Week 1 Quiz :AWS Cloud Technical Essentials (AWS Fundamentals Specialization) Answers 2025
Question 1
How do we choose an AWS Region?
✅ Latency, price, service availability, and compliance
❌ Latency, high availability, taxes, and compliance
❌ Latency, taxes, speed, and compliance
❌ Latency, security, high availability, and resiliency
Explanation:
Regions are chosen based on latency (distance to users), pricing differences, available AWS services, and local compliance or data laws.
Question 2
Every action a user takes in AWS is an API call.
✅ True
❌ False
Explanation:
All AWS actions — whether done in the Console, CLI, or SDKs — are authenticated API requests to AWS.
Question 3
Which statement BEST describes the relationship between Regions, Availability Zones, and data centers?
✅ Regions are clusters of Availability Zones. Availability Zones are clusters of data centers.
❌ Availability Zones are clusters of Regions. Regions are clusters of data centers.
❌ Data centers are cluster of Availability Zones. Regions are clusters of Availability Zones.
❌ Data centers are clusters of Regions. Regions are clusters of Availability Zones.
Explanation:
Each Region contains multiple Availability Zones (AZs), and each AZ contains one or more data centers.
Question 4
Which of the following is a benefit of cloud computing?
✅ Go global in minutes
❌ Run and maintain your own data centers
❌ Increase time-to-market
❌ Overprovision for scale
Explanation:
Cloud computing lets users deploy applications globally within minutes — no physical setup needed.
Question 5
A company wants to manage AWS services by using the command line and automating them with scripts.
✅ AWS Command Line Interface (AWS CLI)
❌ AWS Management Console
❌ AWS SDKs
❌ AWS Management Console and AWS SDKs
Explanation:
The AWS CLI allows users to automate and manage AWS services using command-line scripts.
Question 6
What is a best practice when securing the AWS account root user?
✅ Enable multi-factor authentication (MFA)
❌ Activate IAM access to the Billing console
❌ Use root user for daily tasks
❌ Change account settings
Explanation:
Root user should be protected with MFA, strong password, and rarely used for daily operations.
Question 7
When users authenticate to a corporate network, they want to use AWS without signing in again. Which identity should they use?
✅ IAM Role
❌ IAM User
❌ IAM Group
❌ AWS account root user
Explanation:
IAM Roles enable federated access — users sign in once and get temporary AWS permissions.
Question 8
Which of the following can be found in an IAM policy?
✅ Effect
✅ Action
❌ Object
❌ B and C
Explanation:
IAM policies define permissions using Effect (Allow/Deny), Action, and Resource elements.
Question 9
Can IAM policies restrict the AWS account root user?
✅ False
❌ True
Explanation:
The root user has unlimited access to all AWS services — IAM policies cannot restrict it.
Question 10
According to the AWS Shared Responsibility Model, which of the following is AWS responsible for?
✅ Managing the hardware, software, and networking components that run AWS services
❌ Managing customer data and encryption
❌ Controlling the application platform and OS
❌ Managing client-side encryption
Explanation:
AWS secures the infrastructure of the cloud; customers secure data and applications in the cloud.
Question 11
If a company has one AWS account and multiple users, what’s recommended?
✅ Create IAM groups, assign permissions, and add users to groups
❌ Use root user for all
❌ Create a single IAM user with full access
❌ Give each user the root credentials
Explanation:
Follow the principle of least privilege — use IAM groups and roles, not root user.
Question 12
According to the shared responsibility model, customers are responsible for security in the cloud.
✅ True
❌ False
Explanation:
Customers secure their OS, apps, network settings, and data; AWS secures the hardware and infrastructure.
Question 13
Which provides temporary credentials that expire after a set period?
✅ IAM Role
❌ IAM User
❌ IAM Group
❌ Identity Provider
Explanation:
IAM Roles provide temporary security credentials valid for 15 minutes to 36 hours.
Question 14
Which networking component creates a private network for AWS resources?
✅ Virtual Private Cloud (VPC)
❌ Tags
❌ Instance
❌ Amazon Machine Image (AMI)
Explanation:
A VPC provides a logically isolated private network for AWS resources like EC2 or RDS.
🧾 Summary Table
| # | ✅ Correct Answer | Key Concept |
|---|---|---|
| 1 | Latency, price, service availability, and compliance | Choosing AWS Region |
| 2 | True | All AWS actions are API calls |
| 3 | Regions → AZs → Data centers | AWS Infrastructure |
| 4 | Go global in minutes | Cloud advantage |
| 5 | AWS CLI | Manage AWS via scripts |
| 6 | Enable MFA | Root user security |
| 7 | IAM Role | Federated login |
| 8 | Effect & Action | IAM policy elements |
| 9 | False | Root unrestricted |
| 10 | AWS manages infra | Shared responsibility |
| 11 | IAM groups | User management |
| 12 | True | Security in the cloud |
| 13 | IAM Role | Temporary credentials |
| 14 | VPC | Private network |