ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











A company's development team is designing an application using AWS Lambda and Amazon Elastic Container Service (Amazon ECS). The development team needs to create IAM roles to support these systems. The company's security team wants to allow the developers to build IAM roles directly, but the security team wants to retain control over the permissions the developers can delegate to those roles. The development team needs access to more permissions than those required for the application's AWS services. The solution must minimize management overhead.

How should the security team prevent privilege escalation for both teams?

A.
Enable AWS CloudTrail. Create a Lambda function that monitors the event history for privilege escalation events and notifies the security team.
A.
Enable AWS CloudTrail. Create a Lambda function that monitors the event history for privilege escalation events and notifies the security team.
Answers
B.
Create a managed IAM policy for the permissions required. Reference the IAM policy as a permissions boundary within the development team's IAM role.
B.
Create a managed IAM policy for the permissions required. Reference the IAM policy as a permissions boundary within the development team's IAM role.
Answers
C.
Enable AWS Organizations Create an SCP that allows the IAM CreateUser action but that has a condition that prevents API calls other than those required by the development team
C.
Enable AWS Organizations Create an SCP that allows the IAM CreateUser action but that has a condition that prevents API calls other than those required by the development team
Answers
D.
Create an IAM policy with a deny on the IAMCreateUser action and assign the policy to the development team. Use a ticket system to allow the developers to request new IAM roles for their applications. The IAM roles will then be created by the security team.
D.
Create an IAM policy with a deny on the IAMCreateUser action and assign the policy to the development team. Use a ticket system to allow the developers to request new IAM roles for their applications. The IAM roles will then be created by the security team.
Answers
Suggested answer: A

After multiple compromises of its Amazon EC2 instances, a company's Security Officer is mandating that memory dumps of compromised instances be captured for further analysis. A Security Engineer just received an EC2 abuse notification report from AWS stating that an EC2 instance running the most recent Windows Server 2019 Base AMI is compromised. How should the Security Engineer collect a memory dump of the EC2 instance for forensic analysis?

A.
Give consent to the AWS Security team to dump the memory core on the compromised instance and provide it to AWS Support for analysis.
A.
Give consent to the AWS Security team to dump the memory core on the compromised instance and provide it to AWS Support for analysis.
Answers
B.
Review memory dump data that the AWS Systems Manager Agent sent to Amazon CloudWatch Logs.
B.
Review memory dump data that the AWS Systems Manager Agent sent to Amazon CloudWatch Logs.
Answers
C.
Download and run the EC2Rescue for Windows Server utility from AWS.
C.
Download and run the EC2Rescue for Windows Server utility from AWS.
Answers
D.
Reboot the EC2 Windows Server, enter safe mode, and select memory dump.
D.
Reboot the EC2 Windows Server, enter safe mode, and select memory dump.
Answers
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/ec2rw-cli.html

A Security Engineer is troubleshooting a connectivity issue between a web server that is writing log files to the logging server in another VPC. The Engineer has confirmed that a peering relationship exists between the two VPCs. VPC flow logs show that requests sent from the web server are accepted by the togging server but the web server never receives a reply Which of the following actions could fix this issue1?

A.
Add an inbound rule to the security group associated with the logging server that allows requests from the web server
A.
Add an inbound rule to the security group associated with the logging server that allows requests from the web server
Answers
B.
Add an outbound rule to the security group associated with the web server that allows requests to the logging server.
B.
Add an outbound rule to the security group associated with the web server that allows requests to the logging server.
Answers
C.
Add a route to the route table associated with the subnet that hosts the logging server that targets the peering connection
C.
Add a route to the route table associated with the subnet that hosts the logging server that targets the peering connection
Answers
D.
Add a route to the route table associated with the subnet that hosts the web server that targets the peering connection
D.
Add a route to the route table associated with the subnet that hosts the web server that targets the peering connection
Answers
Suggested answer: C

A company has several critical applications running on a large fleet of Amazon EC2 instances. As part of a security operations review, the company needs to apply a critical operating system patch to EC2 instances within 24 hours of the patch becoming available from the operating system vendor. The company does not have a patching solution deployed on AWS, but does have AWS Systems Manager configured. The solution must also minimize administrative overhead. What should a security engineer recommend to meet these requirements?

