Limited Time Offer!

For Less Than the Cost of a Starbucks Coffee, Access All DevOpsSchool Videos on YouTube Unlimitedly.
Master DevOps, SRE, DevSecOps Skills!

Enroll Now

AWS Interview Questions and Answer Part – 13

The IAS octave is an expansion of what security baseline?

  • FEDRAMP
  • HIPPA
  • ISO 27001
  • The C.I.A. Triad (Ans)

What are three goals AWS is striving to meet in the cloud through utilization of their security tools?

  • Planning, control, and audibility
  • Visibility, audibility, and control (Ans)
  • Audibility, analysis, and governance
  • Planning, governance, and control

When defining the security requirements for your company’s operation in the public cloud, what is the essential certification you need to analyze first?

  • SOC-1
  • SOC-2 (Ans)
  • ISO 27001
  • SOC-3

What is the definition of the AWS shared security model for customers?

  • Security in the cloud (Ans)
  • Security on the cloud
  • Security of the cloud
  • Security for the cloud

Replication between regions at AWS is carried out by what party?

  • AWS partner
  • AWS upon request
  • Associated Telco
  • The customer (Ans)

When managing hard drives in the Amazon cloud, how are older drives disposed of?

  • Drives are sold for scrap.
  • Drives are degassed and destroyed. (Ans)
  • All drives are SSD and never break down.
  • Drives are reformatted.

What security controls are inherited by AWS customers when they deploy workloads?

  • ISO 27001 (Ans)
  • Security of equipment
  • Secure disposal of hard drives
  • Physical security
  • Equipment maintenance

Would key feature at AWS can be used on most services for identification and control?

  • Tagging (Ans)
  • Cloud Watch
  • Logging
  • Cloud Trail

What can identity and access management be used to control in the AWS cloud?

  • Users, groups, and services (Ans)
  • Users, groups, and devices
  • APIs, console access, and groups
  • Groups, systems, and consol access

Utilizing security for users and computers at AWS is carried out using what security tool?

  • Cloud HSM
  • Amazon Inspector
  • AWS Config
  • Identity and access management (Ans)

Validating the security of physical access to AWS is performed by whom?

  • Independent auditors (Ans)
  • Multifactor authentication and smartcards
  • Swipe cards and security personnel
  • Multifactor authentication and retinal scans

When creating a governance structure, policies are created from what two components?

  • Certifications and standards
  • Standards and procedures (Ans)
  • Procedures and goals
  • Attestations and certifications

What AWS infrastructure is deployed in Edge locations?

  • Data centers
  • DNS and CDN services (Ans)
  • Virtual machines
  • Direct link
Rajesh Kumar
Follow me