ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











A global company that deals with International finance is investing heavily in cryptocurrencies and wants to experiment with mining technologies using AWS. The company's security team has enabled Amazon GuardDuty and is concerned by the number of findings being generated by the accounts.

The security team wants to minimize the possibility of GuardDuty finding false negatives for compromised instances that are performing mining How can the security team continue using GuardDuty while meeting these requirements?

A.
In the GuardDuty console, select the CryptoCurrency:EC2/BitcoinTool B'DNS finding and use the suppress findings option
A.
In the GuardDuty console, select the CryptoCurrency:EC2/BitcoinTool B'DNS finding and use the suppress findings option
Answers
B.
Create a custom AWS Lambda function to process newly detected GuardDuty alerts Process the CryptoCurrency EC2/BitcoinTool BIDNS alert and filter out the high-severity finding types only.
B.
Create a custom AWS Lambda function to process newly detected GuardDuty alerts Process the CryptoCurrency EC2/BitcoinTool BIDNS alert and filter out the high-severity finding types only.
Answers
C.
When creating a new Amazon EC2 Instance, provide the instance with a specific tag that indicates it is performing mining operations Create a custom AWS Lambda function to process newly detected GuardDuty alerts and filter for the presence of this tag
C.
When creating a new Amazon EC2 Instance, provide the instance with a specific tag that indicates it is performing mining operations Create a custom AWS Lambda function to process newly detected GuardDuty alerts and filter for the presence of this tag
Answers
D.
When GuardDuty produces a cryptocurrency finding, process the finding with a custom AWS Lambda function to extract the instance ID from the finding Then use the AWS Systems Manager Run Command to check for a running process performing mining operations
D.
When GuardDuty produces a cryptocurrency finding, process the finding with a custom AWS Lambda function to extract the instance ID from the finding Then use the AWS Systems Manager Run Command to check for a running process performing mining operations
Answers
Suggested answer: A

A security engineer must develop an encryption tool for a company. The company requires a cryptographic solution that supports the ability to perform cryptographic erasure on all resources protected by the key material in 15 minutes or less Which AWS Key Management Service (AWS KMS) key solution will allow the security engineer to meet these requirements?

A.
Use Imported key material with CMK
A.
Use Imported key material with CMK
Answers
B.
Use an AWS KMS CMK
B.
Use an AWS KMS CMK
Answers
C.
Use an AWS managed CMK.
C.
Use an AWS managed CMK.
Answers
D.
Use an AWS KMS customer managed CMK
D.
Use an AWS KMS customer managed CMK
Answers
Suggested answer: C

A security engineer is designing a solution that will provide end-to-end encryption between clients and Docker containers running In Amazon Elastic Container Service (Amazon ECS). This solution will also handle volatile traffic patterns Which solution would have the MOST scalability and LOWEST latency?

A.
Configure a Network Load Balancer to terminate the TLS traffic and then re-encrypt the traffic to the containers
A.
Configure a Network Load Balancer to terminate the TLS traffic and then re-encrypt the traffic to the containers
Answers
B.
Configure an Application Load Balancer to terminate the TLS traffic and then re-encrypt the traffic to the containers
B.
Configure an Application Load Balancer to terminate the TLS traffic and then re-encrypt the traffic to the containers
Answers
C.
Configure a Network Load Balancer with a TCP listener to pass through TLS traffic to the containers
C.
Configure a Network Load Balancer with a TCP listener to pass through TLS traffic to the containers
Answers
D.
Configure Amazon Route 53 to use multivalue answer routing to send traffic to the containers
D.
Configure Amazon Route 53 to use multivalue answer routing to send traffic to the containers
Answers
Suggested answer: A

A company has an application hosted in an Amazon EC2 instance and wants the application to access secure strings stored in AWS Systems Manager Parameter Store When the application tries to access the secure string key value, it fails. Which factors could be the cause of this failure? (Select TWO.)

A.
The EC2 instance role does not have decrypt permissions on the AWS Key Management Sen/ice(AWS KMS) key used to encrypt the secret
A.
The EC2 instance role does not have decrypt permissions on the AWS Key Management Sen/ice(AWS KMS) key used to encrypt the secret
Answers
B.
The EC2 instance role does not have read permissions to read the parameters In Parameter Store
B.
The EC2 instance role does not have read permissions to read the parameters In Parameter Store
Answers
C.
Parameter Store does not have permission to use AWS Key Management Service (AWS KMS) to decrypt the parameter
C.
Parameter Store does not have permission to use AWS Key Management Service (AWS KMS) to decrypt the parameter
Answers
D.
The EC2 instance role does not have encrypt permissions on the AWS Key Management Service(AWS KMS) key associated with the secret
D.
The EC2 instance role does not have encrypt permissions on the AWS Key Management Service(AWS KMS) key associated with the secret
Answers
E.
The EC2 instance does not have any tags associated.
E.
The EC2 instance does not have any tags associated.
Answers
Suggested answer: C, E

A company is running an application on Amazon EC2 instances in an Auto Scaling group. The application stores logs locally A security engineer noticed that logs were lost after a scale-in event. The security engineer needs to recommend a solution to ensure the durability and availability of log data All logs must be kept for a minimum of 1 year for auditing purposes What should the security engineer recommend?

A.
Within the Auto Scaling lifecycle, add a hook to create and attach an Amazon Elastic Block Store (Amazon EBS) log volume each time an EC2 instance is created. When the instance is terminated, the EBS volume can be reattached to another instance for log review.
A.
Within the Auto Scaling lifecycle, add a hook to create and attach an Amazon Elastic Block Store (Amazon EBS) log volume each time an EC2 instance is created. When the instance is terminated, the EBS volume can be reattached to another instance for log review.
Answers
B.
Create an Amazon Elastic File System (Amazon EFS) file system and add a command in the user data section of the Auto Scaling launch template to mount the EFS file system during EC2 instance creation Configure a process on the instance to copy the logs once a day from an instance Amazon Elastic Block Store (Amazon EBS) volume to a directory in the EFS file system.
B.
Create an Amazon Elastic File System (Amazon EFS) file system and add a command in the user data section of the Auto Scaling launch template to mount the EFS file system during EC2 instance creation Configure a process on the instance to copy the logs once a day from an instance Amazon Elastic Block Store (Amazon EBS) volume to a directory in the EFS file system.
Answers
C.
Build the Amazon CloudWatch agent into the AMI used in the Auto Scaling group. Configure the CloudWatch agent to send the logs to Amazon CloudWatch Logs for review.
C.
Build the Amazon CloudWatch agent into the AMI used in the Auto Scaling group. Configure the CloudWatch agent to send the logs to Amazon CloudWatch Logs for review.
Answers
D.
Within the Auto Scaling lifecycle, add a lifecycle hook at the terminating state transition and alert the engineering team by using a lifecycle notification to Amazon Simple Notification Service (Amazon SNS). Configure the hook to remain in the Terminating:Wait state for 1 hour to allow manual review of the security logs prior to instance termination.
D.
Within the Auto Scaling lifecycle, add a lifecycle hook at the terminating state transition and alert the engineering team by using a lifecycle notification to Amazon Simple Notification Service (Amazon SNS). Configure the hook to remain in the Terminating:Wait state for 1 hour to allow manual review of the security logs prior to instance termination.
Answers
Suggested answer: B

A large government organization is moving to the cloud and has specific encryption requirements.

The first workload to move requires that a customer's data be immediately destroyed when the customer makes that request. Management has asked the security team to provide a solution that will securely store the data, allow only authorized applications to perform encryption and decryption and allow for immediate destruction of the data Which solution will meet these requirements?

A.
Use AWS Secrets Manager and an AWS SDK to create a unique secret for the customer-specific data
A.
Use AWS Secrets Manager and an AWS SDK to create a unique secret for the customer-specific data
Answers
B.
Use AWS Key Management Service (AWS KMS) and the AWS Encryption SDK to generate and store a data encryption key for each customer.
B.
Use AWS Key Management Service (AWS KMS) and the AWS Encryption SDK to generate and store a data encryption key for each customer.
Answers
C.
Use AWS Key Management Service (AWS KMS) with service-managed keys to generate and store customer-specific data encryption keys
C.
Use AWS Key Management Service (AWS KMS) with service-managed keys to generate and store customer-specific data encryption keys
Answers
D.
Use AWS Key Management Service (AWS KMS) and create an AWS CloudHSM custom key store Use CloudHSM to generate and store a new CMK for each customer.
D.
Use AWS Key Management Service (AWS KMS) and create an AWS CloudHSM custom key store Use CloudHSM to generate and store a new CMK for each customer.
Answers
Suggested answer: A

A security engineer has created an Amazon Cognito user pool. The engineer needs to manually verify the ID and access token sent by the application for troubleshooting purposes What is the MOST secure way to accomplish this?

A.
Extract the subject (sub), audience (aud), and cognito:username from the ID token payload Manually check the subject and audience for the user name In the user pool
A.
Extract the subject (sub), audience (aud), and cognito:username from the ID token payload Manually check the subject and audience for the user name In the user pool
Answers
B.
Search for the public key with a key ID that matches the key ID In the header of the token. Then use a JSON Web Token (JWT) library to validate the signature of the token and extract values, such as the expiry date
B.
Search for the public key with a key ID that matches the key ID In the header of the token. Then use a JSON Web Token (JWT) library to validate the signature of the token and extract values, such as the expiry date
Answers
C.
Verify that the token is not expired. Then use the token_use claim function In Amazon Cognito to validate the key IDs
C.
Verify that the token is not expired. Then use the token_use claim function In Amazon Cognito to validate the key IDs
Answers
D.
Copy the JSON Web Token (JWT) as a JSON document Obtain the public JSON Web Key (JWK) and convert It to a pem file. Then use the file to validate the original JWT.
D.
Copy the JSON Web Token (JWT) as a JSON document Obtain the public JSON Web Key (JWK) and convert It to a pem file. Then use the file to validate the original JWT.
Answers
Suggested answer: A

A security engineer must use AWS Key Management Service (AWS KMS) to design a key management solution for a set of Amazon Elastic Block Store (Amazon EBS) volumes that contain sensitive dat a. The solution needs to ensure that the key material automatically expires in 90 days.

Which solution meets these criteria?

A.
A customer managed CMK that uses customer provided key material
A.
A customer managed CMK that uses customer provided key material
Answers
B.
A customer managed CMK that uses AWS provided key material
B.
A customer managed CMK that uses AWS provided key material
Answers
C.
An AWS managed CMK
C.
An AWS managed CMK
Answers
D.
Operating system-native encryption that uses GnuPG
D.
Operating system-native encryption that uses GnuPG
Answers
Suggested answer: B

A Security Engineer discovered a vulnerability in an application running on Amazon ECS. The vulnerability allowed attackers to install malicious code. Analysis of the code shows it exfiltrates data on port 5353 in batches at random time intervals.

While the code of the containers is being patched, how can Engineers quickly identify all compromised hosts and stop the egress of data on port 5353?

A.
Enable AWS Shield Advanced and AWS WAF. Configure an AWS WAF custom filter for egress traffic on port 5353
A.
Enable AWS Shield Advanced and AWS WAF. Configure an AWS WAF custom filter for egress traffic on port 5353
Answers
B.
Enable Amazon Inspector on Amazon ECS and configure a custom assessment to evaluate containers that have port 5353 open. Update the NACLs to block port 5353 outbound.
B.
Enable Amazon Inspector on Amazon ECS and configure a custom assessment to evaluate containers that have port 5353 open. Update the NACLs to block port 5353 outbound.
Answers
C.
Create an Amazon CloudWatch custom metric on the VPC Flow Logs identifying egress traffic on port 5353. Update the NACLs to block port 5353 outbound.
C.
Create an Amazon CloudWatch custom metric on the VPC Flow Logs identifying egress traffic on port 5353. Update the NACLs to block port 5353 outbound.
Answers
D.
Use Amazon Athena to query AWS CloudTrail logs in Amazon S3 and look for any traffic on port 5353. Update the security groups to block port 5353 outbound.
D.
Use Amazon Athena to query AWS CloudTrail logs in Amazon S3 and look for any traffic on port 5353. Update the security groups to block port 5353 outbound.
Answers
Suggested answer: C

A Developer is building a serverless application that uses Amazon API Gateway as the front end. The application will not be publicly accessible. Other legacy applications running on Amazon EC2 will make calls to the application A Security Engineer Has been asked to review the security controls for authentication and authorization of the application Which combination of actions would provide the MOST secure solution? (Select TWO )

A.
Configure an IAM policy that allows the least permissive actions to communicate with the API Gateway Attach the policy to the role used by the legacy EC2 instances
A.
Configure an IAM policy that allows the least permissive actions to communicate with the API Gateway Attach the policy to the role used by the legacy EC2 instances
Answers
B.
Enable AWS WAF for API Gateway Configure rules to explicitly allow connections from the legacy EC2 instances
B.
Enable AWS WAF for API Gateway Configure rules to explicitly allow connections from the legacy EC2 instances
Answers
C.
Create a VPC endpoint for API Gateway Attach an IAM resource policy that allows the role of the legacy EC2 instances to call specific APIs
C.
Create a VPC endpoint for API Gateway Attach an IAM resource policy that allows the role of the legacy EC2 instances to call specific APIs
Answers
D.
Create a usage plan Generate a set of API keys for each application that needs to call the API.
D.
Create a usage plan Generate a set of API keys for each application that needs to call the API.
Answers
E.
Configure cross-origin resource sharing (CORS) in each API Share the CORS information with the applications that call the API.
E.
Configure cross-origin resource sharing (CORS) in each API Share the CORS information with the applications that call the API.
Answers
Suggested answer: A, E
Total 590 questions
Go to page: of 59