ExamGecko
Home / Amazon / SCS-C01 / List of questions
Ask Question

Amazon SCS-C01 Practice Test - Questions Answers, Page 5

List of questions

Question 41

Report
Export
Collapse

A company has recently recovered from a security incident that required the restoration of Amazon EC2 instances from snapshots. After performing a gap analysis of its disaster recovery procedures and backup strategies, the company is concerned that, next time, it will not be able to recover the EC2 instances if the AWS account was compromised and Amazon EBS snapshots were deleted.

All EBS snapshots are encrypted using an AWS KMS CMK.

Which solution would solve this problem?

Create a new Amazon S3 bucket Use EBS lifecycle policies to move EBS snapshots to the new S3 bucket. Move snapshots to Amazon S3 Glacier using lifecycle policies, and apply Glacier Vault Lock policies to prevent deletion
Create a new Amazon S3 bucket Use EBS lifecycle policies to move EBS snapshots to the new S3 bucket. Move snapshots to Amazon S3 Glacier using lifecycle policies, and apply Glacier Vault Lock policies to prevent deletion
Use AWS Systems Manager to distribute a configuration that performs local backups of all attached disks to Amazon S3.
Use AWS Systems Manager to distribute a configuration that performs local backups of all attached disks to Amazon S3.
Create a new AWS account with limited privileges. Allow the new account to access the AWS KMS key used to encrypt the EBS snapshots, and copy the encrypted snapshots to the new account on a recuning basis
Create a new AWS account with limited privileges. Allow the new account to access the AWS KMS key used to encrypt the EBS snapshots, and copy the encrypted snapshots to the new account on a recuning basis
Use AWS Backup to copy EBS snapshots to Amazon S3.
Use AWS Backup to copy EBS snapshots to Amazon S3.
Suggested answer: A
asked 16/09/2024
Paolo D Amelio
36 questions

Question 42

Report
Export
Collapse

A security engineer needs to configure monitoring and auditing for AWS Lambda.

Which combination of actions using AWS services should the security engineer take to accomplish this goal? (Select TWO.)

Use AWS Config to track configuration changes to Lambda functions, runtime environments, tags, handler names, code sizes, memory allocation, timeout settings, and concurrency settings, along with Lambda IAM execution role, subnet, and security group associations.
Use AWS Config to track configuration changes to Lambda functions, runtime environments, tags, handler names, code sizes, memory allocation, timeout settings, and concurrency settings, along with Lambda IAM execution role, subnet, and security group associations.
Use AWS CloudTrail to implement governance, compliance, operational, and risk auditing for Lambda.
Use AWS CloudTrail to implement governance, compliance, operational, and risk auditing for Lambda.
Use Amazon Inspector to automatically monitor for vulnerabilities and perform governance, compliance, operational, and risk auditing for Lambda.
Use Amazon Inspector to automatically monitor for vulnerabilities and perform governance, compliance, operational, and risk auditing for Lambda.
Use AWS Resource Access Manager to track configuration changes to Lambda functions, runtime environments, tags, handler names, code sizes, memory allocation, timeout settings, and concurrency settings, along with Lambda IAM execution role, subnet, and security group associations.
Use AWS Resource Access Manager to track configuration changes to Lambda functions, runtime environments, tags, handler names, code sizes, memory allocation, timeout settings, and concurrency settings, along with Lambda IAM execution role, subnet, and security group associations.
Use Amazon Macie to discover, classify, and protect sensitive data being executed inside the Lambda function.
Use Amazon Macie to discover, classify, and protect sensitive data being executed inside the Lambda function.
Suggested answer: A, B
asked 16/09/2024
Joshin Ogele
35 questions

Question 43

Report
Export
Collapse

A company is setting up products to deploy in AWS Service Catalog. Management is concerned that when users launch products, elevated IAM privileges will be required to create resources. How should the company mitigate this concern?

