Amazon SCS-C01 Practice Test - Questions Answers, Page 5
List of questions
Question 41
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A company has recently recovered from a security incident that required the restoration of Amazon EC2 instances from snapshots. After performing a gap analysis of its disaster recovery procedures and backup strategies, the company is concerned that, next time, it will not be able to recover the EC2 instances if the AWS account was compromised and Amazon EBS snapshots were deleted.
All EBS snapshots are encrypted using an AWS KMS CMK.
Which solution would solve this problem?
Question 42
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A security engineer needs to configure monitoring and auditing for AWS Lambda.
Which combination of actions using AWS services should the security engineer take to accomplish this goal? (Select TWO.)
Question 43
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A company is setting up products to deploy in AWS Service Catalog. Management is concerned that when users launch products, elevated IAM privileges will be required to create resources. How should the company mitigate this concern?
Explanation:
https://docs.aws.amazon.com/servicecatalog/latest/adminguide/constraints-launch.htmlLaunch constraints apply to products in the portfolio (product-portfolio association). Launchconstraints do not apply at the portfolio level or to a product across all portfolios. To associate alaunch constraint with all products in a portfolio, you must apply the launch constraint to eachproduct individually.
Question 44
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A Security Engineer has been asked to troubleshoot inbound connectivity to a web server. This single web server is not receiving inbound connections from the internet, whereas all other web servers are functioning properly. The architecture includes network ACLs, security groups, and a virtual security appliance. In addition, the Development team has implemented Application Load Balancers (ALBs) to distribute the load across all web servers. It is a requirement that traffic between the web servers and the internet flow through the virtual security appliance. The Security Engineer has verified the following:
Explanation:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-eni.html
Question 45
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A company has a VPC with an IPv6 address range and a public subnet with an IPv6 address block. The VPC currently hosts some public Amazon EC2 instances but a Security Engineer needs to migrate a second application into the VPC that also requires IPv6 connectivity.
This new application will occasionally make API requests to an external, internet-accessible endpoint to receive updates However, the Security team does not want the application's EC2 instance exposed directly to the internet The Security Engineer intends to create a private subnet with a custom route table and to associate the route table with the private subnet What else does the Security Engineer need to do to ensure the application will not be exposed directly to the internet, but can still communicate as required''
Question 46
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following are valid configurations for using SSL certificates with Amazon CloudFront?
(Select THREE )
Question 47
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A company has implemented centralized logging and monitoring of AWS CloudTrail logs from all Regions in an Amazon S3 bucket. The log Hies are encrypted using AWS KMS. A Security Engineer is attempting to review the log files using a third-party tool hosted on an Amazon EC2 instance The Security Engineer is unable to access the logs in the S3 bucket and receives an access denied error message What should the Security Engineer do to fix this issue?
Question 48
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Users report intermittent availability of a web application hosted on AWS. Monitoring systems report an excess of abnormal network traffic followed by high CPU utilization on the application web tier. Which of the following techniques will improve the availability of the application? (Select TWO.)
Question 49
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A company uses SAML federation with AWS Identity and Access Management (IAM) to provide internal users with SSO for their AWS accounts. The company's identity provider certificate was rotated as part of its normal lifecycle. Shortly after, users started receiving the following error when attempting to log in:
"Error: Response Signature Invalid (Service: AWSSecuntyTokenService; Status Code: 400; Error Code: InvalidldentltyToken)" A security engineer needs to address the immediate issue and ensure that it will not occur again. Which combination of steps should the security engineer take to accomplish this? (Select TWO.)
Question 50
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A company Is building a data lake on Amazon S3. The data consists of millions of small files containing sensitive information. The security team has the following requirements for the architecture:
• Data must be encrypted in transit.
• Data must be encrypted at rest.
• The bucket must be private, but if the bucket is accidentally made public, the data must remain confidential. Which combination of steps would meet the requirements? (Select THREE.)
Question