{"id":8638,"date":"2020-01-11T08:08:06","date_gmt":"2020-01-11T08:08:06","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=8638"},"modified":"2021-11-13T12:07:17","modified_gmt":"2021-11-13T12:07:17","slug":"aws-interview-questions-and-answer-part-13","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/aws-interview-questions-and-answer-part-13\/","title":{"rendered":"AWS Interview Questions and Answer Part \u2013 13"},"content":{"rendered":"\n<p><strong>The IAS octave is an expansion of what security baseline?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>FEDRAMP<\/li><li>HIPPA<\/li><li>ISO 27001<\/li><li><strong>The C.I.A. Triad (Ans)<\/strong><\/li><\/ul>\n\n\n\n<p><strong>What are three goals AWS is striving to meet in the cloud through utilization of their security tools?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Planning, control, and audibility<\/li><li><strong>Visibility, audibility, and control (Ans)<\/strong><\/li><li>Audibility, analysis, and governance<\/li><li>Planning, governance, and control<\/li><\/ul>\n\n\n\n<p><strong>When defining the security requirements for your company&#8217;s operation in the public cloud, what is the essential certification you need to analyze first?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>SOC-1<\/li><li><strong>SOC-2 (Ans)<\/strong><\/li><li>ISO 27001<\/li><li>SOC-3<\/li><\/ul>\n\n\n\n<p><strong>What is the definition of the AWS shared security model for customers?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Security in the cloud (Ans)<\/strong><\/li><li>Security on the cloud<\/li><li>Security of the cloud<\/li><li>Security for the cloud<\/li><\/ul>\n\n\n\n<p><strong>Replication between regions at AWS is carried out by what party?    <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>AWS partner<\/li><li>AWS upon request<\/li><li>Associated Telco<\/li><li><strong>The customer (Ans)<\/strong><\/li><\/ul>\n\n\n\n<p><strong>When managing hard drives in the Amazon cloud, how are older drives disposed of?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Drives are sold for scrap.<\/li><li><strong>Drives are degassed and destroyed. (Ans)<\/strong><\/li><li>All drives are SSD and never break down.<\/li><li>Drives are reformatted.<\/li><\/ul>\n\n\n\n<p><strong>What security controls are inherited by AWS customers when they deploy workloads?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>ISO 27001 (Ans)<\/strong><\/li><li>Security of equipment<\/li><li>Secure disposal of hard drives<\/li><li>Physical security<\/li><li>Equipment maintenance<\/li><\/ul>\n\n\n\n<p><strong>Would key feature at AWS can be used on most services for identification and control?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Tagging (Ans)<\/strong><\/li><li>Cloud Watch<\/li><li>Logging<\/li><li>Cloud Trail<\/li><\/ul>\n\n\n\n<p><strong>What can identity and access management be used to control in the AWS cloud?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Users, groups, and services (Ans)<\/strong><\/li><li>Users, groups, and devices<\/li><li>APIs, console access, and groups<\/li><li>Groups, systems, and consol access<\/li><\/ul>\n\n\n\n<p><strong>Utilizing security for users and computers at AWS is carried out using what security tool?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Cloud HSM<\/li><li>Amazon Inspector<\/li><li>AWS Config<\/li><li><strong>Identity and access management (Ans)<\/strong><\/li><\/ul>\n\n\n\n<p><strong>Validating the security of physical access to AWS is performed by whom?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Independent auditors (Ans)<\/strong><\/li><li>Multifactor authentication and smartcards<\/li><li>Swipe cards and security personnel<\/li><li>Multifactor authentication and retinal scans<\/li><\/ul>\n\n\n\n<p><strong>When creating a governance structure, policies are created from what two components?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Certifications and standards<\/li><li><strong>Standards and procedures (Ans)<\/strong><\/li><li>Procedures and goals<\/li><li>Attestations and certifications<\/li><\/ul>\n\n\n\n<p><strong>What AWS infrastructure is deployed in Edge locations?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Data centers<\/li><li><strong>DNS and CDN services (Ans)<\/strong><\/li><li>Virtual machines<\/li><li>Direct link<\/li><\/ul>\n\n\n<div class=\"epyt-gallery\" data-currpage=\"1\" id=\"epyt_gallery_67441\"><figure class=\"wp-block-embed wp-block-embed-youtube is-type-video is-provider-youtube epyt-figure\"><div class=\"wp-block-embed__wrapper\"><iframe loading=\"lazy\"  id=\"_ytid_66750\"  width=\"760\" height=\"427\"  data-origwidth=\"760\" data-origheight=\"427\" src=\"https:\/\/www.youtube.com\/embed\/?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;cc_lang_pref=&#038;iv_load_policy=1&#038;loop=0&#038;rel=1&#038;fs=1&#038;playsinline=0&#038;autohide=2&#038;theme=dark&#038;color=red&#038;controls=1&#038;disablekb=0&#038;\" class=\"__youtube_prefs__  no-lazyload\" title=\"YouTube player\"  data-epytgalleryid=\"epyt_gallery_67441\"  allow=\"fullscreen; accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen data-no-lazy=\"1\" data-skipgform_ajax_framebjll=\"\"><\/iframe><\/div><\/figure><div class=\"epyt-gallery-list\"><div>Sorry, there was a YouTube error.<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The IAS octave is an expansion of what security baseline? FEDRAMP HIPPA ISO 27001 The C.I.A. Triad (Ans) What are three goals AWS is striving to meet&#8230; <\/p>\n","protected":false},"author":1,"featured_media":8706,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[5633],"tags":[],"class_list":["post-8638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aws"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/8638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=8638"}],"version-history":[{"count":3,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/8638\/revisions"}],"predecessor-version":[{"id":25160,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/8638\/revisions\/25160"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media\/8706"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=8638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=8638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=8638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}