ExamGecko

SCS-C01: AWS Certified Security - Specialty

AWS Certified Security - Specialty
Vendor:

Amazon

AWS Certified Security - Specialty Exam Questions: 590
AWS Certified Security - Specialty   2.370 Learners
Take Practice Tests
Comming soon
PDF | VPLUS

Exam Number: SCS-C01

Exam Name: AWS Certified Security - Specialty

Length of test: 170 mins

Exam Format: Multiple-choice questions.

Language Offered: English, Japanese, Korean, Portuguese (Brazil), Simplified Chinese, and Spanish (Latin America)

Number of questions in the actual exam: 65 questions

Passing Score: 750 points (approximately 49 out of 65 questions)

This certification is designed for individuals who create and implement security solutions in the AWS Cloud. It validates your expertise in understanding specialized data classifications, data-encryption methods, secure internet protocols, and AWS mechanisms to implement them.

Related questions

A Security Administrator is configuring an Amazon S3 bucket and must meet the following security requirements:

Encryption in transit

Encryption at rest

Logging of all object retrievals in AWS CloudTrail

Which of the following meet these security requirements? (Choose three.)

A.
Specify “aws:SecureTransport”: “true” within a condition in the S3 bucket policy.
A.
Specify “aws:SecureTransport”: “true” within a condition in the S3 bucket policy.
Answers
B.
Enable a security group for the S3 bucket that allows port 443, but not port 80.
B.
Enable a security group for the S3 bucket that allows port 443, but not port 80.
Answers
C.
Set up default encryption for the S3 bucket.
C.
Set up default encryption for the S3 bucket.
Answers
D.
Enable Amazon CloudWatch Logs for the AWS account.
D.
Enable Amazon CloudWatch Logs for the AWS account.
Answers
E.
Enable API logging of data events for all S3 objects.
E.
Enable API logging of data events for all S3 objects.
Answers
F.
Enable S3 object versioning for the S3 bucket.
F.
Enable S3 object versioning for the S3 bucket.
Answers
Suggested answer: A, C, E
asked 16/09/2024
Tom Starren
43 questions

A company is implementing new compliance requirements to meet customer needs. According to the new requirements the company must not use any Amazon RDS DB instances or DB clusters that lack encryption of the underlying storage. The company needs a solution that will generate an email alert when an unencrypted DB instance or DB cluster is created. The solution also must terminate the unencrypted DB instance or DB cluster.

Which solution will meet these requirements in the MOST operationally efficient manner?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

A company's cloud operations team is responsible for building effective security for AWS crossaccount access. The team asks a security engineer to help troubleshoot why some developers in the developer account (123456789012) in the developers group are not able to assume a cross-account role (ReadS3) into a production account (999999999999) to read the contents of an Amazon S3 bucket (productionapp). The two account policies are as follows:

Which recommendations should the security engineer make to resolve this issue? (Select TWO.)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

A Security Architect has been asked to review an existing security architecture and identify why the application servers cannot successfully initiate a connection to the database servers. The following summary describes the architecture:

1 An Application Load Balancer, an internet gateway, and a NAT gateway are configured in the public subnet 2. Database, application, and web servers are configured on three different private subnets. 3 The VPC has two route tables: one for the public subnet and one for all other subnets The route table for the public subnet has a 0 0 0 0/0 route to the internet gateway The route table for all other subnets has a 0 0.0.0/0 route to the NAT gateway. All private subnets can route to each other 4 Each subnet has a network ACL implemented that limits all inbound and outbound connectivity to only the required ports and protocols 5 There are 3 Security Groups (SGs) database application and web Each group limits all inbound and outbound connectivity to the minimum required Which of the following accurately reflects the access control mechanisms the Architect should verify1?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

A company hosts an end user application on AWS Currently the company deploys the application on Amazon EC2 instances behind an Elastic Load Balancer The company wants to configure end-to-end encryption between the Elastic Load Balancer and the EC2 instances.

