AWS Security Awareness Training Quiz

15 Questions | Total Attempts: 145

SettingsSettingsSettings
Please wait...
AWS Security Awareness Training Quiz

Questions and Answers
  • 1. 
    Maintaining an inventory of network devices is a best practice for security.
    • A. 

      True

    • B. 

      False

  • 2. 
    Amazing Web Services periodically scans for _______ devices on the network.
  • 3. 
    Amazing Web Services only installs one firewall in one location.
    • A. 

      True

    • B. 

      False

  • 4. 
    AWS uses ingress and _______ filtering to control data coming into and going out of the network.
  • 5. 
    ______ are used to monitor web browsing and file transfers for users to limit dangerous or inappropriate network activities.
  • 6. 
    IDS stands for:
    • A. 

      Intrusion Delay System

    • B. 

      Incident Discovery System

    • C. 

      Information Destruction System

    • D. 

      Intrusion detection system

  • 7. 
    IDS signatures never need to be update.
    • A. 

      True

    • B. 

      False

  • 8. 
    Telnet may be used on AWS for connecting to remote systems.
    • A. 

      True

    • B. 

      False

  • 9. 
    Which of the following network protocols should be restricted:
    • A. 

      Telnet / rlogin / rsh

    • B. 

      Ftp / anonymous ftp / tftp

    • C. 

      P2P

    • D. 

      IRC and instant messaging

    • E. 

      All of the above

  • 10. 
    Only WPA2 is acceptable for encrypting wireless connections.
    • A. 

      True

    • B. 

      False

  • 11. 
    Periodic _____ scans for wireless devices will be conducted by the security group.
  • 12. 
    Remote access connections to AWS must be ________ and secured.
  • 13. 
    Which of the following are reasons to NOT notify law enforcement in the event of a data breach:
    • A. 

      Control of the information, information systems, facilities, and flow of information

    • B. 

      Publicity

    • C. 

      Risk of continued hacking or malware activities

    • D. 

      Risk of equipment seizure and/or interruption to business during an investigation

    • E. 

      Legal protections that apply to alleged perpetrator regarding unreasonable search (e.g., if a Company employee should become “an agent acting on behalf of law enforcement”).

    • F. 

      All of the above

  • 14. 
    Which of the following must be included in the network diagram for AWS network assets:
    • A. 

      Major network zones and primary services

    • B. 

      Workstations

    • C. 

      Wireless network connection points

    • D. 

      Remote network connection points

    • E. 

      A, C, and D

    • F. 

      B, C, and D

    • G. 

      A, B, and C

  • 15. 
    Which domain did this training cover:
    • A. 

      Workstations and Users

    • B. 

      Remote Access

    • C. 

      Networks: LAN, LAN-to-WAN, and WAN

    • D. 

      Systems/Applications

Related Topics
Back to Top Back to top