ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











Due to new compliance requirements, a Security Engineer must enable encryption with customerprovided keys on corporate data that is stored in DynamoDB. The company wants to retain full control of the encryption keys. Which DynamoDB feature should the Engineer use to achieve compliance'?

A.
Use AWS Certificate Manager to request a certificate. Use that certificate to encrypt data prior to uploading it to DynamoDB.
A.
Use AWS Certificate Manager to request a certificate. Use that certificate to encrypt data prior to uploading it to DynamoDB.
Answers
B.
Enable S3 server-side encryption with the customer-provided keys. Upload the data to Amazon S3, and then use S3Copy to move all data to DynamoDB
B.
Enable S3 server-side encryption with the customer-provided keys. Upload the data to Amazon S3, and then use S3Copy to move all data to DynamoDB
Answers
C.
Create a KMS master key. Generate per-record data keys and use them to encrypt data prior to uploading it to DynamoDS. Dispose of the cleartext and encrypted data keys after encryption without storing.
C.
Create a KMS master key. Generate per-record data keys and use them to encrypt data prior to uploading it to DynamoDS. Dispose of the cleartext and encrypted data keys after encryption without storing.
Answers
D.
Use the DynamoDB Java encryption client to encrypt data prior to uploading it to DynamoDB.
D.
Use the DynamoDB Java encryption client to encrypt data prior to uploading it to DynamoDB.
Answers
Suggested answer: D

Explanation:

Follow the link: https://docs.aws.amazon.com/dynamodb-encryption-client/latest/devguide/whatis-ddb-encrypt.html

A Security Engineer must design a system that can detect whether a file on an Amazon EC2 host has been modified. The system must then alert the Security Engineer of the modification. What is the MOST efficient way to meet these requirements?

A.
Install antivirus software and ensure that signatures are up-to-date. Configure Amazon CloudWatch alarms to send alerts for security events.
A.
Install antivirus software and ensure that signatures are up-to-date. Configure Amazon CloudWatch alarms to send alerts for security events.
Answers
B.
Install host-based IDS software to check for file integrity. Export the logs to Amazon CloudWatch Logs for monitoring and alerting.
B.
Install host-based IDS software to check for file integrity. Export the logs to Amazon CloudWatch Logs for monitoring and alerting.
Answers
C.
Export system log files to Amazon S3. Parse the log files using an AWS Lambda function that will send alerts of any unauthorized system login attempts through Amazon SNS.
C.
Export system log files to Amazon S3. Parse the log files using an AWS Lambda function that will send alerts of any unauthorized system login attempts through Amazon SNS.
Answers
D.
Use Amazon CloudWatch Logs to detect file system changes. If a change is detected, automatically terminate and recreate the instance from the most recent AMI. Use Amazon SNS to send notification of the event.
D.
Use Amazon CloudWatch Logs to detect file system changes. If a change is detected, automatically terminate and recreate the instance from the most recent AMI. Use Amazon SNS to send notification of the event.
Answers
Suggested answer: B


A company has multiple VPCs in their account that are peered, as shown in the diagram. A Security Engineer wants to perform penetration tests of the Amazon EC2 instances in all three VPCs. How can this be accomplished? (Choose two.)

A.
Deploy a pre-authorized scanning engine from the AWS Marketplace into VPC B, and use it to scan instances in all three VPCs. Do not complete the penetration test request form.
A.
Deploy a pre-authorized scanning engine from the AWS Marketplace into VPC B, and use it to scan instances in all three VPCs. Do not complete the penetration test request form.
Answers
B.
Deploy a pre-authorized scanning engine from the Marketplace into each VPC, and scan instances in each VPC from the scanning engine in that VPC. Do not complete the penetration test request form.
B.
Deploy a pre-authorized scanning engine from the Marketplace into each VPC, and scan instances in each VPC from the scanning engine in that VPC. Do not complete the penetration test request form.
Answers
C.
Create a VPN connection from the data center to VPC A. Use an on-premises scanning engine to scan the instances in all three VPCs. Complete the penetration test request form for all three VPCs.
C.
Create a VPN connection from the data center to VPC A. Use an on-premises scanning engine to scan the instances in all three VPCs. Complete the penetration test request form for all three VPCs.
Answers
D.
Create a VPN connection from the data center to each of the three VPCs. Use an on-premises scanning engine to scan the instances in each VPC. Do not complete the penetration test request form.
D.
Create a VPN connection from the data center to each of the three VPCs. Use an on-premises scanning engine to scan the instances in each VPC. Do not complete the penetration test request form.
Answers
E.
Create a VPN connection from the data center to each of the three VPCs. Use an on-premises scanning engine to scan the instances in each VPC. Complete the penetration test request form for all three VPCs.
E.
Create a VPN connection from the data center to each of the three VPCs. Use an on-premises scanning engine to scan the instances in each VPC. Complete the penetration test request form for all three VPCs.
Answers
Suggested answer: B, D

