ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 25

Question list
Search
Search

List of questions

Search

Related questions











A company is hosting a website that must be accessible to users for HTTPS traffic. Also port 22 shouldbe open for administrative purposes. The administrator's workstation has a static IP address of203.0.113.1/32. Which of the following security group configurations are the MOST secure but stillfunctional to support these requirements? Choose 2 answers from the options given belowPlease select:

A.
Port 443 coming from 0.0.0.0/0
A.
Port 443 coming from 0.0.0.0/0
Answers
B.
Port 443 coming from 10.0.0.0/16
B.
Port 443 coming from 10.0.0.0/16
Answers
C.
Port 22 coming from 0.0.0.0/0
C.
Port 22 coming from 0.0.0.0/0
Answers
D.
Port 22 coming from 203.0.113.1/32
D.
Port 22 coming from 203.0.113.1/32
Answers
Suggested answer: A, D

Explanation:

Since HTTPS traffic is required for all users on the Internet, Port 443 should be open on all IPaddresses. For port 22, the traffic should be restricted to an internal subnet. Option B is invalid, because this only allow traffic from a particular CIDR block and not from the internet Option C is invalid because allowing port 22 from the internet is a security risk For more information on AWS Security Groups, please visit the following UR

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/usins-network-secunty.htmllThe correct answers are: Port 443 coming from 0.0.0.0/0, Port 22 coming from 203.0.113.1 /32Submit your Feedback/Queries to our Experts

Your company has an EC2 Instance that is hosted in an AWS VPC. There is a requirement to ensure that logs files from the EC2 Instance are stored accordingly. The access should also be limited for the destination of the log files. How can this be accomplished? Choose 2 answers from the options given below. Each answer forms part of the solution Please select:

A.
Stream the log files to a separate Cloudtrail trail
A.
Stream the log files to a separate Cloudtrail trail
Answers
B.
Stream the log files to a separate Cloudwatch Log group
B.
Stream the log files to a separate Cloudwatch Log group
Answers
C.
Create an IAM policy that gives the desired level of access to the Cloudtrail trail
C.
Create an IAM policy that gives the desired level of access to the Cloudtrail trail
Answers
D.
Create an IAM policy that gives the desired level of access to the Cloudwatch Log group
D.
Create an IAM policy that gives the desired level of access to the Cloudwatch Log group
Answers
Suggested answer: B, D

Explanation:

You can create a Log group and send all logs from the EC2 Instance to that group. You can then limit the access to the Log groups via an IAM policy. Option A is invalid because Cloudtrail is used to record API activity and not for storing log files Option C is invalid because Cloudtrail is the wrong service to be used for this requirement For more information on Log Groups and Log Streams, please visit the following URL:

* https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/Workinj

For more information on Access to Cloudwatch logs, please visit the following URL:

* https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/auth-and-access-control-cwl.htmlThe correct answers are: Stream the log files to a separate Cloudwatch Log group. Create an IAMpolicy that gives the desired level of access to the Cloudwatch Log groupSubmit your Feedback/Queries to our Experts

You have an Ec2 Instance in a private subnet which needs to access the KMS service. Which of the following methods can help fulfil this requirement, keeping security in perspective Please select:

A.
Use a VPC endpoint
A.
Use a VPC endpoint
Answers
B.
Attach an Internet gateway to the subnet
B.
Attach an Internet gateway to the subnet
Answers
C.
Attach a VPN connection to the VPC
C.
Attach a VPN connection to the VPC
Answers
D.
Use VPC Peering
D.
Use VPC Peering
Answers
Suggested answer: A

Explanation:

The AWS Documentation mentions the following

You can connect directly to AWS KMS through a private endpoint in your VPC instead of connecting over the internet. When you use a VPC endpoint communication between your VPC and AWS KMS is conducted entirely within the AWS network.