Which solution will meet this requirement with the LEAST operational effort?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

A company usesAWS Organizations to run workloads in multiple AWS accounts Currently the individual team members at the company access all Amazon EC2 instances remotely by using SSH or Remote Desktop Protocol (RDP) The company does not have any audit trails and security groups are occasionally open The company must secure access management and implement a centralized togging solution. Which solution will meet these requirements MOST securely?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

A company has hired a third-party security auditor, and the auditor needs read-only access to all AWS resources and logs of all VPC records and events that have occurred on AWS. How can the company meet the auditor's requirements without comprising security in the AWS environment? Choose the correct answer from the options below Please select:

A.
Create a role that has the required permissions for the auditor.
A.
Create a role that has the required permissions for the auditor.
Answers
B.
Create an SNS notification that sends the CloudTrail log files to the auditor's email when CIoudTrail delivers the logs to S3, but do not allow the auditor access to the AWS environment.
B.
Create an SNS notification that sends the CloudTrail log files to the auditor's email when CIoudTrail delivers the logs to S3, but do not allow the auditor access to the AWS environment.
Answers
C.
The company should contact AWS as part of the shared responsibility model, and AWS will grant required access to th^ third-party auditor.
C.
The company should contact AWS as part of the shared responsibility model, and AWS will grant required access to th^ third-party auditor.
Answers
D.
Enable CloudTrail logging and create an IAM user who has read-only permissions to the required AWS resources, including the bucket containing the CloudTrail logs.
D.
Enable CloudTrail logging and create an IAM user who has read-only permissions to the required AWS resources, including the bucket containing the CloudTrail logs.
Answers
Suggested answer: D

Explanation:

AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain events related to API calls across your AWS infrastructure. CloudTrail provides a history of AWS API calls for your account including API calls made through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This history simplifies security analysis, resource change tracking, and troubleshooting.

Option A and C are incorrect since Cloudtrail needs to be used as part of the solution

Option B is incorrect since the auditor needs to have access to Cloudtrail For more information on cloudtrail, please visit the below URL:

https://aws.amazon.com/cloudtraiLThe correct answer is: Enable CloudTrail logging and create an IAM user who has read-onlypermissions to the required AWS resources, including the bucket containing the CloudTrail logs. Submit your Feedback/Queries to our Experts

asked 16/09/2024
MIGUEL PARADA VAZQUEZ
34 questions

A company has several production AWS accounts and a central security AWS account. The security account is used for centralized monitoring and has IAM privileges to all resources in every corporate account. All of the company's Amazon S3 buckets are tagged with a value denoting the data classification of their contents.

A Security Engineer is deploying a monitoring solution in the security account that will enforce bucket policy compliance. The system must monitor S3 buckets in all production accounts and confirm that any policy change is in accordance with the bucket's data classification. If any change is out of compliance; the Security team must be notified quickly. Which combination of actions would build the required solution? (Choose three.)

A.
Configure Amazon CloudWatch Events in the production accounts to send all S3 events to the security account event bus.
A.
Configure Amazon CloudWatch Events in the production accounts to send all S3 events to the security account event bus.
Answers
B.
Enable Amazon GuardDuty in the security account. and join the production accounts as members.
B.
Enable Amazon GuardDuty in the security account. and join the production accounts as members.
Answers
C.
Configure an Amazon CloudWatch Events rule in the security account to detect S3 bucket creation or modification events.
C.
Configure an Amazon CloudWatch Events rule in the security account to detect S3 bucket creation or modification events.
Answers
D.
Enable AWS Trusted Advisor and activate email notifications for an email address assigned to the security contact.
D.
Enable AWS Trusted Advisor and activate email notifications for an email address assigned to the security contact.
Answers
E.
Invoke an AWS Lambda function in the security account to analyze S3 bucket settings in response to S3 events, and send non-compliance notifications to the Security team.
E.
Invoke an AWS Lambda function in the security account to analyze S3 bucket settings in response to S3 events, and send non-compliance notifications to the Security team.
Answers
F.
Configure event notifications on S3 buckets for PUT; POST, and DELETE events.
F.
Configure event notifications on S3 buckets for PUT; POST, and DELETE events.
Answers
Suggested answer: D, E, F
asked 16/09/2024
Alex Fill
30 questions

