0
0
AWScloud~20 mins

KMS for key management in AWS - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
KMS Key Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
service_behavior
intermediate
2:00remaining
What happens when you disable a KMS key?

You have an AWS KMS key that you disable. What is the immediate effect on services using this key?

AThe key automatically rotates to a new key version.
BServices can still encrypt and decrypt data with the key without interruption.
CThe key is deleted permanently and cannot be recovered.
DServices can no longer use the key to encrypt or decrypt data until it is enabled again.
Attempts:
2 left
💡 Hint

Think about what disabling a key means for its usability.

security
intermediate
2:00remaining
Which IAM policy action allows decrypting data with a KMS key?

You want to allow a user to decrypt data encrypted with a specific KMS key. Which IAM action must be included in the policy?

Akms:Decrypt
Bkms:Encrypt
Ckms:GenerateDataKey
Dkms:CreateKey
Attempts:
2 left
💡 Hint

Decrypting data requires a specific permission related to reading encrypted content.

Architecture
advanced
3:00remaining
How to architect secure key rotation with AWS KMS?

You want to ensure your encryption keys rotate automatically without downtime for your application. Which approach is best?

AEnable automatic key rotation on the KMS customer managed key and use the same key ARN in your application.
BManually create new keys and update your application to use the new key ARN each time.
CDelete old keys after creating new ones to avoid confusion.
DUse AWS Secrets Manager to store keys and rotate them manually.
Attempts:
2 left
💡 Hint

Think about how KMS supports key rotation natively.

Best Practice
advanced
3:00remaining
What is the best practice for granting least privilege access to KMS keys?

You want to follow the principle of least privilege when granting access to KMS keys. Which practice aligns best?

AUse root account credentials to manage all keys centrally.
BGrant all users full access to all KMS keys to avoid permission errors.
CUse key policies and IAM policies to restrict access to only necessary actions and resources.
DDisable key policies and rely only on IAM policies for access control.
Attempts:
2 left
💡 Hint

Think about combining policies to limit access effectively.

🧠 Conceptual
expert
3:00remaining
What error occurs if you try to decrypt data with a KMS key that is scheduled for deletion?

You attempt to decrypt ciphertext using a KMS key that is scheduled for deletion but not yet deleted. What error will AWS KMS return?

AKeyUnavailableException
BKMSInvalidStateException
CAccessDeniedException
DInvalidCiphertextException
Attempts:
2 left
💡 Hint

Consider the key's state when scheduled for deletion.