Option B is invalid because this could open threats from the internet Option C is invalid because this is normally used for communication between on-premise environments and AWS. Option D is invalid because this is normally used for communication between VPCs For more information on accessing KMS via an endpoint, please visit the following URL https://docs.aws.amazon.com/kms/latest/developerguide/kms-vpc-endpoint.htmllThe correct answer is: Use a VPC endpoint Submit your Feedback/Queries to our Experts

You have a web site that is sitting behind AWS Cloudfront. You need to protect the web site against threats such as SQL injection and Cross site scripting attacks. Which of the following service can help in such a scenario Please select:

A.
AWS Trusted Advisor
A.
AWS Trusted Advisor
Answers
B.
AWS WAF
B.
AWS WAF
Answers
C.
AWS Inspector
C.
AWS Inspector
Answers
D.
AWS Config
D.
AWS Config
Answers
Suggested answer: B

Explanation:

The AWS Documentation mentions the following

AWS WAF is a web application firewall that helps detect and block malicious web requests targeted at your web applications. AWS WAF allows you to create rules that can help protect against common web exploits like SQL injection and cross-site scripting. With AWS WAF you first identify the resource (either an Amazon CloudFront distribution or an Application Load Balancer) that you need to protect. Option A is invalid because this will only give advise on how you can better the security in your AWS account but not protect against threats mentioned in the question. Option C is invalid because this can be used to scan EC2 Instances for vulnerabilities but not protect against threats mentioned in the question. Option D is invalid because this can be used to check config changes but not protect against threats mentioned in the quest For more information on AWS WAF, please visit the following URL:

https://aws.amazon.com/waf/details;The correct answer is: AWS WAFSubmit your Feedback/Queries to our Experts

Your company has a set of resources defined in the AWS Cloud. Their IT audit department has requested to get a list of resources that have been defined across the account. How can this be achieved in the easiest manner? Please select:

A.
Create a powershell script using the AWS CLI. Query for all resources with the tag of production.
A.
Create a powershell script using the AWS CLI. Query for all resources with the tag of production.
Answers
B.
Create a bash shell script with the AWS CLI. Query for all resources in all regions. Store the results in an S3 bucket.
B.
Create a bash shell script with the AWS CLI. Query for all resources in all regions. Store the results in an S3 bucket.
Answers
C.
Use Cloud Trail to get the list of all resources
C.
Use Cloud Trail to get the list of all resources
Answers
D.
Use AWS Config to get the list of all resources
D.
Use AWS Config to get the list of all resources
Answers
Suggested answer: D

Explanation:

The most feasible option is to use AWS Config. When you turn on AWS Config, you will get a list of resources defined in your AWS Account. A sample snapshot of the resources dashboard in AWS Config is shown below

Option A is incorrect because this would give the list of production based resources and now all resources Option B is partially correct But this will just add more maintenance overhead.

Option C is incorrect because this can be used to log API activities but not give an account of all resou For more information on AWS Config, please visit the below URL:

https://docs.aws.amazon.com/config/latest/developereuide/how-does-confie-work.htmlThe correct answer is: Use AWS Config to get the list of all resourcesSubmit your Feedback/Queries to our Experts

A Lambda function reads metadata from an S3 object and stores the metadata in a DynamoDB table.

The function is triggered whenever an object is stored within the S3 bucket.

How should the Lambda function be given access to the DynamoDB table?

Please select:

A.
Create a VPC endpoint for DynamoDB within a VPC. Configure the Lambda function to access resources in the VPC.
A.
Create a VPC endpoint for DynamoDB within a VPC. Configure the Lambda function to access resources in the VPC.
Answers
B.
Create a resource policy that grants the Lambda function permissions to write to the DynamoDB table. Attach the poll to the DynamoDB table.
B.
Create a resource policy that grants the Lambda function permissions to write to the DynamoDB table. Attach the poll to the DynamoDB table.
Answers
C.
Create an IAM user with permissions to write to the DynamoDB table. Store an access key for that user in the Lambda environment variables.
C.
Create an IAM user with permissions to write to the DynamoDB table. Store an access key for that user in the Lambda environment variables.
Answers
D.
Create an IAM service role with permissions to write to the DynamoDB table. Associate that role with the Lambda function.
D.
Create an IAM service role with permissions to write to the DynamoDB table. Associate that role with the Lambda function.
Answers
Suggested answer: D

