Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Welcome to AWS Fundamentals: Addressing Security Risk!
This course will give you an overview of security best practices when developing and managing applications on AWS. The course, created by AWS experts and delivered by AWS Solutions Architects, uses video lectures, hands-on exercise guides, demonstrations, and quizzes to dive deep into concepts about security on AWS.
You will learn about the concept of “least privilege” and the AWS Shared Responsibility Model, as well as view demonstrations of Amazon GuardDuty, AWS Secrets Manager, and cross-account access.
We encourage IT professionals and leaders who are interested in learning about best practices for securing an AWS environment and applications developed on AWS to enroll in this course. Before taking this course, we recommend you complete AWS Fundamentals: Going Cloud-Native (https://www.coursera.org/learn/aws-fundamentals-going-cloud-native).
Q1. What security mechanism can add an extra layer of protection to your AWS account in addition to a username-password combination?
Q2. If a user wanted to read from a DynamoDB table what policy would you attach to their user profile?
Q3. What are valid MFA or Multi-factor Authentication options available to use on AWS? Select all that apply.
Q4. What format is an Identity and Access Management policy document in?
Q5. Which are valid options for interacting with your AWS account? Select all that apply.
Q1. Which solution below grants AWS Management Console access to a DevOps engineer?
Q2. Which of these IAM policies cannot be updated by you?
Q3. Which of these services can establish a trusted relationship between your corporate Active Directory and AWS?
Q4. What is the main difference between Cognito User Pool and Cognito Identity Pool?
Q5. How do you audit IAM user’s access to your AWS accounts and resources?
Q1. Which statement is true?
Q2. What is a Security Group?
Q3. How many types of VPC Endpoints are available?
Q4. Which of these AWS resources cannot be monitored using VPC Flow logs?
Q5. You can route traffic to a NAT Gateway through:
Q1. What AWS Services keeps a record of who is interacting with your AWS Account?1 point
Q2. Which of the following are monitoring and logging services available on AWS? Select all that apply.
Q3. Which of the following sections from Trusted Advisor exists under the Well-Architected Framework as a pillar as well?
Q4. If you wanted to accomplish threat detection in your AWS Infrastructure, which of the following services would you use?
Q5. Which AWS Service has an optional agent that can be deployed to EC2 instances to perform a security assessment?
Q1. What requirement must you adhere to in order to deploy an AWS CloudHSM?
Q2. What AWS KMS keys are used to encrypt and decrypt data in AWS?
Q3. How much data can you encrypt/decrypt using a Customer Master Key?
Q1. The purpose of encrypting data when it is in transit between systems and services is to prevent (choose 3 correct answers):
Q2. Which protocol below is an industry-standard cryptographic protocol used for encrypting data at the transport layer?
Q3. How do you encrypt an existing unencrypted EBS volume?
Q4. Can you encrypt just a subset of items in a DynamoDB table?
Q5. When you enable encryption for the RDS DB instance, what would not be encrypted?
Q1. Which of the following are valid Pillars of the Well-Architected Framework? Choose two.
Q2. What language does Amazon Athena support?
Q3. What is the name of the model that shows how security is handled by AWS and its customers in the AWS Cloud?
Q4. What AWS service is best suited for storing objects?
Q5. What AWS service can be used to manage multiple AWS accounts for consolidated billing?
Q6. What type of database is Amazon DynamoDB?
Q7. What is a customer access endpoint?
Refer Above Quizzes for End of Course Assessment Quiz Answers
More Coursera Quiz Answers >>
Managing Security in Google Cloud Coursera Quiz Answers
Security Best Practices in Google Cloud Coursera Quiz Answers
AWS Fundamentals Addressing Security Risk Coursera Quiz Answers
MLOps (Machine Learning Operations) Fundamentals Quiz Answers