ExamGecko
Home / Amazon / SCS-C01 / List of questions
Ask Question

Amazon SCS-C01 Practice Test - Questions Answers, Page 17

List of questions

Question 161

Report
Export
Collapse

The Security Engineer for a mobile game has to implement a method to authenticate users so that they can save their progress. Because most of the users are part of the same OpenID-Connect compatible social media website, the Security Engineer would like to use that as the identity provider.

Which solution is the SIMPLEST way to allow the authentication of users using their social media identities?

Amazon Cognito
Amazon Cognito
AssumeRoleWithWebIdentity API
AssumeRoleWithWebIdentity API
Amazon Cloud Directory
Amazon Cloud Directory
Active Directory (AD) Connector
Active Directory (AD) Connector
Suggested answer: A
asked 16/09/2024
Jesserey Joseph
43 questions

Question 162

Report
Export
Collapse

A Software Engineer is trying to figure out why network connectivity to an Amazon EC2 instance does not appear to be working correctly. Its security group allows inbound HTTP traffic from 0.0.0.0/0, and the outbound rules have not been modified from the default. A custom network ACL associated with its subnet allows inbound HTTP traffic from 0.0.0.0/0 and has no outbound rules. What would resolve the connectivity issue?

The outbound rules on the security group do not allow the response to be sent to the client on the ephemeral port range.
The outbound rules on the security group do not allow the response to be sent to the client on the ephemeral port range.
The outbound rules on the security group do not allow the response to be sent to the client on the HTTP port.
The outbound rules on the security group do not allow the response to be sent to the client on the HTTP port.
An outbound rule must be added to the network ACL to allow the response to be sent to the client on the ephemeral port range.
An outbound rule must be added to the network ACL to allow the response to be sent to the client on the ephemeral port range.
An outbound rule must be added to the network ACL to allow the response to be sent to the client on the HTTP port.
An outbound rule must be added to the network ACL to allow the response to be sent to the client on the HTTP port.
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html

asked 16/09/2024
Ronald Stover
41 questions

Question 163

Report
Export
Collapse

A Security Engineer has been asked to create an automated process to disable IAM user access keys that are more than three months old. Which of the following options should the Security Engineer use?

In the AWS Console, choose the IAM service and select “Users”. Review the “Access Key Age” column.
In the AWS Console, choose the IAM service and select “Users”. Review the “Access Key Age” column.
Define an IAM policy that denies access if the key age is more than three months and apply to all users.
Define an IAM policy that denies access if the key age is more than three months and apply to all users.
Write a script that uses the GenerateCredentialReport, GetCredentialReport, and UpdateAccessKey APIs.
Write a script that uses the GenerateCredentialReport, GetCredentialReport, and UpdateAccessKey APIs.
Create an Amazon CloudWatch alarm to detect aged access keys and use an AWS Lambda function to disable the keys older than 90 days.
Create an Amazon CloudWatch alarm to detect aged access keys and use an AWS Lambda function to disable the keys older than 90 days.
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/IAM/latest/APIReference/API_UpdateAccessKey.html

https://docs.aws.amazon.com/IAM/latest/APIReference/API_GenerateCredentialReport.html

https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetCredentialReport.html

asked 16/09/2024
Jonaid Alam
36 questions

Question 164

Report
Export
Collapse

The InfoSec team has mandated that in the future only approved Amazon Machine Images (AMIs) can be used. How can the InfoSec team ensure compliance with this mandate?

Terminate all Amazon EC2 instances and relaunch them with approved AMIs.
Terminate all Amazon EC2 instances and relaunch them with approved AMIs.
Patch all running instances by using AWS Systems Manager.
Patch all running instances by using AWS Systems Manager.
Deploy AWS Config rules and check all running instances for compliance.
Deploy AWS Config rules and check all running instances for compliance.
Define a metric filter in Amazon CloudWatch Logs to verify compliance.
Define a metric filter in Amazon CloudWatch Logs to verify compliance.
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/config/latest/developerguide/approved-amis-by-id.html

asked 16/09/2024
Piroon Dechates
24 questions

Question 165

Report
Export
Collapse

A pharmaceutical company has digitized versions of historical prescriptions stored on premises. The company would like to move these prescriptions to AWS and perform analytics on the data in them. Any operation with this data requires that the data be encrypted in transit and at rest.

Which application flow would meet the data protection requirements on AWS?

Digitized files -> Amazon Kinesis Data Analytics
Digitized files -> Amazon Kinesis Data Analytics
Digitized files -> Amazon Kinesis Data Firehose -> Amazon S3 -> Amazon Athena
Digitized files -> Amazon Kinesis Data Firehose -> Amazon S3 -> Amazon Athena
Digitized files -> Amazon Kinesis Data Streams -> Kinesis Client Library consumer -> Amazon S3 -> Athena
Digitized files -> Amazon Kinesis Data Streams -> Kinesis Client Library consumer -> Amazon S3 -> Athena
Digitized files -> Amazon Kinesis Data Firehose -> Amazon Elasticsearch
Digitized files -> Amazon Kinesis Data Firehose -> Amazon Elasticsearch
Suggested answer: A

Explanation:

(Amazon Kinesis Data Analytics is the easiest way to analyze streaming data, also provide encryption at rest and in-transit) -https://docs.aws.amazon.com/kinesisanalytics/latest/dev/dataprotection. html

asked 16/09/2024
JP Pelovello
48 questions

Question 166

Report
Export
Collapse

The Security Engineer created a new AWS Key Management Service (AWS KMS) key with the following key policy:

Amazon SCS-C01 image Question 166 7284 09162024005923000000

What are the effects of the key policy? (Choose two.)

The policy allows access for the AWS account 111122223333 to manage key access though IAM policies.
The policy allows access for the AWS account 111122223333 to manage key access though IAM policies.
The policy allows all IAM users in account 111122223333 to have full access to the KMS key.
The policy allows all IAM users in account 111122223333 to have full access to the KMS key.
The policy allows the root user in account 111122223333 to have full access to the KMS key.
The policy allows the root user in account 111122223333 to have full access to the KMS key.
The policy allows the KMS service-linked role in account 111122223333 to have full access to the KMS key.
The policy allows the KMS service-linked role in account 111122223333 to have full access to the KMS key.
The policy allows all IAM roles in account 111122223333 to have full access to the KMS key.
The policy allows all IAM roles in account 111122223333 to have full access to the KMS key.
Suggested answer: A, C

Explanation:

Giving the AWS account full access to the CMK does this; it enables you to use IAM policies to give IAM users and roles in the account access to the CMK. It does not by itself give any IAM users or roles access to the CMK, but it enables you to use IAM policies to do so.

https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-defaultallow-root-enable-iam

asked 16/09/2024
Edgar Santiago
47 questions

Question 167

Report
Export
Collapse

A company uses AWS Organization to manage 50 AWS accounts. The finance staff members log in as AWS IAM users in the FinanceDept AWS account. The staff members need to read the consolidated billing information in the MasterPayer AWS account. They should not be able to view any other resources in the MasterPayer AWS account. IAM access to billing has been enabled in the MasterPayer account. Which of the following approaches grants the finance staff the permissions they require without granting any unnecessary permissions?

Create an IAM group for the finance users in the FinanceDept account, then attach the AWS managed ReadOnlyAccess IAM policy to the group.
Create an IAM group for the finance users in the FinanceDept account, then attach the AWS managed ReadOnlyAccess IAM policy to the group.
Create an IAM group for the finance users in the MasterPayer account, then attach the AWS managed ReadOnlyAccess IAM policy to the group.
Create an IAM group for the finance users in the MasterPayer account, then attach the AWS managed ReadOnlyAccess IAM policy to the group.
Create an AWS IAM role in the FinanceDept account with the ViewBilling permission, then grant the finance users in the MasterPayer account the permission to assume that role.
Create an AWS IAM role in the FinanceDept account with the ViewBilling permission, then grant the finance users in the MasterPayer account the permission to assume that role.
Create an AWS IAM role in the MasterPayer account with the ViewBilling permission, then grant the finance users in the FinanceDept account the permission to assume that role.
Create an AWS IAM role in the MasterPayer account with the ViewBilling permission, then grant the finance users in the FinanceDept account the permission to assume that role.
Suggested answer: D

Explanation:

AWS Region that You Request a Certificate In (for AWS Certificate Manager) If you want to require

HTTPS between viewers and CloudFront, you must change the AWS region to US East (N. Virginia) inthe AWS Certificate Manager console before you request or import a certificate. If you want torequire HTTPS between CloudFront and your origin, and you're using an ELB load balancer as yourorigin, you can request or import a certificate in any region. https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/cnames-and-httpsrequirements.html

asked 16/09/2024
Miguel Sartori
35 questions

Question 168

Report
Export
Collapse

Which approach will generate automated security alerts should too many unauthorized AWS API requests be identified?

Create an Amazon CloudWatch metric filter that looks for API call error codes and then implement an alarm based on that metric’s rate.
Create an Amazon CloudWatch metric filter that looks for API call error codes and then implement an alarm based on that metric’s rate.
Configure AWS CloudTrail to stream event data to Amazon Kinesis. Configure an AWS Lambda function on the stream to alarm when the threshold has been exceeded.
Configure AWS CloudTrail to stream event data to Amazon Kinesis. Configure an AWS Lambda function on the stream to alarm when the threshold has been exceeded.
Run an Amazon Athena SQL query against CloudTrail log files. Use Amazon QuickSight to create an operational dashboard.
Run an Amazon Athena SQL query against CloudTrail log files. Use Amazon QuickSight to create an operational dashboard.
Use the Amazon Personal Health Dashboard to monitor the account’s use of AWS services, and raise an alert if service error rates increase.
Use the Amazon Personal Health Dashboard to monitor the account’s use of AWS services, and raise an alert if service error rates increase.
Suggested answer: A

Explanation:

https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-forcloudtrail.html#cloudwatch-alarms-for-cloudtrail-authorization-failuresOpen the CloudWatch console at https://console.aws.amazon.com/cloudwatch/. In the navigationpane, choose Logs. In the list of log groups, select the check box next to the log group that youcreated for CloudTrail log events. Choose Create Metric Filter. On the Define Logs Metric Filterscreen, choose Filter Pattern and then type the following: { ($.errorCode ="*UnauthorizedOperation") || ($.errorCode = "AccessDenied*") } Choose Assign Metric. For FilterName, type AuthorizationFailures. For Metric Namespace, type CloudTrailMetrics. For Metric Name,type AuthorizationFailureCount.

asked 16/09/2024
Casey Donovan
40 questions

Question 169

Report
Export
Collapse

Amazon CloudWatch Logs agent is successfully delivering logs to the CloudWatch Logs service.

However, logs stop being delivered after the associated log stream has been active for a specific number of hours. What steps are necessary to identify the cause of this phenomenon? (Choose two.)

Ensure that file permissions for monitored files that allow the CloudWatch Logs agent to read the file have not been modified.
Ensure that file permissions for monitored files that allow the CloudWatch Logs agent to read the file have not been modified.
Verify that the OS Log rotation rules are compatible with the configuration requirements for agent streaming.
Verify that the OS Log rotation rules are compatible with the configuration requirements for agent streaming.
Configure an Amazon Kinesis producer to first put the logs into Amazon Kinesis Streams.
Configure an Amazon Kinesis producer to first put the logs into Amazon Kinesis Streams.
Create a CloudWatch Logs metric to isolate a value that changes at least once during the period before logging stops.
Create a CloudWatch Logs metric to isolate a value that changes at least once during the period before logging stops.
Use AWS CloudFormation to dynamically create and maintain the configuration file for the CloudWatch Logs agent.
Use AWS CloudFormation to dynamically create and maintain the configuration file for the CloudWatch Logs agent.
Suggested answer: A, B

Explanation:

https://acloud.guru/forums/aws-certified-security-specialty/discussion/-Lm5A3w6_NybQPhh6tRP/Cloudwatch%20Log%20question

asked 16/09/2024
eddie alvarez
42 questions

Question 170

Report
Export
Collapse

A company has deployed a custom DNS server in AWS. The Security Engineer wants to ensure that Amazon EC2 instances cannot use the Amazon-provided DNS. How can the Security Engineer block access to the Amazon-provided DNS in the VPC?

Deny access to the Amazon DNS IP within all security groups.
Deny access to the Amazon DNS IP within all security groups.
Add a rule to all network access control lists that deny access to the Amazon DNS IP.
Add a rule to all network access control lists that deny access to the Amazon DNS IP.
Add a route to all route tables that black holes traffic to the Amazon DNS IP.
Add a route to all route tables that black holes traffic to the Amazon DNS IP.
Disable DNS resolution within the VPC configuration.
Disable DNS resolution within the VPC configuration.
Suggested answer: D

Explanation:

https://docs.aws.amazon.com/vpc/latest/userguide/vpc-dns.html

asked 16/09/2024
Rehan Malik
51 questions
Total 590 questions
Go to page: of 59
Search

Related questions