Explanation:

The ideal way is to create an IAM role which has the required permissions and then associate it with the Lambda function The AWS Documentation additionally mentions the following Each Lambda function has an IAM role (execution role) associated with it. You specify the IAM role when you create your Lambda function. Permissions you grant to this role determine what AWS Lambda can do when it assumes the role. There are two types of permissions that you grant to the IAM role:

If your Lambda function code accesses other AWS resources, such as to read an object from an S3 bucket or write logs to CloudWatch Logs, you need to grant permissions for relevant Amazon S3 and CloudWatch actions to the role. If the event source is stream-based (Amazon Kinesis Data Streams and DynamoDB streams), AWS Lambda polls these streams on your behalf. AWS Lambda needs permissions to poll the stream and read new records on the stream so you need to grant the relevant permissions to this role.

Option A is invalid because the VPC endpoint allows access instances in a private subnet to access DynamoDB Option B is invalid because resources policies are present for resources such as S3 and KMS, but not AWS Lambda Option C is invalid because AWS Roles should be used and not IAM Users For more information on the Lambda permission model, please visit the below URL:

https://docs.aws.amazon.com/lambda/latest/dg/intro-permission-model.htmlThe correct answer is: Create an IAM service role with permissions to write to the DynamoDB table. Associate that role with the Lambda function.

Submit your Feedback/Queries to our Exp

Your company has defined privileged users for their AWS Account. These users are administrators for key resources defined in the company. There is now a mandate to enhance the security authentication for these users. How can this be accomplished?

Please select:

A.
Enable MFA for these user accounts
A.
Enable MFA for these user accounts
Answers
B.
Enable versioning for these user accounts
B.
Enable versioning for these user accounts
Answers
C.
Enable accidental deletion for these user accounts
C.
Enable accidental deletion for these user accounts
Answers
D.
Disable root access for the users
D.
Disable root access for the users
Answers
Suggested answer: A

Explanation:

The AWS Documentation mentions the following as a best practices for IAM users. For extra security, enable multi-factor authentication (MFA) for privileged IAM users (users who are allowed access to sensitive resources or APIs). With MFA, users have a device that generates unique authentication code (a one-time password, or OTP). Users must provide both their normal credentials (like their user name and password) and the OTP. The MFA device can either be a special piece of hardware, or it can be a virtual device (for example, it can run in an app on a smartphone). Option B,C and D are invalid because no such security options are available in AWS For more information on IAM best practices, please visit the below URL https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html The correct answer is:

Enable MFA for these user accounts

Submit your Feedback/Queries to our Experts

An application running on EC2 instances must use a username and password to access a database.

The developer has stored those secrets in the SSM Parameter Store with type SecureString using the default KMS CMK. Which combination of configuration steps will allow the application to access the secrets via the API? Select 2 answers from the options below Please select:

A.
Add the EC2 instance role as a trusted service to the SSM service role.
A.
Add the EC2 instance role as a trusted service to the SSM service role.
Answers
B.
Add permission to use the KMS key to decrypt to the SSM service role.
B.
Add permission to use the KMS key to decrypt to the SSM service role.
Answers
C.
Add permission to read the SSM parameter to the EC2 instance role..
C.
Add permission to read the SSM parameter to the EC2 instance role..
Answers
D.
Add permission to use the KMS key to decrypt to the EC2 instance role
D.
Add permission to use the KMS key to decrypt to the EC2 instance role
Answers
E.
Add the SSM service role as a trusted service to the EC2 instance role.
E.
Add the SSM service role as a trusted service to the EC2 instance role.
Answers
Suggested answer: C, D

Explanation:

The below example policy from the AWS Documentation is required to be given to the EC2 Instance in order to read a secure string from AWS KMS. Permissions need to be given to the Get Parameter API and the KMS API call to decrypt the secret.

