MCQS on Advanced AWS KMS Features and Techniques | AWS Key Management Service

Prepare for your AWS certification with these AWS KMS Key Management Service questions and answers. This set focuses on advanced AWS KMS features, covering topics such as cross-region key management, asymmetric key operations, custom key stores with HSM backing, and monitoring with AWS CloudTrail. Test your knowledge with these scenario-based multiple-choice questions.

Chapter 3: Advanced AWS KMS Features and Techniques

Cross-Region and Multi-Account Key Management

  1. What is a primary benefit of using cross-region key replication in AWS KMS?
    a) Reduced key management overhead
    b) Improved security through geographical isolation
    c) Faster key rotation
    d) Automatic data encryption
  2. Which AWS service is essential for sharing KMS keys across multiple accounts?
    a) AWS Organizations
    b) AWS Lambda
    c) AWS Direct Connect
    d) Amazon Redshift
  3. What is required to enable cross-account access to a KMS key?
    a) A pre-signed URL
    b) IAM policy and KMS key policy
    c) VPC endpoint configuration
    d) Cross-region replication
  4. When using a KMS key across regions, the data must be:
    a) Compressed
    b) Re-encrypted with the target region’s key
    c) Converted to plain text
    d) Signed using an asymmetric key
  5. Which of the following is NOT true about cross-region KMS operations?
    a) Keys must be manually synchronized
    b) They improve disaster recovery
    c) Keys can be independently managed in each region
    d) Automatic replication of keys is supported

Asymmetric Key Operations: Signing and Key Pair Management

  1. What is an advantage of using asymmetric keys in AWS KMS?
    a) They provide higher throughput than symmetric keys
    b) They allow for signing and verification operations
    c) They can only be used with Amazon S3
    d) They eliminate the need for key rotation
  2. Asymmetric key pairs in AWS KMS consist of:
    a) Private and public keys
    b) Encryption and decryption keys
    c) Primary and secondary keys
    d) Static and dynamic keys
  3. Which operation is only possible with asymmetric keys?
    a) Data encryption
    b) Key rotation
    c) Digital signature verification
    d) Key material import
  4. In AWS KMS, asymmetric keys are ideal for:
    a) Managing multiple accounts
    b) Encrypting bulk data
    c) Digital signatures and public key encryption
    d) Replicating data across regions
  5. To verify a digital signature in AWS KMS, you need:
    a) The private key
    b) The public key
    c) The data key
    d) The HSM module

Custom Key Store and HSM Backed Keys

  1. What is a Custom Key Store in AWS KMS?
    a) A key store exclusively for symmetric keys
    b) A dedicated resource for storing hardware-backed keys
    c) A shared database for managing encryption keys
    d) A centralized dashboard for viewing all keys
  2. Which hardware device is required for a custom key store in AWS KMS?
    a) EC2 instance
    b) AWS Nitro System
    c) CloudHSM cluster
    d) Lambda function
  3. What is the benefit of using HSM-backed keys in AWS KMS?
    a) Improved key lifecycle management
    b) Physical control over key material
    c) Automatic cross-region replication
    d) Reduced key usage costs
  4. Custom key stores in AWS KMS are primarily used when:
    a) Key management is outsourced to AWS entirely
    b) Compliance requirements demand control over key material
    c) Keys are shared across multiple regions
    d) Data is encrypted for short-term use
  5. Which of the following is a prerequisite for setting up a custom key store?
    a) An IAM policy for key usage
    b) A CloudHSM cluster
    c) Multi-account permissions
    d) Encryption context

Auditing and Monitoring: AWS CloudTrail and Key Usage

  1. Which service provides logs for monitoring KMS key usage?
    a) Amazon CloudWatch
    b) AWS CloudTrail
    c) AWS Config
    d) Amazon Inspector
  2. What is captured in AWS CloudTrail logs for KMS operations?
    a) Key policies only
    b) Encrypted data content
    c) API requests to AWS KMS
    d) Rotation schedules
  3. How can you monitor the use of a specific KMS key in AWS?
    a) Using Amazon QuickSight
    b) By enabling detailed monitoring in CloudWatch
    c) By filtering AWS CloudTrail logs
    d) Through KMS dashboards
  4. Which of the following is true about auditing KMS key usage?
    a) It only applies to symmetric keys
    b) Audit logs cannot be exported outside AWS
    c) Access patterns can be tracked using CloudTrail logs
    d) Logs are automatically deleted after 90 days
  5. When a key is used in AWS KMS, the audit trail includes:
    a) The encrypted data
    b) The region where the key was accessed
    c) The user who accessed the key
    d) The algorithm used for encryption
  6. How can you ensure compliance with key usage policies in AWS KMS?
    a) By creating strict IAM roles
    b) By enabling AWS Config rules for KMS
    c) By integrating AWS Glue
    d) By storing keys in S3 buckets
  7. What is the role of AWS Config in monitoring KMS keys?
    a) Rotating the keys automatically
    b) Tracking configuration changes to key policies
    c) Encrypting data across regions
    d) Setting up key usage dashboards
  8. To restrict access to a KMS key for specific users, you should:
    a) Use encryption context
    b) Modify the KMS key policy
    c) Disable the key temporarily
    d) Update the IAM group permissions
  9. Which CloudTrail log event indicates key deletion?
    a) DeleteKeyPolicy
    b) ScheduleKeyDeletion
    c) RevokeKeyUsage
    d) RotateKey
  10. Key rotation in AWS KMS can be tracked by:
    a) Enabling auto-rotation in CloudWatch
    b) Reviewing CloudTrail events
    c) Scheduling periodic audits in Config
    d) Generating a key rotation report

Answers

QnoAnswer
1b) Improved security through geographical isolation
2a) AWS Organizations
3b) IAM policy and KMS key policy
4b) Re-encrypted with the target region’s key
5d) Automatic replication of keys is supported
6b) They allow for signing and verification operations
7a) Private and public keys
8c) Digital signature verification
9c) Digital signatures and public key encryption
10b) The public key
11b) A dedicated resource for storing hardware-backed keys
12c) CloudHSM cluster
13b) Physical control over key material
14b) Compliance requirements demand control over key material
15b) A CloudHSM cluster
16b) AWS CloudTrail
17c) API requests to AWS KMS
18c) By filtering AWS CloudTrail logs
19c) Access patterns can be tracked using CloudTrail logs
20c) The user who accessed the key
21b) By enabling AWS Config rules for KMS
22b) Tracking configuration changes to key policies
23b) Modify the KMS key policy
24b) ScheduleKeyDeletion
25b) Reviewing CloudTrail events

Use a Blank Sheet, Note your Answers and Finally tally with our answer at last. Give Yourself Score.

X
error: Content is protected !!
Scroll to Top