Add a template constraint to each product in the portfolio.
Add a template constraint to each product in the portfolio.
Add a launch constraint to each product in the portfolio.
Add a launch constraint to each product in the portfolio.
Define resource update constraints for each product in the portfolio.
Define resource update constraints for each product in the portfolio.
Update the AWS CloudFormalion template backing the product to include a service role configuration.
Update the AWS CloudFormalion template backing the product to include a service role configuration.
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/servicecatalog/latest/adminguide/constraints-launch.htmlLaunch constraints apply to products in the portfolio (product-portfolio association). Launchconstraints do not apply at the portfolio level or to a product across all portfolios. To associate alaunch constraint with all products in a portfolio, you must apply the launch constraint to eachproduct individually.

asked 16/09/2024
Daniel Ramirez
46 questions

Question 44

Report
Export
Collapse


A Security Engineer has been asked to troubleshoot inbound connectivity to a web server. This single web server is not receiving inbound connections from the internet, whereas all other web servers are functioning properly. The architecture includes network ACLs, security groups, and a virtual security appliance. In addition, the Development team has implemented Application Load Balancers (ALBs) to distribute the load across all web servers. It is a requirement that traffic between the web servers and the internet flow through the virtual security appliance. The Security Engineer has verified the following:

The rule set in the Security Groups is correct
The rule set in the Security Groups is correct
The rule set in the network ACLs is correct
The rule set in the network ACLs is correct
The rule set in the virtual appliance is correctWhich of the following are other valid items to troubleshoot in this scenario? (Choose two.)
The rule set in the virtual appliance is correctWhich of the following are other valid items to troubleshoot in this scenario? (Choose two.)
Verify that the 0.0.0.0/0 route in the route table for the web server subnet points to a NAT gateway.
Verify that the 0.0.0.0/0 route in the route table for the web server subnet points to a NAT gateway.
Verify which Security Group is applied to the particular web server’s elastic network interface (ENI).
Verify which Security Group is applied to the particular web server’s elastic network interface (ENI).
Verify that the 0.0.0.0/0 route in the route table for the web server subnet points to the virtual security appliance.
Verify that the 0.0.0.0/0 route in the route table for the web server subnet points to the virtual security appliance.
Verify the registered targets in the ALB.
Verify the registered targets in the ALB.
Verify that the 0.0.0.0/0 route in the public subnet points to a NAT gateway.
Verify that the 0.0.0.0/0 route in the public subnet points to a NAT gateway.
Suggested answer: C, D

Explanation:

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-eni.html

asked 16/09/2024
Marcin Golec
33 questions

Question 45

Report
Export
Collapse

A company has a VPC with an IPv6 address range and a public subnet with an IPv6 address block. The VPC currently hosts some public Amazon EC2 instances but a Security Engineer needs to migrate a second application into the VPC that also requires IPv6 connectivity.

This new application will occasionally make API requests to an external, internet-accessible endpoint to receive updates However, the Security team does not want the application's EC2 instance exposed directly to the internet The Security Engineer intends to create a private subnet with a custom route table and to associate the route table with the private subnet What else does the Security Engineer need to do to ensure the application will not be exposed directly to the internet, but can still communicate as required''

Launch a NAT instance in the public subnet Update the custom route table with a new route to the NAT instance
Launch a NAT instance in the public subnet Update the custom route table with a new route to the NAT instance
Remove the internet gateway, and add AWS PrivateLink to the VPC Then update the custom route table with a new route to AWS PrivateLink
Remove the internet gateway, and add AWS PrivateLink to the VPC Then update the custom route table with a new route to AWS PrivateLink
Add a managed NAT gateway to the VPC Update the custom route table with a new route to the gateway
Add a managed NAT gateway to the VPC Update the custom route table with a new route to the gateway
Add an egress-only internet gateway to the VPC. Update the custom route table with a new route to the gateway
Add an egress-only internet gateway to the VPC. Update the custom route table with a new route to the gateway
Suggested answer: D
asked 16/09/2024
Yan Wei
35 questions

Question 46

Report
Export
Collapse

Which of the following are valid configurations for using SSL certificates with Amazon CloudFront?

(Select THREE )

Default AWS Certificate Manager certificate
Default AWS Certificate Manager certificate
Custom SSL certificate stored in AWS KMS
Custom SSL certificate stored in AWS KMS
Default CloudFront certificate
Default CloudFront certificate
Custom SSL certificate stored in AWS Certificate Manager
Custom SSL certificate stored in AWS Certificate Manager
Default SSL certificate stored in AWS Secrets Manager
Default SSL certificate stored in AWS Secrets Manager
Custom SSL certificate stored in AWS IAM
Custom SSL certificate stored in AWS IAM
Suggested answer: A, C, D
asked 16/09/2024
nebaba monda
42 questions

Question 47

Report
Export
Collapse

A company has implemented centralized logging and monitoring of AWS CloudTrail logs from all Regions in an Amazon S3 bucket. The log Hies are encrypted using AWS KMS. A Security Engineer is attempting to review the log files using a third-party tool hosted on an Amazon EC2 instance The Security Engineer is unable to access the logs in the S3 bucket and receives an access denied error message What should the Security Engineer do to fix this issue?

Check that the role the Security Engineer uses grants permission to decrypt objects using the KMS CMK.
Check that the role the Security Engineer uses grants permission to decrypt objects using the KMS CMK.
Check that the role the Security Engineer uses grants permission to decrypt objects using the KMS CMK and gives access to the S3 bucket and objects
Check that the role the Security Engineer uses grants permission to decrypt objects using the KMS CMK and gives access to the S3 bucket and objects
Check that the role the EC2 instance profile uses grants permission lo decrypt objects using the KMS CMK and gives access to the S3 bucket and objects
Check that the role the EC2 instance profile uses grants permission lo decrypt objects using the KMS CMK and gives access to the S3 bucket and objects
Check that the role the EC2 instance profile uses grants permission to decrypt objects using the KMS CMK
Check that the role the EC2 instance profile uses grants permission to decrypt objects using the KMS CMK
Suggested answer: C
asked 16/09/2024
Nelson G Porras
42 questions

Question 48

Report
Export
Collapse

Users report intermittent availability of a web application hosted on AWS. Monitoring systems report an excess of abnormal network traffic followed by high CPU utilization on the application web tier. Which of the following techniques will improve the availability of the application? (Select TWO.)

Deploy AWS WAF to block all unsecured web applications from accessing the internet.
Deploy AWS WAF to block all unsecured web applications from accessing the internet.
Deploy an Intrusion Detection/Prevention System (IDS/IPS) to monitor or block unusual incoming network traffic.
Deploy an Intrusion Detection/Prevention System (IDS/IPS) to monitor or block unusual incoming network traffic.
Configure security groups to allow outgoing network traffic only from hosts that are protected with up-to-date antivirus software.
Configure security groups to allow outgoing network traffic only from hosts that are protected with up-to-date antivirus software.
Create Amazon CloudFront distribution and configure AWS WAF rules to protect the web applications from malicious traffic.
Create Amazon CloudFront distribution and configure AWS WAF rules to protect the web applications from malicious traffic.
Use the default Amazon VPC for externakfacing systems to allow AWS to actively block malicious network traffic affecting Amazon EC2 instances.
Use the default Amazon VPC for externakfacing systems to allow AWS to actively block malicious network traffic affecting Amazon EC2 instances.
Suggested answer: B, D
asked 16/09/2024
Raphael Oliveir
42 questions

Question 49

Report
Export
Collapse

A company uses SAML federation with AWS Identity and Access Management (IAM) to provide internal users with SSO for their AWS accounts. The company's identity provider certificate was rotated as part of its normal lifecycle. Shortly after, users started receiving the following error when attempting to log in:

"Error: Response Signature Invalid (Service: AWSSecuntyTokenService; Status Code: 400; Error Code: InvalidldentltyToken)" A security engineer needs to address the immediate issue and ensure that it will not occur again. Which combination of steps should the security engineer take to accomplish this? (Select TWO.)