Option A is invalid because roles can be attached to EC2 and not EC2 roles to SSM Option B is invalid because the KMS key does not need to decrypt the SSM service role. Option E is invalid because this configuration is valid For more information on the parameter store, please visit the below URL:

https://docs.aws.amazon.com/kms/latest/developerguide/services-parameter-store.htmllThe correct answers are: Add permission to read the SSM parameter to the EC2 instance role., Addpermission to use the KMS key to decrypt to the EC2 instance roleSubmit your Feedback/Queries to our Experts

When you enable automatic key rotation for an existing CMK key where the backing key is managed by AWS, after how long is the key rotated? Please select:

A.
After 30 days
A.
After 30 days
Answers
B.
After 128 days
B.
After 128 days
Answers
C.
After 365 days
C.
After 365 days
Answers
D.
After 3 years
D.
After 3 years
Answers
Suggested answer: D

Explanation:

The AWS Documentation states the following

• AWS managed CM Ks: You cannot manage key rotation for AWS managed CMKs. AWS KMS automatically rotates AWS managed keys every three years (1095 days). Note: AWS-managed CMKs are rotated every 3yrs, Customer-Managed CMKs are rotated every 365- days from when rotation is enabled. Option A, B, C are invalid because the dettings for automatic key rotation is not changeable.

For more information on key rotation please visit the below URL

https://docs.aws.amazon.com/kms/latest/developereuide/rotate-keys.htmlAWS managed CMKs are CMKs in your account that are created, managed, and used on your behalfby an AWS service that is integrated with AWS KMS. This CMK is unique to your AWS account andregion. Only the service that created the AWS managed CMK can use itYou can login to you IAM dashbaord . Click on "Encryption Keys"You will find the list based on the services you are using as follows:

• aws/elasticfilesystem 1 aws/lightsail

• aws/s3

• aws/rds and many more

Detailed Guide: KMS

You can recognize AWS managed CMKs because their aliases have the format aws/service-name, such as aws/redshift. Typically, a service creates its AWS managed CMK in your account when you set up the service or the first time you use the CMfC The AWS services that integrate with AWS KMS can use it in many different ways. Some services create AWS managed CMKs in your account. Other services require that you specify a customer managed CMK that you have created. And, others support both types of CMKs to allow you the ease of an AWS managed CMK or the control of a customer-managed CMK Rotation period for CMKs is as follows:

• AWS managed CMKs: 1095 days

• Customer managed CMKs: 365 days

Since question mentions about "CMK where backing keys is managed by AWS", its Amazon(AWS) managed and its rotation period turns out to be 1095 days{every 3 years) For more details, please check below AWS Docs:

https://docs.aws.amazon.com/kms/latest/developerguide/concepts.htmlThe correct answer is: After 3 yearsSubmit your Feedback/Queries to our Experts

You have a 2 tier application hosted in AWS. It consists of a web server and database server (SQL Server) hosted on separate EC2 Instances. You are devising the security groups for these EC2 Instances. The Web tier needs to be accessed by users across the Internet. You have created a web security group(wg-123) and database security group(db-345). Which combination of the following security group rules will allow the application to be secure and functional. Choose 2 answers from the options given below.

Please select:

A.
wg-123 -Allow ports 80 and 443 from 0.0.0.0/0
A.
wg-123 -Allow ports 80 and 443 from 0.0.0.0/0
Answers
B.
db-345 - Allow port 1433 from wg-123
B.
db-345 - Allow port 1433 from wg-123
Answers
C.
wg-123 - Allow port 1433 from wg-123
C.
wg-123 - Allow port 1433 from wg-123
Answers
D.
db-345 -Allow ports 1433 from 0.0.0.0/0
D.
db-345 -Allow ports 1433 from 0.0.0.0/0
Answers
Suggested answer: A, B

Explanation:

The Web security groups should allow access for ports 80 and 443 for HTTP and HTTPS traffic to allusers from the internet. The database security group should just allow access from the web security group from port 1433.

Option C is invalid because this is not a valid configuration

Option D is invalid because database security should not be allowed on the internet For more information on Security Groups please visit the below URL:

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/usins-network-security.htmllThe correct answers are: wg-123 - Allow ports 80 and 443 from 0.0.0.0/0, db-345 - Allow port 1433from wg-123Submit your Feedback/Queries to our Experts

Total 590 questions
Go to page: of 59