ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











A Security Engineer is setting up a new AWS account. The Engineer has been asked to continuously monitor the company's AWS account using automated compliance checks based on AWS best practices and Center for Internet Security (CIS) AWS Foundations Benchmarks How can the Security Engineer accomplish this using AWS services?

A.
Enable AWS Config and set it to record all resources in all Regions and global resources. Then enable AWS Security Hub and confirm that the CIS AWS Foundations compliance standard is enabled
A.
Enable AWS Config and set it to record all resources in all Regions and global resources. Then enable AWS Security Hub and confirm that the CIS AWS Foundations compliance standard is enabled
Answers
B.
Enable Amazon Inspector and configure it to scan all Regions for the CIS AWS Foundations Benchmarks. Then enable AWS Security Hub and configure it to ingest the Amazon Inspector findings
B.
Enable Amazon Inspector and configure it to scan all Regions for the CIS AWS Foundations Benchmarks. Then enable AWS Security Hub and configure it to ingest the Amazon Inspector findings
Answers
C.
Enable Amazon Inspector and configure it to scan all Regions for the CIS AWS Foundations Benchmarks. Then enable AWS Shield in all Regions to protect the account from DDoS attacks.
C.
Enable Amazon Inspector and configure it to scan all Regions for the CIS AWS Foundations Benchmarks. Then enable AWS Shield in all Regions to protect the account from DDoS attacks.
Answers
D.
Enable AWS Config and set it to record all resources in all Regions and global resources Then enable Amazon Inspector and configure it to enforce CIS AWS Foundations Benchmarks using AWS Config rules.
D.
Enable AWS Config and set it to record all resources in all Regions and global resources Then enable Amazon Inspector and configure it to enforce CIS AWS Foundations Benchmarks using AWS Config rules.
Answers
Suggested answer: A

Explanation:

https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-standards-cis-configresources.html

A Web Administrator for the website example.com has created an Amazon CloudFront distribution for dev.example.com, with a requirement to configure HTTPS using a custom TLS certificate imported to AWS Certificate Manager. Which combination of steps is required to ensure availability of the certificate in the CloudFront console? (Choose two.)

A.
Call UploadServerCertificate with /cloudfront/dev/ in the path parameter.
A.
Call UploadServerCertificate with /cloudfront/dev/ in the path parameter.
Answers
B.
Import the certificate with a 4,096-bit RSA public key.
B.
Import the certificate with a 4,096-bit RSA public key.
Answers
C.
Ensure that the certificate, private key, and certificate chain are PKCS #12-encoded.
C.
Ensure that the certificate, private key, and certificate chain are PKCS #12-encoded.
Answers
D.
Import the certificate in the us-east-1 (N. Virginia) Region.
D.
Import the certificate in the us-east-1 (N. Virginia) Region.
Answers
E.
Ensure that the certificate, private key, and certificate chain are PEM-encoded.
E.
Ensure that the certificate, private key, and certificate chain are PEM-encoded.
Answers
Suggested answer: D, E

A company has several production AWS accounts and a central security AWS account. The security account is used for centralized monitoring and has IAM privileges to all resources in every corporate account. All of the company's Amazon S3 buckets are tagged with a value denoting the data classification of their contents.

A Security Engineer is deploying a monitoring solution in the security account that will enforce bucket policy compliance. The system must monitor S3 buckets in all production accounts and confirm that any policy change is in accordance with the bucket's data classification. If any change is out of compliance; the Security team must be notified quickly. Which combination of actions would build the required solution? (Choose three.)

A.
Configure Amazon CloudWatch Events in the production accounts to send all S3 events to the security account event bus.
A.
Configure Amazon CloudWatch Events in the production accounts to send all S3 events to the security account event bus.
Answers
B.
Enable Amazon GuardDuty in the security account. and join the production accounts as members.
B.
Enable Amazon GuardDuty in the security account. and join the production accounts as members.
Answers
C.
Configure an Amazon CloudWatch Events rule in the security account to detect S3 bucket creation or modification events.
C.
Configure an Amazon CloudWatch Events rule in the security account to detect S3 bucket creation or modification events.
Answers
D.
Enable AWS Trusted Advisor and activate email notifications for an email address assigned to the security contact.
D.
Enable AWS Trusted Advisor and activate email notifications for an email address assigned to the security contact.
Answers
E.
Invoke an AWS Lambda function in the security account to analyze S3 bucket settings in response to S3 events, and send non-compliance notifications to the Security team.
E.
Invoke an AWS Lambda function in the security account to analyze S3 bucket settings in response to S3 events, and send non-compliance notifications to the Security team.
Answers
F.
Configure event notifications on S3 buckets for PUT; POST, and DELETE events.
F.
Configure event notifications on S3 buckets for PUT; POST, and DELETE events.
Answers
Suggested answer: D, E, F

An employee accidentally exposed an AWS access key and secret access key during a public presentation. The company Security Engineer immediately disabled the key. How can the Engineer assess the impact of the key exposure and ensure that the credentials were not misused? (Choose two.)

A.
Analyze AWS CloudTrail for activity.
A.
Analyze AWS CloudTrail for activity.
Answers
B.
Analyze Amazon CloudWatch Logs for activity.
B.
Analyze Amazon CloudWatch Logs for activity.
Answers
C.
Download and analyze the IAM Use report from AWS Trusted Advisor.
C.
Download and analyze the IAM Use report from AWS Trusted Advisor.
Answers
D.
Analyze the resource inventory in AWS Config for IAM user activity.
D.
Analyze the resource inventory in AWS Config for IAM user activity.
Answers
E.
Download and analyze a credential report from IAM.
E.
Download and analyze a credential report from IAM.
Answers
Suggested answer: A, D

Explanation:

https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html

A company’s security engineer is configuring Amazon S3 permissions to ban all current and future public buckets However, the company hosts several websites directly off S3 buckets with public access enabled The engineer needs to bock me pubic S3 buckets without causing any outages on me easting websites The engineer has set up an Amazon CloudFrom distribution (or each website Which set or steps should the security engineer implement next?

A.
Configure an S3 bucket as the origin an origin access identity (OAI) for the CloudFront distribution Switch the DNS records from websites to point to the CloudFront distribution Enable Nock public access settings at the account level
A.
Configure an S3 bucket as the origin an origin access identity (OAI) for the CloudFront distribution Switch the DNS records from websites to point to the CloudFront distribution Enable Nock public access settings at the account level
Answers
B.
Configure an S3 bucket as the origin with an origin access identity (OAI) for the CloudFront distribution Switch the ONS records tor the websites to point to the CloudFront disinfection Then, tor each S3 bucket enable block public access settings
B.
Configure an S3 bucket as the origin with an origin access identity (OAI) for the CloudFront distribution Switch the ONS records tor the websites to point to the CloudFront disinfection Then, tor each S3 bucket enable block public access settings
Answers
C.
Configure an S3 bucket as the origin with an origin access identity (OAI) for the CloudFront distribution Enable block public access settings at the account level
C.
Configure an S3 bucket as the origin with an origin access identity (OAI) for the CloudFront distribution Enable block public access settings at the account level
Answers
D.
Configure an S3 bucket as the origin for me CloudFront distribution Configure the S3 bucket policy to accept connections from the CloudFront points of presence only Switch the DNS records for the websites to point to the CloudFront distribution Enable block public access settings at me account level
D.
Configure an S3 bucket as the origin for me CloudFront distribution Configure the S3 bucket policy to accept connections from the CloudFront points of presence only Switch the DNS records for the websites to point to the CloudFront distribution Enable block public access settings at me account level
Answers
Suggested answer: A

A convoys data lake uses Amazon S3 and Amazon Athen a. The company's security engineer has been asked to design an encryption solution that meets the company's data protection requirements. The encryption solution must work with Amazon S3 and keys managed by the company. The encryption solution must be protected in a hardware security module that is validated id Federal information Processing Standards (FPS) 140-2 Level 3. Which solution meets these requirements?

A.
Use client-side encryption with an AWS KMS customer-managed key implemented with the AWS Encryption SDK
A.
Use client-side encryption with an AWS KMS customer-managed key implemented with the AWS Encryption SDK
Answers
B.
Use AWS CloudHSM to store the keys and perform cryptographic operations Save the encrypted text in Amazon S3
B.
Use AWS CloudHSM to store the keys and perform cryptographic operations Save the encrypted text in Amazon S3
Answers
C.
Use an AWS KMS customer-managed key that is backed by a custom key store using AWS CloudHSM
C.
Use an AWS KMS customer-managed key that is backed by a custom key store using AWS CloudHSM
Answers
D.
Use an AWS KMS customer-managed key with the bring your own key (BYOK) feature to import a key stored in AWS CloudHSM
D.
Use an AWS KMS customer-managed key with the bring your own key (BYOK) feature to import a key stored in AWS CloudHSM
Answers
Suggested answer: B

A website currently runs on Amazon EC2 with mostly static content on the site. Recently, the site was subjected to a ODoS attack, and a Security Engineer was tasked with redesigning the edge security to help mitigate this risk in the future What are some ways the Engineer could achieve this? (Select THREE )

A.
Use AWS X-Ray to inspect the traffic going 10 the EC2 instances
A.
Use AWS X-Ray to inspect the traffic going 10 the EC2 instances
Answers
B.
Move the state content to Amazon S3 and font this with an Amazon CloudFront distribution
B.
Move the state content to Amazon S3 and font this with an Amazon CloudFront distribution
Answers
C.
Change the security group configuration to block the source of the attack traffic
C.
Change the security group configuration to block the source of the attack traffic
Answers
D.
Use AWS WAF security rules to inspect the inbound traffic
D.
Use AWS WAF security rules to inspect the inbound traffic
Answers
E.
Use Amazon inspector assessment templates to inspect the inbound traffic
E.
Use Amazon inspector assessment templates to inspect the inbound traffic
Answers
F.
Use Amazon Route 53 to distribute traffic
F.
Use Amazon Route 53 to distribute traffic
Answers
Suggested answer: B, D, F

A Security Engineer accidentally deleted the imported key material in an AWS KMS CMK. What should the Security Engineer do to restore the deleted key material?

A.
Create a new CMK. Download a new wrapping key and a new import token to import the original key material
A.
Create a new CMK. Download a new wrapping key and a new import token to import the original key material
Answers
B.
Create a new CMK Use the original wrapping key and import token to import the original key material.
B.
Create a new CMK Use the original wrapping key and import token to import the original key material.
Answers
C.
Download a new wrapping key and a new import token Import the original key material into the existing CMK.
C.
Download a new wrapping key and a new import token Import the original key material into the existing CMK.
Answers
D.
Use the original wrapping key and import token Import the original key material into the existing CMK
D.
Use the original wrapping key and import token Import the original key material into the existing CMK
Answers
Suggested answer: C

A company is developing a new mobile app for social media sharing. The company's development team has decided to use Amazon S3 to store at media files generated by mobile app users The company wants to allow users to control whether their own tiles are public, private, of shared with other users in their social network what should the development team do to implement the type of access control with the LEAST administrative effort?

A.
Use individual ACLs on each S3 object.
A.
Use individual ACLs on each S3 object.
Answers
B.
Use IAM groups tor sharing files between application social network users
B.
Use IAM groups tor sharing files between application social network users
Answers
C.
Store each user's files in a separate S3 bucket and apery a bucket policy based on the user's sharing settings
C.
Store each user's files in a separate S3 bucket and apery a bucket policy based on the user's sharing settings
Answers
D.
Generate presigned UPLs for each file access
D.
Generate presigned UPLs for each file access
Answers
Suggested answer: A


A Security Engineer noticed an anomaly within a company EC2 instance as shown in the image. The Engineer must now investigate what e causing the anomaly. What are the MOST effective steps to take lo ensure that the instance is not further manipulated while allowing the Engineer to understand what happened?

A.
Remove the instance from the Auto Scaling group Place the instance within an isolation security group, detach the EBS volume launch an EC2 instance with a forensic toolkit and attach the E8S volume to investigate
A.
Remove the instance from the Auto Scaling group Place the instance within an isolation security group, detach the EBS volume launch an EC2 instance with a forensic toolkit and attach the E8S volume to investigate
Answers
B.
Remove the instance from the Auto Scaling group and the Elastic Load Balancer Place the instance within an isolation security group, launch an EC2 instance with a forensic toolkit, and allow the forensic toolkit image to connect to the suspicious Instance to perform the Investigation.
B.
Remove the instance from the Auto Scaling group and the Elastic Load Balancer Place the instance within an isolation security group, launch an EC2 instance with a forensic toolkit, and allow the forensic toolkit image to connect to the suspicious Instance to perform the Investigation.
Answers
C.
Remove the instance from the Auto Scaling group Place the Instance within an isolation security group, launch an EC2 Instance with a forensic toolkit and use the forensic toolkit imago to deploy an ENI as a network span port to inspect all traffic coming from the suspicious instance.
C.
Remove the instance from the Auto Scaling group Place the Instance within an isolation security group, launch an EC2 Instance with a forensic toolkit and use the forensic toolkit imago to deploy an ENI as a network span port to inspect all traffic coming from the suspicious instance.
Answers
D.
Remove the instance from the Auto Scaling group and the Elastic Load Balancer Place the instance within an isolation security group, make a copy of the EBS volume from a new snapshot, launch an EC2 Instance with a forensic toolkit and attach the copy of the EBS volume to investigate.
D.
Remove the instance from the Auto Scaling group and the Elastic Load Balancer Place the instance within an isolation security group, make a copy of the EBS volume from a new snapshot, launch an EC2 Instance with a forensic toolkit and attach the copy of the EBS volume to investigate.
Answers
Suggested answer: B
Total 590 questions
Go to page: of 59