1.) Name 2 Unmanaged services and 5 managed services from the (Google slides page 5)
2.) Who is responsible for the physical security of data centers in AWS:?
3.) AWS is responsible for security __ the cloud.
4.) Customer is responsible for security __ the cloud.
5.) What is an IAM user name and password used for? (Google slides page 16)
6.) What are the Access and Secret Access keys used for? (Google slides page 16)
7.) What are key pairs used for?
8.) Name the 5 Best IAM practices? (Google slides page 17)
9.) What is an IAM policy?
10.) What is AWS Cloud Trail?
11.) What is AWS Config?
12.) Why shouldn't you use the root account?
13.) Should you require MFA for your root account and all IAM users? True or False
14.) What is the advantage of using a role?
15.) What does the AWS Service Catalog allow you to do?
16.) What are AWS security compliance programs? (Google slides page 71)
17.) What is AWS Enterprise Support?
18.) What is an AWS Partner Network (APN)?
19.) What is MFA and is it needed?
20.) What is the difference between an IAM role and an IAM user?
21.) What are customers responsible for in the AWS cloud?