AWS KMS (Key Management Service) is a secure and fully managed encryption key management solution offered by AWS. This set of 25 MCQs will help you test your understanding of AWS KMS fundamentals, including Customer Master Keys (CMKs), key policies, symmetric and asymmetric keys, and integration with AWS services.
a) Key generation and management for encryption
b) Data visualization and analysis
c) Network monitoring
d) API development
a) Managing AWS IAM users
b) Encrypting and decrypting data keys
c) Monitoring application logs
d) Setting up AWS EC2 instances
a) Auto-scaling infrastructure
b) Centralized key management
c) High availability zones
d) Load balancing
a) Symmetric and asymmetric keys
b) Public and private keys only
c) Encryption and decryption keys only
d) None of the above
a) A set of rules for managing EC2 instances
b) A JSON document that defines access permissions for a CMK
c) A security group for encryption
d) A predefined AWS IAM role
a) Data encryption and decryption with the same key
b) Encrypting network packets
c) Digital signatures
d) Generating access logs
a) Deleting CMKs automatically
b) Using separate keys for encryption and decryption
c) Simultaneous key management across regions
d) Integrating with Amazon S3 only
a) Access logs for encrypted files
b) Additional security by ensuring context consistency during encryption and decryption
c) Automatic deletion of CMKs
d) Audit trails for AWS IAM users
a) Amazon S3
b) AWS CloudWatch
c) AWS CodePipeline
d) Amazon SageMaker
a) Encrypting sensitive data
b) Tracking all API calls and access to encryption keys
c) Enabling faster data access
d) Monitoring database performance
a) Automatically rotates keys every 90 days
b) Requires manual rotation by administrators
c) Allows optional automatic key rotation for symmetric CMKs every year
d) Does not support key rotation
a) 1 KB
b) 4 KB
c) 10 KB
d) 16 KB
a) The CMK can be restored within a specified retention period
b) All associated data is automatically decrypted
c) The deletion is immediate and irreversible
d) The key is archived for future use
a) AWS IAM roles
b) AWS KMS API
c) Key management and integration with storage services like Amazon S3
d) Key policy replication
a) RSA-2048
b) SHA-256
c) AES-256
d) MD5
a) AWS administrators only
b) IAM users and roles defined in the key policy
c) CloudWatch services
d) S3 bucket owners
a) CreateKey
b) GenerateKey
c) AddKey
d) NewCMK
a) A key that encrypts large amounts of data
b) A key used to encrypt and decrypt CMKs
c) A key derived from a CMK for data encryption and decryption
d) A key that provides access to AWS resources
a) By replicating them across multiple regions
b) By storing them in a hardware security module (HSM)
c) By encrypting them using S3 bucket policies
d) By applying user-defined tags
a) Multi-region replication
b) Fault-tolerant key storage in multiple HSMs
c) Automatic backups
d) Continuous monitoring by AWS CloudWatch
a) Amazon DynamoDB
b) Amazon RDS
c) Amazon Redshift
d) All of the above
a) DecryptData
b) DecryptKey
c) Decrypt
d) UnlockKey
a) By providing pre-built compliance reports
b) By enabling audit trails and secure encryption key management
c) By integrating with AWS Config only
d) By encrypting IAM roles
a) aws kms describe-keys
b) aws kms list-keys
c) aws kms show-keys
d) aws kms get-keys
a) Amazon S3
b) Amazon EBS
c) Amazon Glacier
d) All of the above
| Qno | Answer (Option with the text) |
|---|---|
| 1 | a) Key generation and management for encryption |
| 2 | b) Encrypting and decrypting data keys |
| 3 | b) Centralized key management |
| 4 | a) Symmetric and asymmetric keys |
| 5 | b) A JSON document that defines access permissions for a CMK |
| 6 | a) Data encryption and decryption with the same key |
| 7 | b) Using separate keys for encryption and decryption |
| 8 | b) Additional security by ensuring context consistency during encryption and decryption |
| 9 | a) Amazon S3 |
| 10 | b) Tracking all API calls and access to encryption keys |
| 11 | c) Allows optional automatic key rotation for symmetric CMKs every year |
| 12 | b) 4 KB |
| 13 | a) The CMK can be restored within a specified retention period |
| 14 | c) Key management and integration with storage services like Amazon S3 |
| 15 | c) AES-256 |
| 16 | b) IAM users and roles defined in the key policy |
| 17 | a) CreateKey |
| 18 | c) A key derived from a CMK for data encryption and decryption |
| 19 | b) By storing them in a hardware security module (HSM) |
| 20 | b) Fault-tolerant key storage in multiple HSMs |
| 21 | d) All of the above |
| 22 | c) Decrypt |
| 23 | b) By enabling audit trails and secure encryption key management |
| 24 | b) aws kms list-keys |
| 25 | d) All of the above |