An organization wants to ensure that their application running on an EC2 instance can access an S3 bucket with the least privilege. Which IAM strategy should they use?
Free DOP - AWS Certified DevOps Engineer - Professional Practice Questions
Test your knowledge with 10 free sample practice questions for the DOP - AWS Certified DevOps Engineer - Professional certification. Each question includes a detailed explanation to help you learn.
Disclaimer: These are original, AI-generated practice questions created by ProctorPulse for exam preparation purposes. They are not sourced from any official exam and are not affiliated with or endorsed by Amazon Web Services. Use them as a study aid alongside official preparation materials.
How can you enforce Multi-Factor Authentication (MFA) for users accessing sensitive AWS resources using IAM policy conditions?
An organization is reviewing its IAM policies to ensure security compliance. During the audit, several policy changes are identified. (Select all that apply) Which of these changes could potentially introduce security vulnerabilities?
(Select all that apply)
(Select all that apply) You are reviewing IAM policies to ensure they adhere to the principle of least privilege. Which of the following policies incorrectly grant root-level permissions?
(Select all that apply)
What steps should the IT team take to ensure their IAM policies comply with the company's security standards?
(Select all that apply)
(Select all that apply) Which practices should be implemented to ensure least privilege access within AWS IAM to protect sensitive resources?
(Select all that apply)
A company wants to ensure their IAM policies grant only the necessary permissions to their developers working on a new project. Which approach should they take to achieve this?
What steps should you take to ensure IAM roles in your organization adhere to the principle of least privilege after identifying those with excessive permissions?
(Select all that apply)
You are tasked with setting up an IAM role in AWS to allow cross-account access from Account A to Account B with minimal privileges. What is a crucial step to ensure that only necessary permissions are granted to this IAM role?
A company has an AWS IAM policy that grants permissions to several S3 buckets but includes an overly permissive statement. The policy allows 's3:*' on one of the buckets, which includes both sensitive and public data. What actions should you take to increase the security of this IAM policy? (Select all that apply)
(Select all that apply)

