ExamGecko
Home / Amazon / SCS-C01 / List of questions
Ask Question

Amazon SCS-C01 Practice Test - Questions Answers, Page 24

Add to Whishlist

List of questions

Question 231

Report Export Collapse

A company uses user data scripts that contain sensitive information to bootstrap Amazon EC2 instances. A Security Engineer discovers that this sensitive information is viewable by people who should not have access to it. What is the MOST secure way to protect the sensitive information used to bootstrap the instances?

Become a Premium Member for full access
  Unlock Premium Member

Question 232

Report Export Collapse

An Amazon EC2 instance is denied access to a newly created AWS KMS CMK used for decrypt actions.

The environment has the following configuration:

The instance is allowed the kms:Decrypt action in its IAM role for all resources The AWS KMS CMK status is set to enabled The instance can communicate with the KMS API using a configured VPC endpoint What is causing the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 233

Report Export Collapse

A company has enabled Amazon GuardDuty in all Regions as part of its security monitoring strategy.

In one of the VPCs, the company hosts an Amazon EC2 instance working as an FTP server that is contacted by a high number of clients from multiple locations. This is identified by GuardDuty as a brute force attack due to the high number of connections that happen every hour.

The finding has been flagged as a false positive. However, GuardDuty keeps raising the issue. A Security Engineer has been asked to improve the signal-to-noise ratio. The Engineer needs to ensure that changes do not compromise the visibility of potential anomalous behavior.

How can the Security Engineer address the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 234

Report Export Collapse

What are the MOST secure ways to protect the AWS account root user of a recently opened AWS account? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 235

Report Export Collapse

A company hosts a popular web application that connects to an Amazon RDS MySQL DB instance running in a private VPC subnet that was created with default ACL settings. The IT Security department has a suspicion that a DDos attack is coming from a suspecting IP. How can you protect the subnets from this attack?

Please select:

Become a Premium Member for full access
  Unlock Premium Member

Question 236

Report Export Collapse

You are designing a custom IAM policy that would allow uses to list buckets in S3 only if they are MFA authenticated. Which of the following would best match this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 237

Report Export Collapse

You are hosting a web site via website hosting on an S3 bucket - http://demo.s3-website-us-east-l.amazonaws.com. You have some web pages that use Javascript that access resources in anotherbucket which has web site hosting also enabled. But when users access the web pages , they aregetting a blocked Javascript error. How can you rectify this? Please select:

Become a Premium Member for full access
  Unlock Premium Member

Question 238

Report Export Collapse

You have a vendor that needs access to an AWS resource. You create an AWS user account. You want to restrict access to the resource using a policy for just that user over a brief period. Which of the following would be an ideal policy to use?

Please select:

Become a Premium Member for full access
  Unlock Premium Member

Question 239

Report Export Collapse

Your company has a requirement to monitor all root user activity by notification. How can this best be achieved? Choose 2 answers from the options given below. Each answer forms part of the solution Please select:

Become a Premium Member for full access
  Unlock Premium Member

Question 240

Report Export Collapse

A company wants to have a secure way of generating, storing and managing cryptographic exclusive access for the keys. Which of the following can be used for this purpose?

Please select:

Become a Premium Member for full access
  Unlock Premium Member
Total 590 questions
Go to page: of 59
Search

Related questions