問題一覧
1
Use an IAM policy to control access for clients who can mount your file system with the required permissions, Use VPC security groups to control the network traffic to and from your file system
2
Create a group, attach the policy to the group and place the users in the group
3
AWS Shield Advanced, VPC Security Groups, AWS Web Application Firewall (AWS WAF)
4
Amazon GuardDuty
5
Dedicated Instances
6
Configure the bucket policy to deny if the PutObject does not have an x-amz-server-side-encryption header set
7
AWS Directory Service for Microsoft Active Directory (AWS Managed Microsoft AD)
8
Client Side Encryption
9
Updates to security groups are applied immediately., Security groups are stateful.
10
Only bucket and object owners have access to the resources they create
11
AWS Systems Manager Patch Manager
12
Immediately
13
200
14
Prevent passwords including the user’s last name
15
All traffic/Deny
16
Move the ENI from the instance no longer needing it to the instance requiring it
17
No, VPC peering does not support edge-to-edge routing.
18
Create a security group for the database server. The security group should allow traffic on TCP port 1521 from the web server security group., Create a security group for the web server. The security group should allow inbound HTTPS traffic on port 443 from 0.0.0.0/0 (anywhere).
19
Attach an Internet Gateway (IGW) to the VPC., Create a route in the route table of the subnet allowing a route out of the Internet Gateway (IGW).
20
Amazon EMR, Amazon EC2
21
NACL then security group
22
At the time the EBS volume is created
23
IAM
24
A multi-tier secure architecture
25
All of them
26
Assign IAM roles to the EC2 instance.
27
1
28
An on-premises customer gateway, A virtual private gateway, A VPC with hardware VPN access
29
Root login
30
Enable MFA
31
Network interfaces
32
The portal first verifies the user's identity in the organization and then generates a SAML authentication response., After the client browser posts the SAML assertion, AWS sends the sign-in URL as a redirect and then the client browser is redirected to the Console.
33
String match conditions, Size constraint conditions, IP match conditions
34
Allow all outbound traffic
35
Root user
36
You need to create an outbound rule allowing RDP response traffic to go back out again., Network access control lists are stateless.
37
AWS CloudTrail
38
Key Rotation
39
Make use of an OS-level logging tool such as iptables and log events to CloudWatch or S3., Set up a Flow Log for the group of instances and forward them to CloudWatch.
40
Because the first matching rule applies
41
Through a password policy
42
Access Key ID/Secret Access Key
43
You should configure the VPC subnet in which the application sits so that it does not have an IP address range that conflicts with that of the on-premises VLAN in which the back-end services sit., You should configure an AWS Direct-Connect link between the VPC and the site with the on-premises solution.
44
OS security issues within the instances
45
Allow all traffic in and out
46
PCI-DSS
47
Shared Responsibility
48
NACLs are stateless
49
“Owner” refers to the identity and e-mail address used to create the AWS account.
50
Inbound traffic
51
Trusted Advisor
52
Dedicated instance
53
Use third-party volume encryption tools., Encrypt the data using native encryption tools available in the operating system., Encrypt the data inside your application, before storing it on EBS.
54
Launch permissions, S3 bucket permissions, User-defined tags
55
5
56
Allow rules
57
Groups
58
Have each user set up multifactor authentication once they have logged in to the console., Generate a password for each user and give these passwords to your system administrators.
59
Security Groups
60
Explain that AWS implements network security differently and that there is no such thing as a firewall appliance. Create an IAM user with a policy that can read Security Group and Route settings., Tell him the details of the web application firewall.
61
Network ACLs (NACLs)
62
The public IP address is not managed on the instance; instead, it is an alias applied as a network address translation of the private IP address.
63
Role
64
5
65
All data stored on the volume
xj9 - 19628 - a
xj9 - 19628 - a
critical flaw · 98問 · 2年前xj9 - 19628 - a
xj9 - 19628 - a
98問 • 2年前xj9 - 19628 - b
xj9 - 19628 - b
critical flaw · 30問 · 2年前xj9 - 19628 - b
xj9 - 19628 - b
30問 • 2年前xj9 - 19628 - c
xj9 - 19628 - c
critical flaw · 99問 · 1年前xj9 - 19628 - c
xj9 - 19628 - c
99問 • 1年前xj9 - 19628 - d1
xj9 - 19628 - d1
critical flaw · 99問 · 1年前xj9 - 19628 - d1
xj9 - 19628 - d1
99問 • 1年前xj9 - 19628 - d2
xj9 - 19628 - d2
critical flaw · 98問 · 1年前xj9 - 19628 - d2
xj9 - 19628 - d2
98問 • 1年前1. Shattershot
1. Shattershot
critical flaw · 50問 · 1年前1. Shattershot
1. Shattershot
50問 • 1年前Conquest Book 1
Conquest Book 1
critical flaw · 100問 · 1年前Conquest Book 1
Conquest Book 1
100問 • 1年前k3ch - 2910116 - D1 - A
k3ch - 2910116 - D1 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D1 - A
k3ch - 2910116 - D1 - A
100問 • 1年前k3ch - 2910116 - D1 - B
k3ch - 2910116 - D1 - B
critical flaw · 65問 · 1年前k3ch - 2910116 - D1 - B
k3ch - 2910116 - D1 - B
65問 • 1年前k3ch - 2910116 - D2 - A
k3ch - 2910116 - D2 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D2 - A
k3ch - 2910116 - D2 - A
100問 • 1年前k3ch - 2910116 - D2 - B
