ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 319 - CLF-C02 discussion

Report
Export

Which tasks are the responsibility of the customer, according to the AWS shared responsibility model? (Select TWO.)

A.
Patch the Amazon RDS operating system.
Answers
A.
Patch the Amazon RDS operating system.
B.
Upgrade the firmware of the network infrastructure.
Answers
B.
Upgrade the firmware of the network infrastructure.
C.
Manage data encryption.
Answers
C.
Manage data encryption.
D.
Maintain physical access control in an AWS Region.
Answers
D.
Maintain physical access control in an AWS Region.
E.
Grant least privilege access to 1AM users.
Answers
E.
Grant least privilege access to 1AM users.
Suggested answer: C, E

Explanation:

According to the AWS shared responsibility model, the customer is responsible for security in the cloud, which includes the tasks of managing data encryption and granting least privilege access to IAM users. Data encryption is the process of transforming data into an unreadable format that can only be accessed with a key or a password. The customer must decide whether to encrypt their data at rest (when it is stored on AWS) or in transit (when it is moving between AWS and the customer or between AWS services). The customer must also choose the encryption method, algorithm, and key management solution that best suit their needs. AWS provides various services and features that support data encryption, such as AWS Key Management Service (AWS KMS), AWS Certificate Manager (ACM), and AWS Encryption SDK5 IAM users are entities that represent the people or applications that interact with AWS resources and services. The customer must grant the IAM users the minimum permissions that they need to perform their tasks, and avoid giving them unnecessary or excessive access. This is known as the principle of least privilege, and it helps reduce the risk of unauthorized or malicious actions. The customer can use IAM policies, roles, groups, and permissions boundaries to manage the access of IAM users.

asked 16/09/2024
Patricia Escobar
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first