Explanation:

https://aws.amazon.com/security/penetration-testing/

For compliance reasons, an organization limits the use of resources to three specific AWS regions. It wants to be alerted when any resources are launched in unapproved regions. Which of the following approaches will provide alerts on any resources launched in an unapproved region?

A.
Develop an alerting mechanism based on processing AWS CloudTrail logs.
A.
Develop an alerting mechanism based on processing AWS CloudTrail logs.
Answers
B.
Monitor Amazon S3 Event Notifications for objects stored in buckets in unapproved regions.
B.
Monitor Amazon S3 Event Notifications for objects stored in buckets in unapproved regions.
Answers
C.
Analyze Amazon CloudWatch Logs for activities in unapproved regions.
C.
Analyze Amazon CloudWatch Logs for activities in unapproved regions.
Answers
D.
Use AWS Trusted Advisor to alert on all resources being created.
D.
Use AWS Trusted Advisor to alert on all resources being created.
Answers
Suggested answer: A

Explanation:

https://stackoverflow.com/questions/45449053/cloudwatch-alert-on-any-instance-creation

A company runs an application on AWS that needs to be accessed only by employees. Most employees work from the office, but others work remotely or travel. How can the Security Engineer protect this workload so that only employees can access it?

A.
Add each employee’s home IP address to the security group for the application so that only those users can access the workload.
A.
Add each employee’s home IP address to the security group for the application so that only those users can access the workload.
Answers
B.
Create a virtual gateway for VPN connectivity for each employee, and restrict access to the workload from within the VPC.
B.
Create a virtual gateway for VPN connectivity for each employee, and restrict access to the workload from within the VPC.
Answers
C.
Use a VPN appliance from the AWS Marketplace for users to connect to, and restrict workload access to traffic from that appliance.
C.
Use a VPN appliance from the AWS Marketplace for users to connect to, and restrict workload access to traffic from that appliance.
Answers
D.
Route all traffic to the workload through AWS WAF. Add each employee’s home IP address into an AWS WAF rule, and block all other traffic.
D.
Route all traffic to the workload through AWS WAF. Add each employee’s home IP address into an AWS WAF rule, and block all other traffic.
Answers
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/what-is.html

A Systems Engineer is troubleshooting the connectivity of a test environment that includes a virtual security appliance deployed inline. In addition to using the virtual security appliance, the Development team wants to use security groups and network ACLs to accomplish various security requirements in the environment.

What configuration is necessary to allow the virtual security appliance to route the traffic?

A.
Disable network ACLs.
A.
Disable network ACLs.
Answers
B.
Configure the security appliance's elastic network interface for promiscuous mode.
B.
Configure the security appliance's elastic network interface for promiscuous mode.
Answers
C.
Disable the Network Source/Destination check on the security appliance's elastic network interface
C.
Disable the Network Source/Destination check on the security appliance's elastic network interface
Answers
D.
Place the security appliance in the public subnet with the internet gateway
D.
Place the security appliance in the public subnet with the internet gateway
Answers
Suggested answer: C

Explanation:

Each EC2 instance performs source/destination checks by default. This means that the instance must be the source or destination of any traffic it sends or receives. In this case virtual security appliance instance must be able to send and receive traffic when the source or destination is not itself.

Therefore, you must disable source/destination checks on the NAT instance."

A Security Architect is evaluating managed solutions for storage of encryption keys. The requirements are:

-Storage is accessible by using only VPCs.

-Service has tamper-evident controls.

-Access logging is enabled.

-Storage has high availability.

Which of the following services meets these requirements?

A.
Amazon S3 with default encryption
A.
Amazon S3 with default encryption
Answers
B.
AWS CloudHSM
B.
AWS CloudHSM
Answers
C.
Amazon DynamoDB with server-side encryption
C.
Amazon DynamoDB with server-side encryption
Answers
D.
AWS Systems Manager Parameter Store
D.
AWS Systems Manager Parameter Store
Answers
Suggested answer: B

An AWS account includes two S3 buckets: bucket1 and bucket2. The bucket2 does not have a policy defined, but bucket1 has the following bucket policy:

In addition, the same account has an IAM User named “alice”, with the following IAM policy.

