Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam

You're reading from   AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam Set yourself apart by becoming an AWS Certified Cloud Practitioner

Arrow left icon
Product type Paperback
Published in Jul 2019
Publisher Wiley
ISBN-13 9781119490708
Length 304 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Ben Piper Ben Piper
Author Profile Icon Ben Piper
Ben Piper
David Clinton David Clinton
Author Profile Icon David Clinton
David Clinton
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

1. Cover
2. Acknowledgments FREE CHAPTER
3. About the Authors
4. Table of Exercises
5. Introduction
6. Assessment Test
7. Answers to Assessment Test
8. Chapter 1 The Cloud 9. Chapter 2 Understanding Your AWS Account 10. Chapter 3 Getting Support on AWS 11. Chapter 4 Understanding the AWS Environment 12. Chapter 5 Securing Your AWS Resources 13. Chapter 6 Working with Your AWS Resources 14. Chapter 7 The Core Compute Services 15. Chapter 8 The Core Storage Services 16. Chapter 9 The Core Database Services 17. Chapter 10 The Core Networking Services 18. Chapter 11 Automating Your AWS Workloads 19. Chapter 12 Common Use-Case Scenarios 20. Index
21. Advert
22. End User License Agreement
Appendix A Answers to Review Questions 1. Appendix B Additional Services

Chapter 5: Securing Your AWS Resources

  1. A. Identity and Access Management (IAM) is primarily focused on helping you control access to your AWS resources. KMS handles access keys. EC2 manages SSH key pairs. While IAM does touch on federated management, that’s not its primary purpose.

  2. A, B, D. Including a space or null character is not a password policy option.

  3. C, D. The root user should not be used for day-to-day admin tasks—even as part of an “admin” group. The goal is to protect root as much as possible.

  4. D. MFA requires at least two (“multi”) authentication methods. Those will normally include a password (something you know) and a token sent to either a virtual or physical MFA device (something you have).

  5. B. The -i argument should point to the name (and location) of the key stored on the local (client) machine. By default, the admin user on an Amazon Linux instance is named ec2-user.

  6. B. While assigning permissions and...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime