ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 123 - DVA-C02 discussion

Report
Export

A developer is creating a mobile application that will not require users to log in.

What is the MOST efficient method to grant users access to AWS resources'?

A.
Use an identity provider to securely authenticate with the application.
Answers
A.
Use an identity provider to securely authenticate with the application.
B.
Create an AWS Lambda function to create an 1AM user when a user accesses the application.
Answers
B.
Create an AWS Lambda function to create an 1AM user when a user accesses the application.
C.
Create credentials using AWS KMS and apply these credentials to users when using the application.
Answers
C.
Create credentials using AWS KMS and apply these credentials to users when using the application.
D.
Use Amazon Cognito to associate unauthenticated users with an IAM role that has limited access to resources.
Answers
D.
Use Amazon Cognito to associate unauthenticated users with an IAM role that has limited access to resources.
Suggested answer: D

Explanation:

This solution is the most efficient method to grant users access to AWS resources without requiring them to log in. Amazon Cognito is a service that provides user sign-up, sign-in, and access control for web and mobile applications. Amazon Cognito identity pools support both authenticated and unauthenticated users. Unauthenticated users receive access to your AWS resources even if they aren't logged in with any of your identity providers (IdPs). You can use Amazon Cognito to associate unauthenticated users with an IAM role that has limited access to resources, such as Amazon S3 buckets or DynamoDB tables. This degree of access is useful to display content to users before they log in or to allow them to perform certain actions without signing up. Using an identity provider to securely authenticate with the application will require users to log in, which does not meet the requirement. Creating an AWS Lambda function to create an IAM user when a user accesses the application will incur unnecessary costs and complexity, and may pose security risks if not implemented properly. Creating credentials using AWS KMS and applying them to users when using the application will also incur unnecessary costs and complexity, and may not provide fine-grained access control for resources.

Reference: Switching unauthenticated users to authenticated users (identity pools), Allow user access to your API without authentication (Anonymous user access)

asked 16/09/2024
Koen Poos
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first