Introduction to AWS Identity and Access Management Coursera Quiz Answer [💯Correct Answer]

Hello Peers, Today we are going to share all week assessment and quizzes answers of Introduction to AWS Identity and Access Management course launched by Coursera for totally free of cost✅✅✅. This is a certification course for every interested students.

In case you didn’t find this course for free, then you can apply for financial ads to get this course for totally free.

Checkout this article for“How to Apply for Financial Ads?”

Coursera, a India’s biggest learning platform which launched millions of free courses for students daily. These courses are from various recognized university, where industry experts and professors teaches in a very well manner and in a more understandable way.

Here, you will find Introduction to AWS Identity and Access Management Exam Answers in Bold Color which are given below.

These answers are updated recently and are 100% correctanswers of all week, assessment and final exam answers of Introduction to AWS Identity and Access Management from Coursera Free Certification Course.

Use “Ctrl+F” To Find Any Questions Answer. & For Mobile User, You Just Need To Click On Three dots In Your Browser & You Will Get A “Find” Option There. Use These Option to Get Any Random Questions Answer.

Apply Link – Introduction to AWS Identity and Access Management

Week 1 Answers

Question 1
Which of the following best defines authentication?

  • The process of verifying a user’s permissions.
  • The validation of a user’s identity and verification of their permissions
  • The process of protecting your personal information as data is transferred
  • The process of validating a user’s identity.

Question 2
Which of the following is a true about IAM roles?

  • You should rarely use roles as an authentication method.
  • IAM roles are considered long-term credentials.
  • Roles are associated with a specific person or machine.
  • Roles are assumed by users and services when they need short term credentials.

Question 3
True or false: Amazon EC2 instances are virtual servers that can be resized on demand.

  • True
  • False

Question 4
Which is NOT one of the 4 prompts you see when configuring the AWS Command Line Interface?

  • AWS Access Key ID
  • Default output format
  • Default Region name
  • Default Availability Zone
  • AWS Secret Access Key

Question 5
What is the maximum bucket size of Amazon Simple Storage Service?

  • 5GB
  • 50GB
  • 5TB
  • 500TB
  • Unlimited

Question 6
What is the term for an external user trusted in AWS through identity federation?

  • Outside identity
  • External user
  • Federated identity
  • Federated external


Question 7
AWS Identity and Access Management policies are used to define permissions for what kind of operation methods?

  • API calls made through an SDK
  • AWS Command Line Interface
  • AWS Management Console operations
  • All of the above
Week 2 Quiz Answers

Question 1
You create a policy that only allows a user to access Amazon S3. The user tries to access Amazon EC2. What happens?

  • The user is implicitly allowed access to Amazon EC2.
  • The user is explicitly allowed access to Amazon EC2.
  • The user is explicitly denied access to Amazon EC2.
  • The user is implicitly denied access to Amazon EC2.

Question 2
Which of the following can you use to create an IAM policy?

  • IAM console visual editor.
  • The AWS policy generator.
  • Creating the JSON using the AWS documentation and a code editor.
  • All the above.

Question 3
True or False: An AWS account is an isolated container for your resources, with independent billing, user identities, and policies.

  • True
  • False

Question 4
In the formatting for an Amazon Resource Name, what is always in the first section?

  • s3
  • arn
  • ec2
  • aws

Question 5
What is one example of a resource-based policy?

  • Group policy
  • Inline policy
  • User policy
  • Amazon S3 bucket policy

Question 6
What is a unique quality of an inline policy in AWS Identity and Access Management?

  • Can be attached to resources and accounts
  • Can be attached to both identities and resources
  • One-to-one relationship with attached identity
  • Reusable – can be attached to multiple identities

Question 7
What do the letters E-PARC refer to in a policy?

  • Element, Partition, Allowable, Refusal, Conclusion
  • Effect, Principal, Action, Resource, Condition
  • Effect, Principal, Allowable, Refusal, Conclusion
  • Element, Principal, Allowable, Refusal, Condition
Week 3 Quiz Answers

Question 1
You make an API call using the AWS Command Line Interface (CLI) to request credentials from AWS Security Token Service (AWS STS). Which of the following elements is needed to make this API call?

  • The service IAM
  • Policy Name
  • User ARN
  • Role Session Name

Question 2
When you create a role, which of the following are considered trusted entities?

  • IAM users within the same account
  • IAM users in a different account
  • AWS services, such as Amazon EC2
  • All of the above

Question 3
True or false: When you assume a role, you take on the permission set of the role in addition to your original permission set.

  • True
  • False

Question 4
A company has three AWS accounts, named Account A, Account B, and Account C. The company needs to allow an employee in Account A access to resources in Account B. Which IAM identity should they use?

  • IAM user
  • IAM corporate directory
  • IAM group
  • IAM role

Question 5
True or false: A role trust policy specifies which resources an identity can access, while a permissions policy defines who is allowed to assume a role.

  • True
  • False

Question 6
Which of the following best defines instance profiles?

  • An encrypted message that EC2 instances provide for easy troubleshooting.
  • A snapshot of the instance configuration that shows instance details at a glance.
  • A method of securing network traffic in and out of the EC2 instance.
  • A container for a role that can provide the role’s temporary credentials to an application that runs on the instance.

Question 7
By default, who can assume a service-linked role?

  • The service itself
  • The root user
  • File type storage services
  • IAM users and external identities
Week 4 Quiz Answers

Question 1
Which of the following is an IAM best practice?

1 point

  • Start with a permissive policy and restrict as necessary.
  • Limit the root account with restrictive IAM policies.
  • Remove old credentials.
  • Use users and groups when possible.

Question 2
True or false: AWS SSO eliminates the need to sign in to each AWS account individually to get temporary credentials.

1 point

  • True
  • False

Question 3
A user makes an API call to Amazon EC2. You want to find out when this API call occurred. Which service will enable you to figure this out?

1 point

  • Amazon EC2
  • Amazon CloudWatch
  • AWS CloudTrail
  • Amazon S3

Question 4
True or false: If you fail to create an S3 bucket due to unauthorized access, Amazon S3 gives you
an encoded message that you can decode using an AWS STS API call.

1 point

  • True
  • False

Question 5
What is necessary for you to access the IAM Policy Simulator?

1 point

  • Configure the root user
  • Enable permissions on the Amazon S3 bucket
  • Signing-in to your AWS Account
  • Connected to the internal network
Final Assessment

Question 1
What do ALL users created through AWS Identity and Access Management have?

1 point

  • Username and encryption key
  • Name and credentials
  • Username and password
  • Access Key and Secret Access Key

Question 2
What are tags?

1 point

  • Storage resources
  • Functions
  • Compute resources

Metadata

Question 3
How is the principal element in a policy identified?

1 point

  • Instance Id
  • ARN
  • Account number
  • Bucket name

Question 4
Which of the following best defines what a service provider (SP) does?

1 point

  • Authenticating users.
  • Managing security of your network traffic.
  • Controlling access to resources.
  • Enabling single sign on access.

Question 5
True or false: The assume policy specifies which trusted account members, or principals, are allowed to assume the role.

1 point

  • True
  • False

Question 6
What is AWS Lambda?

1 point

  • Policy tool for creating and testing policies
  • Storage resource providing unlimited storage in AWS
  • Compute service that lets you run code without provisioning servers
  • Custom resource metadata providing security and organization within your account

Question 7
Which of the following best defines authentication?

1 point

  • The validation of a user’s identity and verification of their permissions.
  • The process of validating a user’s identity.
  • The process of protecting your personal information as data is transferred.
  • The process of verifying a user’s permissions.

Question 8
Which of the following is a true about IAM roles?

1 point

  • Roles are associated with a specific person or machine.
  • Roles are assumed by users and services when they need short term credentials.
  • IAM roles are considered long-term credentials.
  • You should rarely use roles as an authentication method.

Question 9
What is a unique quality of an inline policy in AWS Identity and Access Management?

1 point

  • Can be attached to resources and accounts
  • Can be attached to both identities and resources
  • Reusable – can be attached to multiple identities
  • One-to-one relationship with attached identity

Question 10
What do the letters E-PARC refer to in a policy?

1 point

  • Effect, Principal, Action, Resource, Condition
  • Element, Partition, Allowable, Refusal, Conclusion
  • Effect, Principal, Allowable, Refusal, Conclusion
  • Element, Principal, Allowable, Refusal, Condition

Question 11
You make an API call using the AWS Command Line Interface (CLI) to request credentials from AWS Security Token Service (AWS STS). Which of the following elements is needed to make this API call?

1 point

  • User ARN
  • Policy Name
  • The service IAM
  • Role Session Name

Question 12
When you create a role, which of the following are considered trusted entities?

1 point

  • IAM users within the same account
  • IAM users in a different account
  • AWS services, such as Amazon EC2
  • All of the above

Question 13
A user makes an API call to Amazon EC2. You want to find out when this API call occurred. Which service will enable you to figure this out?

1 point

  • Amazon S3
  • Amazon EC2
  • Amazon CloudWatch
  • AWS CloudTrail

Question 14
True or false: If you fail to create an S3 bucket due to unauthorized access, Amazon S3 gives you
an encoded message that you can decode using an AWS STS API call.

1 point

  • True
  • False

Question 15
What is necessary for you to access the IAM Policy Simulator?

1 point

  • Connected to the internal network
  • Configure the root user
  • Signing-in to your AWS Account
  • Enable permissions on the Amazon S3 bucket

Conclusion

Hopefully, this article will be useful for you to find all the Week and Final Quiz Answers of Introduction to AWS Identity and Access Management of Coursera and grab some premium knowledge with less effort. If this article really helped you in any way then make sure to share it with your friends on social media and let them also know about this amazing training. You can also check out our other course Answers. So, be with us guys we will share a lot more free courses and their exam/quiz solutions also and follow our Techno-RJ Blog for more updates.

Leave a Comment

Ads Blocker Image Powered by Code Help Pro
Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Refresh