Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
AWS: Security Best Practices on AWS

You're reading from   AWS: Security Best Practices on AWS Learn to secure your data, servers, and applications with AWS

Arrow left icon
Product type Paperback
Published in Mar 2018
Publisher Packt
ISBN-13 9781789134513
Length 118 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Albert Anthony Albert Anthony
Author Profile Icon Albert Anthony
Albert Anthony
Arrow right icon
View More author details
Toc

Assessments


  1. If an application is running on an EC2 instance, it must pass credentials along with its ______.

    1. API response

    2. API request

    3. IP address

    4. VPC credentials

  2. When an EC2 instance is launched, it is assigned to which role?

    1. HSM

    2. KMS

    3. S3

    4. IAM

  3. Which among the following enables you to secure your infrastructure on the cloud using multiple options?

    1. Subnet

    2. NAT

    3. VPC

    4. ENI

  4. Which among the following is a detective and monitoring control system that continuously scans your network, servers, platform, and systems?

    1. IDS

    2. IPS

    3. ELB

    4. ISMS

  5. State whether the following is True or False: AWS Shield is a managed Distributed Denial of Service (DDoS) protection service.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime