An EC2 instance needs DynamoDB access. What's the most secure credential method? | Card: 5 / 64 |
Fill in the blank: _____ always overrides Allow statements in AWS policy evaluation. | Card: 7 / 64 |
What AWS service exchanges external identity tokens for temporary AWS credentials? | Card: 9 / 64 |
A user has Allow for S3:GetObject but bucket policy denies it. What happens? | Card: 15 / 64 |
Fill in the blank: _____ boundaries set maximum permissions without granting any permissions. | Card: 19 / 64 |
Which federation method should enterprises use for Active Directory integration? | Card: 21 / 64 |
True or False: IAM Access Analyzer automatically fixes detected security issues. | Card: 25 / 64 |
An organization needs region restrictions across all AWS accounts. What should they use? | Card: 27 / 64 |
Fill in the blank: EC2 instances retrieve temporary credentials from the _____ metadata service. | Card: 31 / 64 |
![]() Unlock all Flashcards with EduRev Infinity Plan Starting from @ ₹99 only |
A developer creates users but shouldn't grant admin access. What prevents privilege escalation? | Card: 39 / 64 |
Cross-account access requires policies in both accounts. What must the source account allow? | Card: 51 / 64 |
Which AWS Organizations feature prevents service usage outside approved regions? | Card: 57 / 64 |
An app needs temporary S3 access for mobile users. What's the best approach? | Card: 63 / 64 |






