AWS CloudTrail MCQ questions and answers are designed to help learners master the essential aspects of security and compliance in AWS. This set focuses on log integrity, encryption with KMS, and compliance use cases to enhance your knowledge for certifications and real-world AWS management.
MCQs on Ensuring Log Integrity and Validation
What feature in AWS CloudTrail ensures log integrity? a) S3 Lifecycle Policies b) CloudTrail Log File Integrity Validation c) IAM Access Analyzer d) CloudTrail Insights
How does CloudTrail validate log file integrity? a) By using encryption keys b) By generating hash values for log files c) By replicating logs across multiple regions d) By enabling multi-factor authentication
What is the primary purpose of log file validation in CloudTrail? a) To minimize storage costs b) To ensure logs haven’t been tampered with c) To optimize log delivery speed d) To track IAM role usage
Which algorithm is used by CloudTrail for log integrity validation? a) SHA-256 b) RSA-1024 c) MD5 d) AES-256
What action must be taken to enable log file validation in CloudTrail? a) Attach an IAM policy with log validation permissions b) Enable the feature during trail creation or editing c) Use AWS Config to monitor logs d) Activate CloudWatch metrics
How does log validation benefit security audits? a) By enabling detailed event tracking b) By verifying the authenticity of log data c) By providing encryption for stored logs d) By reducing data latency
What AWS tool can be used to programmatically verify CloudTrail log file integrity? a) AWS CLI b) AWS SDK c) AWS CloudFormation d) Both a and b
MCQs on Encryption with KMS
What is the role of AWS KMS in CloudTrail log encryption? a) To store log files securely in S3 b) To provide encryption keys for log file protection c) To automate the delivery of logs to CloudWatch d) To validate log integrity
Which key type is recommended for encrypting CloudTrail logs? a) AWS-managed CMKs b) Customer-managed CMKs c) Symmetric key pairs d) Asymmetric key pairs
How is encryption applied to CloudTrail logs stored in S3? a) By enabling server-side encryption (SSE) with KMS keys b) By encrypting the S3 bucket directly c) By enabling CloudWatch log monitoring d) By configuring the IAM role attached to the bucket
How can you control access to the KMS key used for encrypting CloudTrail logs? a) By using IAM policies b) By creating key policies in KMS c) By enabling MFA for the KMS key d) By attaching S3 bucket policies
What is the primary benefit of using customer-managed CMKs over AWS-managed CMKs for CloudTrail logs? a) Reduced cost b) Greater control and audit capabilities c) Automatic key rotation d) Faster encryption processing
How can KMS key usage for CloudTrail logs be monitored? a) By using AWS CloudTrail Insights b) By enabling key usage logging in AWS KMS c) By configuring AWS Trusted Advisor alerts d) By monitoring IAM role changes
Which of the following can be encrypted using KMS in the context of CloudTrail? a) Log files stored in S3 b) CloudTrail event logs in CloudWatch c) Both a and b d) None of the above
MCQs on Compliance Use Cases
What compliance framework requires detailed logging and auditing provided by CloudTrail? a) PCI DSS b) GDPR c) HIPAA d) All of the above
Which AWS service works with CloudTrail to enable compliance reporting? a) AWS Config b) AWS Trusted Advisor c) Amazon Inspector d) AWS Glue
How does CloudTrail support compliance requirements? a) By enforcing security group rules b) By providing detailed event history and log validation c) By managing IAM role access d) By encrypting all data in transit
What is the best practice for storing CloudTrail logs for compliance? a) Store them in the default region b) Use an S3 bucket with versioning enabled c) Delete old logs periodically d) Store them locally for better access
Which AWS feature enhances CloudTrail for meeting compliance mandates? a) CloudTrail Insights b) Cross-account logging c) Multi-region trail configuration d) All of the above
How can compliance teams use CloudTrail logs effectively? a) By exporting logs to AWS Glue for analysis b) By setting up event filters for specific operations c) By archiving logs for long-term storage d) All of the above
What is a key advantage of multi-region trails in CloudTrail? a) Simplified compliance audits b) Faster event tracking c) Cost reduction d) Better IAM role management
How do signed log files help meet compliance standards? a) By reducing storage size b) By ensuring the authenticity of log data c) By enabling automatic encryption d) By accelerating data transfer
Which of the following is a compliance use case for CloudTrail log monitoring? a) Identifying unauthorized access attempts b) Tracking data processing operations c) Ensuring data retention policies are followed d) All of the above
What feature allows CloudTrail logs to be analyzed for compliance breaches? a) CloudWatch Logs Insights b) AWS Glue DataBrew c) S3 Select d) AWS Kinesis Data Analytics
How does CloudTrail ensure compliance with GDPR regulations? a) By enabling cross-account access b) By logging data access and modification events c) By automatically deleting logs after 30 days d) By encrypting log files during transfer
Answers
QNo
Answer (Option with Text)
1
b) CloudTrail Log File Integrity Validation
2
b) By generating hash values for log files
3
b) To ensure logs haven’t been tampered with
4
a) SHA-256
5
b) Enable the feature during trail creation or editing
6
b) By verifying the authenticity of log data
7
d) Both a and b
8
b) To provide encryption keys for log file protection
9
b) Customer-managed CMKs
10
a) By enabling server-side encryption (SSE) with KMS keys
11
b) By creating key policies in KMS
12
b) Greater control and audit capabilities
13
b) By enabling key usage logging in AWS KMS
14
c) Both a and b
15
d) All of the above
16
a) AWS Config
17
b) By providing detailed event history and log validation