{"id":8638,"date":"2020-01-11T08:08:06","date_gmt":"2020-01-11T08:08:06","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=8638"},"modified":"2021-11-13T12:07:17","modified_gmt":"2021-11-13T12:07:17","slug":"aws-interview-questions-and-answer-part-13","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/aws-interview-questions-and-answer-part-13\/","title":{"rendered":"AWS Interview Questions and Answer Part \u2013 13"},"content":{"rendered":"\n<p><strong>The IAS octave is an expansion of what security baseline?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>FEDRAMP<\/li><li>HIPPA<\/li><li>ISO 27001<\/li><li><strong>The C.I.A. Triad (Ans)<\/strong><\/li><\/ul>\n\n\n\n<p><strong>What are three goals AWS is striving to meet in the cloud through utilization of their security tools?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Planning, control, and audibility<\/li><li><strong>Visibility, audibility, and control (Ans)<\/strong><\/li><li>Audibility, analysis, and governance<\/li><li>Planning, governance, and control<\/li><\/ul>\n\n\n\n<p><strong>When defining the security requirements for your company&#8217;s operation in the public cloud, what is the essential certification you need to analyze first?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>SOC-1<\/li><li><strong>SOC-2 (Ans)<\/strong><\/li><li>ISO 27001<\/li><li>SOC-3<\/li><\/ul>\n\n\n\n<p><strong>What is the definition of the AWS shared security model for customers?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Security in the cloud (Ans)<\/strong><\/li><li>Security on the cloud<\/li><li>Security of the cloud<\/li><li>Security for the cloud<\/li><\/ul>\n\n\n\n<p><strong>Replication between regions at AWS is carried out by what party?    <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>AWS partner<\/li><li>AWS upon request<\/li><li>Associated Telco<\/li><li><strong>The customer (Ans)<\/strong><\/li><\/ul>\n\n\n\n<p><strong>When managing hard drives in the Amazon cloud, how are older drives disposed of?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Drives are sold for scrap.<\/li><li><strong>Drives are degassed and destroyed. (Ans)<\/strong><\/li><li>All drives are SSD and never break down.<\/li><li>Drives are reformatted.<\/li><\/ul>\n\n\n\n<p><strong>What security controls are inherited by AWS customers when they deploy workloads?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>ISO 27001 (Ans)<\/strong><\/li><li>Security of equipment<\/li><li>Secure disposal of hard drives<\/li><li>Physical security<\/li><li>Equipment maintenance<\/li><\/ul>\n\n\n\n<p><strong>Would key feature at AWS can be used on most services for identification and control?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Tagging (Ans)<\/strong><\/li><li>Cloud Watch<\/li><li>Logging<\/li><li>Cloud Trail<\/li><\/ul>\n\n\n\n<p><strong>What can identity and access management be used to control in the AWS cloud?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Users, groups, and services (Ans)<\/strong><\/li><li>Users, groups, and devices<\/li><li>APIs, console access, and groups<\/li><li>Groups, systems, and consol access<\/li><\/ul>\n\n\n\n<p><strong>Utilizing security for users and computers at AWS is carried out using what security tool?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Cloud HSM<\/li><li>Amazon Inspector<\/li><li>AWS Config<\/li><li><strong>Identity and access management (Ans)<\/strong><\/li><\/ul>\n\n\n\n<p><strong>Validating the security of physical access to AWS is performed by whom?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Independent auditors (Ans)<\/strong><\/li><li>Multifactor authentication and smartcards<\/li><li>Swipe cards and security personnel<\/li><li>Multifactor authentication and retinal scans<\/li><\/ul>\n\n\n\n<p><strong>When creating a governance structure, policies are created from what two components?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Certifications and standards<\/li><li><strong>Standards and procedures (Ans)<\/strong><\/li><li>Procedures and goals<\/li><li>Attestations and certifications<\/li><\/ul>\n\n\n\n<p><strong>What AWS infrastructure is deployed in Edge locations?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Data centers<\/li><li><strong>DNS and CDN services (Ans)<\/strong><\/li><li>Virtual machines<\/li><li>Direct link<\/li><\/ul>\n\n\n<div class=\"epyt-gallery\" data-currpage=\"1\" id=\"epyt_gallery_86409\"><figure class=\"wp-block-embed wp-block-embed-youtube is-type-video is-provider-youtube epyt-figure\"><div class=\"wp-block-embed__wrapper\"><iframe loading=\"lazy\"  id=\"_ytid_16759\"  width=\"760\" height=\"427\"  data-origwidth=\"760\" data-origheight=\"427\" src=\"https:\/\/www.youtube.com\/embed\/?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;cc_lang_pref=&#038;iv_load_policy=1&#038;loop=0&#038;rel=1&#038;fs=1&#038;playsinline=0&#038;autohide=2&#038;theme=dark&#038;color=red&#038;controls=1&#038;disablekb=0&#038;\" class=\"__youtube_prefs__  no-lazyload\" title=\"YouTube player\"  data-epytgalleryid=\"epyt_gallery_86409\"  allow=\"fullscreen; accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen data-no-lazy=\"1\" data-skipgform_ajax_framebjll=\"\"><\/iframe><\/div><\/figure><div class=\"epyt-gallery-list\"><div>Sorry, there was a YouTube error.<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The IAS octave is an expansion of what security baseline? FEDRAMP HIPPA ISO 27001 The C.I.A. Triad (Ans) What are three goals AWS is striving to meet in the cloud through utilization of their security tools? Planning, control, and audibility Visibility, audibility, and control (Ans) Audibility, analysis, and governance Planning, governance, and control When defining&#8230;<\/p>\n","protected":false},"author":1,"featured_media":8706,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_joinchat":[],"footnotes":""},"categories":[5633],"tags":[],"class_list":["post-8638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aws"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/8638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=8638"}],"version-history":[{"count":3,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/8638\/revisions"}],"predecessor-version":[{"id":25160,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/8638\/revisions\/25160"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media\/8706"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=8638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=8638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=8638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}