AWS Access Management FRESCO PLAY - T-FACTOR course
Q.1 Is it necessary to have a new bucket for CloudTrail logs?
1) True
2) False
Ans: 2) False
Q.2 Is it recommended to use the root account for regular use?
1) True
2) False
Ans: 2) False
Q.3 The security of the cloud is the responsibility of ____________.
1) None of the options
2) AWS
3) Customers
4) Both AWS and customers
Ans: 2) AWS
Q.4 Which of the following service is used in the Data Exfiltration process in the cloud watch?
1) EC2
2) S3
3) IAM
4) AWS Lambda
Ans: 4) AWS Lambda
Q.5 An operating system, data encryption, and network traffic protection falls under the responsibilities of ___________.
1) None of the options
2) AWS
3) Both AWS and customers
4) Customers
Ans:4) Customers
Q.6 Existing identity management systems like Microsoft AD can be integrated into AWS to manage permissions.
1) True
2) False
Ans: 1) True
Q.7 AWS CloudTrail records all the API interactions and stores the data in S3 Buckets.
1) True
2) False
Ans:1) True
Q. 8 AWS Global Infrastructure consists of __________.
1) Regions
2) Availability Zones
3) Edge Locations
4) All the options
Ans: 4) All the options
Q.9 Which of the following AWS service helps in the overall management of Security in the cloud?
1) Aurora
2) VPC
3) Cloudwatch
4) IAM
Ans: 4) IAM
No comments:
Post a Comment
If you have any doubts, Please let us know.