ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











An external Auditor finds that a company's user passwords have no minimum length. The company is currently using two identity providers:

• AWS IAM federated with on-premises Active Directory

• Amazon Cognito user pools to accessing an AWS Cloud application developed by the company Which combination o1 actions should the Security Engineer take to solve this issue? (Select TWO.)

A.
Update the password length policy In the on-premises Active Directory configuration.
A.
Update the password length policy In the on-premises Active Directory configuration.
Answers
B.
Update the password length policy In the IAM configuration.
B.
Update the password length policy In the IAM configuration.
Answers
C.
Enforce an IAM policy In Amazon Cognito and AWS IAM with a minimum password length condition.
C.
Enforce an IAM policy In Amazon Cognito and AWS IAM with a minimum password length condition.
Answers
D.
Update the password length policy in the Amazon Cognito configuration.
D.
Update the password length policy in the Amazon Cognito configuration.
Answers
E.
Create an SCP with AWS Organizations that enforces a minimum password length for AWS IAM and Amazon Cognito.
E.
Create an SCP with AWS Organizations that enforces a minimum password length for AWS IAM and Amazon Cognito.
Answers
Suggested answer: A, D

A company has hundreds of AWS accounts, and a centralized Amazon S3 bucket used to collect AWS CloudTrail for all of these accounts. A security engineer wants to create a solution that will enable the company to run ad hoc queues against its CloudTrail logs dating back 3 years from when the trails were first enabled in the company’s AWS account. How should the company accomplish this with the least amount of administrative overhead?

A.
Run an Amazon EMP cluster that uses a MapReduce job to be examine the CloudTrail trails.
A.
Run an Amazon EMP cluster that uses a MapReduce job to be examine the CloudTrail trails.
Answers
B.
Use the events history/feature of the CloudTrail console to query the CloudTrail trails.
B.
Use the events history/feature of the CloudTrail console to query the CloudTrail trails.
Answers
C.
Write an AWS Lambda function to query the CloudTrail trails Configure the Lambda function to be executed whenever a new file is created in the CloudTrail S3 bucket.
C.
Write an AWS Lambda function to query the CloudTrail trails Configure the Lambda function to be executed whenever a new file is created in the CloudTrail S3 bucket.
Answers
D.
Create an Amazon Athena table that tools at the S3 bucket the CloudTrail trails are being written to Use Athena to run queries against the trails.
D.
Create an Amazon Athena table that tools at the S3 bucket the CloudTrail trails are being written to Use Athena to run queries against the trails.
Answers
Suggested answer: D

A recent security audit identified that a company's application team injects database credentials into the environment variables of an AWS Fargate task. The company's security policy mandates that all sensitive data be encrypted at rest and in transit.

When combination of actions should the security team take to make the application compliant within the security policy? (Select THREE)

A.
Store the credentials securely in a file in an Amazon S3 bucket with restricted access to the application team IAM role Ask the application team to read the credentials from the S3 object instead
A.
Store the credentials securely in a file in an Amazon S3 bucket with restricted access to the application team IAM role Ask the application team to read the credentials from the S3 object instead
Answers
B.
Create an AWS Secrets Manager secret and specify the key/value pairs to be stored in this secret
B.
Create an AWS Secrets Manager secret and specify the key/value pairs to be stored in this secret
Answers
C.
Modify the application to pull credentials from the AWS Secrets Manager secret instead of the environment variables.
C.
Modify the application to pull credentials from the AWS Secrets Manager secret instead of the environment variables.
Answers
D.
Add the following statement to the container instance IAM role policy
D.
Add the following statement to the container instance IAM role policy
Answers
E.
Add the following statement to the execution role policy.
E.
Add the following statement to the execution role policy.
Answers
F.
Log in to the AWS Fargate instance, create a script to read the secret value from AWS Secret Manager, and inject the environment variables. Ask the application team to redeploy the application.
F.
Log in to the AWS Fargate instance, create a script to read the secret value from AWS Secret Manager, and inject the environment variables. Ask the application team to redeploy the application.
Answers
Suggested answer: B, E, F

A Security Engineer creates an Amazon S3 bucket policy that denies access to all users. A few days later, the Security Engineer adds an additional statement to the bucket policy to allow read-only access to one other employee Even after updating the policy the employee still receives an access denied message.

What is the likely cause of this access denial?

