Search This Blog

Quiz Handson - AWS- Amazon Web Services- HackerRank Questions and answers Fresco Play - AWS Access Management - Final Assessment



Q.1 What is the practice of distributing responsibility among multiple people so that no one person has full control of everything?

1) Responsibility sharing

2) Separation of duties

3) Separation of responsibility

4) None

Ans: 2) Separation of duties




Q.2 Security is still considered as the major hurdle for businesses to opt for cloud.

1) True

2) False

Ans: True




Q.3 You can set up your password policy for users in IAM.

1) True

2) False

Ans: True





Q.4 AWS Identity and Access Management are available through ____________ interfaces.

1) Query API

2) Management console

3) AWS CLI

4) All the options

Ans: 4) All the options





Q.5 An IAM role that grants permissions to an AWS service so it can access AWS resources. The policies that you attach to it determine which AWS resources the service can access and what it can do with those resources

1) Granted role

2) selector role

3) service role

4) permission role

Ans: 3) service role




Q.6 You can change the properties but not the user name using a console in IAM.

1) True

2) False

Ans: 1) True




Q.7 Every user you create in IAM starts with _______.

1) None of the options

2) Partial permissions

3) No access

4) Full access

Ans: 3) No access




Q.8 Is it recommended to use the root account for regular use?

1) True

2) False

Ans: False





Q.9 Which IAM policy provides full access to resources in it but not for IAM ?

1) Administrator

2) Power user


3) Support user

4) System Administrator

Ans: 2) Power user







Q.10 Service linked roles are predefined by ____________.

1) Policy

2) Service

3) AWS

4) None of the options

Ans: 2) Service




Q.11 AWS Global Infrastructure consists of__________.


1) Edge Locations

2) Availability Zones

3) All the options

4) Regions

Ans: 3) All the options





Q.12 Temporary security credentials are not stored with users.

1) True

2) False

Ans: True




Q.13 The operating system, data encryption, and network traffic protection fall under the responsibilities of ______.

1) AWS

2) None of the options

3) Customers


4) Both the options

Ans: 3) Customers





Q.14 The security of the cloud is the responsibility of ___________.

1) AWS

2) None of the options

3) Customers

4) Both the options

Ans: 1) AWS




Q.15 Using which of the following a user is validated by AWS to use a particular resource ?

1) Role

2) Policy

3) MFA

4) Access Keys


Ans: 2) Policy




Q.16 A practice that adds increased security to an account by using multiple forms of authentication is ______________.

1) Logging

2) Root logging

3) MFA

4) None of the options

Ans: 3) MFA




Q.17 The _________ policy template gives the Admins group permission to access all account resources, except your AWS account information.

1) Power user access

2) Read only access

3) All the options

4) Administrator access

Ans: 4) Administrator access




Q.18 IAM user needs to use both the access key ID and secret access key to make API calls.

1) True

2) False

Ans: True

No comments:

Post a Comment

If you have any doubts, Please let us know.