Questions
CSYE6225.17541.202610 Quiz 1- Requires Respondus LockDown Browser
Multiple choice
Which IAM security practices are recommended? (Select ALL that apply)
Options
A.shared root user access keys
B.Use multi-factor authentication
C.store credentials in code repositories
D.Apply principle of least privilege
View Explanation
Verified Answer
Please login to view
Step-by-Step Analysis
When evaluating IAM security practices, I consider both recommended and discouraged approaches and how they impact access control and risk.
Option: shared root user access keys
Reasoning: Sharing root access keys is risky because the root account has unrestricted privileges. If keys are shared, there is no traceability or accountability for actions, and a single compromis......Login to view full explanationLog in for full answers
We've collected over 50,000 authentic exam questions and detailed explanations from around the globe. Log in now and get instant access to the answers!
Similar Questions
What components ensure secure access and management of user identities within the digital ecosystem?
Which of the following describes a security best practice that can be implemented by using AWS Identity and Access Management (IAM)?
Which of the following are best practices to secure your account using the identity and Access Management (IAM)? (Choose 2)
Which AWS service enables identity and access management?
More Practical Tools for Students Powered by AI Study Helper
Making Your Study Simpler
Join us and instantly unlock extensive past papers & exclusive solutions to get a head start on your studies!