →
Q25.
What does AWS Systems Manager Inventory collect?
✓ Explanation: Systems Manager Inventory collects metadata from managed instances about installed applications, OS patches, network configurations, running services, and more.
📖 SSM Inventory →
📖 SSM Inventory →
D4
Identity & Access Management
Q1.
What does the principle of least privilege mean?
✓ Explanation: Least privilege means granting users, roles, and services only the minimum permissions they need to perform their specific tasks — nothing more.
📖 IAM Least Privilege →
📖 IAM Least Privilege →
Q2.
What is an IAM policy?
✓ Explanation: An IAM policy is a JSON document with statements that define which actions are allowed or denied on which AWS resources, and under what conditions.
📖 IAM Policies →
📖 IAM Policies →
Q3.
What is the difference between an IAM user and an IAM role?
✓ Explanation: IAM users have permanent long-term credentials (password, access keys). IAM roles provide temporary security credentials and can be assumed by users, services, or applications.
📖 IAM Identities →
📖 IAM Identities →
Q4.
What is AWS STS (Security Token Service)?
✓ Explanation: AWS STS enables you to request temporary, limited-privilege credentials for IAM users or federated users, commonly used with AssumeRole.
📖 AWS STS API Reference →
📖 AWS STS API Reference →
Q5.
What is an IAM policy condition?
✓ Explanation: Conditions are optional policy elements that specify circumstances (like source IP, time, MFA status) under which a policy statement is in effect.
📖 IAM Policy Conditions →
📖 IAM Policy Conditions →
Q6.
What does an explicit deny in an IAM policy do?
✓ Explanation: An explicit deny in an IAM policy always takes precedence over any allow statement. If any policy explicitly denies an action, it is denied regardless of other policies.
📖 Policy Evaluation Logic →
📖 Policy Evaluation Logic →
Q7.
What is AWS Organizations?
✓ Explanation: AWS Organizations lets you centrally manage multiple AWS accounts, create organizational units, apply policies, and consolidate billing.
📖 AWS Organizations →
📖 AWS Organizations →
Q8.
What is a Service Control Policy (SCP)?
✓ Explanation: SCPs set the maximum available permissions for member accounts in an organization. They don't grant permissions but limit what IAM policies in those accounts can allow.
📖 Service Control Policies →
📖 Service Control Policies →
Q9.
What is IAM federation?
✓ Explanation: Federation allows users from external identity providers (like Active Directory, SAML, or OIDC) to access AWS resources using temporary credentials without separate IAM users.
📖 IAM Identity Providers →
📖 IAM Identity Providers →
Q10.
What is an IAM permissions boundary?
✓ Explanation: A permissions boundary is a managed policy that sets the maximum permissions that an identity-based policy can grant to an IAM entity (user or role), acting as a guardrail.
📖 Permissions Boundaries →
📖 Permissions Boundaries →
Q11.
What is the purpose of the IAM Access Analyzer?
✓ Explanation: IAM Access Analyzer identifies resources (like S3 buckets, IAM roles) shared with external entities and helps you validate IAM policies to ensure they grant intended access.
📖 IAM Access Analyzer →
📖 IAM Access Analyzer →
Q12.
What is cross-account access in AWS?
✓ Explanation: Cross-account access uses IAM roles with trust policies to allow principals in one AWS account to assume a role in another account and access its resources.
📖 Cross-Account Access Tutorial →
📖 Cross-Account Access Tutorial →
Q13.
What is MFA (Multi-Factor Authentication) in AWS?
✓ Explanation: MFA adds an extra layer of security by requiring users to provide a second factor (like a code from a virtual MFA device or hardware token) in addition to their password.
📖 Using MFA in AWS →
📖 Using MFA in AWS →
Q14.
What is an IAM role trust policy?
✓ Explanation: A trust policy (attached to a role) defines which principals (users, services, accounts) are allowed to assume the role. It's separate from the permissions policy.
📖 IAM Role Concepts →
📖 IAM Role Concepts →
Q15.
Why should you avoid using the AWS root account for daily tasks?
✓ Explanation: The root account has complete, unrestricted access to all resources and cannot be limited by IAM policies or SCPs. Use it only for tasks that specifically require root access.
📖 Root Account Best Practices →
📖 Root Account Best Practices →
Q16.
