ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 8 - SCS-C02 discussion

Report
Export

A website currently runs on Amazon EC2, wan mostly statics content on the site. Recently the site was subjected to a DDoS attack a security engineer was (asked was redesigning the edge security to help

Mitigate this risk in the future.

What are some ways the engineer could achieve this (Select THREE)?

A.
Use IAM X-Ray to inspect the trafc going to the EC2 instances.
Answers
A.
Use IAM X-Ray to inspect the trafc going to the EC2 instances.
B.
Move the static content to Amazon S3, and front this with an Amazon Cloud Front distribution.
Answers
B.
Move the static content to Amazon S3, and front this with an Amazon Cloud Front distribution.
C.
Change the security group conguration to block the source of the attack trafc
Answers
C.
Change the security group conguration to block the source of the attack trafc
D.
Use IAM WAF security rules to inspect the inbound trafc.
Answers
D.
Use IAM WAF security rules to inspect the inbound trafc.
E.
Use Amazon Inspector assessment templates to inspect the inbound traffic.
Answers
E.
Use Amazon Inspector assessment templates to inspect the inbound traffic.
F.
Use Amazon Route 53 to distribute trafc.
Answers
F.
Use Amazon Route 53 to distribute trafc.
Suggested answer: B, D, F

Explanation:

To redesign the edge security to help mitigate the DDoS attack risk in the future, the engineer could do the following:

Move the static content to Amazon S3, and front this with an Amazon CloudFront distribution. This allows the engineer to use a global content delivery network that can cache static content at edge locations and reduce the load on the origin servers.

Use AWS WAF security rules to inspect the inbound traffic. This allows the engineer to use web application firewall rules that can filter malicious requests based on IP addresses, headers, body, or URI strings, and block them before they reach the web servers.

Use Amazon Route 53 to distribute traffic. This allows the engineer to use a scalable and highly available DNS service that can route traffic based on different policies, such as latency, geolocation, or health checks.

asked 16/09/2024
Sai C H
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first