Amazon SCS-C01 Practice Test - Questions Answers, Page 17
List of questions
Question 161

The Security Engineer for a mobile game has to implement a method to authenticate users so that they can save their progress. Because most of the users are part of the same OpenID-Connect compatible social media website, the Security Engineer would like to use that as the identity provider.
Which solution is the SIMPLEST way to allow the authentication of users using their social media identities?
Question 162

A Software Engineer is trying to figure out why network connectivity to an Amazon EC2 instance does not appear to be working correctly. Its security group allows inbound HTTP traffic from 0.0.0.0/0, and the outbound rules have not been modified from the default. A custom network ACL associated with its subnet allows inbound HTTP traffic from 0.0.0.0/0 and has no outbound rules. What would resolve the connectivity issue?
Explanation:
https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html
Question 163

A Security Engineer has been asked to create an automated process to disable IAM user access keys that are more than three months old. Which of the following options should the Security Engineer use?
Explanation:
https://docs.aws.amazon.com/IAM/latest/APIReference/API_UpdateAccessKey.html
https://docs.aws.amazon.com/IAM/latest/APIReference/API_GenerateCredentialReport.html
https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetCredentialReport.html
Question 164

The InfoSec team has mandated that in the future only approved Amazon Machine Images (AMIs) can be used. How can the InfoSec team ensure compliance with this mandate?
Explanation:
https://docs.aws.amazon.com/config/latest/developerguide/approved-amis-by-id.html
Question 165

A pharmaceutical company has digitized versions of historical prescriptions stored on premises. The company would like to move these prescriptions to AWS and perform analytics on the data in them. Any operation with this data requires that the data be encrypted in transit and at rest.
Which application flow would meet the data protection requirements on AWS?
Explanation:
(Amazon Kinesis Data Analytics is the easiest way to analyze streaming data, also provide encryption at rest and in-transit) -https://docs.aws.amazon.com/kinesisanalytics/latest/dev/dataprotection. html
Question 166

The Security Engineer created a new AWS Key Management Service (AWS KMS) key with the following key policy:
What are the effects of the key policy? (Choose two.)
Explanation:
Giving the AWS account full access to the CMK does this; it enables you to use IAM policies to give IAM users and roles in the account access to the CMK. It does not by itself give any IAM users or roles access to the CMK, but it enables you to use IAM policies to do so.
https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-defaultallow-root-enable-iam
Question 167

A company uses AWS Organization to manage 50 AWS accounts. The finance staff members log in as AWS IAM users in the FinanceDept AWS account. The staff members need to read the consolidated billing information in the MasterPayer AWS account. They should not be able to view any other resources in the MasterPayer AWS account. IAM access to billing has been enabled in the MasterPayer account. Which of the following approaches grants the finance staff the permissions they require without granting any unnecessary permissions?
Explanation:
AWS Region that You Request a Certificate In (for AWS Certificate Manager) If you want to require
HTTPS between viewers and CloudFront, you must change the AWS region to US East (N. Virginia) inthe AWS Certificate Manager console before you request or import a certificate. If you want torequire HTTPS between CloudFront and your origin, and you're using an ELB load balancer as yourorigin, you can request or import a certificate in any region. https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/cnames-and-httpsrequirements.html
Question 168

Which approach will generate automated security alerts should too many unauthorized AWS API requests be identified?
Explanation:
https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-forcloudtrail.html#cloudwatch-alarms-for-cloudtrail-authorization-failuresOpen the CloudWatch console at https://console.aws.amazon.com/cloudwatch/. In the navigationpane, choose Logs. In the list of log groups, select the check box next to the log group that youcreated for CloudTrail log events. Choose Create Metric Filter. On the Define Logs Metric Filterscreen, choose Filter Pattern and then type the following: { ($.errorCode ="*UnauthorizedOperation") || ($.errorCode = "AccessDenied*") } Choose Assign Metric. For FilterName, type AuthorizationFailures. For Metric Namespace, type CloudTrailMetrics. For Metric Name,type AuthorizationFailureCount.
Question 169

Amazon CloudWatch Logs agent is successfully delivering logs to the CloudWatch Logs service.
However, logs stop being delivered after the associated log stream has been active for a specific number of hours. What steps are necessary to identify the cause of this phenomenon? (Choose two.)
Explanation:
https://acloud.guru/forums/aws-certified-security-specialty/discussion/-Lm5A3w6_NybQPhh6tRP/Cloudwatch%20Log%20question
Question 170

A company has deployed a custom DNS server in AWS. The Security Engineer wants to ensure that Amazon EC2 instances cannot use the Amazon-provided DNS. How can the Security Engineer block access to the Amazon-provided DNS in the VPC?
Explanation:
https://docs.aws.amazon.com/vpc/latest/userguide/vpc-dns.html
Question