What is AWS IAM Identity Center (formerly AWS SSO)?
✓ Explanation: IAM Identity Center provides centralized single sign-on access to multiple AWS accounts and business applications, supporting SAML 2.0 and built-in identity store.
📖 IAM Identity Center →
📖 IAM Identity Center →
Q17.
What is a resource-based policy?
✓ Explanation: Resource-based policies are JSON policies attached directly to AWS resources (S3 buckets, SQS queues, Lambda functions) that specify who can access the resource and what actions they can perform.
📖 Identity vs Resource Policies →
📖 Identity vs Resource Policies →
Q18.
What does the IAM policy element 'Effect' specify?
✓ Explanation: The Effect element specifies whether the policy statement results in an Allow or Deny. Every policy statement must include an Effect element.
📖 Policy Element: Effect →
📖 Policy Element: Effect →
Q19.
What is an inline policy vs. a managed policy?
✓ Explanation: Inline policies are embedded directly in a single user, group, or role. Managed policies are standalone objects that can be attached to multiple entities, making them reusable and easier to manage.
📖 Managed vs Inline Policies →
📖 Managed vs Inline Policies →
Q20.
What is the purpose of the 'aws:SourceIp' condition key?
✓ Explanation: The aws:SourceIp condition key restricts access to AWS resources based on the IP address from which the API request originates, useful for office IP restrictions.
📖 Global Condition Keys →
📖 Global Condition Keys →
Q21.
What happens if there is no explicit allow or deny for a request in IAM?
✓ Explanation: AWS follows a default-deny model. If no policy explicitly allows an action, the request is implicitly denied. You must explicitly grant permissions for any action.
📖 Policy Evaluation Logic →
📖 Policy Evaluation Logic →
Q22.
What is an IAM group?
✓ Explanation: An IAM group is a collection of IAM users. Policies attached to a group apply to all users in that group, simplifying permissions management.
📖 IAM User Groups →
📖 IAM User Groups →
Q23.
What is the AWS policy evaluation logic order?
✓ Explanation: AWS evaluates policies in this order: 1) Explicit Deny (always wins), 2) Explicit Allow, 3) Implicit Deny (default). SCPs and permission boundaries are also evaluated.
📖 Policy Evaluation Logic →
📖 Policy Evaluation Logic →
Q24.
What is an IAM instance profile?
✓ Explanation: An instance profile is a container for an IAM role. When you attach a role to an EC2 instance, you're actually attaching an instance profile that contains the role.
📖 Instance Profiles →
📖 Instance Profiles →
Q25.
What is the purpose of the 'aws:MultiFactorAuthPresent' condition key?
✓ Explanation: The aws:MultiFactorAuthPresent condition key checks whether the API request was made using multi-factor authentication, allowing you to require MFA for sensitive actions.
📖 MFA Condition Key →
📖 MFA Condition Key →
D5
Data Protection
Q1.
What is AWS KMS (Key Management Service)?
✓ Explanation: AWS KMS is a managed service that makes it easy to create and manage cryptographic keys used to encrypt your data across AWS services and applications.
📖 AWS KMS Overview →
📖 AWS KMS Overview →
Q2.
What is the difference between encryption at rest and encryption in transit?
✓ Explanation: Encryption at rest protects data stored on disk/storage. Encryption in transit (using TLS/SSL) protects data as it moves between systems, services, or users.
📖 AWS Data Encryption →
📖 AWS Data Encryption →
Q3.
What is an S3 bucket policy?
✓ Explanation: An S3 bucket policy is a resource-based JSON policy attached to an S3 bucket that defines which principals can perform which actions on the bucket and its objects.
📖 S3 Bucket Policies →
📖 S3 Bucket Policies →
Q4.
What does AWS Secrets Manager do?
✓ Explanation: AWS Secrets Manager helps you store, manage, and automatically rotate credentials like database passwords, API keys, and other secrets securely.
📖 Secrets Manager User Guide →
📖 Secrets Manager User Guide →
Q5.
What is AWS Certificate Manager (ACM)?
✓ Explanation: ACM lets you provision, manage, and deploy public and private SSL/TLS certificates for use with AWS services and connected resources, with automatic renewal.
📖 ACM User Guide →
📖 ACM User Guide →
Q6.
