Learning
Learning
Loading practice session...
AWS Certified Cloud Practitioner · Exam domain
62 practice questions in this domain. AI-tutored explanations for every answer.
Sign in to practice all 62 questions with progress tracking and AI explanations.
1. A company stores sensitive customer records in Amazon S3 and wants AWS to manage the encryption keys automatically without any additional configuration. Which S3 encryption option best meets this requirement?
Explanation
SSE-S3 is the simplest option: S3 manages all key creation, rotation, and storage automatically using AES-256, requiring zero additional configuration from the customer.
2. A financial firm requires full audit trails for every encryption key usage event in Amazon S3, including who accessed a key and when. Which encryption method provides this level of key activity logging?
Explanation
SSE-KMS uses AWS KMS customer master keys whose every usage is logged in AWS CloudTrail, giving full auditability of who used which key and when.
3. An application transmits personally identifiable information (PII) between a web browser and an Amazon EC2-hosted API. Which AWS-recommended mechanism protects this data while it travels over the network?
Explanation
SSL/TLS (HTTPS) encrypts data in transit between clients and servers, preventing eavesdropping and man-in-the-middle attacks on network communications.
4. A developer needs to create and control the lifecycle of cryptographic keys used to encrypt data across multiple AWS services. Which AWS service is designed specifically for this purpose?
Explanation
AWS KMS is the managed service purpose-built to create, store, rotate, and control access to customer master keys (CMKs) used for encryption across AWS services.
5. A security team wants to use their own cryptographic key material imported into AWS KMS rather than having AWS generate the key. What does AWS KMS support to enable this?
Explanation
AWS KMS supports customer-managed CMKs with imported key material, letting customers supply their own cryptographic key bytes while still using KMS for key management operations.
Practice all 62+ questions in this domain
Start free practice →