← Back to Quiz Home
This quiz covers operational security, cross-account patterns, and advanced data protection mechanisms.
How can you securely share an AMI (Amazon Machine Image) with another AWS account?
Sharing encrypted AMIs requires permissions on both the AMI object and the CMK used to encrypt it.
What is a "Permission Boundary"?
Boundaries are critical when delegating admin rights (e.g., "Developer can create roles, but only if they attach this boundary").
How do you monitor for the "Root" user login?
Root login is a high-severity event that should trigger immediate alerts (SNS/PagerDuty).
What data source does Amazon GuardDuty use to detect compromised EC2 instances (e.g., Bitcoin mining)?
It uses ML to spot communication with known bad IPs or unusual traffic volume.
What is the "IMDSv2" (Instance Metadata Service Version 2) security improvement?
IMDSv1 (simple GET) was vulnerable because simple WAF rules or proxies couldn't distinguish legitimate requests from attacker-redirected ones.
How do you grant a Lambda function access to a DynamoDB table in a different account?
Cross-account role assumption is the standard pattern for inter-account access.
What is "S3 Object Lock"?
Compliance mode ensures that not even the root user can delete the data until the retention period expires.
How do you analyze a compromised instance without tipping off the attacker?
Touching the live filesystem changes timestamps and can trigger "dead man switches" in malware.
Which service manages SSL/TLS certificates for your load balancers?
ACM handles the complexity of provisioning, deploying, and renewing public certificates automatically.
What is the difference between "Inspector" and "GuardDuty"?
Inspector finds the "open door"; GuardDuty tells you "someone just walked through the door".
How do you rotate database passwords without downtime?
Secrets Manager has built-in rotation lambda templates for RDS.
Flow logs show the "Source IP, Dest IP, Port, Action (ACCEPT/REJECT)" tuple, vital for network troubleshooting.
How can you ensure that no one deletes the CloudTrail logs?
Immutable logs are a requirement for many compliance standards (PCI, HIPAA).
Which component allows you to filter traffic based on the body of an HTTP request (e.g., JSON payload)?
WAF can inspect the first 8KB (or more) of the body to look for malicious patterns like {"action": "drop table"}.
What is a "Trust Policy" in IAM?
"Who can pick up the badge?" is defined by the Trust Policy. "What can the badge do?" is the Permissions Policy.
How do you detect if an S3 bucket is publicly accessible?
Config provides a continuous compliance view of your resources.
What is "S3 Block Public Access"?
Always enable this at the Account level unless you specifically host public data.
How do you secure data in transit between EC2 instances in the same VPC?
While physical layer encryption exists on modern instances, application-layer TLS is the standard for zero-trust.
Detective helps answer "Who else communicated with this malicious IP?" using a visual graph.
Can Security Groups block traffic?
To explicitly block a specific IP (blacklisting), you must use NACLs or WAF.
Quiz Progress
0 / 0 questions answered
(0%)
0 correct
Quiz Complete!
0%
📚 Study Guides
📬 Weekly DevOps, Cloud & Gen AI quizzes & guides