ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 63 - SCS-C02 discussion

Report
Export

An ecommerce website was down for 1 hour following a DDoS attack Users were unable to connect to the website during the attack period. The ecommerce company's security team is worried about future potential attacks and wants to prepare for such events The company needs to minimize downtime in its response to similar attacks in the future.

Which steps would help achieve this9 (Select TWO )

A.
Enable Amazon GuardDuty to automatically monitor for malicious activity and block unauthorized access.
Answers
A.
Enable Amazon GuardDuty to automatically monitor for malicious activity and block unauthorized access.
B.
Subscribe to IAM Shield Advanced and reach out to IAM Support in the event of an attack.
Answers
B.
Subscribe to IAM Shield Advanced and reach out to IAM Support in the event of an attack.
C.
Use VPC Flow Logs to monitor network: traffic and an IAM Lambda function to automatically block an attacker's IP using security groups.
Answers
C.
Use VPC Flow Logs to monitor network: traffic and an IAM Lambda function to automatically block an attacker's IP using security groups.
D.
Set up an Amazon CloudWatch Events rule to monitor the IAM CloudTrail events in real time use IAM Config rules to audit the configuration, and use IAM Systems Manager for remediation.
Answers
D.
Set up an Amazon CloudWatch Events rule to monitor the IAM CloudTrail events in real time use IAM Config rules to audit the configuration, and use IAM Systems Manager for remediation.
E.
Use IAM WAF to create rules to respond to such attacks
Answers
E.
Use IAM WAF to create rules to respond to such attacks
Suggested answer: B, E

Explanation:

To minimize downtime in response to DDoS attacks, the company should do the following:

Subscribe to AWS Shield Advanced and reach out to AWS Support in the event of an attack. This provides access to 24x7 support from the AWS DDoS Response Team (DRT), as well as advanced detection and mitigation capabilities for network and application layer attacks.

Use AWS WAF to create rules to respond to such attacks. This allows the company to filter web requests based on IP addresses, headers, body, or URI strings, and block malicious requests before they reach the web applications.

asked 16/09/2024
Oliver Buss
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first