Use the buttons below to browse detailed training notes for AWS Security, Identity, and Compliance services.
TEST YOURSELF: check out our FREE practice questions at the bottom of the page!
Free AWS Security, Identity and Compliance Practice Questions
Test your Solutions Architecture knowledge with this free sample exam. Includes:
- Questions: 10 questions (multiple knowledge areas)
- Mode: Exam simulation
- Completion time: no time limit
- Pass mark: 70%
Need more questions like these? Learn more about our full question bank with over 500 questions and multiple learning modes
0 of 10 questions completed
You have already completed the practice exam before. Hence you can not start it again.
Practice Exam is loading…
You must sign in or sign up to start the practice exam.
You must first complete the following:
0 of 10 questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
- AWS Security, Identity, & Compliance 0%
Better luck next time!
Unfortunately on this occasion you did not pass the exam. The passing mark is a minimum score of 70%. Please use the “View Questions” button below to review answers, explanations, and reference links for each question before taking the practice exam again.
Need to improve your score? Get access to over 500+ high quality questions like these. Click here to enrol now and ensure you’re ready to ace your AWS Solutions Architect Associate exam!
You have passed the exam. The passing mark is a minimum score of 70%. Please use the “View Questions” button below to review answers, explanations, and reference links for each question.
Need more questions like these? Get access to over 500+ high quality questions. Click here to enrol now and ensure you’re ready to ace your AWS Solutions Architect Associate exam!
- Question 1 of 10
A solutions Architect is designing a new workload where an AWS Lambda function will access an Amazon DynamoDB table.
What is the MOST secure means of granting the Lambda function access to the DynamoDB table?CorrectIncorrect
- Question 2 of 10
A Solutions Architect is developing an encryption solution. The solution requires that data keys are encrypted using envelope protection before they are written to disk.
Which solution option can assist with this requirement?CorrectIncorrect
- Question 3 of 10
To improve security in your AWS account you have decided to enable multi-factor authentication (MFA). You can authenticate using an MFA device in which two ways? (choose 2)CorrectIncorrect
- Question 4 of 10
An EC2 instance that you manage has an IAM role attached to it that provides it with access to Amazon S3 for saving log data to a bucket. A change in the application architecture means that you now need to provide the additional ability for the application to securely make API requests to Amazon API Gateway.
Which two methods could you use to resolve this challenge? (choose 2)CorrectIncorrect
- Question 5 of 10
The security team in your company is defining new policies for enabling security analysis, resource change tracking, and compliance auditing. They would like to gain visibility into user activity by recording API calls made within the company’s AWS account. The information that is logged must be encrypted. This requirement applies to all AWS regions in which your company has services running.
How will you implement this request? (choose 2)CorrectIncorrect
- Question 6 of 10
You work for Digital Cloud Training and have just created a number of IAM users in your AWS account. You need to ensure that the users are able to make API calls to AWS services. What else needs to be done?CorrectIncorrect
- Question 7 of 10
A company needs to deploy virtual desktops for its customers in an AWS VPC, and would like to leverage their existing on-premise security principles. AWS Workspaces will be used as the virtual desktop solution.
Which set of AWS services and features will meet the company’s requirements?CorrectIncorrect
- Question 8 of 10
The development team at your company have created a new mobile application that will be used by users to access confidential data. The developers have used Amazon Cognito for authentication, authorization, and user management. Due to the sensitivity of the data, there is a requirement to add another method of authentication in addition to a username and password.
You have been asked to recommend the best solution. What is your recommendation?CorrectIncorrect
- Question 9 of 10
You are a Developer working for Digital Cloud Training. You are planning to write some code that creates a URL that lets users who sign in to your organization’s network securely access the AWS Management Console. The URL will include a sign-in token that you get from AWS that authenticates the user to AWS. You are using Microsoft Active Directory Federation Services as your identity provider (IdP) which is compatible with SAML 2.0.
Which of the steps below will you need to include when developing your custom identity broker? (choose 2)CorrectIncorrect
- Question 10 of 10
You have been asked to come up with a solution for providing single sign-on to existing staff in your company who manage on-premise web applications and now need access to the AWS management console to manage resources in the AWS cloud.
Which product combinations provide the best solution to achieve this requirement?CorrectIncorrect