Bash, the Crucial Exams Chat Bot
AI Bot
Security and Permissions for Data Solutions Flashcards
Front | Back |
How can you ensure end-to-end encryption in your data pipeline | By encrypting data at rest and in transit |
How does an IAM Role differ from an IAM User | Roles are assumed temporarily by users or services, users have long-term credentials |
Name one key benefit of data encryption | Protects sensitive information from unauthorized access |
What AWS service can you use to monitor unusual activity in your account | Amazon GuardDuty |
What does IAM stand for | Identity and Access Management |
What does the principle of least privilege entail | Granting the minimal permissions necessary for a task |
What feature in AWS ensures encrypted data delivery between VPCs | VPN or VPC Peering with encryption |
What is a compliant data pipeline | One that adheres to regulatory standards like GDPR or HIPAA |
What is a VPC used for in AWS | To isolate and secure network resources |
What is the benefit of multi-factor authentication (MFA) for IAM users | Adds an extra layer of security beyond passwords |
What is the difference between symmetric and asymmetric encryption | Symmetric encryption uses one key; asymmetric uses a public-private key pair |
What is the function of a Security Group in AWS | To act as a virtual firewall for controlling inbound and outbound traffic |
What is the function of AWS WAF | Protects web applications from common threats such as SQL injection |
What is the primary purpose of IAM policies | Define permissions for users, groups, and roles |
What is the purpose of a Key Management Service (KMS) | To create and manage cryptographic keys |
What is the role of AWS CloudTrail in security | Tracks API activity for auditing and compliance |
What tool in AWS can you use to enforce compliance policies | AWS Config |
What type of encryption does AWS S3 provide | Server-Side Encryption (SSE) and Client-Side Encryption |
When should S3 Bucket Policies be used | For fine-grained access controls to S3 objects |
Which service helps manage control over shared credentials in AWS | Secrets Manager or Systems Manager Parameter Store |
Front
What is the difference between symmetric and asymmetric encryption
Click the card to flip
Back
Symmetric encryption uses one key; asymmetric uses a public-private key pair
Front
What does the principle of least privilege entail
Back
Granting the minimal permissions necessary for a task
Front
When should S3 Bucket Policies be used
Back
For fine-grained access controls to S3 objects
Front
What is a VPC used for in AWS
Back
To isolate and secure network resources
Front
How can you ensure end-to-end encryption in your data pipeline
Back
By encrypting data at rest and in transit
Front
Name one key benefit of data encryption
Back
Protects sensitive information from unauthorized access
Front
What is a compliant data pipeline
Back
One that adheres to regulatory standards like GDPR or HIPAA
Front
How does an IAM Role differ from an IAM User
Back
Roles are assumed temporarily by users or services, users have long-term credentials
Front
What type of encryption does AWS S3 provide
Back
Server-Side Encryption (SSE) and Client-Side Encryption
Front
What is the purpose of a Key Management Service (KMS)
Back
To create and manage cryptographic keys
Front
What does IAM stand for
Back
Identity and Access Management
Front
Which service helps manage control over shared credentials in AWS
Back
Secrets Manager or Systems Manager Parameter Store
Front
What is the function of AWS WAF
Back
Protects web applications from common threats such as SQL injection
Front
What is the primary purpose of IAM policies
Back
Define permissions for users, groups, and roles
Front
What AWS service can you use to monitor unusual activity in your account
Back
Amazon GuardDuty
Front
What is the benefit of multi-factor authentication (MFA) for IAM users
Back
Adds an extra layer of security beyond passwords
Front
What is the role of AWS CloudTrail in security
Back
Tracks API activity for auditing and compliance
Front
What is the function of a Security Group in AWS
Back
To act as a virtual firewall for controlling inbound and outbound traffic
Front
What tool in AWS can you use to enforce compliance policies
Back
AWS Config
Front
What feature in AWS ensures encrypted data delivery between VPCs
Back
VPN or VPC Peering with encryption
1/20
This deck covers IAM policies, data encryption, VPCs, and compliance-related features for securing data pipelines and AWS resources.