ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











The Security Engineer for a mobile game has to implement a method to authenticate users so that they can save their progress. Because most of the users are part of the same OpenID-Connect compatible social media website, the Security Engineer would like to use that as the identity provider.

Which solution is the SIMPLEST way to allow the authentication of users using their social media identities?

A.
Amazon Cognito
A.
Amazon Cognito
Answers
B.
AssumeRoleWithWebIdentity API
B.
AssumeRoleWithWebIdentity API
Answers
C.
Amazon Cloud Directory
C.
Amazon Cloud Directory
Answers
D.
Active Directory (AD) Connector
D.
Active Directory (AD) Connector
Answers
Suggested answer: A

A Software Engineer is trying to figure out why network connectivity to an Amazon EC2 instance does not appear to be working correctly. Its security group allows inbound HTTP traffic from 0.0.0.0/0, and the outbound rules have not been modified from the default. A custom network ACL associated with its subnet allows inbound HTTP traffic from 0.0.0.0/0 and has no outbound rules. What would resolve the connectivity issue?

A.
The outbound rules on the security group do not allow the response to be sent to the client on the ephemeral port range.
A.
The outbound rules on the security group do not allow the response to be sent to the client on the ephemeral port range.
Answers
B.
The outbound rules on the security group do not allow the response to be sent to the client on the HTTP port.
B.
The outbound rules on the security group do not allow the response to be sent to the client on the HTTP port.
Answers
C.
An outbound rule must be added to the network ACL to allow the response to be sent to the client on the ephemeral port range.
C.
An outbound rule must be added to the network ACL to allow the response to be sent to the client on the ephemeral port range.
Answers
D.
An outbound rule must be added to the network ACL to allow the response to be sent to the client on the HTTP port.
D.
An outbound rule must be added to the network ACL to allow the response to be sent to the client on the HTTP port.
Answers
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html

A Security Engineer has been asked to create an automated process to disable IAM user access keys that are more than three months old. Which of the following options should the Security Engineer use?

A.
In the AWS Console, choose the IAM service and select “Users”. Review the “Access Key Age” column.
A.
In the AWS Console, choose the IAM service and select “Users”. Review the “Access Key Age” column.
Answers
B.
Define an IAM policy that denies access if the key age is more than three months and apply to all users.
B.
Define an IAM policy that denies access if the key age is more than three months and apply to all users.
Answers
C.
Write a script that uses the GenerateCredentialReport, GetCredentialReport, and UpdateAccessKey APIs.
C.
Write a script that uses the GenerateCredentialReport, GetCredentialReport, and UpdateAccessKey APIs.
Answers
D.
Create an Amazon CloudWatch alarm to detect aged access keys and use an AWS Lambda function to disable the keys older than 90 days.
D.
Create an Amazon CloudWatch alarm to detect aged access keys and use an AWS Lambda function to disable the keys older than 90 days.
Answers
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/IAM/latest/APIReference/API_UpdateAccessKey.html

https://docs.aws.amazon.com/IAM/latest/APIReference/API_GenerateCredentialReport.html

https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetCredentialReport.html

The InfoSec team has mandated that in the future only approved Amazon Machine Images (AMIs) can be used. How can the InfoSec team ensure compliance with this mandate?

A.
Terminate all Amazon EC2 instances and relaunch them with approved AMIs.
A.
Terminate all Amazon EC2 instances and relaunch them with approved AMIs.
Answers
B.
Patch all running instances by using AWS Systems Manager.
B.
Patch all running instances by using AWS Systems Manager.
Answers
C.
Deploy AWS Config rules and check all running instances for compliance.
C.
Deploy AWS Config rules and check all running instances for compliance.
Answers
D.
Define a metric filter in Amazon CloudWatch Logs to verify compliance.
D.
Define a metric filter in Amazon CloudWatch Logs to verify compliance.
Answers
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/config/latest/developerguide/approved-amis-by-id.html

A pharmaceutical company has digitized versions of historical prescriptions stored on premises. The company would like to move these prescriptions to AWS and perform analytics on the data in them. Any operation with this data requires that the data be encrypted in transit and at rest.

Which application flow would meet the data protection requirements on AWS?

