NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
A good policy blocks users from ALL areas-except those that they need to do their job.
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Explanation:
Detailed explanation-1: -Permissions boundaries – Use a managed policy as the permissions boundary for an IAM entity (user or role). That policy defines the maximum permissions that the identity-based policies can grant to an entity, but does not grant permissions.
Detailed explanation-2: -An inline policy is one that you create and embed directly to an IAM group, user, or role.
Detailed explanation-3: -IAM Users access AWS with their root account credentials. This is incorrect as they use their username and password to access AWS. Which of the following is an IAM best practice? Do not use root user account.
Detailed explanation-4: -You can attach up to 20 managed policies to IAM roles and users.
There is 1 question to complete.