📝 Notes
How to Get the Most Out of Studying #teaching
Notes from MCC Center for Teaching & Learning (CTL) Advisory Group
- Students value clear, organized courses that are fully ready on day one.
- Students feel more connected in online courses that include faculty videos and human presence, not just text.
- Faculty see their primary added value as the human connection, timely feedback, and adaptation of learning to individual students, especially in online environments where AI and web content are abundant.
CIS126RH (26072)
- Lab: Users and Groups re-valued.
- Preview next class.
CLD120 (25866)
- Module 3 - Securing Access
- KC3
- Lab: Exploring AWS Identity and Access Management (IAM)
CLD120 Module 3 Knowledge Check
1: Which statement reflects a design principle of the security pillar of the Well-Architected Framework?
- Ensure that staff are actively monitoring potential risks manually.
- Apply security at all layers of an architecture.
- Do not deploy a solution to production until you’re certain that no security risks exist.
- Decentralize privilege management.
2: Which statements about responsibility are accurate based on the AWS shared responsibility model? (Select TWO.)
- AWS is responsible for the configuration of security groups.
- Customers are responsible for managing their user data.
- AWS is responsible for host-based firewall configurations.
- AWS is responsible for the physical security of data centers.
- Customers are responsible for the installation, maintenance, and decommissioning of the hardware that they use in the AWS data center.
3: Which options are characteristics of the principle of least privilege? (Select TWO.)
- Always use groups.
- Craft security policies that limit access to specific tasks.
- Use encryption.
- Monitor actions and changes.
- Grant access only as needed.
4: Which statement about AWS Identity and Access Management (IAM) is true?
- IAM provides an audit trail of who performed an action, what action they performed, and when they performed it.
- With IAM, you can grant principals granular access to resources.
- IAM provides an extra layer of security by offering anomaly detection on resources.
- With IAM, you can manage encryption for items that require encryption at rest.
5: Which statements describe AWS Identity and Access Management (IAM) roles? (Select TWO.)
- They are uniquely associated to an individual.
- They provide permanent security credentials.
- Individuals, applications, and services can assume roles.
- They provide temporary security credentials.
- They can only be used by accounts that are associated to the person who creates the role.
6: Which statement reflects a best practice for the root user on an AWS account?
- Create two root users with separate credentials and distribute them to two different individuals.
- Remove unneeded permissions from the root user account.
- Create an admin user and perform most admin tasks with this user instead of the root user.
- To avoid getting locked out of the account, do not enable multi-factor authentication (MFA) on the root account.
7: How does AWS Identity and Access Management (IAM) evaluate a policy?
- If the policy doesn’t have any explicit deny statements or explicit allow statements, users have access by default.
- It checks for explicit allow statements before it checks for explicit deny statements.
- An explicit deny statement does not override an explicit allow statement.
- It checks for explicit deny statements before it checks for explicit allow statements.
8: Which statement about AWS Identity and Access Management (IAM) policies is accurate?
- Identity-based policies can only be attached to a single entity.
- Resource-based policies allow access by default.
- Identity-based policies are attached to a user, group, or role.
- Resource-based policies are attached to a user, group, or role.
9: Which AWS Identity and Access Management (IAM) policy element includes information about whether to allow or deny a request?
- Principal
- Action
- Effect
- Condition
10: Which option accurately describes the statement element in an AWS Identity and Access Management (IAM) policy?
- A policy can only have one statement element.
- The statement element contains other elements that together define what is allowed or denied.
- The statement element is an optional part of an IAM policy.
- The statement element does not apply to identity-based policies.