A.
Create an AWS Config rule defining the patch as a required configuration for EC2 instances.
A.
Create an AWS Config rule defining the patch as a required configuration for EC2 instances.
Answers
B.
Use the AWS Systems Manager Run Command to patch affected instances.
B.
Use the AWS Systems Manager Run Command to patch affected instances.
Answers
C.
Use an AWS Systems Manager Patch Manager predefined baseline to patch affected instances.
C.
Use an AWS Systems Manager Patch Manager predefined baseline to patch affected instances.
Answers
D.
Use AWS Systems Manager Session Manager to log in to each affected instance and apply the patch.
D.
Use AWS Systems Manager Session Manager to log in to each affected instance and apply the patch.
Answers
Suggested answer: B

A security engineer has noticed an unusually high amount of traffic coming from a single IP address. This was discovered by analyzing the Application Load Balancer's access logs. How can the security engineer limit the number of requests from a specific IP address without blocking the IP address?

A.
Add a rule to the Application Load Balancer to route the traffic originating from the IP address in question and show a static webpage.
A.
Add a rule to the Application Load Balancer to route the traffic originating from the IP address in question and show a static webpage.
Answers
B.
Implement a rate-based rule with AWS WAF
B.
Implement a rate-based rule with AWS WAF
Answers
C.
Use AWS Shield to limit the originating traffic hit rate.
C.
Use AWS Shield to limit the originating traffic hit rate.
Answers
D.
Implement the GeoLocation feature in Amazon Route 53.
D.
Implement the GeoLocation feature in Amazon Route 53.
Answers
Suggested answer: C

A security engineer has noticed an unusually high amount of traffic coming from a single IP address. This was discovered by analyzing the Application Load Balancer's access logs. How can the security engineer limit the number of requests from a specific IP address without blocking the IP address?

A.
Add a rule to the Application Load Balancer to route the traffic originating from the IP address in question and show a static webpage.
A.
Add a rule to the Application Load Balancer to route the traffic originating from the IP address in question and show a static webpage.
Answers
B.
Implement a rate-based rule with AWS WAF
B.
Implement a rate-based rule with AWS WAF
Answers
C.
Use AWS Shield to limit the originating traffic hit rate.
C.
Use AWS Shield to limit the originating traffic hit rate.
Answers
D.
Implement the GeoLocation feature in Amazon Route 53.
D.
Implement the GeoLocation feature in Amazon Route 53.
Answers
Suggested answer: B

A company’s information security team wants to analyze Amazon EC2 performance and utilization data in the near-real time for anomalies. A Sec Engineer is responsible for log aggregation. The Engineer must collect logs from all of the company’s AWS accounts in centralized location to perform the analysis.

How should the Security Engineer do this?

Log in to each account four te a day and filter the AWS CloudTrail log data, then copy and paste the logs in to the Amazon S3 bucket in the destination account.

A.
Set up Amazon CloudWatch to stream data to an Amazon S3 bucket in each source account. Set up bucket replication for each source account into a centralized bucket owned by the security Engineer.
A.
Set up Amazon CloudWatch to stream data to an Amazon S3 bucket in each source account. Set up bucket replication for each source account into a centralized bucket owned by the security Engineer.
Answers
B.
Set up an AWS Config aggregator to collect AWS configuration data from multiple sources.
B.
Set up an AWS Config aggregator to collect AWS configuration data from multiple sources.
Answers
C.
Set up an AWS config aggregator to collect AWS configuration data from multiple sources.
C.
Set up an AWS config aggregator to collect AWS configuration data from multiple sources.
Answers
D.
Set up Amazon CloudWatch cross-account log data sharing with subscriptions in each account.Send the logs to Amazon Kinesis Data Firehose in the Security Engineer’s account.
D.
Set up Amazon CloudWatch cross-account log data sharing with subscriptions in each account.Send the logs to Amazon Kinesis Data Firehose in the Security Engineer’s account.
Answers
Suggested answer: A

A company wants to encrypt the private network between its orvpremises environment and AWS.

The company also wants a consistent network experience for its employees.

What should the company do to meet these requirements?