A.
Digitized files -> Amazon Kinesis Data Analytics
A.
Digitized files -> Amazon Kinesis Data Analytics
Answers
B.
Digitized files -> Amazon Kinesis Data Firehose -> Amazon S3 -> Amazon Athena
B.
Digitized files -> Amazon Kinesis Data Firehose -> Amazon S3 -> Amazon Athena
Answers
C.
Digitized files -> Amazon Kinesis Data Streams -> Kinesis Client Library consumer -> Amazon S3 -> Athena
C.
Digitized files -> Amazon Kinesis Data Streams -> Kinesis Client Library consumer -> Amazon S3 -> Athena
Answers
D.
Digitized files -> Amazon Kinesis Data Firehose -> Amazon Elasticsearch
D.
Digitized files -> Amazon Kinesis Data Firehose -> Amazon Elasticsearch
Answers
Suggested answer: A

Explanation:

(Amazon Kinesis Data Analytics is the easiest way to analyze streaming data, also provide encryption at rest and in-transit) -https://docs.aws.amazon.com/kinesisanalytics/latest/dev/dataprotection. html

The Security Engineer created a new AWS Key Management Service (AWS KMS) key with the following key policy:

What are the effects of the key policy? (Choose two.)

A.
The policy allows access for the AWS account 111122223333 to manage key access though IAM policies.
A.
The policy allows access for the AWS account 111122223333 to manage key access though IAM policies.
Answers
B.
The policy allows all IAM users in account 111122223333 to have full access to the KMS key.
B.
The policy allows all IAM users in account 111122223333 to have full access to the KMS key.
Answers
C.
The policy allows the root user in account 111122223333 to have full access to the KMS key.
C.
The policy allows the root user in account 111122223333 to have full access to the KMS key.
Answers
D.
The policy allows the KMS service-linked role in account 111122223333 to have full access to the KMS key.
D.
The policy allows the KMS service-linked role in account 111122223333 to have full access to the KMS key.
Answers
E.
The policy allows all IAM roles in account 111122223333 to have full access to the KMS key.
E.
The policy allows all IAM roles in account 111122223333 to have full access to the KMS key.
Answers
Suggested answer: A, C

Explanation:

Giving the AWS account full access to the CMK does this; it enables you to use IAM policies to give IAM users and roles in the account access to the CMK. It does not by itself give any IAM users or roles access to the CMK, but it enables you to use IAM policies to do so.

https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-defaultallow-root-enable-iam

A company uses AWS Organization to manage 50 AWS accounts. The finance staff members log in as AWS IAM users in the FinanceDept AWS account. The staff members need to read the consolidated billing information in the MasterPayer AWS account. They should not be able to view any other resources in the MasterPayer AWS account. IAM access to billing has been enabled in the MasterPayer account. Which of the following approaches grants the finance staff the permissions they require without granting any unnecessary permissions?

A.
Create an IAM group for the finance users in the FinanceDept account, then attach the AWS managed ReadOnlyAccess IAM policy to the group.
A.
Create an IAM group for the finance users in the FinanceDept account, then attach the AWS managed ReadOnlyAccess IAM policy to the group.
Answers
B.
Create an IAM group for the finance users in the MasterPayer account, then attach the AWS managed ReadOnlyAccess IAM policy to the group.
B.
Create an IAM group for the finance users in the MasterPayer account, then attach the AWS managed ReadOnlyAccess IAM policy to the group.
Answers
C.
Create an AWS IAM role in the FinanceDept account with the ViewBilling permission, then grant the finance users in the MasterPayer account the permission to assume that role.
C.
Create an AWS IAM role in the FinanceDept account with the ViewBilling permission, then grant the finance users in the MasterPayer account the permission to assume that role.
Answers
D.
Create an AWS IAM role in the MasterPayer account with the ViewBilling permission, then grant the finance users in the FinanceDept account the permission to assume that role.
D.
Create an AWS IAM role in the MasterPayer account with the ViewBilling permission, then grant the finance users in the FinanceDept account the permission to assume that role.
Answers
Suggested answer: D

Explanation:

AWS Region that You Request a Certificate In (for AWS Certificate Manager) If you want to require

HTTPS between viewers and CloudFront, you must change the AWS region to US East (N. Virginia) inthe AWS Certificate Manager console before you request or import a certificate. If you want torequire HTTPS between CloudFront and your origin, and you're using an ELB load balancer as yourorigin, you can request or import a certificate in any region. https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/cnames-and-httpsrequirements.html

Which approach will generate automated security alerts should too many unauthorized AWS API requests be identified?

A.
Create an Amazon CloudWatch metric filter that looks for API call error codes and then implement an alarm based on that metric’s rate.
A.
Create an Amazon CloudWatch metric filter that looks for API call error codes and then implement an alarm based on that metric’s rate.
Answers
B.
Configure AWS CloudTrail to stream event data to Amazon Kinesis. Configure an AWS Lambda function on the stream to alarm when the threshold has been exceeded.
B.
Configure AWS CloudTrail to stream event data to Amazon Kinesis. Configure an AWS Lambda function on the stream to alarm when the threshold has been exceeded.
Answers
C.
Run an Amazon Athena SQL query against CloudTrail log files. Use Amazon QuickSight to create an operational dashboard.
C.
Run an Amazon Athena SQL query against CloudTrail log files. Use Amazon QuickSight to create an operational dashboard.
Answers
D.
Use the Amazon Personal Health Dashboard to monitor the account’s use of AWS services, and raise an alert if service error rates increase.
D.
Use the Amazon Personal Health Dashboard to monitor the account’s use of AWS services, and raise an alert if service error rates increase.
Answers
Suggested answer: A

Explanation:

https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-forcloudtrail.html#cloudwatch-alarms-for-cloudtrail-authorization-failuresOpen the CloudWatch console at https://console.aws.amazon.com/cloudwatch/. In the navigationpane, choose Logs. In the list of log groups, select the check box next to the log group that youcreated for CloudTrail log events. Choose Create Metric Filter. On the Define Logs Metric Filterscreen, choose Filter Pattern and then type the following: { ($.errorCode ="*UnauthorizedOperation") || ($.errorCode = "AccessDenied*") } Choose Assign Metric. For FilterName, type AuthorizationFailures. For Metric Namespace, type CloudTrailMetrics. For Metric Name,type AuthorizationFailureCount.

Amazon CloudWatch Logs agent is successfully delivering logs to the CloudWatch Logs service.

However, logs stop being delivered after the associated log stream has been active for a specific number of hours. What steps are necessary to identify the cause of this phenomenon? (Choose two.)

A.
Ensure that file permissions for monitored files that allow the CloudWatch Logs agent to read the file have not been modified.
A.
Ensure that file permissions for monitored files that allow the CloudWatch Logs agent to read the file have not been modified.
Answers
B.
Verify that the OS Log rotation rules are compatible with the configuration requirements for agent streaming.
B.
Verify that the OS Log rotation rules are compatible with the configuration requirements for agent streaming.
Answers
C.
Configure an Amazon Kinesis producer to first put the logs into Amazon Kinesis Streams.
C.
Configure an Amazon Kinesis producer to first put the logs into Amazon Kinesis Streams.
Answers
D.
Create a CloudWatch Logs metric to isolate a value that changes at least once during the period before logging stops.
D.
Create a CloudWatch Logs metric to isolate a value that changes at least once during the period before logging stops.
Answers
E.
Use AWS CloudFormation to dynamically create and maintain the configuration file for the CloudWatch Logs agent.
E.
Use AWS CloudFormation to dynamically create and maintain the configuration file for the CloudWatch Logs agent.
Answers
Suggested answer: A, B

Explanation:

https://acloud.guru/forums/aws-certified-security-specialty/discussion/-Lm5A3w6_NybQPhh6tRP/Cloudwatch%20Log%20question

A company has deployed a custom DNS server in AWS. The Security Engineer wants to ensure that Amazon EC2 instances cannot use the Amazon-provided DNS. How can the Security Engineer block access to the Amazon-provided DNS in the VPC?

A.
Deny access to the Amazon DNS IP within all security groups.
A.
Deny access to the Amazon DNS IP within all security groups.
Answers
B.
Add a rule to all network access control lists that deny access to the Amazon DNS IP.
B.
Add a rule to all network access control lists that deny access to the Amazon DNS IP.
Answers
C.
Add a route to all route tables that black holes traffic to the Amazon DNS IP.
C.
Add a route to all route tables that black holes traffic to the Amazon DNS IP.
Answers
D.
Disable DNS resolution within the VPC configuration.
D.
Disable DNS resolution within the VPC configuration.
Answers
Suggested answer: D

Explanation:

https://docs.aws.amazon.com/vpc/latest/userguide/vpc-dns.html

Total 590 questions
Go to page: of 59