The IAS octave is an expansion of what security baseline?
- FEDRAMP
- HIPPA
- ISO 27001
- The C.I.A. Triad (Ans)
What are three goals AWS is striving to meet in the cloud through utilization of their security tools?
- Planning, control, and audibility
- Visibility, audibility, and control (Ans)
- Audibility, analysis, and governance
- Planning, governance, and control
When defining the security requirements for your company’s operation in the public cloud, what is the essential certification you need to analyze first?
- SOC-1
- SOC-2 (Ans)
- ISO 27001
- SOC-3
What is the definition of the AWS shared security model for customers?
- Security in the cloud (Ans)
- Security on the cloud
- Security of the cloud
- Security for the cloud
Replication between regions at AWS is carried out by what party?
- AWS partner
- AWS upon request
- Associated Telco
- The customer (Ans)
When managing hard drives in the Amazon cloud, how are older drives disposed of?
- Drives are sold for scrap.
- Drives are degassed and destroyed. (Ans)
- All drives are SSD and never break down.
- Drives are reformatted.
What security controls are inherited by AWS customers when they deploy workloads?
- ISO 27001 (Ans)
- Security of equipment
- Secure disposal of hard drives
- Physical security
- Equipment maintenance
Would key feature at AWS can be used on most services for identification and control?
- Tagging (Ans)
- Cloud Watch
- Logging
- Cloud Trail
What can identity and access management be used to control in the AWS cloud?
- Users, groups, and services (Ans)
- Users, groups, and devices
- APIs, console access, and groups
- Groups, systems, and consol access
Utilizing security for users and computers at AWS is carried out using what security tool?
- Cloud HSM
- Amazon Inspector
- AWS Config
- Identity and access management (Ans)
Validating the security of physical access to AWS is performed by whom?
- Independent auditors (Ans)
- Multifactor authentication and smartcards
- Swipe cards and security personnel
- Multifactor authentication and retinal scans
When creating a governance structure, policies are created from what two components?
- Certifications and standards
- Standards and procedures (Ans)
- Procedures and goals
- Attestations and certifications
What AWS infrastructure is deployed in Edge locations?
- Data centers
- DNS and CDN services (Ans)
- Virtual machines
- Direct link
- Best AI tools for Software Engineers - November 4, 2024
- Installing Jupyter: Get up and running on your computer - November 2, 2024
- An Introduction of SymOps by SymOps.com - October 30, 2024