k3ch - 2910116 - D2 - B
critical flaw · 55問 · 1年前k3ch - 2910116 - D2 - B
k3ch - 2910116 - D2 - B
55問 • 1年前k3ch - 2910116 - D3 - A
k3ch - 2910116 - D3 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D3 - A
k3ch - 2910116 - D3 - A
100問 • 1年前k3ch - 2910116 - D3 - B
k3ch - 2910116 - D3 - B
critical flaw · 63問 · 1年前k3ch - 2910116 - D3 - B
k3ch - 2910116 - D3 - B
63問 • 1年前k3ch - 2910116 - D4 - A
k3ch - 2910116 - D4 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D4 - A
k3ch - 2910116 - D4 - A
100問 • 1年前1. X-Tinction Agenda
1. X-Tinction Agenda
critical flaw · 100問 · 1年前1. X-Tinction Agenda
1. X-Tinction Agenda
100問 • 1年前2. X-Tinction Agenda
2. X-Tinction Agenda
critical flaw · 100問 · 1年前2. X-Tinction Agenda
2. X-Tinction Agenda
100問 • 1年前3. X-Tinction Agenda
3. X-Tinction Agenda
critical flaw · 100問 · 1年前3. X-Tinction Agenda
3. X-Tinction Agenda
100問 • 1年前4. X-Tinction Agenda
4. X-Tinction Agenda
critical flaw · 90問 · 1年前4. X-Tinction Agenda
4. X-Tinction Agenda
90問 • 1年前Executioner's Song Book 1
Executioner's Song Book 1
critical flaw · 30問 · 1年前Executioner's Song Book 1
Executioner's Song Book 1
30問 • 1年前問題一覧
1
Use an IAM policy to control access for clients who can mount your file system with the required permissions, Use VPC security groups to control the network traffic to and from your file system
2
Create a group, attach the policy to the group and place the users in the group
3
AWS Shield Advanced, VPC Security Groups, AWS Web Application Firewall (AWS WAF)
4
Amazon GuardDuty
5
Dedicated Instances
6
Configure the bucket policy to deny if the PutObject does not have an x-amz-server-side-encryption header set
7
AWS Directory Service for Microsoft Active Directory (AWS Managed Microsoft AD)
8
Client Side Encryption
9
Updates to security groups are applied immediately., Security groups are stateful.
10
Only bucket and object owners have access to the resources they create
11
AWS Systems Manager Patch Manager
12
Immediately
13
200
14
Prevent passwords including the user’s last name
15
All traffic/Deny
16
Move the ENI from the instance no longer needing it to the instance requiring it
17
No, VPC peering does not support edge-to-edge routing.
18
Create a security group for the database server. The security group should allow traffic on TCP port 1521 from the web server security group., Create a security group for the web server. The security group should allow inbound HTTPS traffic on port 443 from 0.0.0.0/0 (anywhere).
19
Attach an Internet Gateway (IGW) to the VPC., Create a route in the route table of the subnet allowing a route out of the Internet Gateway (IGW).
20
Amazon EMR, Amazon EC2
21
NACL then security group
22
At the time the EBS volume is created
23
IAM
24
A multi-tier secure architecture
25
All of them
26
Assign IAM roles to the EC2 instance.
27
1
28
An on-premises customer gateway, A virtual private gateway, A VPC with hardware VPN access
29
Root login
30
Enable MFA
31
Network interfaces
32
The portal first verifies the user's identity in the organization and then generates a SAML authentication response., After the client browser posts the SAML assertion, AWS sends the sign-in URL as a redirect and then the client browser is redirected to the Console.
33
String match conditions, Size constraint conditions, IP match conditions
34
Allow all outbound traffic
35
Root user
36
You need to create an outbound rule allowing RDP response traffic to go back out again., Network access control lists are stateless.
37
AWS CloudTrail
38
Key Rotation
39
Make use of an OS-level logging tool such as iptables and log events to CloudWatch or S3., Set up a Flow Log for the group of instances and forward them to CloudWatch.
40
Because the first matching rule applies
41
Through a password policy
42
Access Key ID/Secret Access Key
43
You should configure the VPC subnet in which the application sits so that it does not have an IP address range that conflicts with that of the on-premises VLAN in which the back-end services sit., You should configure an AWS Direct-Connect link between the VPC and the site with the on-premises solution.
44
OS security issues within the instances
45
Allow all traffic in and out
46
PCI-DSS
47
Shared Responsibility
48
NACLs are stateless
49
“Owner” refers to the identity and e-mail address used to create the AWS account.
50
Inbound traffic
51
Trusted Advisor
52
Dedicated instance
53
Use third-party volume encryption tools., Encrypt the data using native encryption tools available in the operating system., Encrypt the data inside your application, before storing it on EBS.
54
Launch permissions, S3 bucket permissions, User-defined tags
55
5
56
Allow rules
57
Groups
58
Have each user set up multifactor authentication once they have logged in to the console., Generate a password for each user and give these passwords to your system administrators.
59
Security Groups
60
Explain that AWS implements network security differently and that there is no such thing as a firewall appliance. Create an IAM user with a policy that can read Security Group and Route settings., Tell him the details of the web application firewall.
61
Network ACLs (NACLs)
62
The public IP address is not managed on the instance; instead, it is an alias applied as a network address translation of the private IP address.
63
Role
64
5
65
All data stored on the volume