ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











A company has decided to use encryption in its AWS account to secure the objects in Amazon S3 using server-side encryption. Object sizes range from 16.000 B to 5 MB. The requirements are as follows:

• The key material must be generated and stored in a certified Federal Information Processing Standard (FIPS) 140-2 Level 3 machine. • The key material must be available in multiple Regions.

Which option meets these requirements?

A.
Use an AWS KMS customer managed key and store the key material in AWS with replication across Regions
A.
Use an AWS KMS customer managed key and store the key material in AWS with replication across Regions
Answers
B.
Use an AWS customer managed key, import the key material into AWS KMS using in-house AWS CloudHSM. and store the key material securely in Amazon S3.
B.
Use an AWS customer managed key, import the key material into AWS KMS using in-house AWS CloudHSM. and store the key material securely in Amazon S3.
Answers
C.
Use an AWS KMS custom key store backed by AWS CloudHSM clusters, and copy backups across Regions
C.
Use an AWS KMS custom key store backed by AWS CloudHSM clusters, and copy backups across Regions
Answers
D.
Use AWS CloudHSM to generate the key material and backup keys across Regions Use the Java Cryptography Extension (JCE) and Public Key Cryptography Standards #11 (PKCS #11) encryption libraries to encrypt and decrypt the data.
D.
Use AWS CloudHSM to generate the key material and backup keys across Regions Use the Java Cryptography Extension (JCE) and Public Key Cryptography Standards #11 (PKCS #11) encryption libraries to encrypt and decrypt the data.
Answers
Suggested answer: D

A company hosts a web-based application that captures and stores sensitive data in an Amazon DynamoDB table. A security audit reveals that the application does not provide end-to-end data protection or the ability to detect unauthorized data changes The software engineering team needs to make changes that will address the audit findings. Which set of steps should the software engineering team take?

A.
Use an AWS Key Management Service (AWS KMS) CMK. Encrypt the data at rest.
A.
Use an AWS Key Management Service (AWS KMS) CMK. Encrypt the data at rest.
Answers
B.
Use AWS Certificate Manager (ACM) Private Certificate Authority Encrypt the data in transit.
B.
Use AWS Certificate Manager (ACM) Private Certificate Authority Encrypt the data in transit.
Answers
C.
Use a DynamoDB encryption client. Use client-side encryption and sign the table items
C.
Use a DynamoDB encryption client. Use client-side encryption and sign the table items
Answers
D.
Use the AWS Encryption SDK. Use client-side encryption and sign the table items.
D.
Use the AWS Encryption SDK. Use client-side encryption and sign the table items.
Answers
Suggested answer: A

A security engineer has been tasked with implementing a solution that allows the company's development team to have interactive command line access to Amazon EC2 Linux instances using the AWS Management Console. Which steps should the security engineer take to satisfy this requirement while maintaining least privilege?

A.
Enable AWS Systems Manager in the AWS Management Console and configure for access to EC2 instances using the default AmazonEC2RoleforSSM role. Install the Systems Manager Agent on all EC2 Linux instances that need interactive access. Configure IAM user policies to allow development team access to the Systems Manager Session Manager and attach to the team's IAM users.
A.
Enable AWS Systems Manager in the AWS Management Console and configure for access to EC2 instances using the default AmazonEC2RoleforSSM role. Install the Systems Manager Agent on all EC2 Linux instances that need interactive access. Configure IAM user policies to allow development team access to the Systems Manager Session Manager and attach to the team's IAM users.
Answers
B.
Enable console SSH access in the EC2 console. Configure IAM user policies to allow development team access to the AWS Systems Manager Session Manager and attach to the development team's IAM users.
B.
Enable console SSH access in the EC2 console. Configure IAM user policies to allow development team access to the AWS Systems Manager Session Manager and attach to the development team's IAM users.
Answers
C.
Enable AWS Systems Manager in the AWS Management Console and configure to access EC2 instances using the default AmazonEC2RoleforSSM role. Install the Systems Manager Agent on all EC2 Linux instances that need interactive access. Configure a security group that allows SSH port 22 from all published IP addresses. Configure IAM user policies to allow development team access to the AWS Systems Manager Session Manager and attach to the team's IAM users.
C.
Enable AWS Systems Manager in the AWS Management Console and configure to access EC2 instances using the default AmazonEC2RoleforSSM role. Install the Systems Manager Agent on all EC2 Linux instances that need interactive access. Configure a security group that allows SSH port 22 from all published IP addresses. Configure IAM user policies to allow development team access to the AWS Systems Manager Session Manager and attach to the team's IAM users.
Answers
D.
Enable AWS Systems Manager in the AWS Management Console and configure to access EC2 instances using the default AmazonEC2RoleforSSM role Install the Systems Manager Agent on all EC2 Linux instances that need interactive access. Configure IAM policies to allow development team access to the EC2 console and attach to the teams IAM users.
D.
Enable AWS Systems Manager in the AWS Management Console and configure to access EC2 instances using the default AmazonEC2RoleforSSM role Install the Systems Manager Agent on all EC2 Linux instances that need interactive access. Configure IAM policies to allow development team access to the EC2 console and attach to the teams IAM users.
Answers
Suggested answer: A

