1. Right Answer: D
Explanation: You need to ensure that UserB is given access via the Key policy for the Key Option A is invalid because you don't assign roles to IAM users Options B and D are invalid because the permissions are not pertinent to the IAM or bucket policy For more information on Key policies please visit the below Link: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html
2. Right Answer: D
Explanation: The AWS(Amazon Web Service) Documentation mentions the following Amazon Cognito provides authentication, authorization, and user management for your web and mobile apps. Your users can sign in directly with a user name and password, or through a third party such as Facebook, Amazon, or Google. Option B is incorrect since this is used for identity federation Option C is incorrect since this is pure Identity and Access management Option D is incorrect since AWS(Amazon Web Service) is a configuration service For more information on AWS(Amazon Web Service) Cognito please refer to the below link https://docs.aws.amazon.com/cognito/latest/developerguide/what-is-amazon-cognito.html
3. Right Answer: A,B,E
Explanation: IPSec is a widely adopted protocol that can be used to provide end to end protection for data Options A and B are invalid because there is no complete guarantee of end to end encryption using IPSec For more information on IPSec, please visit the following URL: https://en.wikipedia.org/wiki/IPsec
4. Right Answer: D
Explanation: Option A and B are invalid because by default the Security Groups already block traffic. You can use NACL's as an additional security layer for the subnet to deny traffic. Option D is invalid since just changing the Inbound Rules is sufficient. The AWS(Amazon Web Service) Documentation mentions the following A network access control list (ACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets. You might set up network ACLs with rules similar to your security groups in order to add an additional layer of security to your VPC. For more information on Network Access Control Lists, please visit the following url https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html
5. Right Answer: A
Explanation: