IAM (Identity Access Management) Exam with ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
precise detailed answers ||\\//|| ||\\//||
What does IAM stand for? - correct answer✔✔Identity Access Management
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
What is IAM ? - correct answer✔✔IAM allows you to manage users and their level of access
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
to AWS resources
||\\//|| ||\\//||
Benefits of IAM - correct answer✔✔1. Centralized control of AWS account
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
2. Shared access to your AWS account
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
3. Granular level of permissions
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
4. Identity Federation (Active Directory, Facebook, etc)
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
5. Multi-Factor Authentication (MFA)
||\\//|| ||\\//|| ||\\//||
6. Provide temporary access for users, devices, and services
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
7. Password rotation policy
||\\//|| ||\\//|| ||\\//||
8. Support PCI (payment card Industry) DSS (data security standards) compliance
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
(True/False) Secret Access key is only give once - correct answer✔✔True ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Power Users Access allows access to all AWS services except for management which two
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
services within IAM ? - correct answer✔✔1. Groups
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
2. Users
||\\//||
, (True/False) IAM policies are region specific - correct answer✔✔False. IAM is universally ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
available which means you only need to configure users and policies only once since they are
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
applied globally
||\\//|| ||\\//||
Under what category is IAM in ? - correct answer✔✔Security, Identity & Compliance
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
IAM consist of ... - correct answer✔✔1. Users
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
2. Groups ||\\//|| ||\\//||
3. Roles ||\\//||
4. Policies||\\//||
When you use the AWS Management Console to create a user, you must choose to at least
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
which two IAM User credentials - correct answer✔✔1. console password
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
or ||\\//||
2. access keys
||\\//|| ||\\//||
What are the four IAM User credentials the user use can use to access AWS ? - correct
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔1. Console Password ||\\//|| ||\\//||
2. Access & Secret Keys
||\\//|| ||\\//|| ||\\//|| ||\\//||
3. SSH Keys||\\//|| ||\\//||
4. Server Certificate (SSL/TLS cert)
||\\//|| ||\\//|| ||\\//|| ||\\//||
What are Access & Secret Key used for ? - correct answer✔✔Access & Secret Keys can be
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
used to make programmatic calls to AWS. Which includes, API calls in your code, at a
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
command prompt when using the AWS CLI, at the AWS PowerShell tools. ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
What is the maximum number of Access and Secret key you can assign an IAM User - correct
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔You can assign two to a user at a time
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
precise detailed answers ||\\//|| ||\\//||
What does IAM stand for? - correct answer✔✔Identity Access Management
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
What is IAM ? - correct answer✔✔IAM allows you to manage users and their level of access
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
to AWS resources
||\\//|| ||\\//||
Benefits of IAM - correct answer✔✔1. Centralized control of AWS account
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
2. Shared access to your AWS account
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
3. Granular level of permissions
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
4. Identity Federation (Active Directory, Facebook, etc)
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
5. Multi-Factor Authentication (MFA)
||\\//|| ||\\//|| ||\\//||
6. Provide temporary access for users, devices, and services
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
7. Password rotation policy
||\\//|| ||\\//|| ||\\//||
8. Support PCI (payment card Industry) DSS (data security standards) compliance
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
(True/False) Secret Access key is only give once - correct answer✔✔True ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Power Users Access allows access to all AWS services except for management which two
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
services within IAM ? - correct answer✔✔1. Groups
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
2. Users
||\\//||
, (True/False) IAM policies are region specific - correct answer✔✔False. IAM is universally ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
available which means you only need to configure users and policies only once since they are
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
applied globally
||\\//|| ||\\//||
Under what category is IAM in ? - correct answer✔✔Security, Identity & Compliance
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
IAM consist of ... - correct answer✔✔1. Users
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
2. Groups ||\\//|| ||\\//||
3. Roles ||\\//||
4. Policies||\\//||
When you use the AWS Management Console to create a user, you must choose to at least
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
which two IAM User credentials - correct answer✔✔1. console password
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
or ||\\//||
2. access keys
||\\//|| ||\\//||
What are the four IAM User credentials the user use can use to access AWS ? - correct
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔1. Console Password ||\\//|| ||\\//||
2. Access & Secret Keys
||\\//|| ||\\//|| ||\\//|| ||\\//||
3. SSH Keys||\\//|| ||\\//||
4. Server Certificate (SSL/TLS cert)
||\\//|| ||\\//|| ||\\//|| ||\\//||
What are Access & Secret Key used for ? - correct answer✔✔Access & Secret Keys can be
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
used to make programmatic calls to AWS. Which includes, API calls in your code, at a
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
command prompt when using the AWS CLI, at the AWS PowerShell tools. ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
What is the maximum number of Access and Secret key you can assign an IAM User - correct
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔You can assign two to a user at a time
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||