Skip to content

Week 1 Quiz :AWS Cloud Technical Essentials (AWS Fundamentals Specialization) Answers 2025

Question 1

How do we choose an AWS Region?
✅ Latency, price, service availability, and compliance
❌ Latency, high availability, taxes, and compliance
❌ Latency, taxes, speed, and compliance
❌ Latency, security, high availability, and resiliency

Explanation:
Regions are chosen based on latency (distance to users), pricing differences, available AWS services, and local compliance or data laws.


Question 2

Every action a user takes in AWS is an API call.
✅ True
❌ False

Explanation:
All AWS actions — whether done in the Console, CLI, or SDKs — are authenticated API requests to AWS.


Question 3

Which statement BEST describes the relationship between Regions, Availability Zones, and data centers?
✅ Regions are clusters of Availability Zones. Availability Zones are clusters of data centers.
❌ Availability Zones are clusters of Regions. Regions are clusters of data centers.
❌ Data centers are cluster of Availability Zones. Regions are clusters of Availability Zones.
❌ Data centers are clusters of Regions. Regions are clusters of Availability Zones.

Explanation:
Each Region contains multiple Availability Zones (AZs), and each AZ contains one or more data centers.


Question 4

Which of the following is a benefit of cloud computing?
✅ Go global in minutes
❌ Run and maintain your own data centers
❌ Increase time-to-market
❌ Overprovision for scale

Explanation:
Cloud computing lets users deploy applications globally within minutes — no physical setup needed.


Question 5

A company wants to manage AWS services by using the command line and automating them with scripts.
✅ AWS Command Line Interface (AWS CLI)
❌ AWS Management Console
❌ AWS SDKs
❌ AWS Management Console and AWS SDKs

Explanation:
The AWS CLI allows users to automate and manage AWS services using command-line scripts.


Question 6

What is a best practice when securing the AWS account root user?
✅ Enable multi-factor authentication (MFA)
❌ Activate IAM access to the Billing console
❌ Use root user for daily tasks
❌ Change account settings

Explanation:
Root user should be protected with MFA, strong password, and rarely used for daily operations.


Question 7

When users authenticate to a corporate network, they want to use AWS without signing in again. Which identity should they use?
✅ IAM Role
❌ IAM User
❌ IAM Group
❌ AWS account root user

Explanation:
IAM Roles enable federated access — users sign in once and get temporary AWS permissions.


Question 8

Which of the following can be found in an IAM policy?
✅ Effect
✅ Action
❌ Object
❌ B and C

Explanation:
IAM policies define permissions using Effect (Allow/Deny), Action, and Resource elements.


Question 9

Can IAM policies restrict the AWS account root user?
✅ False
❌ True

Explanation:
The root user has unlimited access to all AWS services — IAM policies cannot restrict it.


Question 10

According to the AWS Shared Responsibility Model, which of the following is AWS responsible for?
✅ Managing the hardware, software, and networking components that run AWS services
❌ Managing customer data and encryption
❌ Controlling the application platform and OS
❌ Managing client-side encryption

Explanation:
AWS secures the infrastructure of the cloud; customers secure data and applications in the cloud.


Question 11

If a company has one AWS account and multiple users, what’s recommended?
✅ Create IAM groups, assign permissions, and add users to groups
❌ Use root user for all
❌ Create a single IAM user with full access
❌ Give each user the root credentials

Explanation:
Follow the principle of least privilege — use IAM groups and roles, not root user.


Question 12

According to the shared responsibility model, customers are responsible for security in the cloud.
✅ True
❌ False

Explanation:
Customers secure their OS, apps, network settings, and data; AWS secures the hardware and infrastructure.


Question 13

Which provides temporary credentials that expire after a set period?
✅ IAM Role
❌ IAM User
❌ IAM Group
❌ Identity Provider

Explanation:
IAM Roles provide temporary security credentials valid for 15 minutes to 36 hours.


Question 14

Which networking component creates a private network for AWS resources?
✅ Virtual Private Cloud (VPC)
❌ Tags
❌ Instance
❌ Amazon Machine Image (AMI)

Explanation:
A VPC provides a logically isolated private network for AWS resources like EC2 or RDS.


🧾 Summary Table

# ✅ Correct Answer Key Concept
1 Latency, price, service availability, and compliance Choosing AWS Region
2 True All AWS actions are API calls
3 Regions → AZs → Data centers AWS Infrastructure
4 Go global in minutes Cloud advantage
5 AWS CLI Manage AWS via scripts
6 Enable MFA Root user security
7 IAM Role Federated login
8 Effect & Action IAM policy elements
9 False Root unrestricted
10 AWS manages infra Shared responsibility
11 IAM groups User management
12 True Security in the cloud
13 IAM Role Temporary credentials
14 VPC Private network