16 - Security & Compliance

Data sitting on an RDS instance would be referred to as?

1
2
3
2

Data at rest

According to the Shared Responsibility Model, who is responsible for firewall and network configuration for EC2 Instances?

1
2
3
2

The customer

Which of the following services can you use to discover and protect your sensitive data in AWS?

1
2
3
4
1

Macie

Which AWS service lets you quickly find the root of potential security issues to take faster actions?

1
2
3
4
2

Detective

A company would like to protect its web applications from common web exploits that may affect availability, compromise security, or consume excessive resources. Which AWS service should they use?

1
2
3
4
4

Web Application Firewall (WAF)

Where can you find on-demand access to AWS compliance documentation and AWS agreements?

1
2
3
4
1

Artifact

You can perform any kind of penetration testing on any AWS service without prior approval.

1
2
2

False

You want to record configurations and changes over time. Which service allows you to do this?

1
2
3
4
1

Config

According to the Shared Responsibility Model, who is responsible for Patch Management?

1
2
3
3

AWS and the customer

You want to centrally automate security checks across several AWS accounts. Which AWS service can you use?

1
2
3
4
4

Security Hub

Which of the following services is managed by AWS and is used to manage encryption keys?

1
2
3
4
2

KMS

A company would like to automate security on EC2 instances to assess security and vulnerabilities in these instances. Which AWS service should it use?

1
2
3
4
3

Inspector

Which of the following actions does NOT require the root user?

1
2
3
4
4

Access the billing dashboard

According to the Shared Responsibility Model, who is responsible for protecting hardware?

1
2
3
1

AWS

Which AWS service's ONLY role is to safeguard running applications from DDoS attacks?

1
2
3
4
2

Shield

Which service is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts and workloads?

1
2
3
4
4

GuardDuty

Which of the following options is NOT a situation where you should contact the AWS Abuse team?

1
2
3
4
4

Losing your MFA device

BoolFalse