Security, Compliance, and Monitoring | AWS Certified Solutions Architect – Associate MCQs

AWS provides comprehensive security, compliance, and monitoring solutions to ensure your cloud infrastructure is both secure and compliant. Tools like AWS CloudTrail, Amazon CloudWatch, and AWS KMS are integral to monitoring and securing your architecture. This quiz tests your knowledge of AWS security tools, threat detection, and resource compliance.


Chapter 7: Security, Compliance, and Monitoring | AWS Certified Solutions Architect – Associate

Topic 1: AWS CloudTrail – Logging and Auditing API Calls

  1. Your organization needs to track and audit API calls made to AWS services for security and compliance purposes. Which AWS service should you enable?
    • A. AWS Config
    • B. AWS CloudTrail
    • C. Amazon CloudWatch
    • D. AWS Shield
    • E. AWS Identity and Access Management (IAM)
  2. A security team needs to review the details of API requests made by a user in a specific region. What feature in AWS CloudTrail should be used to filter the logs?
    • A. CloudTrail Insights
    • B. Event history with region filter
    • C. CloudTrail Trails
    • D. IAM Access Analyzer
    • E. Resource Access Manager
  3. Which of the following are true about AWS CloudTrail logs?
    • A. CloudTrail logs are stored indefinitely unless manually deleted
    • B. CloudTrail tracks only read-only API calls
    • C. CloudTrail logs API activity from AWS Management Console, CLI, and SDKs
    • D. CloudTrail is enabled by default for all AWS services
    • E. CloudTrail logs can be encrypted using AWS KMS
  4. You want to store CloudTrail logs in an S3 bucket for long-term retention. Which AWS service allows you to automate log management for compliance and auditing?
    • A. AWS Lambda
    • B. AWS Config
    • C. AWS CloudTrail Insights
    • D. S3 Lifecycle policies
    • E. Amazon Macie
  5. Your organization requires that CloudTrail logs be monitored for unauthorized API activity. Which feature of AWS CloudTrail allows you to get real-time notifications?
    • A. CloudTrail Insights
    • B. CloudWatch Logs Integration
    • C. CloudTrail Event History
    • D. Amazon GuardDuty
    • E. AWS Config Rules

Topic 2: Amazon CloudWatch – Metrics, Logs, Alarms, and Dashboards

  1. You want to automatically receive notifications when an EC2 instance’s CPU utilization exceeds a specified threshold. Which AWS service should you use?
    • A. AWS CloudTrail
    • B. Amazon CloudWatch Alarms
    • C. AWS Systems Manager
    • D. Amazon S3
    • E. AWS Config
  2. Which CloudWatch feature allows you to create custom visualizations for monitoring the performance of your AWS resources?
    • A. CloudWatch Logs
    • B. CloudWatch Alarms
    • C. CloudWatch Dashboards
    • D. CloudWatch Insights
    • E. CloudWatch Events
  3. Which of the following is true when using Amazon CloudWatch Logs to monitor your application?
    • A. CloudWatch Logs store logs indefinitely without cost
    • B. You can trigger CloudWatch alarms based on log data patterns
    • C. CloudWatch Logs require manual intervention for log retention
    • D. CloudWatch Logs only support logs from AWS services
    • E. Logs cannot be shared with other AWS accounts
  4. You want to monitor the health of a large number of EC2 instances running in different regions. Which CloudWatch feature should you use to automate this process?
    • A. CloudWatch Dashboards
    • B. CloudWatch Alarms
    • C. CloudWatch Logs
    • D. CloudWatch Events
    • E. CloudWatch Metrics
  5. Which metric type can Amazon CloudWatch track for your AWS resources?
  • A. EC2 instance status checks
  • B. Number of active users on an EC2 instance
  • C. Application-level request count
  • D. Instance-level network traffic
  • E. Service-specific application logs

