Access Control & Definitions
Security Threats
AWS Security Services
Security Responsibilities
AWS Security
100

A method where access to a website or account is only granted after the user presents two or more factors (password, SMS code, etc.)

Multifactor Authentication? (or two-factor authentication)

100

A type of malicious software, or malware designed to deny access to a computer system or data until compensation is paid

Ransomware

100

Identity Management for mobile apps. Which AWS service provides that ?

AWS Cognito

100

You found 2 issues one you found a security Risk in one of our AWS services and You see suspicious activity in an AWS Account ? What is your responsibility as AWS Employee ?

Open a Ticket with AWS Security

100

How are AWS security teams notified when an AWS resource is found to be noncompliant?

Both SNS and Configuration Stream

200

An approach to restrict system access to authorized users by granting it based on business responsibilities

Role-based access control?

200

An attack that aims to make a service such as a website unusable by flooding it with a large amount of malicious traffic

Denial of service attack (DDoS)

200

Protect AWS accounts with intelligent threat detection

Amazon GuardDuty

200

The process of converting plaintext into another format that cannot be decoded without a key

Encryption

200

AWS Security Best Practices Checklist contains 8 key Items. Name one

1. Create Strong Password Policies

2. Implement Multi-Factor Authentication (MFA)

3. Use Email Aliases

4. Set Up AWS Identity & Access Management (IAM)

5. Perform Regular Data Backups

6. Create a Company Culture of Security

7. Maintain Regulatory Compliance

8. Keep Policies Up to Date

300

The principle of allowing users as little access to a system as possible for them to complete their tasks

Principle of least privilege

300

An attack that repeatedly tries possible passwords or encryption keys until the correct one is found

Brute-force attack

300

Rotate, manage, and retrieve Secrets in a AWS environment

AWS Secrets Manager

300

Which AWS service help automate security assessment that helps improve the security & Compliance of applications deployed on AWS

Amazon Inspector

300

This security product capture the inbound and outbound traffic from the network interfaces in your VPC.

Flow logs

400

Strategic plan with tactical prescriptive guidance that lays out a customers cloud security journey to transform their enterprise.

AWS Security EPICS

400

Understand and identify potential security misconfigurations, threats, or unexpected behaviors

Threat Detection

400

No cost, self-service portal for on-demand access to AWS’ compliance reports

AWS Artifact

400

Which AWS Well Architected Design Principle help Monitor, alert, and audit actions and changes to your environment in real time. Integrate log and metric collection with systems to automatically investigate and take action.

Traceability Enablement

400

What is the name of the role that notify customers about one or more vulnerabilities

AWS Security Bulletins

500

Continuously Identify, Classify, remediate, and mitigate security issues is called

Vulnerability Mgmt

500

Monitor, Evaluate, Manage, and Improve the effectiveness of our security & privacy programs.

Reduce potential harm by effectively respond to security issues (hint 2 security Perspectives)

Security Assurance & Incident Response

500

Investigate potential security issues which AWS Service provides this ?

Scalable, cost-effective application recovery to AWS. Name the service ?

Amazon Detective & AWS Elastic Disaster Recovery

500

What Services in Isengard can be made public to show customer information related to a demo or aws service that shows the benefit of using AWS cloud services

None (No Services can be made public in Isengard account)

500

What is a way of using human-like thought mechanisms and converting them to be used by Artificial Intelligence technologies in security to detect security threats.

Cognitive Cybersecurity

M
e
n
u