Which buckets can user “alice” access?

A.
Bucket1 only
A.
Bucket1 only
Answers
B.
Bucket2 only
B.
Bucket2 only
Answers
C.
Both bucket1 and bucket2
C.
Both bucket1 and bucket2
Answers
D.
Neither bucket1 nor bucket2
D.
Neither bucket1 nor bucket2
Answers
Suggested answer: C

Explanation:

Both S3 policies and IAM policies can be used to grant access to buckets. IAM policies specify what actions are allowed or denied on what AWS resources (e.g. allow ec2:TerminateInstance on the EC2 instance with instance_id=i-8b3620ec). You attach IAM policies to IAM users, groups, or roles, which are then subject to the permissions you’ve defined. In other words, IAM policies define what a principal can do in your AWS environment. S3 bucket policies, on the other hand, are attached only to S3 buckets. S3 bucket policies specify what actions are allowed or denied for which principals on the bucket that the bucket policy is attached to (e.g. allow user Alice to PUT but not DELETE objects in the bucket). https:// aws.amazon.com/blogs/security/iam-policies-and-bucket-policies-and-aclsoh- my-controlling-access-to-s3-resources/

An organization has three applications running on AWS, each accessing the same data on Amazon S3.

The data on Amazon S3 is server-side encrypted by using an AWS KMS Customer Master Key (CMK).

What is the recommended method to ensure that each application has its own programmatic access control permissions on the KMS CMK?

A.
Change the key policy permissions associated with the KMS CMK for each application when it must access the data in Amazon S3.
A.
Change the key policy permissions associated with the KMS CMK for each application when it must access the data in Amazon S3.
Answers
B.
Have each application assume an IAM role that provides permissions to use the AWS Certificate Manager CMK.
B.
Have each application assume an IAM role that provides permissions to use the AWS Certificate Manager CMK.
Answers
C.
Have each application use a grant on the KMS CMK to add or remove specific access controls on the KMS CMK.
C.
Have each application use a grant on the KMS CMK to add or remove specific access controls on the KMS CMK.
Answers
D.
Have each application use an IAM policy in a user context to have specific access permissions on the KMS CMK.
D.
Have each application use an IAM policy in a user context to have specific access permissions on the KMS CMK.
Answers
Suggested answer: C

The Security Engineer is given the following requirements for an application that is running on Amazon EC2 and managed by using AWS CloudFormation templates with EC2 Auto Scaling groups:

-Have the EC2 instances bootstrapped to connect to a backend database.

-Ensure that the database credentials are handled securely.

-Ensure that retrievals of database credentials are logged.

Which of the following is the MOST efficient way to meet these requirements?

A.
Pass databases credentials to EC2 by using CloudFormation stack parameters with the property set to true. Ensure that the instance is configured to log to Amazon CloudWatch Logs.
A.
Pass databases credentials to EC2 by using CloudFormation stack parameters with the property set to true. Ensure that the instance is configured to log to Amazon CloudWatch Logs.
Answers
B.
Store database passwords in AWS Systems Manager Parameter Store by using SecureString parameters. Set the IAM role for the EC2 instance profile to allow access to the parameters.
B.
Store database passwords in AWS Systems Manager Parameter Store by using SecureString parameters. Set the IAM role for the EC2 instance profile to allow access to the parameters.
Answers
C.
Create an AWS Lambda that ingests the database password and persists it to Amazon S3 with server-side encryption. Have the EC2 instances retrieve the S3 object on startup, and log all script invocations to syslog.
C.
Create an AWS Lambda that ingests the database password and persists it to Amazon S3 with server-side encryption. Have the EC2 instances retrieve the S3 object on startup, and log all script invocations to syslog.
Answers
D.
Write a script that is passed in as UserData so that it is executed upon launch of the EC2 instance. Ensure that the instance is configured to log to Amazon CloudWatch Logs.
D.
Write a script that is passed in as UserData so that it is executed upon launch of the EC2 instance. Ensure that the instance is configured to log to Amazon CloudWatch Logs.
Answers
Suggested answer: B
Total 590 questions
Go to page: of 59