After multiple compromises of its Amazon EC2 instances, a company's Security Officer is mandating that memory dumps of compromised instances be captured for further analysis. A Security Engineer just received an EC2 abuse notification report from AWS stating that an EC2 instance running the most recent Windows Server 2019 Base AMI is compromised. How should the Security Engineer collect a memory dump of the EC2 instance for forensic analysis?

A.
Give consent to the AWS Security team to dump the memory core on the compromised instance and provide it to AWS Support for analysis.
A.
Give consent to the AWS Security team to dump the memory core on the compromised instance and provide it to AWS Support for analysis.
Answers
B.
Review memory dump data that the AWS Systems Manager Agent sent to Amazon CloudWatch Logs.
B.
Review memory dump data that the AWS Systems Manager Agent sent to Amazon CloudWatch Logs.
Answers
C.
Download and run the EC2Rescue for Windows Server utility from AWS.
C.
Download and run the EC2Rescue for Windows Server utility from AWS.
Answers
D.
Reboot the EC2 Windows Server, enter safe mode, and select memory dump.
D.
Reboot the EC2 Windows Server, enter safe mode, and select memory dump.
Answers
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/ec2rw-cli.html

asked 16/09/2024
giulio guzzi
38 questions

A company will store sensitive documents in three Amazon S3 buckets based on a data classification scheme of “Sensitive,” “Confidential,” and “Restricted.” The security solution must meet all of the following requirements:

Each object must be encrypted using a unique key.

Items that are stored in the “Restricted” bucket require two-factor authentication for decryption.

AWS KMS must automatically rotate encryption keys annually.

Which of the following meets these requirements?

A.
Create a Customer Master Key (CMK) for each data classification type, and enable the rotation of it annually. For the “Restricted” CMK, define the MFA policy within the key policy. Use S3 SSE-KMS to encrypt the objects.
A.
Create a Customer Master Key (CMK) for each data classification type, and enable the rotation of it annually. For the “Restricted” CMK, define the MFA policy within the key policy. Use S3 SSE-KMS to encrypt the objects.
Answers
B.
Create a CMK grant for each data classification type with EnableKeyRotation and MultiFactorAuthPresent set to true. S3 can then use the grants to encrypt each object with a unique CMK.
B.
Create a CMK grant for each data classification type with EnableKeyRotation and MultiFactorAuthPresent set to true. S3 can then use the grants to encrypt each object with a unique CMK.
Answers
C.
Create a CMK for each data classification type, and within the CMK policy, enable rotation of it annually, and define the MFA policy. S3 can then create DEK grants to uniquely encrypt each object within the S3 bucket.
C.
Create a CMK for each data classification type, and within the CMK policy, enable rotation of it annually, and define the MFA policy. S3 can then create DEK grants to uniquely encrypt each object within the S3 bucket.
Answers
D.
Create a CMK with unique imported key material for each data classification type, and rotate them annually. For the “Restricted” key material, define the MFA policy in the key policy. Use S3 SSE-KMS to encrypt the objects.
D.
Create a CMK with unique imported key material for each data classification type, and rotate them annually. For the “Restricted” key material, define the MFA policy in the key policy. Use S3 SSE-KMS to encrypt the objects.
Answers
Suggested answer: A

Explanation:

CMKs that are not eligible for automatic key rotation, including asymmetric CMKs, CMKs in custom key stores, and CMKs with imported key material.

asked 16/09/2024
Aldays Kausiona
43 questions