Understanding IAM Users
Which of the following best describes an IAM user in a cloud environment?
- A digital identity assigned to a person or application needing access
- A temporary guest account for public resources
- A storage location for encrypted files
- A backup system for lost passwords
- A type of network access protocol
IAM Groups Role
What is the primary purpose of creating a group in IAM?
- To allow users to share files more securely
- To manage permissions for multiple users collectively
- To increase network speed for users
- To automate server backups
- To monitor system performance
Identity Policy Application
If you want to give all developers read-only access to a resource, which IAM feature should you use?
- Attach a policy to the developer group
- Change the password for each user
- Reset the access key for the group
- Create a custom protocol
- Turn off multi-factor authentication
Policy Documents Format
IAM policy documents are typically written in which format?
- CSV
- JSON
- XML
- TXT
- JASN
Multi-Factor Authentication Requirement
Enabling multi-factor authentication (MFA) on an IAM user account helps achieve which security goal?
- Providing an extra layer of verification at login
- Encrypting data before storage
- Sharing passwords securely
- Generating stronger network connections
- Disabling account access
Role-Based Access
Why might you use an IAM role instead of an IAM user for an application running on a virtual machine?
- To assign temporary permissions without managing long-term credentials
- To allow manual login for every application
- To increase disk storage size
- To improve operating system performance
- To share passwords among users
Principle of Least Privilege
Granting users the minimum permissions necessary to perform their tasks is known as which security best practice?
- Maximum access policy
- Open access principle
- Principle of least privilege
- Mandatory admin mode
- Privilege escalation
Policy Evaluation Order
When both an 'Allow' and an explicit 'Deny' permission are present for a resource, what is the default IAM behavior?
- Deny overrides Allow
- Allow overrides Deny
- Both permissions are ignored
- The user gets admin access
- An error message is shown
Temporary Credentials Use Case
Which IAM feature provides short-term access to resources, often used for external users or services?
- Temporary credentials
- Permanent passwords
- Static tokens
- Access certificates
- Manual keys
Understanding IAM Permissions
An IAM permission statement allowing 'List', 'Read', and 'Write' actions on a resource means what?
- The user can list, view, and modify the resource
- The user can only delete the resource
- The user can manage network access for the resource
- The user can only archive the resource
- The user has no access to the resource