Topic 3: AWS Config – Compliance and Resource Monitoring

  1. You need to ensure that all EC2 instances in your AWS account are tagged according to company policy. Which AWS service can help you with compliance tracking for this requirement?
  • A. AWS Config
  • B. AWS CloudTrail
  • C. AWS Shield
  • D. AWS Lambda
  • E. Amazon GuardDuty
  1. Which of the following can AWS Config be used to monitor?
  • A. Resource compliance with corporate governance
  • B. Unauthorized changes to IAM policies
  • C. Changes in security groups and VPC configurations
  • D. Real-time API requests to services
  • E. Billing and cost allocation tags
  1. How can you use AWS Config to enforce a desired configuration of your AWS resources?
  • A. By using AWS Config rules
  • B. By monitoring CloudTrail logs
  • C. By creating CloudWatch Alarms
  • D. By deploying AWS Lambda functions
  • E. By using AWS Systems Manager
  1. Which of the following best describes AWS Config’s role in compliance auditing?
  • A. It tracks API activity for all AWS resources
  • B. It ensures resource configurations meet compliance standards
  • C. It monitors AWS CloudTrail logs for unauthorized API access
  • D. It helps detect security threats in real-time
  • E. It helps set up WAF rules
  1. Which of the following are possible AWS Config actions based on compliance violations?
  • A. Automatically remediating non-compliant resources
  • B. Sending notifications to stakeholders
  • C. Running Lambda functions to correct configurations
  • D. Creating CloudWatch Alarms for real-time monitoring
  • E. Reverting resources to a previous configuration

Topic 4: AWS KMS – Encryption and Key Management

  1. You need to store sensitive customer data in Amazon S3 and ensure it is encrypted at rest. Which AWS service can you use for managing the encryption keys?
  • A. Amazon S3 Encryption
  • B. AWS KMS
  • C. AWS IAM
  • D. AWS Lambda
  • E. Amazon CloudWatch
  1. You want to manage the lifecycle of encryption keys and enforce strict key rotation policies. Which service is best suited for this?
  • A. Amazon S3
  • B. AWS Key Management Service (KMS)
  • C. AWS Secrets Manager
  • D. AWS Config
  • E. Amazon CloudTrail
  1. Which AWS KMS feature ensures that a key is rotated automatically?
  • A. Automatic Key Rotation
  • B. Key Alias Management
  • C. Multi-Region Key Management
  • D. Key Policy Enforcement
  • E. IAM Key Access Management
  1. You are planning to use KMS for encrypting data across multiple AWS regions. Which KMS feature enables you to use the same encryption key across regions?
  • A. Cross-Region Replication
  • B. Multi-Region Keys
  • C. Key Policy
  • D. CloudHSM Integration
  • E. Key Rotation
  1. You need to create a customer-managed KMS key to encrypt sensitive data. Which of the following should you configure for access control?
  • A. KMS Key Policies
  • B. IAM Policies
  • C. CloudWatch Logs integration
  • D. VPC Security Groups
  • E. CloudTrail Permissions

Answer Key

QnoAnswer
1B. AWS CloudTrail
2B. Event history with region filter
3C. CloudTrail tracks activity, E. CloudTrail logs can be encrypted
4D. S3 Lifecycle policies
5B. CloudWatch Logs Integration
6B. Amazon CloudWatch Alarms
7C. CloudWatch Dashboards
8B. Trigger CloudWatch alarms, D. CloudWatch Logs only support AWS service logs
9A. CloudWatch Dashboards
10A. EC2 instance status checks, D. Instance-level network traffic
11A. AWS Config
12A. Resource compliance, C. Changes in security groups and VPC configurations
13A. By using AWS Config rules
14B. Ensures resource configurations meet compliance standards
15A. Automatically remediating, B. Sending notifications, C. Running Lambda functions
16B. AWS KMS
17B. AWS Key Management Service (KMS)
18A. Automatic Key Rotation
19B. Multi-Region Keys
20A. KMS Key Policies, B. IAM Policies

Use a Blank Sheet, Note your Answers and Finally tally with our answer at last. Give Yourself Score.

X
error: Content is protected !!
Scroll to Top