ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











While analyzing a company's security solution, a Security Engineer wants to secure the AWS account root user. What should the Security Engineer do to provide the highest level of security for the account?

A.
Create a new IAM user that has administrator permissions in the AWS account. Delete the password for the AWS account root user.
A.
Create a new IAM user that has administrator permissions in the AWS account. Delete the password for the AWS account root user.
Answers
B.
Create a new IAM user that has administrator permissions in the AWS account. Modify the permissions for the existing IAM users.
B.
Create a new IAM user that has administrator permissions in the AWS account. Modify the permissions for the existing IAM users.
Answers
C.
Replace the access key for the AWS account root user. Delete the password for the AWS account root user.
C.
Replace the access key for the AWS account root user. Delete the password for the AWS account root user.
Answers
D.
Create a new IAM user that has administrator permissions in the AWS account. Enable multifactor authentication for the AWS account root user.
D.
Create a new IAM user that has administrator permissions in the AWS account. Enable multifactor authentication for the AWS account root user.
Answers
Suggested answer: D

Explanation:

If you continue to use the root user credentials, we recommend that you follow the security best practice to enable multi-factor authentication (MFA) for your account. Because your root user can perform sensitive operations in your account, adding an additional layer of authentication helps you to better secure your account. Multiple types of MFA are available.

A Security Engineer is working with a Product team building a web application on AWS. The application uses Amazon S3 to host the static content, Amazon API Gateway to provide RESTful services; and Amazon DynamoDB as the backend data store. The users already exist in a directory that is exposed through a SAML identity provider.

Which combination of the following actions should the Engineer take to enable users to be authenticated into the web application and call APIs? (Choose three.)

A.
Create a custom authorization service using AWS Lambda.
A.
Create a custom authorization service using AWS Lambda.
Answers
B.
Configure a SAML identity provider in Amazon Cognito to map attributes to the Amazon Cognito user pool attributes.
B.
Configure a SAML identity provider in Amazon Cognito to map attributes to the Amazon Cognito user pool attributes.
Answers
C.
Configure the SAML identity provider to add the Amazon Cognito user pool as a relying party.
C.
Configure the SAML identity provider to add the Amazon Cognito user pool as a relying party.
Answers
D.
Configure an Amazon Cognito identity pool to integrate with social login providers.
D.
Configure an Amazon Cognito identity pool to integrate with social login providers.
Answers
E.
Update DynamoDB to store the user email addresses and passwords.
E.
Update DynamoDB to store the user email addresses and passwords.
Answers
F.
Update API Gateway to use a COGNITO_USER_POOLS authorizer.
F.
Update API Gateway to use a COGNITO_USER_POOLS authorizer.
Answers
Suggested answer: B, D, E

A Security Engineer is building a Java application that is running on Amazon EC2. The application communicates with an Amazon RDS instance and authenticates with a user name and password. Which combination of steps can the Engineer take to protect the credentials and minimize downtime when the credentials are rotated? (Choose two.)

A.
Have a Database Administrator encrypt the credentials and store the ciphertext in Amazon S3.Grant permission to the instance role associated with the EC2 instance to read the object and decrypt the ciphertext.
A.
Have a Database Administrator encrypt the credentials and store the ciphertext in Amazon S3.Grant permission to the instance role associated with the EC2 instance to read the object and decrypt the ciphertext.
Answers
B.
Configure a scheduled job that updates the credential in AWS Systems Manager Parameter Store and notifies the Engineer that the application needs to be restarted.
B.
Configure a scheduled job that updates the credential in AWS Systems Manager Parameter Store and notifies the Engineer that the application needs to be restarted.
Answers
C.
Configure automatic rotation of credentials in AWS Secrets Manager.
C.
Configure automatic rotation of credentials in AWS Secrets Manager.
Answers
D.
Store the credential in an encrypted string parameter in AWS Systems Manager Parameter Store.Grant permission to the instance role associated with the EC2 instance to access the parameter and the AWS KMS key that is used to encrypt it.
D.
Store the credential in an encrypted string parameter in AWS Systems Manager Parameter Store.Grant permission to the instance role associated with the EC2 instance to access the parameter and the AWS KMS key that is used to encrypt it.
Answers
E.
Configure the Java application to catch a connection failure and make a call to AWS Secrets Manager to retrieve updated credentials when the password is rotated. Grant permission to the instance role associated with the EC2 instance to access Secrets Manager.
E.
Configure the Java application to catch a connection failure and make a call to AWS Secrets Manager to retrieve updated credentials when the password is rotated. Grant permission to the instance role associated with the EC2 instance to access Secrets Manager.
Answers
Suggested answer: C, E

A company plans to migrate a sensitive dataset to Amazon S3. A Security Engineer must ensure that the data is encrypted at rest. The encryption solution must enable the company to generate its own keys without needing to manage key storage or the encryption process.

What should the Security Engineer use to accomplish this?

A.
Server-side encryption with Amazon S3-managed keys (SSE-S3)
A.
Server-side encryption with Amazon S3-managed keys (SSE-S3)
Answers
B.
Server-side encryption with AWS KMS-managed keys (SSE-KMS)
B.
Server-side encryption with AWS KMS-managed keys (SSE-KMS)
Answers
C.
Server-side encryption with customer-provided keys (SSE-C)
C.
Server-side encryption with customer-provided keys (SSE-C)
Answers
D.
Client-side encryption with an AWS KMS-managed CMK
D.
Client-side encryption with an AWS KMS-managed CMK
Answers
Suggested answer: B

Explanation:

Reference https://aws.amazon.com/s3/faqs/

A Security Engineer is defining the logging solution for a newly developed product. Systems Administrators and Developers need to have appropriate access to event log files in AWS CloudTrail to support and troubleshoot the product. Which combination of controls should be used to protect against tampering with and unauthorized access to log files? (Choose two.)

A.
Ensure that the log file integrity validation mechanism is enabled.
A.
Ensure that the log file integrity validation mechanism is enabled.
Answers
B.
Ensure that all log files are written to at least two separate Amazon S3 buckets in the same account.
B.
Ensure that all log files are written to at least two separate Amazon S3 buckets in the same account.
Answers
C.
Ensure that Systems Administrators and Developers can edit log files, but prevent any other access.
C.
Ensure that Systems Administrators and Developers can edit log files, but prevent any other access.
Answers
D.
Ensure that Systems Administrators and Developers with job-related need-to-know requirements only are capable of viewing—but not modifying—the log files.
D.
Ensure that Systems Administrators and Developers with job-related need-to-know requirements only are capable of viewing—but not modifying—the log files.
Answers
E.
Ensure that all log files are stored on Amazon EC2 instances that allow SSH access from the internal corporate network only.
E.
Ensure that all log files are stored on Amazon EC2 instances that allow SSH access from the internal corporate network only.
Answers
Suggested answer: A, D

A company has a few dozen application servers in private subnets behind an Elastic Load Balancer

(ELB) in an AWS Auto Scaling group. The application is accessed from the web over HTTPS. The datamust always be encrypted in transit. The Security Engineer is worried about potential key exposuredue to vulnerabilities in the application software.

Which approach will meet these requirements while protecting the external certificate during a breach?

A.
Use a Network Load Balancer (NLB) to pass through traffic on port 443 from the internet to port 443 on the instances.
A.
Use a Network Load Balancer (NLB) to pass through traffic on port 443 from the internet to port 443 on the instances.
Answers
B.
Purchase an external certificate, and upload it to the AWS Certificate Manager (for use with the ELB) and to the instances. Have the ELB decrypt traffic, and route and re-encrypt with the same certificate.
B.
Purchase an external certificate, and upload it to the AWS Certificate Manager (for use with the ELB) and to the instances. Have the ELB decrypt traffic, and route and re-encrypt with the same certificate.
Answers
C.
Generate an internal self-signed certificate and apply it to the instances. Use AWS Certificate Manager to generate a new external certificate for the ELB. Have the ELB decrypt traffic, and route and re-encrypt with the internal certificate.
C.
Generate an internal self-signed certificate and apply it to the instances. Use AWS Certificate Manager to generate a new external certificate for the ELB. Have the ELB decrypt traffic, and route and re-encrypt with the internal certificate.
Answers
D.
Upload a new external certificate to the load balancer. Have the ELB decrypt the traffic and forward it on port 80 to the instances.
D.
Upload a new external certificate to the load balancer. Have the ELB decrypt the traffic and forward it on port 80 to the instances.
Answers
Suggested answer: C

Which of the following are valid event sources that are associated with web access control lists that trigger AWS WAF rules? (Choose two.)

