Bash, the Crucial Exams Chat Bot
AI Bot

Security and Permissions for Data Solutions  Flashcards

AWS Certified Data Engineer Associate DEA-C01 Flashcards

FrontBack
How can you ensure end-to-end encryption in your data pipelineBy encrypting data at rest and in transit
How does an IAM Role differ from an IAM UserRoles are assumed temporarily by users or services, users have long-term credentials
Name one key benefit of data encryptionProtects sensitive information from unauthorized access
What AWS service can you use to monitor unusual activity in your accountAmazon GuardDuty
What does IAM stand forIdentity and Access Management
What does the principle of least privilege entailGranting the minimal permissions necessary for a task
What feature in AWS ensures encrypted data delivery between VPCsVPN or VPC Peering with encryption
What is a compliant data pipelineOne that adheres to regulatory standards like GDPR or HIPAA
What is a VPC used for in AWSTo isolate and secure network resources
What is the benefit of multi-factor authentication (MFA) for IAM usersAdds an extra layer of security beyond passwords
What is the difference between symmetric and asymmetric encryptionSymmetric encryption uses one key; asymmetric uses a public-private key pair
What is the function of a Security Group in AWSTo act as a virtual firewall for controlling inbound and outbound traffic
What is the function of AWS WAFProtects web applications from common threats such as SQL injection
What is the primary purpose of IAM policiesDefine permissions for users, groups, and roles
What is the purpose of a Key Management Service (KMS)To create and manage cryptographic keys
What is the role of AWS CloudTrail in securityTracks API activity for auditing and compliance
What tool in AWS can you use to enforce compliance policiesAWS Config
What type of encryption does AWS S3 provideServer-Side Encryption (SSE) and Client-Side Encryption
When should S3 Bucket Policies be usedFor fine-grained access controls to S3 objects
Which service helps manage control over shared credentials in AWSSecrets Manager or Systems Manager Parameter Store
This deck covers IAM policies, data encryption, VPCs, and compliance-related features for securing data pipelines and AWS resources.
Share on...
Follow us on...