AWS Certified Free Questions & Explanations
Solutions Architect - Associate
Correct Answer DQuestion
(会員限定)
1
2
3
4
Explanation
The use of access keys grants the same level of privileges to everyone. Therefore, it is considered more secure to manage permissions by role assignment than by access keys.
* Reference
AWS Access key Best practices
* Reference
AWS Access key Best practices
Comment
If you have any questions about the answers or explanations, or if you have a better explanation, please feel free to comment. We would be happy to be a place where we can teach and learn from each other.
Rate of correct answer 70%
No.2 Explanation
An enterprise wants to store access keys (access key ID and secret access key) in a text file on a custom AMI. The company will use the access keys to access DynamoDB tables from instances created from the AMI. The security team requires a more secure solution.
Which solution meets the security team's requirements?
Which solution meets the security team's requirements?
- Store the access key in an Amazon S3 bucket and retrieve the access key from the instance at startup.
- Pass access keys to instances via instance user data.
- Obtain an access key from a key server started in a private subnet.
- Create an IAM role with permission to access that table and use that role to launch all instances.
NextPrevious
Sponsored