What is Amazon Macie?
✓ Explanation: Amazon Macie uses machine learning and pattern matching to discover and protect sensitive data (like PII, financial data) stored in Amazon S3.
📖 Amazon Macie User Guide →
📖 Amazon Macie User Guide →
Q7.
What is server-side encryption (SSE) in S3?
✓ Explanation: Server-side encryption means Amazon S3 encrypts your data at the object level as it writes it to disks in its data centers and decrypts it when you access it.
📖 S3 Server-Side Encryption →
📖 S3 Server-Side Encryption →
Q8.
What are the three types of S3 server-side encryption?
✓ Explanation: SSE-S3 uses S3-managed keys, SSE-KMS uses AWS KMS-managed keys (with audit trail), and SSE-C lets you provide your own encryption keys.
📖 S3 Encryption Options →
📖 S3 Encryption Options →
Q9.
What is a KMS key policy?
✓ Explanation: A KMS key policy is a resource-based policy that determines who can use and manage a KMS key. Unlike most AWS resources, KMS keys REQUIRE a key policy.
📖 KMS Key Policies →
📖 KMS Key Policies →
Q10.
What is envelope encryption?
✓ Explanation: Envelope encryption encrypts your data with a data encryption key (DEK), then encrypts the DEK with a KMS master key. This is how KMS handles large data encryption.
📖 Envelope Encryption →
📖 Envelope Encryption →
Q11.
What is S3 Block Public Access?
✓ Explanation: S3 Block Public Access provides settings at the account and bucket level to ensure S3 resources never become publicly accessible, overriding bucket policies and ACLs.
📖 S3 Block Public Access →
📖 S3 Block Public Access →
Q12.
What does AWS CloudHSM provide?
✓ Explanation: AWS CloudHSM provides dedicated FIPS 140-2 Level 3 validated hardware security modules in the cloud, giving you full control over your cryptographic keys.
📖 CloudHSM User Guide →
📖 CloudHSM User Guide →
Q13.
How does KMS key rotation work with AWS-managed keys?
✓ Explanation: For AWS-managed KMS keys, AWS automatically rotates the key material every year. For customer-managed keys, you can enable automatic annual rotation.
📖 KMS Key Rotation →
📖 KMS Key Rotation →
Q14.
What is the purpose of S3 Object Lock?
✓ Explanation: S3 Object Lock uses a WORM (Write Once Read Many) model to prevent objects from being deleted or overwritten for a fixed retention period or indefinitely.
📖 S3 Object Lock →
📖 S3 Object Lock →
Q15.
What is client-side encryption?
✓ Explanation: Client-side encryption means you encrypt data on the client side before uploading it to AWS. AWS never sees the unencrypted data or the encryption keys.
📖 S3 Client-Side Encryption →
📖 S3 Client-Side Encryption →
Q16.
What is the difference between KMS symmetric and asymmetric keys?
✓ Explanation: Symmetric KMS keys use a single 256-bit AES key for both encryption and decryption. Asymmetric keys use a mathematically related public/private key pair for different operations.
📖 Symmetric vs Asymmetric Keys →
📖 Symmetric vs Asymmetric Keys →
Q17.
How can you prevent accidental deletion of S3 objects?
✓ Explanation: S3 versioning preserves all versions of objects (allowing recovery), and MFA Delete requires multi-factor authentication to permanently delete object versions.
📖 S3 Versioning →
📖 S3 Versioning →
Q18.
What does AWS Secrets Manager automatic rotation do?
✓ Explanation: Secrets Manager can automatically rotate secrets (like RDS database passwords) on a configurable schedule using a Lambda rotation function, ensuring credentials stay fresh.
📖 Secret Rotation →
📖 Secret Rotation →
Q19.
What is the purpose of Amazon S3 default encryption?
✓ Explanation: S3 default encryption ensures that all new objects stored in a bucket are automatically encrypted using your chosen encryption method (SSE-S3, SSE-KMS, or DSSE-KMS).
📖 S3 Default Encryption →
📖 S3 Default Encryption →
Q20.
What is a KMS grant?
✓ Explanation: KMS grants allow you to programmatically delegate use of KMS keys to other AWS principals without modifying the key policy, commonly used by AWS services.
