Upgrade & Secure Your Future with DevOps, SRE, DevSecOps, MLOps!

We spend hours on Instagram and YouTube and waste money on coffee and fast food, but won’t spend 30 minutes a day learning skills to boost our careers.
Master in DevOps, SRE, DevSecOps & MLOps!

Learn from Guru Rajesh Kumar and double your salary in just one year.


Get Started Now!

AWS Interview Questions and Answer Part – 13

The IAS octave is an expansion of what security baseline?

  • FEDRAMP
  • HIPPA
  • ISO 27001
  • The C.I.A. Triad (Ans)

What are three goals AWS is striving to meet in the cloud through utilization of their security tools?

  • Planning, control, and audibility
  • Visibility, audibility, and control (Ans)
  • Audibility, analysis, and governance
  • Planning, governance, and control

When defining the security requirements for your company’s operation in the public cloud, what is the essential certification you need to analyze first?

  • SOC-1
  • SOC-2 (Ans)
  • ISO 27001
  • SOC-3

What is the definition of the AWS shared security model for customers?

  • Security in the cloud (Ans)
  • Security on the cloud
  • Security of the cloud
  • Security for the cloud

Replication between regions at AWS is carried out by what party?

  • AWS partner
  • AWS upon request
  • Associated Telco
  • The customer (Ans)

When managing hard drives in the Amazon cloud, how are older drives disposed of?

  • Drives are sold for scrap.
  • Drives are degassed and destroyed. (Ans)
  • All drives are SSD and never break down.
  • Drives are reformatted.

What security controls are inherited by AWS customers when they deploy workloads?

  • ISO 27001 (Ans)
  • Security of equipment
  • Secure disposal of hard drives
  • Physical security
  • Equipment maintenance

Would key feature at AWS can be used on most services for identification and control?

  • Tagging (Ans)
  • Cloud Watch
  • Logging
  • Cloud Trail

What can identity and access management be used to control in the AWS cloud?

  • Users, groups, and services (Ans)
  • Users, groups, and devices
  • APIs, console access, and groups
  • Groups, systems, and consol access

Utilizing security for users and computers at AWS is carried out using what security tool?

  • Cloud HSM
  • Amazon Inspector
  • AWS Config
  • Identity and access management (Ans)

Validating the security of physical access to AWS is performed by whom?

  • Independent auditors (Ans)
  • Multifactor authentication and smartcards
  • Swipe cards and security personnel
  • Multifactor authentication and retinal scans

When creating a governance structure, policies are created from what two components?

  • Certifications and standards
  • Standards and procedures (Ans)
  • Procedures and goals
  • Attestations and certifications

What AWS infrastructure is deployed in Edge locations?

  • Data centers
  • DNS and CDN services (Ans)
  • Virtual machines
  • Direct link
DevOps Certification, SRE Certification, and DevSecOps Certification by DevOpsSchool

Explore our DevOps Certification, SRE Certification, and DevSecOps Certification programs at DevOpsSchool. Gain the expertise needed to excel in your career with hands-on training and globally recognized certifications.