AWS Security Engineer - Basics Quiz
← Back to Quiz Home
This quiz covers the fundamental concepts of AWS Security, including Identity, Infrastructure Protection, and Data Privacy.
IAM policies are the core mechanism for Authorization in AWS.
Which service protects web applications from common exploits like SQL Injection and XSS?
WAF filters HTTP(S) traffic at Layer 7 based on rules you define.
What is AWS Shield primarily used for?
Shield Standard is free and on by default; Shield Advanced provides extra protection for large scale attacks.
What is the difference between a Security Group and a Network Access Control List (NACL)?
Security Groups are your first line of defense; NACLs are a coarse-grained subnet control.
What is "AWS KMS" used for?
KMS is central to the encryption strategy for S3, EBS, RDS, and more.
Which service uses Machine Learning to discover and protect sensitive data (PII) in Amazon S3?
Macie automatically scans buckets to tell you "You have 500 credit card numbers in this bucket".
How can you securely allow an EC2 instance to assume an IAM Role?
Instance profiles deliver temporary credentials to the metadata service on the instance.
CloudTrail is the source of truth for auditing and compliance.
What is the purpose of a Service Control Policy (SCP) in AWS Organizations?
SCPs ensure that even the root user of a member account cannot perform restricted actions (e.g., "Never disable CloudTrail").
Which service automates security assessments to help improve the security and compliance of applications deployed on EC2?
Inspector scans for Common Vulnerabilities and Exposures (CVEs) and network accessibility.
What is "Least Privilege" principle?
This limits the blast radius if credentials are compromised.
How should you manage SSH access to a fleet of 1000 instances?
Session Manager improves security by eliminating the need for jump boxes and public ports.
What does "Envelope Encryption" mean in KMS?
This allows you to encrypt massive amounts of data locally while only calling KMS to decrypt the small key.
Which service monitors your AWS account for malicious activity and unauthorized behavior?
GuardDuty analyzes logs (CloudTrail, DNS, Flow Logs) to find threats like "Crypto Mining EC2".
What is the "Confused Deputy" problem?
Condition keys like aws:SourceArn prevent this by ensuring the service acts only for the expected resource.
How often does AWS rotate the access keys for IAM Roles?
The automatic rotation eliminates the risk of long-term credential leakage.
What is "Amazon Cognito"?
Cognito manages user identities (User Pools) and federated identities (Identity Pools).
Which type of VPC Endpoint keeps traffic to S3 within the AWS network without using private IPs?
Gateway Endpoints add a route to your route table pointing to S3 (prefix list).
What is "AWS Secrets Manager"?
It natively supports rotation for RDS, DocumentDB, and Redshift.
What is the root user in an AWS account?
Best practice: Secure the root user with MFA and lock it away. Use it only for billing or account closure.
Quiz Progress
0 / 0 questions answered
(0%)
0 correct
Quiz Complete!
0%
📚 Study Guides
📬 Weekly DevOps, Cloud & Gen AI quizzes & guides