exam questions

Exam AWS Certified Cloud Practitioner All Questions

View all questions & answers for the AWS Certified Cloud Practitioner exam

Exam AWS Certified Cloud Practitioner topic 1 question 301 discussion

Exam question from Amazon's AWS Certified Cloud Practitioner
Question #: 301
Topic #: 1
[All AWS Certified Cloud Practitioner Questions]

What should a user do if the user loses an IAM secret access key?

  • A. Retrieve the secret access key by using the IAM console.
  • B. Create a new user with a new access key and a new secret access key.
  • C. Rotate the secret access key.
  • D. Request a new secret access key from AWS Support.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
vsriga
Highly Voted 2 years, 5 months ago
Selected Answer: C
IAM user access keys – If you are an IAM user and you forget your access keys, you will need new access keys. If you have permission to create your own access keys, you can find instructions for creating a new one at Managing access keys (console). If you do not have the required permissions, you must ask your administrator to create new access keys. If you are still using your old keys, ask your administrator not to delete the old keys. To learn how an administrator can manage your access keys, see Managing access keys for IAM users. You should follow the AWS best practice of periodically changing your password and AWS access keys. In AWS, you change access keys by rotating them. This means that you create a new one, configure your applications to use the new key, and then delete the old one. You are allowed to have two access key pairs active at the same time for just this reason. For more information, see Rotating access keys.
upvoted 17 times
...
JLLNOR
Most Recent 1 year, 9 months ago
Selected Answer: B
If a user loses an IAM secret access key, the recommended action is to create a new user with a new access key and a new secret access key. This ensures that the lost key is invalidated, and any potential security risk is mitigated. So the right answer is B!
upvoted 2 times
...
man5484
1 year, 9 months ago
Selected Answer: C
Rotating the secret access key means generating a new access key and secret access key for the IAM user, while invalidating the old key. This provides a way to mitigate potential security risks if the old key was compromised.
upvoted 2 times
...
Corridon
1 year, 9 months ago
Selected Answer: B
I think the moderator got this one correct. https://securingthe.cloud/2020/how-to-fix-exposed-aws-credentials/ If an IAM access key is lost, you can disable it, then delete it, in the IAM console with any user that has permissions: 1. Sign into the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam/. 2. In the navigation pane, choose Users. 3. Choose the name of the user of the access keys you want to manage, and then choose the Security credentials tab. 4. In the Access keys section, disable an active access key by choosing Make inactive. 5. I recommend you only disable the access key until you have confirmed it’s not being used for anything critical, and you will see access denied attempts in your CloudTrail logs until its deleted. This provides you more information into who or what is trying to use it. . To delete an access key, choose its X button at the end of the row. When prompted for confirmation, choose Delete.
upvoted 1 times
Corridon
1 year, 9 months ago
Sorry I was wrong the answer is C. You will not delete the user account. Only the access key itself. Which is the same as rotating the key.
upvoted 4 times
YSJ_VIT
1 year, 4 months ago
Thanks for clarifying! :)
upvoted 1 times
...
...
...
Gulsah
1 year, 9 months ago
Selected Answer: B
Answer is correct, B. Rotating access keys is a proactive security measure where you generate new keys to replace the existing ones to enhance security. Creating a new user with new access keys is a common approach when an IAM secret access key is lost. By creating a new user, you can start with a clean slate and have full control over the new access keys and permissions associated with the user. https://aws.amazon.com/blogs/security/wheres-my-secret-access-key/ https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys_retrieve.html
upvoted 1 times
...
BilisZ
1 year, 11 months ago
Selected Answer: C
C. better
upvoted 1 times
...
huanghaiyao
1 year, 11 months ago
Selected Answer: C
create a new one access key,so answer C is right
upvoted 1 times
...
RS16
2 years ago
C is better
upvoted 1 times
...
Vinayhasija
2 years, 1 month ago
Selected Answer: C
If a user loses an IAM secret access key, the best course of action is to rotate the secret access key. This can be done by the user themselves, provided they still have access to their AWS account and the permissions required to perform this action. C. Rotate the secret access key: IAM users can rotate their own access keys to help protect their AWS resources. When an access key is rotated, AWS invalidates the existing access key and generates a new one. The user can then use the new access key to access AWS resources, and the old access key is no longer valid.
upvoted 1 times
...
Momo2023
2 years, 1 month ago
Rotating the secret access key means creating a new key and deactivating the old one. It is a good security practice to rotate the access keys periodically or when there is a potential for a key to be compromised. However, if a user has lost the secret access key, rotating it would not help in retrieving it. Instead, the user should create a new access key and delete the lost one.
upvoted 3 times
...
Momo2023
2 years, 1 month ago
B. Create a new user with a new access key and a new secret access key. If an IAM user loses an access key or secret access key, the best practice is to disable the key or delete the user and create a new user with a new access key and a new secret access key. This ensures that any security risks associated with the lost key are minimized.
upvoted 2 times
...
Saif93
2 years, 3 months ago
Selected Answer: C
C is the answer.
upvoted 1 times
Momo2023
2 years, 1 month ago
Rotating the secret access key means creating a new key and deactivating the old one. It is a good security practice to rotate the access keys periodically or when there is a potential for a key to be compromised. However, if a user has lost the secret access key, rotating it would not help in retrieving it. Instead, the user should create a new access key and delete the lost one.
upvoted 2 times
...
...
HW4301
2 years, 4 months ago
C is the best choice here. The best answer would be to create a new access key and delete the lost key. You don't need to create a new user. Therefore, rotating out the lost secret key would be the better answer. Also, the AWS recommended IAM best practice. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys_retrieve.html
upvoted 3 times
...
Redes
2 years, 5 months ago
Selected Answer: B
IAM user access keys – If you are an IAM user and you forget your access keys, you will need new access keys. If you have permission to create your own access keys, you can find instructions for creating a new one at Managing access keys (console). If you do not have the required permissions, you must ask your administrator to create new access keys. If you are still using your old keys, ask your administrator not to delete the old keys. To learn how an administrator can manage your access keys, see Managing access keys for IAM users.
upvoted 2 times
jimzhang
2 years, 1 month ago
Option B state to create a NEW USER account which is wrong! The above statement tells you to create a key under the SAME USER account.
upvoted 1 times
...
...
SLEON01
2 years, 5 months ago
Correct option C, because lost keys can be used against the owner of the account. Changing access keys (which consist of an access key ID and a secret access key) on a regular schedule is a well-known security best practice because it shortens the period an access key is active and therefore reduces the business impact if they are compromised. Having an established process that is run regularly also ensures the operational steps around key rotation are verified, so changing a key is never a scary step.
upvoted 3 times
...
gabbani72
2 years, 5 months ago
Selected Answer: B
right, B
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago