Questions
Single choice
Which of the following describes a security best practice that can be implemented by using AWS Identity and Access Management (IAM)?
Options
A.Generate secret keys for every IAM user.
B.Store AWS credentials within Amazon EC2 instances.
C.Turn off AWS Management Console access for all users.
D.Grant permissions to users who are required to perform a specific task only.
View Explanation
Verified Answer
Please login to view
Step-by-Step Analysis
Question restatement: Which of the following describes a security best practice that can be implemented by using AWS Identity and Access Management (IAM)?
Option 1: 'Generate secret keys for every IAM user.' Generating secret access keys for every user is not a best practice because managing long-lived credentials increases risk. If keys are compromised, they may be misused unless rotated regularly, and each key represents a potential a......Login to view full explanationLog in for full answers
We've collected over 50,000 authentic exam questions and detailed explanations from around the globe. Log in now and get instant access to the answers!
Similar Questions
What components ensure secure access and management of user identities within the digital ecosystem?
Which IAM security practices are recommended? (Select ALL that apply)
Which of the following are best practices to secure your account using the identity and Access Management (IAM)? (Choose 2)
Which AWS service enables identity and access management?
More Practical Tools for Students Powered by AI Study Helper
Making Your Study Simpler
Join us and instantly unlock extensive past papers & exclusive solutions to get a head start on your studies!