Olete.in
Articles
Mock Tests
🧪 AWS IAM MCQ Quiz Hub
AWS identity services, security and compliance
Choose a topic to test your knowledge and improve your AWS IAM skills
1. Identify the wrong statement.
Identity and access management (IAM) is a framework for business processes that facilitates the management of electronic or digital identities
With IAM technologies, IT managers can control user access to critical information within their organizations
Identity and access management products offer role-based access control
In IAM roles are defined according to the ability of an individual user to perform a specific task, such as view, create or modify a file
2. Which of these is Identity in IAM?
Users
Groups
Roles
All of these
3. When you first create an Amazon Web Services (AWS) account, you begin with a single sign-in identity that has complete access to all AWS services and resources in the account. This identity is called:
Root user
Main user
Super user
None of these
4. An IAM user:
is an entity that you create in AWS
is to give people the ability to sign in to the AWS Management Console for interactive tasks and to make programmatic requests to AWS services using the API or CLI
both (a) and (b)
None of these
5. Choose the below statements are true or false for AWS: 1. When you create an IAM user, you grant it permissions by making it a member of a group that has appropriate permission policies attached (recommended), or by directly attaching policies to the user 2. You can also clone the permissions of an existing IAM user, which automatically makes the new user a member of the same groups and attaches all the same policies.
1. True, 2. True
1. True, 2. False
1. False, 2. True
1. False, 2. False
6. IAM group: (a) (b) (c) (d)
Is same as IAM users
Can be used to specify permissions for a collection of users
Is truly an identity
All of these
7. Which of these is IAM principal?
A user
A role
An application
All of the above
8. IAM role:
Have credentials (password or access keys) associated with it
Does not have any credentials (password or access keys) associated with it
May or may not have credentials (password or access keys) associated with it
None of these
9. Temporary credentials:
It expires automatically after a specified time
Have a same set of permissions that your standard IAM user have
We can have control over the duration that the credentials are valid
A and C both
10. AWS evaluates _______ when an IAM principal makes a request.
Username and Password
MAC Address
Security Policies
IP Address
11. AWS supports ______ types of policies.
4
5
6
7
12. Which of these is not an IAM policy type?
Smart policies
Access control lists (ACLs)
Session policies
Organizations SCPs
13. Identify the wrong statement.
IAM can provide shared access to the AWS account
IAM is paid service in AWS
IAM can provide granular permissions
IAM supports multifactor authentication
14. Names of IAM identities (users, roles, and groups):
Must be unique within the AWS account
Must be unique within the availability zone
Must be unique within the region
Must be unique within the AWS cloud whole
15. How many maximum groups can be created in an AWS account?
25
50
100
200
16. How many maximum users can be created in an AWS account?
2000
5000
8000
10000
17. How many maximum roles can be created in an AWS account?
300
400
200
500
18. An IAM user cannot be a member of more than __ groups.
10
20
30
40
19. How many maximum access keys can be assigned to an IAM user?
1
2
3
4
20. How many maximum customer-managed policies can be created in an AWS account?
250
500
750
1000
21. How many maximum managed policies can be assigned to an IAM entity?
2
5
10
20
22. How many maximum server certificates can be store in an AWS account?
20
50
100
500
23. Which statement is wrong for Dark Web?
The dark web is a general term for the seedier corners of the web, where people can interact online without worrying about the watchful eye of the authorities
Usually, these sites are guarded by encryption mechanisms such as Tor that allow users to visit them anonymously
People use the dark web for a variety of purposes: buying and selling drugs, discussing hacking techniques and selling hacking services and so forth
None of these
24. In addition to using IAM roles and policies or custom authorizers, you can use an ________ user pool to control who can access your API in Amazon API Gateway.
Amazon S3
Amazon Cognito
Amazon EBS
All of these
25. _allows your HTTP backend to control and accept only requests originating from Amazon API Gateway, even if the backend is publicly accessible.
Amazon Cognito
Amazon S3
Client-Side SSL Certificates
Amazon EBS
26. Identify the wrong statement for AWS.
When a storage device has reached the end of its useful life, AWS procedures include a decommissioning process
UPS units provide back-up power in the event of an electrical failure for critical and essential loads in the facility
Automatic fire detection and suppression equipment has been installed to reduce risk
AWS allows its user to visit physical data centers so that user can trust on it
Submit