AWS Certified CloudOps Engineer Associate SOA-C03 Practice Question

A company has a single AWS account. Compliance requires that IAM users must enable multi-factor authentication (MFA) before they can invoke any AWS API except enrolling an MFA device or changing their own password. As a CloudOps engineer, which approach enforces this requirement with the least operational overhead and without changing existing group or user policies?

  • Deploy an AWS Config managed rule that checks each user for MFA; invoke an AWS Systems Manager Automation runbook to detach all policies from non-compliant users.

  • Attach a service control policy (SCP) at the root that denies every action for principals without MFA enabled, allowing only IAM actions to configure MFA.

  • Enable the Require MFA for console and programmatic access setting in the account and choose Enforce for all existing users.

  • Attach a customer managed IAM policy that allows iam:CreateVirtualMFADevice, iam:EnableMFADevice, iam:ResyncMFADevice, and iam:ChangePassword, then adds a Deny statement with NotAction listing those same actions and the condition BoolIfExists "aws:MultiFactorAuthPresent" set to "false"; attach the policy to all IAM users.

AWS Certified CloudOps Engineer Associate SOA-C03
Security and Compliance
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot