ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











A company stores data on an Amazon EBS volume attached to an Amazon EC2 instance. The data is asynchronously replicated to an Amazon S3 bucket. Both the EBS volume and the S3 bucket are encrypted with the same AWS KMS

Customer Master Key (CMK). A former employee scheduled a deletion of that CMK before leaving the company.

The company’s Developer Operations department learns about this only after the CMK has been deleted.

Which steps must be taken to address this situation?

A.
Copy the data directly from the EBS encrypted volume before the volume is detached from the EC2 instance.
A.
Copy the data directly from the EBS encrypted volume before the volume is detached from the EC2 instance.
Answers
B.
Recover the data from the EBS encrypted volume using an earlier version of the KMS backing key.
B.
Recover the data from the EBS encrypted volume using an earlier version of the KMS backing key.
Answers
C.
Make a request to AWS Support to recover the S3 encrypted data.
C.
Make a request to AWS Support to recover the S3 encrypted data.
Answers
D.
Make a request to AWS Support to restore the deleted CMK, and use it to recover the data.
D.
Make a request to AWS Support to restore the deleted CMK, and use it to recover the data.
Answers
Suggested answer: A

Explanation:

https://docs.aws.amazon.com/kms/latest/developerguide/deleting-keys.html#deleting-keys-how-itworks

An AWS Lambda function was misused to alter data, and a Security Engineer must identify who invoked the function and what output was produced. The Engineer cannot find any logs created by the Lambda function in Amazon CloudWatch Logs.

Which of the following explains why the logs are not available?

A.
The execution role for the Lambda function did not grant permissions to write log data to CloudWatch Logs.
A.
The execution role for the Lambda function did not grant permissions to write log data to CloudWatch Logs.
Answers
B.
The Lambda function was executed by using Amazon API Gateway, so the logs are not stored in CloudWatch Logs.
B.
The Lambda function was executed by using Amazon API Gateway, so the logs are not stored in CloudWatch Logs.
Answers
C.
The execution role for the Lambda function did not grant permissions to write to the Amazon S3 bucket where CloudWatch Logs stores the logs.
C.
The execution role for the Lambda function did not grant permissions to write to the Amazon S3 bucket where CloudWatch Logs stores the logs.
Answers
D.
The version of the Lambda function that was executed was not current.
D.
The version of the Lambda function that was executed was not current.
Answers
Suggested answer: A

A company has Windows Amazon EC2 instances in a VPC that are joined to on-premises Active Directory servers for domain services. The security team has enabled Amazon GuardDuty on the AWS account to alert on issues with the instances.

During a weekly audit of network traffic, the Security Engineer notices that one of the EC2 instances is attempting to communicate with a known command-and-control server but failing. This alert does not show up in GuardDuty. Why did GuardDuty fail to alert to this behavior?

A.
GuardDuty did not have the appropriate alerts activated.
A.
GuardDuty did not have the appropriate alerts activated.
Answers
B.
GuardDuty does not see these DNS requests.
B.
GuardDuty does not see these DNS requests.
Answers
C.
GuardDuty only monitors active network traffic flow for command-and-control activity.
C.
GuardDuty only monitors active network traffic flow for command-and-control activity.
Answers
D.
GuardDuty does not report on command-and-control activity.
D.
GuardDuty does not report on command-and-control activity.
Answers
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_data-sources.html

https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_backdoor.html

The AWS Systems Manager Parameter Store is being used to store database passwords used by an AWS Lambda function. Because this is sensitive data, the parameters are stored as type SecureString and protected by an AWS KMS key that allows access through IAM. When the function executes, this parameter cannot be retrieved as the result of an access denied error. Which of the following actions will resolve the access denied error?

A.
Update the ssm.amazonaws.com principal in the KMS key policy to allow kms: Decrypt.
A.
Update the ssm.amazonaws.com principal in the KMS key policy to allow kms: Decrypt.
Answers
B.
Update the Lambda configuration to launch the function in a VPC.
B.
Update the Lambda configuration to launch the function in a VPC.
Answers
C.
Add a policy to the role that the Lambda function uses, allowing kms: Decrypt for the KMS key.
C.
Add a policy to the role that the Lambda function uses, allowing kms: Decrypt for the KMS key.
Answers
D.
Add lambda.amazonaws.com as a trusted entity on the IAM role that the Lambda function uses.
D.
Add lambda.amazonaws.com as a trusted entity on the IAM role that the Lambda function uses.
Answers
Suggested answer: C

Explanation:

https://docs.amazonaws.cn/en_us/AmazonRDS/latest/AuroraUserGuide/AuroraMySQL.Integrating.Authorizing.IAM.KMSCreatePolicy.html

A company’s security policy requires that VPC Flow Logs are enabled on all VPCs. A Security Engineer is looking to automate the process of auditing the VPC resources for compliance. What combination of actions should the Engineer take? (Choose two.)

A.
Create an AWS Lambda function that determines whether Flow Logs are enabled for a given VPC.
A.
Create an AWS Lambda function that determines whether Flow Logs are enabled for a given VPC.
Answers
B.
Create an AWS Config configuration item for each VPC in the company AWS account.
B.
Create an AWS Config configuration item for each VPC in the company AWS account.
Answers
C.
Create an AWS Config managed rule with a resource type of AWS:: Lambda:: Function.
C.
Create an AWS Config managed rule with a resource type of AWS:: Lambda:: Function.
Answers
D.
Create an Amazon CloudWatch Event rule that triggers on events emitted by AWS Config.
D.
Create an Amazon CloudWatch Event rule that triggers on events emitted by AWS Config.
Answers
E.
Create an AWS Config custom rule, and associate it with an AWS Lambda function that contains the evaluating logic.
E.
Create an AWS Config custom rule, and associate it with an AWS Lambda function that contains the evaluating logic.
Answers
Suggested answer: A, E

Explanation:

https://medium.com/mudita-misra/how-to-audit-your-aws-resources-for-security-compliance-byusing-custom-aws-config-rules-2e53b09006de

An application makes calls to AWS services using the AWS SDK. The application runs on Amazon EC2 instances with an associated IAM role. When the application attempts to access an object within an Amazon S3 bucket; the Administrator receives the following error message: HTTP 403: Access Denied.

Which combination of steps should the Administrator take to troubleshoot this issue? (Select three.)

A.
Confirm that the EC2 instance's security group authorizes S3 access.
A.
Confirm that the EC2 instance's security group authorizes S3 access.
Answers
B.
Verify that the KMS key policy allows decrypt access for the KMS key for this IAM principle.
B.
Verify that the KMS key policy allows decrypt access for the KMS key for this IAM principle.
Answers
C.
Check the S3 bucket policy for statements that deny access to objects.
C.
Check the S3 bucket policy for statements that deny access to objects.
Answers
D.
Confirm that the EC2 instance is using the correct key pair.
D.
Confirm that the EC2 instance is using the correct key pair.
Answers
E.
Confirm that the IAM role associated with the EC2 instance has the proper privileges.
E.
Confirm that the IAM role associated with the EC2 instance has the proper privileges.
Answers
F.
Confirm that the instance and the S3 bucket are in the same Region.
F.
Confirm that the instance and the S3 bucket are in the same Region.
Answers
Suggested answer: B, C, E

A Security Engineer must implement mutually authenticated TLS connections between containers that communicate inside a VPC. Which solution would be MOST secure and easy to maintain?

A.
Use AWS Certificate Manager to generate certificates from a public certificate authority and deploy them to all the containers.
A.
Use AWS Certificate Manager to generate certificates from a public certificate authority and deploy them to all the containers.
Answers
B.
Create a self-signed certificate in one container and use AWS Secrets Manager to distribute the certificate to the other containers to establish trust.
B.
Create a self-signed certificate in one container and use AWS Secrets Manager to distribute the certificate to the other containers to establish trust.
Answers
C.
Use AWS Certificate Manager Private Certificate Authority (ACM PCA) to create a subordinate certificate authority, then create the private keys in the containers and sign them using the ACM PCA API.
C.
Use AWS Certificate Manager Private Certificate Authority (ACM PCA) to create a subordinate certificate authority, then create the private keys in the containers and sign them using the ACM PCA API.
Answers
D.
Use AWS Certificate Manager Private Certificate Authority (ACM PCA) to create a subordinate certificate authority, then use AWS Certificate Manager to generate the private certificates and deploy them to all the containers.
D.
Use AWS Certificate Manager Private Certificate Authority (ACM PCA) to create a subordinate certificate authority, then use AWS Certificate Manager to generate the private certificates and deploy them to all the containers.
Answers
Suggested answer: D

