Find the Best Cosmetic Hospitals

Explore trusted cosmetic hospitals and make a confident choice for your transformation.

“Invest in yourself — your confidence is always worth it.”

Explore Cosmetic Hospitals

Start your journey today — compare options in one place.

AWS Interview Questions and Answer Part – 35

Cloud Trail delivers logs to which of the following?

  • S3 buckets and RedShift instances
  • S3 buckets and EC2 instances
  • S3 buckets and CloudWatch Logs groups (Ans)
  • S3 buckets and RDS instances

In a policy, a resource is:

  • A role
  • An AWS object (Ans)
  • a network object
  • An IAM object

Policies are written in:

  • JSON (Ans)
  • SOAPjr
  • HTML
  • XML

Rolling back a policy to a previous version is accomplished by which of the following methods?

  • Setting the default version of the policy (Ans)
  • Deleting the later version of a policy to get to the desired version
  • Selecting the rollback action under policies

The best tool to identify excess permissions and inactive accounts is:

  • Amazon Inspector
  • Credential Report
  • Cloud Trail
  • Access Advisor (Ans)
  • Trusted Advisor

Roles can be used with federated users from all of the following except:

  • Google
  • Active Directory
  • Salesforce.com (Ans)
  • Facebook

Roles can be delegated to IAM users only if:

  • A trust has been established betwen the role creator and the user creator
  • A trust has been established to another AWS account (Ans)
  • They are federated with Active Directory users

Auditing answers all of the following questions except which one?

  • Who
  • How (Ans)
  • What
  • Where
  • When

Customer Managed policies are best for which of the following situations?

  • Those who need granularity and control over specific privileges (Ans)
  • Those wanting a simple policy experience
  • Those who are new to AWS policies

Which of the following policy types is deleted when the associated object is deleted?

  • AWS Managed Policies
  • Customer Managed Policies
  • System Managed Policies
  • Inline Policies (Ans)

When multiple statements exist in a single policy or multiple policies are applied to a single object, the policies are:

  • ORed (Ans)
  • Ignored as only one statement per policy or policy per object is allowed
  • ANDed
  • XORed

To revert to a previous version if a policy, you select which option?

  • Revert to policy
  • Set as active policy
  • Set as default (Ans)

IAM Roles can be assumed by:

  • Applications
  • IAM Users (Ans)
  • IAM Groups

IAM roles can be assumed by users in other accounts.

  • False
  • True (Ans)

The least expensive way to store cloud trail data for long periods of time is:

  • Archiving all data to Glacier
  • S3 Reduced Redundancy Storage
  • S3 Lifecycle policies in conjunction with Glacier (Ans)
  • S3 Infrequent Access

Which type of policies are used with roles to provide access to AWS resources?

  • Trust and Permission (Ans)
  • Account and Permission
  • Account and Access
  • Trust and Access

The best tool to identify potential compliance violations is:

  • Trusted Advisor
  • Cloud Trail
  • Credential Report
  • Access Advisor
  • Amazon Inspector (Ans)

Auditing can be used to look for cost savings.

  • False
  • True (Ans)

IAM Policies contant all of the following components except:

  • Resource
  • Effect
  • Action
  • Condition
  • Result (Ans)

If versioning of policies and the ability to revert to a previous version are required, select the _ policy type.

  • Inline
  • Customer Managed (Ans)
  • Version-enabled
  • AWS Managed

Cloud Trail is enabled on a _ basis.

  • Object
  • Region (Ans)
  • Availability Zone

When policies are evaluated, the precedence in permissions is:

  • Least Restricitive
  • Explicit Deny, Explicit Allow, Implicit Deny (Ans)
  • Explicit Allow, Explicit Deny, Implicit Deny
  • Most Restricitive

Cloud Trail data can be encrypted.

  • False
  • True (Ans)

IAM roles can be assigned to EC2 servers to provide access to AWS resources for applications running on that server.

  • False
  • True (Ans)

Cloud Trail audits which of these?

  • API Access
  • Neither of these
  • Both of these (Ans)
  • Console Access

Manged policies exist as stand-alone objects that can be associated with multiple IAM objects.

  • False
  • True (Ans)

The AWS security best practice for applications requiring access to AWS resources is to:

  • Embed Access Keys and Secret keys within those applications
  • Prompt the user for an IAM user name and password when access is needed
  • Assign roles to applications
  • Assign roles to EC2 servers running those applications (Ans)

Find Trusted Cardiac Hospitals

Compare heart hospitals by city and services — all in one place.

Explore Hospitals
I’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at <a href="https://www.cotocus.com/">Cotocus</a>. I share tech blog at <a href="https://www.devopsschool.com/">DevOps School</a>, travel stories at <a href="https://www.holidaylandmark.com/">Holiday Landmark</a>, stock market tips at <a href="https://www.stocksmantra.in/">Stocks Mantra</a>, health and fitness guidance at <a href="https://www.mymedicplus.com/">My Medic Plus</a>, product reviews at <a href="https://www.truereviewnow.com/">TrueReviewNow</a> , and SEO strategies at <a href="https://www.wizbrand.com/">Wizbrand.</a> Do you want to learn <a href="https://www.quantumuting.com/">Quantum Computing</a>? <strong>Please find my social handles as below;</strong> <a href="https://www.rajeshkumar.xyz/">Rajesh Kumar Personal Website</a> <a href="https://www.youtube.com/TheDevOpsSchool">Rajesh Kumar at YOUTUBE</a> <a href="https://www.instagram.com/rajeshkumarin">Rajesh Kumar at INSTAGRAM</a> <a href="https://x.com/RajeshKumarIn">Rajesh Kumar at X</a> <a href="https://www.facebook.com/RajeshKumarLog">Rajesh Kumar at FACEBOOK</a> <a href="https://www.linkedin.com/in/rajeshkumarin/">Rajesh Kumar at LINKEDIN</a> <a href="https://www.wizbrand.com/rajeshkumar">Rajesh Kumar at WIZBRAND</a> <a href="https://www.rajeshkumar.xyz/dailylogs">Rajesh Kumar DailyLogs</a>

Related Posts

What is Amazon Redshift?

🟥 The Complete Guide to AWS Redshift – Cloud Data Warehousing at Scale As the digital economy expands, the amount of data generated by businesses is growing…

Read More

What is Amazon Redshift and use cases of Amazon Redshift?

What is Amazon Redshift? If you’re in the world of big data, you’ve probably heard of Amazon Redshift. But what exactly is it? Simply put, Amazon Redshift…

Read More

What is Amazon SimpleDB?

Amazon one of the big name, offering its customers computing infrastructure through Amazon Web Services since 2006. Aims to use its own infrastructure to provide the building…

Read More

AWS Tutorials: FinOps – AWS Certificate Manager (ACM) & Private CA cost optimisation strategies

Pricing FAQ For AWS Private Certificate Authority Pricing for AWS Certificate Manager You are not subject to an additional charge for SSL/TLS certificates that you manage with…

Read More

AWS Tutorials: How to Shutdown (Stop / Start) Relational Database Service?

To shutdown (stop) and start a Relational Database Service (RDS) instance in AWS, you can follow these steps: Stopping an RDS Instance Starting an RDS Instance AWS…

Read More

What is AWS App Mesh and use cases of AWS App Mesh?

What is AWS App Mesh? AWS App Mesh is a service mesh offering from Amazon Web Services that facilitates communication and management of your microservices across multiple…

Read More