A.
Amazon S3 static web hosting
A.
Amazon S3 static web hosting
Answers
B.
Amazon CloudFront distribution
B.
Amazon CloudFront distribution
Answers
C.
Application Load Balancer
C.
Application Load Balancer
Answers
D.
Amazon Route 53
D.
Amazon Route 53
Answers
E.
VPC Flow Logs
E.
VPC Flow Logs
Answers
Suggested answer: B, C

Explanation:

A web access control list (web ACL) gives you fine-grained control over the web requests that your Amazon API Gateway API, Amazon CloudFront distribution or Application Load Balancer responds to.

A company uses identity federation to authenticate users into an identity account (987654321987) where the users assume an IAM role named IdentityRole. The users then assume an IAM role named JobFunctionRole in the target AWS account (123456789123) to perform their job functions.

A user is unable to assume the IAM role in the target account. The policy attached to the role in the identity account is:

What should be done to enable the user to assume the appropriate role in the target account?

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: A

A Security Engineer is working with the development team to design a supply chain application that stores sensitive inventory data in an Amazon S3 bucket. The application will use an AWS KMS customer master key (CMK) to encrypt the data on Amazon S3. The inventory data on Amazon S3 will be shared of vendors. All vendors will use AWS principals from their own AWS accounts to access the data on Amazon S3. The vendor list may change weekly, and the solution must support cross-account access.

What is the MOST efficient way to manage access control for the KMS CMK7?

A.
Use KMS grants to manage key access. Programmatically create and revoke grants to manage vendor access.
A.
Use KMS grants to manage key access. Programmatically create and revoke grants to manage vendor access.
Answers
B.
Use an IAM role to manage key access. Programmatically update the IAM role policies to manage vendor access.
B.
Use an IAM role to manage key access. Programmatically update the IAM role policies to manage vendor access.
Answers
C.
Use KMS key policies to manage key access. Programmatically update the KMS key policies to manage vendor access.
C.
Use KMS key policies to manage key access. Programmatically update the KMS key policies to manage vendor access.
Answers
D.
Use delegated access across AWS accounts by using IAM roles to manage key access.Programmatically update the IAM trust policy to manage cross-account vendor access.
D.
Use delegated access across AWS accounts by using IAM roles to manage key access.Programmatically update the IAM trust policy to manage cross-account vendor access.
Answers
Suggested answer: A

A corporate cloud security policy states that communications between the company's VPC and KMS must travel entirely within the AWS network and not use public service endpoints. Which combination of the following actions MOST satisfies this requirement? (Choose two.)

A.
Add the aws:sourceVpce condition to the AWS KMS key policy referencing the company's VPC endpoint ID.
A.
Add the aws:sourceVpce condition to the AWS KMS key policy referencing the company's VPC endpoint ID.
Answers
B.
Remove the VPC internet gateway from the VPC and add a virtual private gateway to the VPC to prevent direct, public internet connectivity.
B.
Remove the VPC internet gateway from the VPC and add a virtual private gateway to the VPC to prevent direct, public internet connectivity.
Answers
C.
Create a VPC endpoint for AWS KMS with private DNS enabled.
C.
Create a VPC endpoint for AWS KMS with private DNS enabled.
Answers
D.
Use the KMS Import Key feature to securely transfer the AWS KMS key over a VPN.
D.
Use the KMS Import Key feature to securely transfer the AWS KMS key over a VPN.
Answers
E.
Add the following condition to the AWS KMS key policy: "aws:SourceIp": "10.0.0.0/16".
E.
Add the following condition to the AWS KMS key policy: "aws:SourceIp": "10.0.0.0/16".
Answers
Suggested answer: A, C

Explanation:

An IAM policy can deny access to KMS except through your VPC endpoint with the following condition statement:

"Condition": {

"StringNotEquals": {

"aws:sourceVpce": "vpce-0295a3caf8414c94a"

}

}

I f you select the Enable Private DNS Name option, the standard AWS KMS DNS hostname

(Error! Hyperlink reference not valid.) resolves to your VPC endpoint.

Total 590 questions
Go to page: of 59