AWS IAM and Access Management Basics Quiz Quiz

  1. Understanding IAM Users

    Which of the following best describes an IAM user in a cloud environment?

    1. A digital identity assigned to a person or application needing access
    2. A temporary guest account for public resources
    3. A storage location for encrypted files
    4. A backup system for lost passwords
    5. A type of network access protocol
  2. IAM Groups Role

    What is the primary purpose of creating a group in IAM?

    1. To allow users to share files more securely
    2. To manage permissions for multiple users collectively
    3. To increase network speed for users
    4. To automate server backups
    5. To monitor system performance
  3. Identity Policy Application

    If you want to give all developers read-only access to a resource, which IAM feature should you use?

    1. Attach a policy to the developer group
    2. Change the password for each user
    3. Reset the access key for the group
    4. Create a custom protocol
    5. Turn off multi-factor authentication
  4. Policy Documents Format

    IAM policy documents are typically written in which format?

    1. CSV
    2. JSON
    3. XML
    4. TXT
    5. JASN
  5. Multi-Factor Authentication Requirement

    Enabling multi-factor authentication (MFA) on an IAM user account helps achieve which security goal?

    1. Providing an extra layer of verification at login
    2. Encrypting data before storage
    3. Sharing passwords securely
    4. Generating stronger network connections
    5. Disabling account access
  6. Role-Based Access

    Why might you use an IAM role instead of an IAM user for an application running on a virtual machine?

    1. To assign temporary permissions without managing long-term credentials
    2. To allow manual login for every application
    3. To increase disk storage size
    4. To improve operating system performance
    5. To share passwords among users
  7. Principle of Least Privilege

    Granting users the minimum permissions necessary to perform their tasks is known as which security best practice?

    1. Maximum access policy
    2. Open access principle
    3. Principle of least privilege
    4. Mandatory admin mode
    5. Privilege escalation
  8. Policy Evaluation Order

    When both an 'Allow' and an explicit 'Deny' permission are present for a resource, what is the default IAM behavior?

    1. Deny overrides Allow
    2. Allow overrides Deny
    3. Both permissions are ignored
    4. The user gets admin access
    5. An error message is shown
  9. Temporary Credentials Use Case

    Which IAM feature provides short-term access to resources, often used for external users or services?

    1. Temporary credentials
    2. Permanent passwords
    3. Static tokens
    4. Access certificates
    5. Manual keys
  10. Understanding IAM Permissions

    An IAM permission statement allowing 'List', 'Read', and 'Write' actions on a resource means what?

    1. The user can list, view, and modify the resource
    2. The user can only delete the resource
    3. The user can manage network access for the resource
    4. The user can only archive the resource
    5. The user has no access to the resource