📖 KMS Grants →
📖 KMS Grants →
Q21.
What encryption does EBS use by default when encryption is enabled?
✓ Explanation: When EBS encryption is enabled, it uses AES-256 encryption algorithm with keys managed by AWS KMS to encrypt data at rest on the volume.
📖 EBS Encryption →
📖 EBS Encryption →
Q22.
How does ACM handle certificate renewal?
✓ Explanation: ACM automatically attempts to renew certificates it manages before they expire, ensuring continuous TLS/SSL protection without manual intervention.
📖 ACM Managed Renewal →
📖 ACM Managed Renewal →
Q23.
What is the difference between SSE-KMS and SSE-S3?
✓ Explanation: SSE-KMS uses KMS keys with CloudTrail audit logging of key usage and fine-grained access control. SSE-S3 uses Amazon-managed keys with no separate audit trail or key control.
📖 SSE-KMS vs SSE-S3 →
📖 SSE-KMS vs SSE-S3 →
Q24.
What is AWS Parameter Store in Systems Manager?
✓ Explanation: Systems Manager Parameter Store provides secure, hierarchical storage for configuration data and secrets like database strings, passwords, and license codes.
📖 SSM Parameter Store →
📖 SSM Parameter Store →
Q25.
What is the benefit of using VPC endpoints for KMS?
✓ Explanation: A VPC endpoint for KMS ensures that API calls to KMS remain within your VPC and the AWS network, never traversing the public internet, enhancing security posture.
📖 KMS VPC Endpoint →
📖 KMS VPC Endpoint →
D6
Management & Security Governance
Q1.
What is AWS Control Tower?
✓ Explanation: AWS Control Tower automates the setup of a well-architected multi-account environment based on best practices, with guardrails for ongoing governance.
📖 Control Tower User Guide →
📖 Control Tower User Guide →
Q2.
What are AWS Control Tower guardrails?
✓ Explanation: Guardrails are pre-configured governance rules for security, compliance, and operations. They come in two types: preventive (SCPs) and detective (Config rules).
📖 Control Tower Guardrails →
📖 Control Tower Guardrails →
Q3.
What is the purpose of AWS Organizations organizational units (OUs)?
✓ Explanation: OUs let you group AWS accounts hierarchically, making it easier to apply policies (like SCPs) to groups of accounts based on function, environment, or compliance requirements.
📖 Managing OUs →
📖 Managing OUs →
Q4.
What is a tagging strategy in AWS?
✓ Explanation: A tagging strategy defines conventions for assigning key-value metadata tags to resources for cost allocation, access control, automation, and organizational purposes.
📖 AWS Tagging Best Practices →
📖 AWS Tagging Best Practices →
Q5.
What AWS service can enforce mandatory tags on resources?
✓ Explanation: AWS Organizations tag policies let you define tagging rules and enforce standardized tags across your organization's resources for consistency.
📖 Tag Policies →
📖 Tag Policies →
Q6.
What is AWS Config used for in governance?
✓ Explanation: AWS Config evaluates your resource configurations against desired configurations defined as Config rules, helping maintain compliance and governance standards.
📖 Config Rule Evaluation →
📖 Config Rule Evaluation →
Q7.
What is the difference between preventive and detective guardrails?
✓ Explanation: Preventive guardrails (implemented as SCPs) prevent non-compliant actions from occurring. Detective guardrails (implemented as Config rules) detect and alert on non-compliance.
📖 Guardrail Types →
📖 Guardrail Types →
Q8.
What is the AWS Well-Architected Framework's Security pillar focused on?
✓ Explanation: The Security pillar focuses on protecting information, systems, and assets through identity management, detection, infrastructure protection, data protection, and incident response.
📖 Security Pillar →
📖 Security Pillar →
Q9.
What is a consolidated billing benefit of AWS Organizations?
✓ Explanation: Consolidated billing combines usage from all accounts in the organization, potentially qualifying for volume pricing discounts and simplifying cost management.
📖 Consolidated Billing →
📖 Consolidated Billing →
Q10.
What is the purpose of the AWS CloudFormation service?
✓ Explanation: AWS CloudFormation lets you model and provision AWS resources using templates (infrastructure as code), enabling consistent, repeatable deployments with version control.