Download a new copy of the SAML metadata file from the identity provider Create a new IAM identity provider entity. Upload the new metadata file to the new IAM identity provider entity.
Download a new copy of the SAML metadata file from the identity provider Create a new IAM identity provider entity. Upload the new metadata file to the new IAM identity provider entity.
During the next certificate rotation period and before the current certificate expires, add a new certificate as the secondary to the identity provider. Generate a new metadata file and upload it to the IAM identity provider entity. Perform automated or manual rotation of the certificate when required.
During the next certificate rotation period and before the current certificate expires, add a new certificate as the secondary to the identity provider. Generate a new metadata file and upload it to the IAM identity provider entity. Perform automated or manual rotation of the certificate when required.
Download a new copy of the SAML metadata file from the identity provider Upload the new metadata to the IAM identity provider entity configured for the SAML integration in question.
Download a new copy of the SAML metadata file from the identity provider Upload the new metadata to the IAM identity provider entity configured for the SAML integration in question.
During the next certificate rotation period and before the current certificate expires, add a new certificate as the secondary to the identity provider. Generate a new copy of the metadata file and create a new IAM identity provider entity. Upload the metadata file to the new IAM identity provider entity. Perform automated or manual rotation of the certificate when required.
During the next certificate rotation period and before the current certificate expires, add a new certificate as the secondary to the identity provider. Generate a new copy of the metadata file and create a new IAM identity provider entity. Upload the metadata file to the new IAM identity provider entity. Perform automated or manual rotation of the certificate when required.
Download a new copy of the SAML metadata file from the identity provider Create a new IAM identity provider entity. Upload the new metadata file to the new IAM identity provider entity. Update the identity provider configurations to pass a new IAM identity provider entity name in the SAML assertion.
Download a new copy of the SAML metadata file from the identity provider Create a new IAM identity provider entity. Upload the new metadata file to the new IAM identity provider entity. Update the identity provider configurations to pass a new IAM identity provider entity name in the SAML assertion.
Suggested answer: A, D
asked 16/09/2024
BRUNO DE BRIDA
38 questions

Question 50

Report
Export
Collapse

A company Is building a data lake on Amazon S3. The data consists of millions of small files containing sensitive information. The security team has the following requirements for the architecture:

• Data must be encrypted in transit.

• Data must be encrypted at rest.

• The bucket must be private, but if the bucket is accidentally made public, the data must remain confidential. Which combination of steps would meet the requirements? (Select THREE.)

Enable AES-256 encryption using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) on the S3 bucket
Enable AES-256 encryption using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) on the S3 bucket
Enable default encryption with server-side encryption with AWS KMS-managed keys (SSE-KMS) on the S3 bucket.
Enable default encryption with server-side encryption with AWS KMS-managed keys (SSE-KMS) on the S3 bucket.
Add a bucket policy that includes a deny if a PutObject request does not include awsiSecureTcanspoct.
Add a bucket policy that includes a deny if a PutObject request does not include awsiSecureTcanspoct.
Add a bucket policy with ws: Sourcelpto Allow uploads and downloads from the corporate intranet only.
Add a bucket policy with ws: Sourcelpto Allow uploads and downloads from the corporate intranet only.
Add a bucket policy that includes a deny if a PutObject request does not include s3:x-amz-sairv9rside- enctyption: "aws: kms".
Add a bucket policy that includes a deny if a PutObject request does not include s3:x-amz-sairv9rside- enctyption: "aws: kms".
Enable Amazon Macie to monitor and act on changes to the data lake's S3 bucket.
Enable Amazon Macie to monitor and act on changes to the data lake's S3 bucket.
Suggested answer: B, D, F
asked 16/09/2024
ANDREA SIMONELLI
37 questions
Total 590 questions
Go to page: of 59
Search

Related questions