A.
The ACL in the bucket needs to be updated.
A.
The ACL in the bucket needs to be updated.
Answers
B.
The IAM policy does not allow the user to access the bucket
B.
The IAM policy does not allow the user to access the bucket
Answers
C.
It takes a few minutes for a bucket policy to take effect
C.
It takes a few minutes for a bucket policy to take effect
Answers
D.
The allow permission is being overridden by the deny.
D.
The allow permission is being overridden by the deny.
Answers
Suggested answer: D

A Security Engineer is setting up an AWS CloudTrail trail for all regions in an AWS account. For added security, the logs are stored using server-side encryption with AWS KMS-managed keys (SSE-KMS) and have log integrity validation enabled.

While testing the solution, the Security Engineer discovers that the digest files are readable, but the log files are not. What is the MOST likely cause?

A.
The log files fail integrity validation and automatically are marked as unavailable.
A.
The log files fail integrity validation and automatically are marked as unavailable.
Answers
B.
The KMS key policy does not grant the Security Engineer's IAM user or role permissions to decrypt with it.
B.
The KMS key policy does not grant the Security Engineer's IAM user or role permissions to decrypt with it.
Answers
C.
The bucket is set up to use server-side encryption with Amazon S3-managed keys (SSE-S3) as the default and does not allow SSE-KMS-encrypted files.
C.
The bucket is set up to use server-side encryption with Amazon S3-managed keys (SSE-S3) as the default and does not allow SSE-KMS-encrypted files.
Answers
D.
An IAM policy applicable to the Security Engineer’s IAM user or role denies access to the "CloudTrail/" prefix in the Amazon S3 bucket
D.
An IAM policy applicable to the Security Engineer’s IAM user or role denies access to the "CloudTrail/" prefix in the Amazon S3 bucket
Answers
Suggested answer: B

Explanation:

Enabling server-side encryption encrypts the log files but not the digest files with SSE-KMS. Digest files are encrypted with Amazon S3-managed encryption keys (SSE-S3). https://docs.aws.amazon.com/awscloudtrail/latest/userguide/encrypting-cloudtrail-log-files-withaws-kms.html

A security engineer has noticed that VPC Flow Logs are getting a lot REJECT traffic originating from a single Amazon EC2 instance in an Auto Scaling group. The security engineer is concerned that this EC2 instance may be compromised. What immediate action should the security engineer take?

What immediate action should the security engineer take?

A.
Remove me instance from the Auto Seating group Close me security group mm ingress only from a single forensic P address to perform an analysis.
A.
Remove me instance from the Auto Seating group Close me security group mm ingress only from a single forensic P address to perform an analysis.
Answers
B.
Remove me instance from the Auto Seating group Change me network ACL rules to allow traffic only from a single forensic IP address to perform en analysis Add a rule to deny all other traffic.
B.
Remove me instance from the Auto Seating group Change me network ACL rules to allow traffic only from a single forensic IP address to perform en analysis Add a rule to deny all other traffic.
Answers
C.
Remove the instance from the Auto Scaling group Enable Amazon GuardDuty in that AWS account Install the Amazon Inspector agent cm the suspicious EC 2 instance to perform a scan.
C.
Remove the instance from the Auto Scaling group Enable Amazon GuardDuty in that AWS account Install the Amazon Inspector agent cm the suspicious EC 2 instance to perform a scan.
Answers
D.
Take a snapshot of the suspicious EC2 instance. Create a new EC2 instance from me snapshot in a closed security group with ingress only from a single forensic IP address to perform an analysis
D.
Take a snapshot of the suspicious EC2 instance. Create a new EC2 instance from me snapshot in a closed security group with ingress only from a single forensic IP address to perform an analysis
Answers
Suggested answer: B

A company needs its Amazon Elastic Block Store (Amazon EBS) volumes to be encrypted at all times.

During a security incident. EBS snapshots of suspicious instances are shared to a forensics account for analysis A security engineer attempting to share a suspicious EBS snapshot to the forensics account receives the following error "Unable to share snapshot: An error occurred (OperationNotPermitted) when calling the ModifySnapshotAttribute operation: Encrypted snapshots with EBS default key cannot be shared. Which combination of steps should the security engineer take in the incident account to complete the sharing operation? (Select THREE )

A.
Create a customer managed CMK Copy the EBS snapshot encrypting the destination snapshot using the new CMK.
A.
Create a customer managed CMK Copy the EBS snapshot encrypting the destination snapshot using the new CMK.
Answers
B.
Allow forensics accounting principals to use the CMK by modifying its policy.
B.
Allow forensics accounting principals to use the CMK by modifying its policy.
Answers
C.
Create an Amazon EC2 instance. Attach the encrypted and suspicious EBS volume. Copy data from the suspicious volume to an unencrypted volume. Snapshot the unencrypted volume
C.
Create an Amazon EC2 instance. Attach the encrypted and suspicious EBS volume. Copy data from the suspicious volume to an unencrypted volume. Snapshot the unencrypted volume
Answers
D.
Copy the EBS snapshot to the new decrypted snapshot
D.
Copy the EBS snapshot to the new decrypted snapshot
Answers
E.
Restore a volume from the suspicious EBS snapshot. Create an unencrypted EBS volume of the same size.
E.
Restore a volume from the suspicious EBS snapshot. Create an unencrypted EBS volume of the same size.
Answers
F.
Share the target EBS snapshot with the forensics account.
F.
Share the target EBS snapshot with the forensics account.
Answers
Suggested answer: A, B, F

A company uses a third-party identity provider and SAML-based SSO for its AWS accounts After the third-party identity provider renewed an expired signing certificate users saw the following message when trying to log in:

A security engineer needs to provide a solution that corrects the error and minimizes operational overhead Which solution meets these requirements?

A.
Upload the third-party signing certificate's new private key to the AWS identity provider entity defined in AWS identity and Access Management (IAM) by using the AWS Management Console
A.
Upload the third-party signing certificate's new private key to the AWS identity provider entity defined in AWS identity and Access Management (IAM) by using the AWS Management Console
Answers
B.
Sign the identity provider's metadata file with the new public key Upload the signature to the AWS identity provider entity defined in AWS Identity and Access Management (IAM) by using the AWS CLI.
B.
Sign the identity provider's metadata file with the new public key Upload the signature to the AWS identity provider entity defined in AWS Identity and Access Management (IAM) by using the AWS CLI.
Answers
C.
Download the updated SAML metadata tile from the identity service provider Update the file in the AWS identity provider entity defined in AWS Identity and Access Management (IAM) by using the AWS CLI
C.
Download the updated SAML metadata tile from the identity service provider Update the file in the AWS identity provider entity defined in AWS Identity and Access Management (IAM) by using the AWS CLI
Answers
D.
Configure the AWS identity provider entity defined in AWS Identity and Access Management (IAM) to synchronously fetch the new public key by using the AWS Management Console.
D.
Configure the AWS identity provider entity defined in AWS Identity and Access Management (IAM) to synchronously fetch the new public key by using the AWS Management Console.
Answers
Suggested answer: C

A company's application runs on Amazon EC2 and stores data in an Amazon S3 bucket The company wants additional security controls in place to limit the likelihood of accidental exposure of data to external parties Which combination of actions will meet this requirement? (Select THREE.)

A.
Encrypt the data in Amazon S3 using server-side encryption with Amazon S3 managed encryption keys (SSE-S3)
A.
Encrypt the data in Amazon S3 using server-side encryption with Amazon S3 managed encryption keys (SSE-S3)
Answers
B.
Encrypt the data in Amazon S3 using server-side encryption with AWS KMS managed encryption keys (SSE-KMS)
B.
Encrypt the data in Amazon S3 using server-side encryption with AWS KMS managed encryption keys (SSE-KMS)
Answers
C.
Create a new Amazon S3 VPC endpoint and modify the VPC's routing tables to use the new endpoint
C.
Create a new Amazon S3 VPC endpoint and modify the VPC's routing tables to use the new endpoint
Answers
D.
Use the Amazon S3 Block Public Access feature.
D.
Use the Amazon S3 Block Public Access feature.
Answers
E.
Configure the bucket policy to allow access from the application instances only
E.
Configure the bucket policy to allow access from the application instances only
Answers
F.
Use a NACL to filter traffic to Amazon S3
F.
Use a NACL to filter traffic to Amazon S3
Answers
Suggested answer: B, C, E

Explanation:

Topic 2, Exam Pool B

The Security team believes that a former employee may have gained unauthorized access to AWS resources sometime in the past 3 months by using an identified access key. What approach would enable the Security team to find out what the former employee may have done within AWS?

A.
Use the AWS CloudTrail console to search for user activity.
A.
Use the AWS CloudTrail console to search for user activity.
Answers
B.
Use the Amazon CloudWatch Logs console to filter CloudTrail data by user.
B.
Use the Amazon CloudWatch Logs console to filter CloudTrail data by user.
Answers
C.
Use AWS Config to see what actions were taken by the user.
C.
Use AWS Config to see what actions were taken by the user.
Answers
D.
Use Amazon Athena to query CloudTrail logs stored in Amazon S3.
D.
Use Amazon Athena to query CloudTrail logs stored in Amazon S3.
Answers
Suggested answer: A

Explanation:

You can use CloudTrail to search event history for the last 90 days. You can use CloudWatch queries to search API history beyond the last 90 days. You can use Athena to query CloudTrail logs over the last 90 days. https:// aws.amazon.com/premiumsupport/knowledge-center/view-iam-history/

Total 590 questions
Go to page: of 59