AWS Security Engineer - Advanced Quiz
← Back to Quiz Home
This quiz tests your mastery of advanced IAM policies, forensics, compliance automation, and threat remediation.
How can you conditionally grant access to a resource only if the request comes from a specific VPC Endpoint?
This is a critical control to ensure data cannot be accessed from the public internet, even with valid credentials.
What is a "Token Vending Machine" pattern?
TVMs are used when standard Federation (SAML/OIDC) is not applicable or requires custom logic.
How do you remediate a non-compliant resource detected by AWS Config automatically?
SSM Automation provides a library of pre-built remediation actions for common security issues.
What is the "NotAction" element in an IAM Policy used for?
Be careful: NotAction with Allow matches everything else, potentially granting too much permission if not paired with a Resource constraint.
How do you perform memory analysis on a compromised EC2 instance without rebooting it?
Standard EBS snapshots only capture data on disk. RAM capture is required to find in-memory malware or encryption keys.
What is "AWS Network Firewall"?
Unlike Security Groups, Network Firewall can inspect packet payloads and filter traffic based on FQDNs (e.g., "deny *.evil.com").
How do you create a "Data Perimeter" around your organization?
The perimeter prevents data exfiltration (trusted user moving data to untrusted bucket) and external access.
What is "Attribute-Based Access Control" (ABAC) in IAM?
ABAC scales better than RBAC because you don't need to update policies when adding new resources; just tag them correctly.
How to prevent a specific IAM Role from being modified or deleted by anyone, including Administrators?
This is known as a "break-glass" or critical infrastructure protection pattern.
It integrates with AWS Lambda to block the deployment of unsigned or untrusted code packages.
How do you investigate a "Root Account Usage" alert?
Any root usage outside of specific administrative tasks is a red flag.
What is the difference between kms:Decrypt and kms:GenerateDataKey?
You typically grant GenerateDataKey to the producer (writer) and Decrypt to the consumer (reader).
How do you securely manage secrets for a container running in Fargate?
The injection pattern keeps secrets out of the image build artifact.
What is "AWS Firewall Manager"?
It ensures that new accounts/resources automatically inherit the baseline security rules.
How do you implement "Separation of Duties" for KMS keys?
This prevents the admin who manages the keys from being able to decrypt the sensitive data.
What does "passed" mean in iam:PassRole?
PassRole is a dangerous permission; if I can pass an Admin role to an EC2 instance I create, I can log in to that instance and become Admin.
How do you audit cross-account S3 access?
Access Analyzer uses mathematical logic (automated reasoning) to prove access paths.
What is a "Forensic Workstation"?
It should live in a secure, isolated "Forensics VPC".
How do you ensure logs in CloudWatch Logs are valid and haven't been tampered with?
For chain-of-custody, always archive logs to an immutable S3 bucket.
What is the "PrincipalOrgID" condition key?
"Condition": {"StringEquals": {"aws:PrincipalOrgID": "o-12345"}} is a best practice for internal sharing.
Quiz Progress
0 / 0 questions answered
(0%)
0 correct
Quiz Complete!
0%
📚 Study Guides
📬 Weekly DevOps, Cloud & Gen AI quizzes & guides