A.
Establish an AWS Direct Connect connection with AWS and set up a Direct Connect gateway. In the Direct Connect gateway configuration, enable IPsec and BGP, and then leverage native AWS network encryption between Availability Zones and Regions,
A.
Establish an AWS Direct Connect connection with AWS and set up a Direct Connect gateway. In the Direct Connect gateway configuration, enable IPsec and BGP, and then leverage native AWS network encryption between Availability Zones and Regions,
Answers
B.
Establish an AWS Direct Connect connection with AWS and set up a Direct Connect gateway. Using the Direct Connect gateway, create a private virtual interface and advertise the customer gateway private IP addresses. Create a VPN connection using the customer gateway and the virtual private gateway
B.
Establish an AWS Direct Connect connection with AWS and set up a Direct Connect gateway. Using the Direct Connect gateway, create a private virtual interface and advertise the customer gateway private IP addresses. Create a VPN connection using the customer gateway and the virtual private gateway
Answers
C.
Establish a VPN connection with the AWS virtual private cloud over the internet
C.
Establish a VPN connection with the AWS virtual private cloud over the internet
Answers
D.
Establish an AWS Direct Connect connection with AWS and establish a public virtual interface. For prefixes that need to be advertised, enter the customer gateway public IP addresses. Create a VPN connection over Direct Connect using the customer gateway and the virtual private gateway.
D.
Establish an AWS Direct Connect connection with AWS and establish a public virtual interface. For prefixes that need to be advertised, enter the customer gateway public IP addresses. Create a VPN connection over Direct Connect using the customer gateway and the virtual private gateway.
Answers
Suggested answer: D

A security engineer is auditing a production system and discovers several additional IAM roles that are not required and were not previously documented during the last audit 90 days ago. The engineer is trying to find out who created these IAM roles and when they were created. The solution must have the lowest operational overhead.

Which solution will meet this requirement?

A.
Import AWS CloudTrail logs from Amazon S3 into an Amazon Elasticsearch Service cluster, and search through the combined logs for CreateRole events.
A.
Import AWS CloudTrail logs from Amazon S3 into an Amazon Elasticsearch Service cluster, and search through the combined logs for CreateRole events.
Answers
B.
Create a table in Amazon Athena for AWS CloudTrail events. Query the table in Amazon Athena for CreateRole events.
B.
Create a table in Amazon Athena for AWS CloudTrail events. Query the table in Amazon Athena for CreateRole events.
Answers
C.
Use AWS Config to look up the configuration timeline for the additional IAM roles and view the linked AWS CloudTrail event.
C.
Use AWS Config to look up the configuration timeline for the additional IAM roles and view the linked AWS CloudTrail event.
Answers
D.
Download the credentials report from the IAM console to view the details for each IAM entity, including the creation dates.
D.
Download the credentials report from the IAM console to view the details for each IAM entity, including the creation dates.
Answers
Suggested answer: A

A company had one of its Amazon EC2 key pairs compromised. A Security Engineer must identify which current Linux EC2 instances were deployed and used the compromised key pair. How can this task be accomplished?

A.
Obtain the list of instances by directly querying Amazon EC2 using: aws ec2 describe-instances -- fi1ters "Name=key-name,Values=KEYNAMEHERE".
A.
Obtain the list of instances by directly querying Amazon EC2 using: aws ec2 describe-instances -- fi1ters "Name=key-name,Values=KEYNAMEHERE".
Answers
B.
Obtain the fingerprint for the key pair from the AWS Management Console, then search for the fingerprint in the Amazon Inspector logs.
B.
Obtain the fingerprint for the key pair from the AWS Management Console, then search for the fingerprint in the Amazon Inspector logs.
Answers
C.
Obtain the output from the EC2 instance metadata using: curl http://169.254.169.254/latest/meta-data/public- keys/0/.
C.
Obtain the output from the EC2 instance metadata using: curl http://169.254.169.254/latest/meta-data/public- keys/0/.
Answers
D.
Obtain the fingerprint for the key pair from the AWS Management Console, then search for the fingerprint in Amazon CloudWatch Logs using: aws logs filter-log-events.
D.
Obtain the fingerprint for the key pair from the AWS Management Console, then search for the fingerprint in Amazon CloudWatch Logs using: aws logs filter-log-events.
Answers
Suggested answer: A
Total 590 questions
Go to page: of 59