📖 CloudFormation User Guide →
📖 CloudFormation User Guide →
Q11.
How can you prevent member accounts from leaving an AWS Organization?
✓ Explanation: An SCP can explicitly deny the organizations:LeaveOrganization action, preventing member accounts from removing themselves from the organization.
📖 SCP Examples →
📖 SCP Examples →
Q12.
What is AWS Audit Manager?
✓ Explanation: AWS Audit Manager continuously audits your AWS usage to simplify how you assess risk and compliance with regulations and industry standards like GDPR, HIPAA, and PCI DSS.
📖 Audit Manager User Guide →
📖 Audit Manager User Guide →
Q13.
What is the purpose of the AWS Trusted Advisor?
✓ Explanation: Trusted Advisor inspects your AWS environment and provides recommendations on cost optimization, performance, security, fault tolerance, and service limits.
📖 AWS Trusted Advisor →
📖 AWS Trusted Advisor →
Q14.
What is an AWS Config aggregator?
✓ Explanation: A Config aggregator collects AWS Config configuration and compliance data from multiple accounts and regions into a single account, providing an organization-wide compliance view.
📖 Config Aggregators →
📖 Config Aggregators →
Q15.
What does the Security pillar's 'shared responsibility model' define?
✓ Explanation: The shared responsibility model defines that AWS is responsible for security OF the cloud (infrastructure), while customers are responsible for security IN the cloud (data, access, applications).
📖 Shared Responsibility Model →
📖 Shared Responsibility Model →
Q16.
What is the purpose of AWS Service Catalog?
✓ Explanation: AWS Service Catalog lets you create and manage catalogs of approved IT services (CloudFormation templates) that users can deploy, ensuring compliance and standardization.
📖 Service Catalog Admin Guide →
📖 Service Catalog Admin Guide →
Q17.
What is an AWS Config rule?
✓ Explanation: A Config rule represents your desired configuration settings. AWS Config continuously evaluates your resources against these rules and flags non-compliant resources.
📖 AWS Config Rules →
📖 AWS Config Rules →
Q18.
How does AWS Control Tower Landing Zone work?
✓ Explanation: A Landing Zone is a well-architected, multi-account baseline that includes a security account for auditing and a log archive account for centralized logging.
📖 Landing Zone Overview →
📖 Landing Zone Overview →
Q19.
What is the purpose of enabling AWS CloudTrail organization trail?
✓ Explanation: An organization trail logs API activity for all AWS accounts in the organization to a central S3 bucket, providing comprehensive visibility across your entire organization.
📖 Organization Trails →
📖 Organization Trails →
Q20.
What are AWS Config managed rules?
✓ Explanation: AWS Config managed rules are pre-built rules maintained by AWS that check for common compliance requirements like encrypted EBS volumes, S3 bucket logging, and MFA on root accounts.
📖 Config Managed Rules List →
📖 Config Managed Rules List →
Q21.
What is the benefit of multi-account strategy in AWS?
✓ Explanation: A multi-account strategy provides workload isolation, limits blast radius of incidents, enables fine-grained access control, and simplifies billing and compliance per account.
📖 Multi-Account Strategy →
📖 Multi-Account Strategy →
Q22.
What is AWS License Manager used for?
✓ Explanation: AWS License Manager helps you manage software licenses from vendors like Microsoft, SAP, and Oracle across AWS and on-premises environments, ensuring compliance.
📖 License Manager →
📖 License Manager →
Q23.
What does the AWS Config remediation feature do?
✓ Explanation: Config remediation actions (manual or automatic) can correct non-compliant resources by executing SSM Automation documents to bring resources back into compliance.
📖 Config Remediation →
📖 Config Remediation →
Q24.
What is the purpose of AWS Security Hub standards?
✓ Explanation: Security Hub standards (like CIS AWS Foundations, PCI DSS, AWS Foundational Security Best Practices) are pre-defined collections of automated security checks mapped to compliance frameworks.
📖 Security Hub Standards →
📖 Security Hub Standards →
Q25.
What is the recommended account structure in AWS Control Tower?
✓ Explanation: Control Tower recommends a management account for organization management, a log archive account for centralized logging, and an audit account for security tooling as the baseline.
📖 Control Tower Account Structure →
📖 Control Tower Account Structure →