0
[{"id":177956,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 02:58:29","updated_at":"2017-03-09 02:58:29","questionName":"In AWS, stateless firewalls are called...","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":" stateless firewalls are called network Access Control Lists (ACL) that protect the subnets in Amazon Virtual Private Cloud (VPC).","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177973,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 03:15:25","updated_at":"2017-03-09 03:15:25","questionName":"What is CloudHSM?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"Keys are secrets that should be protected, and an appropriate rotation policy should be defined and used. The best practice is to not hard-code these secrets into management scripts and applications, but it does often occur.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177953,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 02:57:33","updated_at":"2017-03-09 02:57:33","questionName":"In AWS, stateful firewalls are called...","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"Stateful firewalls are called security groups","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177966,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 03:04:10","updated_at":"2017-03-09 03:04:10","questionName":"Which is not an AWS security level security feature?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177933,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 02:44:36","updated_at":"2017-03-09 02:44:36","questionName":"How are you defining roles and responsibilities of system users to control human access to the AWS Management Console and API?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177930,"quiz_id":"10832","answer_id":null,"answerType_id":"1","created_at":"2017-03-09 02:41:30","updated_at":"2017-03-09 02:41:30","questionName":"How are you protecting access to and use of the AWS root account credentials?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"The AWS root account credentials are only used for only minimal required activities.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177968,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 03:06:56","updated_at":"2017-03-09 03:06:56","questionName":"Which of these does not protecting the integrity of the operating system on your Amazon EC2 instances?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177948,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 02:54:51","updated_at":"2017-03-09 02:54:51","questionName":"What is Amazon Cloud Watch?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"You can use Amazon CloudWatch Logs to monitor, store, and access your log files from Amazon EC2 instances, AWS CloudTrail, or other sources.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177962,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 03:01:43","updated_at":"2017-03-09 03:01:43","questionName":"Where does WAF, host based firewalls, security groups and NACLs control network traffic?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177970,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 03:10:06","updated_at":"2017-03-09 03:10:06","questionName":"Which is a client side security control that encrypts data at rest?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":" AWS supports this using both client-side (e.g., SDK-supported, operating system-supported, Windows Bitlocker, dm-crypt, Trend Micro SafeNet, etc.) and server-side (e.g., Amazon S3). You can also use Server-Side Encryption (SSE) and Amazon Elastic Block S","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177940,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 02:49:58","updated_at":"2017-03-09 02:49:58","questionName":" How do you limit automated access to AWS resources? (e.g., applications, scripts, and\/or third-party tools or services)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177932,"quiz_id":"10832","answer_id":null,"answerType_id":"1","created_at":"2017-03-09 02:42:32","updated_at":"2017-03-09 02:42:32","questionName":"The AWS root account should not have?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177975,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 03:17:33","updated_at":"2017-03-09 03:17:33","questionName":"Where should techniques be used to protect data in transit?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"A best practice is to protect data in transit by using encryption. AWS supports using encrypted end-points for the service APIs. Additionally, customers can use various techniques within their Amazon EC2 instances.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177958,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 02:59:51","updated_at":"2017-03-09 02:59:51","questionName":"Where do firewalls, security groups, NACLs, and bastion hosts control traffic?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":177937,"quiz_id":"10832","answer_id":null,"answerType_id":"0","created_at":"2017-03-09 02:47:39","updated_at":"2017-03-09 02:47:39","questionName":"What is Employee Lifecycle Managed?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]