O'Reilly logo

AWS: Security Best Practices on AWS by Albert Anthony

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Assessments

  1. If an application is running on an EC2 instance, it must pass credentials along with its ______.
    1. API response
    2. API request
    3. IP address
    4. VPC credentials
  2. When an EC2 instance is launched, it is assigned to which role?
    1. HSM
    2. KMS
    3. S3
    4. IAM
  3. Which among the following enables you to secure your infrastructure on the cloud using multiple options?
    1. Subnet
    2. NAT
    3. VPC
    4. ENI
  4. Which among the following is a detective and monitoring control system that continuously scans your network, servers, platform, and systems?
    1. IDS
    2. IPS
    3. ELB
    4. ISMS
  5. State whether the following is True or False: AWS Shield is a managed Distributed Denial of Service (DDoS) protection service.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required