ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 81 - SCS-C02 discussion

Report
Export

A developer at a company uses an SSH key to access multiple Amazon EC2 instances. The company discovers that the SSH key has been posted on a public GitHub repository. A security engineer verifies that the key has not been used recently.

How should the security engineer prevent unauthorized access to the EC2 instances?

A.
Delete the key pair from the EC2 console. Create a new key pair.
Answers
A.
Delete the key pair from the EC2 console. Create a new key pair.
B.
Use the ModifylnstanceAttribute API operation to change the key on any EC2 instance that is using the key.
Answers
B.
Use the ModifylnstanceAttribute API operation to change the key on any EC2 instance that is using the key.
C.
Restrict SSH access in the security group to only known corporate IP addresses.
Answers
C.
Restrict SSH access in the security group to only known corporate IP addresses.
D.
Update the key pair in any AMI that is used to launch the EC2 instances. Restart the EC2 instances.
Answers
D.
Update the key pair in any AMI that is used to launch the EC2 instances. Restart the EC2 instances.
Suggested answer: C

Explanation:

To prevent unauthorized access to the EC2 instances, the security engineer should do the following:

Restrict SSH access in the security group to only known corporate IP addresses. This allows the security engineer to use a virtual firewall that controls inbound and outbound traffic for their EC2 instances, and limit SSH access to only trusted sources.

asked 16/09/2024
Saikhantsetseg Donnelly
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first