The Accounting department at Example Corp. has made a decision to hire a third-party firm, AnyCompany, to monitor Example Corp.'s AWS account to help optimize costs. The Security Engineer for Example Corp. has been tasked with providing AnyCompany with access to the required Example Corp. AWS resources. The Engineer has created an IAM role and granted permission to AnyCompany's AWS account to assume this role.

When customers contact AnyCompany, they provide their role ARN for validation. The Engineer is concerned that one of AnyCompany's other customers might deduce Example Corp.'s role ARN and potentially compromise the company's account.

What steps should the Engineer perform to prevent this outcome?

A.
Create an IAM user and generate a set of long-term credentials. Provide the credentials to AnyCompany. Monitor access in IAM access advisor and plan to rotate credentials on a recurring basis.
A.
Create an IAM user and generate a set of long-term credentials. Provide the credentials to AnyCompany. Monitor access in IAM access advisor and plan to rotate credentials on a recurring basis.
Answers
B.
Request an external ID from AnyCompany and add a condition with sts:Externald to the role's trust policy.
B.
Request an external ID from AnyCompany and add a condition with sts:Externald to the role's trust policy.
Answers
C.
Require two-factor authentication by adding a condition to the role's trust policy with aws:MultiFactorAuthPresent.
C.
Require two-factor authentication by adding a condition to the role's trust policy with aws:MultiFactorAuthPresent.
Answers
D.
Request an IP range from AnyCompany and add a condition with aws:SourceIp to the role's trust policy.
D.
Request an IP range from AnyCompany and add a condition with aws:SourceIp to the role's trust policy.
Answers
Suggested answer: B

A company maintains sensitive data in an Amazon S3 bucket that must be protected using an AWS KMS CMK. The company requires that keys be rotated automatically every year. How should the bucket be configured?

A.
Select server-side encryption with Amazon S3-managed keys (SSE-S3) and select an AWS-managed CMK.
A.
Select server-side encryption with Amazon S3-managed keys (SSE-S3) and select an AWS-managed CMK.
Answers
B.
Select Amazon S3-AWS KMS managed encryption keys (S3-KMS) and select a customer-managed CMK with key rotation enabled.
B.
Select Amazon S3-AWS KMS managed encryption keys (S3-KMS) and select a customer-managed CMK with key rotation enabled.
Answers
C.
Select server-side encryption with Amazon S3-managed keys (SSE-S3) and select a customermanaged CMK that has imported key material.
C.
Select server-side encryption with Amazon S3-managed keys (SSE-S3) and select a customermanaged CMK that has imported key material.
Answers
D.
Select server-side encryption with AWS KMS-managed keys (SSE-KMS) and select an alias to an AWS-managed CMK.
D.
Select server-side encryption with AWS KMS-managed keys (SSE-KMS) and select an alias to an AWS-managed CMK.
Answers
Suggested answer: B

An Amazon S3 bucket is encrypted using an AWS KMS CMK. An IAM user is unable to download objects from the S3 bucket using the AWS Management Console; however, other users can download objects from the S3 bucket. Which policies should the Security Engineer review and modify to resolve this issue? (Select three.)

A.
The CMK policy
A.
The CMK policy
Answers
B.
The VPC endpoint policy
B.
The VPC endpoint policy
Answers
C.
The S3 bucket policy
C.
The S3 bucket policy
Answers
D.
The S3 ACL
D.
The S3 ACL
Answers
E.
The IAM policy
E.
The IAM policy
Answers
Suggested answer: A, C, E

Explanation:

https://aws.amazon.com/premiumsupport/knowledge-center/decrypt-kms-encrypted-objects-s3/

Total 590 questions
Go to page: of 59