Security – Part B
Simulator Summary
0 of 31 Questions completed
Questions:
Information
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
Results
Results
0 of 31 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 31
1. Question
What is the difference between AWS KMS envelope encryption and AWS KMS key encryption?
CorrectIncorrect -
Question 2 of 31
2. Question
What is the maximum size of data that can be encrypted with a single call to the AWS KMS Encrypt API?
CorrectIncorrect -
Question 3 of 31
3. Question
Which of the following is a key management approach for AWS CloudHSM?
CorrectIncorrect -
Question 4 of 31
4. Question
Which encryption algorithm is NOT supported by AWS CloudHSM?
CorrectIncorrect -
Question 5 of 31
5. Question
Which of the following services can be used to implement at-rest encryption for Amazon S3 buckets?
CorrectIncorrect -
Question 6 of 31
6. Question
Which of the following protocols can be used to implement in-transit encryption for data sent between Amazon EC2 instances in a VPC?
CorrectIncorrect -
Question 7 of 31
7. Question
Which of the following techniques can be used to implement data obfuscation and masking in Amazon Redshift?
CorrectIncorrect -
Question 8 of 31
8. Question
Which of the following techniques can be used to implement data masking for Amazon RDS instances?
CorrectIncorrect -
Question 9 of 31
9. Question
A data analytics team is using AWS KMS to encrypt data stored in S3. They want to ensure that their encryption keys are rotated regularly to improve their data security posture. Which of the following is the best approach to achieve this?
CorrectIncorrect -
Question 10 of 31
10. Question
An organization is using AWS Secrets Manager to manage their database credentials. They want to ensure that their secrets are not exposed to unauthorized users and that their secrets are rotated periodically to improve security. Which of the following options will best meet these requirements?
CorrectIncorrect -
Question 11 of 31
11. Question
A data analytics team needs to ensure that their data processing and storage comply with GDPR regulations. What should they consider to meet these requirements?
CorrectIncorrect -
Question 12 of 31
12. Question
A company needs to ensure that their data processing complies with HIPAA regulations. Which of the following measures would help them meet these requirements?
CorrectIncorrect -
Question 13 of 31
13. Question
Which of the following services can be used to configure access and audit logging for Amazon S3 and Amazon S3 Glacier?
CorrectIncorrect -
Question 14 of 31
14. Question
Which of the following actions should you take to ensure access and audit logging for Amazon Redshift?
CorrectIncorrect -
Question 15 of 31
15. Question
What service can be used to implement appropriate controls to meet HIPAA compliance requirements for Amazon EMR?
CorrectIncorrect -
Question 16 of 31
16. Question
What service can be used to implement appropriate controls to meet PCI DSS compliance requirements for Amazon RDS?
CorrectIncorrect -
Question 17 of 31
17. Question
Which AWS service can be used to ensure compliance with the General Data Protection Regulation (GDPR) requirements for personal data protection?
CorrectIncorrect -
Question 18 of 31
18. Question
Which of the following AWS services can help meet compliance requirements for data residency?
CorrectIncorrect -
Question 19 of 31
19. Question
Which of the following is a benefit of enabling AWS CloudTrail?
CorrectIncorrect -
Question 20 of 31
20. Question
Which of the following AWS services allow for access and audit logging?
CorrectIncorrect -
Question 21 of 31
21. Question
Your organization has recently implemented a new cloud-based data analytics platform, and you need to ensure that you are meeting all necessary data governance and compliance requirements. Which of the following is the most important consideration when determining your data governance and compliance requirements?
CorrectIncorrect -
Question 22 of 31
22. Question
As a data analyst, you are working with sensitive financial data and need to ensure that your data governance and compliance requirements are met. What is the first step in determining your data governance and compliance requirements?
CorrectIncorrect -
Question 23 of 31
23. Question
What is a best practice for key rotation in AWS?
CorrectIncorrect -
Question 24 of 31
24. Question
What is a best practice for managing secrets in AWS?
CorrectIncorrect -
Question 25 of 31
25. Question
Which of the following is an example of data masking?
CorrectIncorrect -
Question 26 of 31
26. Question
Which of the following is an example of data obfuscation?
CorrectIncorrect -
Question 27 of 31
27. Question
Which of the following statements accurately describes role-based access control?
CorrectIncorrect -
Question 28 of 31
28. Question
Which of the following data types require encryption in transit and at rest for compliance with data protection regulations?
CorrectIncorrect -
Question 29 of 31
29. Question
Which of the following techniques should be used to mask data in a development environment that contains personally identifiable information (PII)?
CorrectIncorrect -
Question 30 of 31
30. Question
Which of the following is an example of server-side encryption for data at rest in an AWS environment?
CorrectIncorrect -
Question 31 of 31
31. Question
Which of the following AWS services provides automatic server-side encryption for data at rest by default?
CorrectIncorrect