A company's security team has defined a set of AWS Config rules that must be enforced globally in all AWS accounts the company owns. What should be done to provide a consolidated compliance overview for the security team?

A.
Use AWS Organizations to limit AWS Config rules to the appropriate Regions, and then consolidate the Amazon CloudWatch dashboard into one AWS account.
A.
Use AWS Organizations to limit AWS Config rules to the appropriate Regions, and then consolidate the Amazon CloudWatch dashboard into one AWS account.
Answers
B.
Use AWS Config aggregation to consolidate the views into one AWS account, and provide role access to the security team.
B.
Use AWS Config aggregation to consolidate the views into one AWS account, and provide role access to the security team.
Answers
C.
Consolidate AWS Config rule results with an AWS Lambda function and push data to Amazon SQS.Use Amazon SNS to consolidate and alert when some metrics are triggered.
C.
Consolidate AWS Config rule results with an AWS Lambda function and push data to Amazon SQS.Use Amazon SNS to consolidate and alert when some metrics are triggered.
Answers
D.
Use Amazon GuardDuty to load data results from the AWS Config rules compliance status, aggregate GuardDuty findings of all AWS accounts into one AWS account, and provide role access to the security team.
D.
Use Amazon GuardDuty to load data results from the AWS Config rules compliance status, aggregate GuardDuty findings of all AWS accounts into one AWS account, and provide role access to the security team.
Answers
Suggested answer: B

An application is currently secured using network access control lists and security groups. Web servers are located in public subnets behind an Application Load Balancer (ALB); application servers are located in private subnets. How can edge security be enhanced to safeguard the Amazon EC2 instances against attack? (Choose two.)

A.
Configure the application’s EC2 instances to use NAT gateways for all inbound traffic.
A.
Configure the application’s EC2 instances to use NAT gateways for all inbound traffic.
Answers
B.
Move the web servers to private subnets without public IP addresses.
B.
Move the web servers to private subnets without public IP addresses.
Answers
C.
Configure AWS WAF to provide DDoS attack protection for the ALB.
C.
Configure AWS WAF to provide DDoS attack protection for the ALB.
Answers
D.
Require all inbound network traffic to route through a bastion host in the private subnet.
D.
Require all inbound network traffic to route through a bastion host in the private subnet.
Answers
E.
Require all inbound and outbound network traffic to route through an AWS Direct Connect connection.
E.
Require all inbound and outbound network traffic to route through an AWS Direct Connect connection.
Answers
Suggested answer: B, C

A company has a website with an Amazon CloudFront HTTPS distribution, an Application LoadBalancer (ALB) with multiple web instances for dynamic website content, and an Amazon S3 bucketfor static website content. The company's security engineer recently updated the website securityrequirements:

• HTTPS needs to be enforced for all data in transit with specific ciphers.

• The CloudFront distribution needs to be accessible from the internet only.

Which solution will meet these requirements?

A company Is trying to replace its on-premises bastion hosts used to access on-premises Linux servers with AWS Systems Manager Session Manager. A security engineer has installed the Systems Manager Agent on all servers. The security engineer verifies that the agent is running on all the servers, but Session Manager cannot connect to them. The security engineer needs to perform verification steps before Session Manager will work on the servers. Which combination of steps should the security engineer perform? (Select THREE.)

A.
Open inbound port 22 to 0 0.0.0/0 on all Linux servers.
A.
Open inbound port 22 to 0 0.0.0/0 on all Linux servers.
Answers
B.
Enable the advanced-instances tier in Systems Manager.
B.
Enable the advanced-instances tier in Systems Manager.
Answers
C.
Create a managed-instance activation for the on-premises servers.
C.
Create a managed-instance activation for the on-premises servers.
Answers
D.
Reconfigure the Systems Manager Agent with the activation code and ID.
D.
Reconfigure the Systems Manager Agent with the activation code and ID.
Answers
E.
Assign an IAM role to all of the on-premises servers.
E.
Assign an IAM role to all of the on-premises servers.
Answers
F.
Initiate an inventory collection with Systems Manager on the on-premises servers
F.
Initiate an inventory collection with Systems Manager on the on-premises servers
Answers
Suggested answer: C, E, F

A Security Engineer is looking for a way to control access to data that is being encrypted under a CMK. The Engineer is also looking to use additional authenticated data (AAD) to prevent tampering with ciphertext. Which action would provide the required functionality?

A.
Pass the key alias to AWS KMS when calling Encrypt and Decrypt API actions.
A.
Pass the key alias to AWS KMS when calling Encrypt and Decrypt API actions.
Answers
B.
Use IAM policies to restrict access to Encrypt and Decrypt API actions.
B.
Use IAM policies to restrict access to Encrypt and Decrypt API actions.
Answers
C.
Use kms:EncryptionContext as a condition when defining IAM policies for the CMK.
C.
Use kms:EncryptionContext as a condition when defining IAM policies for the CMK.
Answers
D.
Use key policies to restrict access to the appropriate IAM groups.
D.
Use key policies to restrict access to the appropriate IAM groups.
Answers
Suggested answer: C

Explanation:

https://aws.amazon.com/blogs/security/how-to-protect-the-integrity-of-your-encrypted-data-byusing-aws-key-management-service-and-encryptioncontext/One of the most important and critical concepts in AWS Key Management Service (KMS) foradvanced and secure data usage is EncryptionContext. Using EncryptionContext properly can helpsignificantly improve the security of your applications. EncryptionContext is a key-value map (bothstrings) that is provided to KMS with each encryption and decryption request. EncryptionContextprovides three benefits: Additional authenticated data (AAD), Audit trail, Authorization context

A Security Engineer has launched multiple Amazon EC2 instances from a private AMI using an AWS CloudFormation template. The Engineer notices instances terminating right after they are launched. What could be causing these terminations?

A.
The IAM user launching those instances is missing ec2:Runinstances permission.
A.
The IAM user launching those instances is missing ec2:Runinstances permission.
Answers
B.
The AMI used as encrypted and the IAM does not have the required AWS KMS permissions.
B.
The AMI used as encrypted and the IAM does not have the required AWS KMS permissions.
Answers
C.
The instance profile used with the EC2 instances in unable to query instance metadata.
C.
The instance profile used with the EC2 instances in unable to query instance metadata.
Answers
D.
AWS currently does not have sufficient capacity in the Region.
D.
AWS currently does not have sufficient capacity in the Region.
Answers
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/troubleshooting-launch.html

A company plans to use custom AMIs to launch Amazon EC2 instances across multiple AWS accounts in a single Region to perform security monitoring and analytics tasks. The EC2 instances are launched in EC2 Auto Scaling groups. To increase the security of the solution, a Security Engineer will manage the lifecycle of the custom AMIs in a centralized account and will encrypt them with a centrally managed AWS KMS CMK. The Security Engineer configured the KMS key policy to allow crossaccount access. However, the EC2 instances are still not being properly launched by the EC2 Auto Scaling groups. Which combination of configuration steps should the Security Engineer take to ensure the EC2 Auto Scaling groups have been granted the proper permissions to execute tasks?

A.
Create a customer-managed CMK in the centralized account. Allow other applicable accounts to use that key for cryptographical operations by applying proper cross-account permissions in the key policy. Create an IAM role in all applicable accounts and configure its access policy to allow the use of the centrally managed CMK for cryptographical operations. Configure EC2 Auto Scaling groups within each applicable account to use the created IAM role to launch EC2 instances.
A.
Create a customer-managed CMK in the centralized account. Allow other applicable accounts to use that key for cryptographical operations by applying proper cross-account permissions in the key policy. Create an IAM role in all applicable accounts and configure its access policy to allow the use of the centrally managed CMK for cryptographical operations. Configure EC2 Auto Scaling groups within each applicable account to use the created IAM role to launch EC2 instances.
Answers
B.
Create a customer-managed CMK in the centralized account. Allow other applicable accounts to use that key for cryptographical operations by applying proper cross-account permissions in the key policy. Create an IAM role in all applicable accounts and configure its access policy with permissions to create grants for the centrally managed CMK. Use this IAM role to create a grant for the centrally managed CMK with permissions to perform cryptographical operations and with the EC2 Auto Scaling service-linked role defined as the grantee principal.
B.
Create a customer-managed CMK in the centralized account. Allow other applicable accounts to use that key for cryptographical operations by applying proper cross-account permissions in the key policy. Create an IAM role in all applicable accounts and configure its access policy with permissions to create grants for the centrally managed CMK. Use this IAM role to create a grant for the centrally managed CMK with permissions to perform cryptographical operations and with the EC2 Auto Scaling service-linked role defined as the grantee principal.
Answers
C.
Create a customer-managed CMK or an AWS managed CMK in the centralized account. Allow other applicable accounts to use that key for cryptographical operations by applying proper crossaccount permissions in the key policy. Use the CMK administrator to create a CMK grant that includes permissions to perform cryptographical operations that define EC2 Auto Scaling service-linked roles from all other accounts as the grantee principal.
C.
Create a customer-managed CMK or an AWS managed CMK in the centralized account. Allow other applicable accounts to use that key for cryptographical operations by applying proper crossaccount permissions in the key policy. Use the CMK administrator to create a CMK grant that includes permissions to perform cryptographical operations that define EC2 Auto Scaling service-linked roles from all other accounts as the grantee principal.
Answers
D.
Create a customer-managed CMK or an AWS managed CMK in the centralized account. Allow other applicable accounts to use that key for cryptographical operations by applying proper crossaccount permissions in the key policy. Modify the access policy for the EC2 Auto Scaling roles to perform cryptographical operations against the centrally managed CMK.
D.
Create a customer-managed CMK or an AWS managed CMK in the centralized account. Allow other applicable accounts to use that key for cryptographical operations by applying proper crossaccount permissions in the key policy. Modify the access policy for the EC2 Auto Scaling roles to perform cryptographical operations against the centrally managed CMK.
Answers
Suggested answer: B

A company has multiple production AWS accounts. Each account has AWS CloudTrail configured to log to a single Amazon S3 bucket in a central account. Two of the production accounts have trails that are not logging anything to the S3 bucket.

Which steps should be taken to troubleshoot the issue? (Choose three.)

A.
Verify that the log file prefix is set to the name of the S3 bucket where the logs should go.
A.
Verify that the log file prefix is set to the name of the S3 bucket where the logs should go.
Answers
B.
Verify that the S3 bucket policy allows access for CloudTrail from the production AWS account IDs.
B.
Verify that the S3 bucket policy allows access for CloudTrail from the production AWS account IDs.
Answers
C.
Create a new CloudTrail configuration in the account, and configure it to log to the account’s S3 bucket.
C.
Create a new CloudTrail configuration in the account, and configure it to log to the account’s S3 bucket.
Answers
D.
Confirm in the CloudTrail Console that each trail is active and healthy.
D.
Confirm in the CloudTrail Console that each trail is active and healthy.
Answers
E.
Open the global CloudTrail configuration in the master account, and verify that the storage location is set to the correct S3 bucket.
E.
Open the global CloudTrail configuration in the master account, and verify that the storage location is set to the correct S3 bucket.
Answers
F.
Confirm in the CloudTrail Console that the S3 bucket name is set correctly.
F.
Confirm in the CloudTrail Console that the S3 bucket name is set correctly.
Answers
Suggested answer: B, D, F
Total 590 questions
Go to page: of 59