AWS Certified Solutions Architect Associate Training Notes [Cheat Sheets]
AWS Security, Identity & Compliance
Use the buttons below to browse detailed training notes for AWS Security, Identity and Compliance.
AWS Identity and Access Management (IAM)
AWS Accounts and Organizations
AWS Directory Services
AWS Key Management Service (KMS)
AWS WAF and Shield
Fast-track your Exam Success with these popular Training Resources
Take your studies offline with these downloadable eBooks
For those who want to take their studies offline, we’ve combined all of our Cheat Sheets into a downloadable eBook. You also get to download 390 practice questions with detailed answers in PDF format.
Download this eBook (in PDF format) for the SAA-C02 with 300 pages of detailed facts, tables and diagrams. These cheat sheets contain everything you need to know to fast-track your exam success.
Assess your exam readiness with these Practice Tests to maximize your chance of passing the AWS certification exam first time. We recommend reviewing these practice questions until you’re confident in all areas!
Click "Start Practice Exam" below
Free AWS Security, Identity and Compliance Practice Questions
Test your knowledge with this FREE AWS Practice Test for the AWS Certified Solutions Architect
- Total number of practice questions: 10
- Pass mark: 72%
- Completion time: No time limit
Want 500 more AWS practice questions?
Learn more about our popular practice exams that will help you fast-track your exam success.
Practice Exam Summary
0 of 10 questions completed
You have already completed the practice exam before. Hence you can not start it again.
Practice Exam is loading…
You must sign in or sign up to start the practice exam.
0 of 10 questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
- AWS Security, Identity, & Compliance 0%
Better luck next time!
Unfortunately on this occasion, you did not pass the exam. The passing mark is a minimum score of 72%. Please use the “View Questions” button below to review answers, explanations, and reference links for each question before taking the practice exam again.
Need to improve your score? Get access to over 500+ high-quality questions here.
You have passed the exam. The passing mark is a minimum score of 72%. Please use the “View Questions” button below to review answers, explanations, and reference links for each question.
Want more questions like these? Get access to over 500+ high-quality questions here.
Question 1 of 10
A solutions Architect is designing a new workload where an AWS Lambda function will access an Amazon DynamoDB table.
What is the MOST secure means of granting the Lambda function access to the DynamoDB table?CorrectIncorrect
Question 2 of 10
A Solutions Architect is developing an encryption solution. The solution requires that data keys are encrypted using envelope protection before they are written to disk.
Which solution option can assist with this requirement?CorrectIncorrect
Question 3 of 10
An EC2 instance that you manage has an IAM role attached to it that provides it with access to Amazon S3 for saving log data to a bucket. A change in the application architecture means that you now need to provide the additional ability for the application to securely make API requests to Amazon API Gateway.
Which two methods could you use to resolve this challenge? (Select TWO.)CorrectIncorrect
Question 4 of 10
The security team in your company is defining new policies for enabling security analysis, resource change tracking, and compliance auditing. They would like to gain visibility into user activity by recording API calls made within the company’s AWS account. The information that is logged must be encrypted. This requirement applies to all AWS regions in which your company has services running.
How will you implement this request? (Select TWO.)CorrectIncorrect
Question 5 of 10
You work for Digital Cloud Training and have just created a number of IAM users in your AWS account. You need to ensure that the users are able to make API calls to AWS services. What else needs to be done?CorrectIncorrect
Question 6 of 10
The development team at your company have created a new mobile application that will be used by users to access confidential data. The developers have used Amazon Cognito for authentication, authorization, and user management. Due to the sensitivity of the data, there is a requirement to add another method of authentication in addition to a username and password.
You have been asked to recommend the best solution. What is your recommendation?CorrectIncorrect
Question 7 of 10
A Solutions Architect is creating a URL that lets users who sign in to the organization’s network securely access the AWS Management Console. The URL will include a sign-in token that authenticates the user to AWS. Microsoft Active Directory Federation Services is being used as the identity provider (IdP).
Which of the steps below will the Solutions Architect need to include when developing the custom identity broker? (Select TWO.)CorrectIncorrect
Question 8 of 10
A Solutions Architect must design a solution for providing single sign-on to existing staff in a company. The staff manage on-premise web applications and also need access to the AWS management console to manage resources in the AWS cloud.
Which combination of services are BEST suited to delivering these requirements?CorrectIncorrect
Question 9 of 10
A solutions architect is designing a microservices architecture. AWS Lambda will store data in an Amazon DynamoDB table named Orders. The solutions architect needs to apply an IAM policy to the Lambda function’s execution role to allow it to put, update, and delete items in the Orders table. No other actions should be allowed.
Which of the following code snippets should be included in the IAM policy to fulfill this requirement whilst providing the LEAST privileged access?CorrectIncorrect
Question 10 of 10
A website runs on Amazon EC2 instances in an Auto Scaling group behind an Application Load Balancer (ALB) which serves as an origin for an Amazon CloudFront distribution. An AWS WAF is being used to protect against SQL injection attacks. A review of security logs revealed an external malicious IP that needs to be blocked from accessing the website.
What should a solutions architect do to protect the application?CorrectIncorrect